Dear all,
We have the following hardware to give away for free:
2x WS-C3750X-48T-L (with stack cables)
1x WS-C2960G-24TC-L
4x Cisco 2901/K9 with HWIC-16A (incl. 1-2x CAB-HD8-ASYNC=)
4x Cisco Nexus C9396TX with N9K-M12PQ
12x Cisco QSFP-40G-SR-BD
~20x Cisco CVR-QSFP-SFP10G=
All hardware is in good condition.
The hardware needs to be collected at our office (Zurich Stadelhofen).
Contact me off list at markus.wellauer(a)datatrans.ch. First comes, first
served.
Best Regards,
Markus
--
Markus Wellauer
Teamleader Infrastructure
Datatrans AG
Kreuzbühlstrasse 26 • CH-8008 Zürich
+41 44 256 81 91 • www.datatrans.ch
Making technology fly. Since 2001. https://dtrx.ch/20Y
Dear SwiNOG community,
there has been a long wait, more delays but finally we're proud to announce the continuity of the SwiNOG meeting.
The 37th meeting of the Swiss Network Operators Group – SwiNOG will be held in Berne on top of the Gurten!
Thursday, 2nd of December 2021
We're still hoping to get a few more sponsors on board and there might be one or two more talks to be announced
Registration is open
https://register.swinog.ch/
Agenda (preliminary)
https://www.swinog.ch/meetings/swinog37/
Special Thanks to
[cid:image001.png@01D7D59C.BFFEA4B0]
supporting us with a Gold Sponsorship and hereby helping us to continue the NOG community in Switzerland
Best regards and looking forward to seeing you
SwiNOG Team
Please redistribute this mail, post it, talk about it, and invite your colleagues
Dear Community
We have a customer who operates hosting and uses a Windows Server 2019
as DNS for his hosting customers and for which we occasionally receive
complaints about this being an open resolver prone to DNS amplification
attacks.
Customers requirements:
* DNS reachable from the Internet, for the domains he is authoritative
for.
* DNS recursion available for hosting customers in his IP range.
He tells me, that he can only switch recursion on and off completely,
but not restrict the ip ranges for which is shall be available.
My quick search via Google, also only revealed how to turn recursion
off completely on a Windows Server 2019.
Hopefully some Microsoft Guru on this list, can tell, how to restrict
recursive access to certain IP ranges?
--
Mit freundlichen Grüssen
-Benoît Panizzon- @ HomeOffice und normal erreichbar
--
I m p r o W a r e A G - Leiter Commerce Kunden
______________________________________________________
Zurlindenstrasse 29 Tel +41 61 826 93 00
CH-4133 Pratteln Fax +41 61 826 93 01
Schweiz Web http://www.imp.ch
______________________________________________________
Hi
Thanks! I'll pass this on to our customer.
--
Mit freundlichen Grüssen
-Benoît Panizzon- @ HomeOffice und normal erreichbar
--
I m p r o W a r e A G - Leiter Commerce Kunden
______________________________________________________
Zurlindenstrasse 29 Tel +41 61 826 93 00
CH-4133 Pratteln Fax +41 61 826 93 01
Schweiz Web http://www.imp.ch
______________________________________________________
Dear Colleagues
We have a customer whose IP keep getting blocked by various CDN
operators.
If we change his IP, this solved the issue for a couple of days, then
he is blocked again. Actual IP: 87.102.212.133
At the moment, this IP is being blocked by the CDN used by:
klm.comnespresso.comeasyjet.com
I opened a case with Amazon, as this is the ones that host the
easyjet.com CDN but they replied that he is blocked 'upstream' by their
customer easyjet.
Our customer called the Easyjet Helpdesk, but they have no clue what
generates this error and sent him to is ISP :-/
We don't get any kind of complaints regarding the IP of this customer.
https://multirbl.valli.org/lookup/87.102.212.133.html
Two entries on blacklist I am not familiar with. One of them about an
email misconfiguration?
All the customer is seing on the webpage is:
=== snipp ===
Access Denied
You don't have permission to access "http://www.easyjet.com/" on this server.
Reference #18.57d61202.1634833697.32bab06
=== snapp ===
Any hints on how to solve or what blocking provider is used (all pages
show a very similar message with similar ID) are appreciated.
PS: Yes, google is finding reports of this exact issue. None I found
provided any useful hint on what causes the issue.
Mit freundlichen Grüssen
-Benoît Panizzon-
--
I m p r o W a r e A G - Leiter Commerce Kunden
______________________________________________________
Zurlindenstrasse 29 Tel +41 61 826 93 00
CH-4133 Pratteln Fax +41 61 826 93 01
Schweiz Web http://www.imp.ch
______________________________________________________
Hello Swinog,
The TLD zones .ch/.li make use of the RcodeZero Anycast DNS service of
nic.at since a few weeks (The nameserver letters d.nic.ch/d.nic.li to be
precise). Nic.at has now added an anycast node at SwissIX. In order to
get the best possible RTT and increased resiliency against potential
DDOS attacks on the DNS infrastructure we encourage network operators
peering at SwissIX without using the route servers to get in contact
with nic.at for direct peering:
AS1921, Peering @ SwissIX https://peeringdb.com/ix/60
IP addresses: 91.206.52.164, 2001:7f8:24::a4
Contact: ops(a)nic.at
The RcodeZero Anycast DNS node at this location provides DNS services
for multiple other TLDs.
Best regards,
Daniel
--
SWITCH DNS Operations
Hi,
The IANA AS Numbers registry has been updated to reflect the allocation of the following blocks to APNIC:
147770-148793 Assigned by APNIC 2021-10-11
148794-149817 Assigned by APNIC 2021-10-11
149818-150841 Assigned by APNIC 2021-10-11
150842-151865 Assigned by APNIC 2021-10-11
You can find the registry at:
https://www.iana.org/assignments/as-numbers/
The allocation was made in accordance with the Policy for Allocation of ASN Blocks to Regional Internet Registries:
https://www.icann.org/resources/pages/global-policy-asn-blocks-2010-09-21-en
Best Regards,
--
Selina Harrington
Lead IANA Services Specialist
https://www.swiss-leaks.net/
Some years back, when I was net admin, I was surprised how easy it was to
make you shut your mouth about whatever problem you find disgusting in our
society. A big DDoS in the dark corner of your network, et voilà, affaire
étouffée!
Those peoples seems able to help you in such case.
Regards.
--
Philippe Strauss
Hallo zusammen, weiter im Text auf Englisch
Bonjour à tous, continuez dans le texte en anglais
Ciao a tutti, continuate nel testo in inglese
PeeringDB wants input from network operators, exchange operators,
facility providers, content distributors and anyone who uses our
interconnection database. We are running an anonymous satisfaction
survey until 23:59 UTC on Friday, 8 October 2021 and would like your
feedback to help us make PeeringDB more useful to everyone involved in
connecting networks.
The survey is available in the six UN languages and Portuguese. We’re
happy with people providing free text comments in whichever language
they are happiest expressing themselves.
We’ll share the results and the new product roadmap early in 2022.
So click here [0] to help guide PeeringDB’s future development.
If you have an idea to improve PeeringDB you can share it on our low
traffic mailing lists [1] or create an issue [2] directly on GitHub. If
you find a data quality issue, please let us know at support(a)peeringdb.com.
Greetings
Arnold, also a PeeringDB Admin
[0] https://surveyhero.com/c/peeringdb2021usersurvey
[1] https://docs.peeringdb.com/#mailing-lists
[2] https://github.com/peeringdb/peeringdb/issues
--
Keep calm, keep distance, keep connected!
Arnold Nipper
email: arnold(a)nipper.de
mobile: +49 172 2650958
Dear all
Allow me a reminder for two events SWITCH, the Swiss NREN and registry for .ch is organising.
Sorry if you receive this invitation on multiple lists.
--
Are you ready for Swiss Web Security Day on 6 October? Do not forget to register.
All information, the registration, and the agenda can be found here:
https://swit.ch/websecurityday
Listen to exciting presentations on current topics such as DNSSEC or services that help you improve your privacy. The panel discussion “Swico industry recommendation Antiphishing measures for email providers” will round off the event.
We look forward to welcoming you on 6 October at our virtual Swiss Web Security Day.
Kind regards
p.s. you also might want to know, that the SWITCH Security Awareness Day is taking place on Oktober 5:
https://www.switch.ch/security/security-awareness-day/
—
Hope to see some of you online
Best regards
Michael Hausding