he 发帖数: 2025 | 1 2012就要过去了,手边厚厚一摞有意思有价值的资料,没空没精力去实践,眼高手低
莫过于此。
准备带上左轮,打他几百发败败火。 |
x*********n 发帖数: 28013 | 2 cisco chicago最近再招voice的,你挺合适的。
BTW,大家怎么度过entry level啊。我感觉完全被压制了,每天搞些完全没技术含量的
,只能偷偷看看配置。
搭车问一个问题啊。
我是ISP,他是客户。
他要玩AS-prepend,我ip as-path access-list 60 permit ^31969$够了么?
这个能不能允许很多相同的AS prepend啊? |
z**r 发帖数: 17771 | 3 爽,俺一直想买枪,家里一直不让。羡慕
【在 he 的大作中提到】 : 2012就要过去了,手边厚厚一摞有意思有价值的资料,没空没精力去实践,眼高手低 : 莫过于此。 : 准备带上左轮,打他几百发败败火。
|
j*a 发帖数: 14423 | 4 专心炒股去
【在 x*********n 的大作中提到】 : cisco chicago最近再招voice的,你挺合适的。 : BTW,大家怎么度过entry level啊。我感觉完全被压制了,每天搞些完全没技术含量的 : ,只能偷偷看看配置。 : 搭车问一个问题啊。 : 我是ISP,他是客户。 : 他要玩AS-prepend,我ip as-path access-list 60 permit ^31969$够了么? : 这个能不能允许很多相同的AS prepend啊?
|
s*****g 发帖数: 1055 | 5 No, it won't work, regexp ^31969$ won't match as-path with multiple 31969 in
it, you probably need a combination of filter-list and prefix-list in this
case, something like ^31969_[31969]*$ and only allow legitimate prefixes to
come in from this AS.
So a side question, does anybody here have tier-1 ISP operation experience?
how does a typical tier-1 ISP configure their BGP filters to block illegal
advertisement from a peer or a customer? do they participate RPKI? if so,
dothey use some kind of offline tool to generate configuration? what if a
legitimate prefix owner did not participate RPKI?
Another side question, you work for Qwest or Time Warner :-)
【在 x*********n 的大作中提到】 : cisco chicago最近再招voice的,你挺合适的。 : BTW,大家怎么度过entry level啊。我感觉完全被压制了,每天搞些完全没技术含量的 : ,只能偷偷看看配置。 : 搭车问一个问题啊。 : 我是ISP,他是客户。 : 他要玩AS-prepend,我ip as-path access-list 60 permit ^31969$够了么? : 这个能不能允许很多相同的AS prepend啊?
|
j*a 发帖数: 14423 | 6 isp uses acl/prefix-list to perform filtering facing customers.
when you say tier-1, do u mean between isps? i guess they dont use
filtering.
in
this
?
【在 s*****g 的大作中提到】 : No, it won't work, regexp ^31969$ won't match as-path with multiple 31969 in : it, you probably need a combination of filter-list and prefix-list in this : case, something like ^31969_[31969]*$ and only allow legitimate prefixes to : come in from this AS. : So a side question, does anybody here have tier-1 ISP operation experience? : how does a typical tier-1 ISP configure their BGP filters to block illegal : advertisement from a peer or a customer? do they participate RPKI? if so, : dothey use some kind of offline tool to generate configuration? what if a : legitimate prefix owner did not participate RPKI? : Another side question, you work for Qwest or Time Warner :-)
|
s*****g 发帖数: 1055 | 7 Tier-1 will have a lot of tier-2/3 customers, right?
【在 j*a 的大作中提到】 : isp uses acl/prefix-list to perform filtering facing customers. : when you say tier-1, do u mean between isps? i guess they dont use : filtering. : : in : this : ? :
|
x*********n 发帖数: 28013 | 8 哦。。谢谢。
我们上面是qwest,我们是tier 4 or 5 or 6 ISP,哈哈哈。
大哥,我不行了,没前途了,被压制了。哎。
in
this
to
?
【在 s*****g 的大作中提到】 : No, it won't work, regexp ^31969$ won't match as-path with multiple 31969 in : it, you probably need a combination of filter-list and prefix-list in this : case, something like ^31969_[31969]*$ and only allow legitimate prefixes to : come in from this AS. : So a side question, does anybody here have tier-1 ISP operation experience? : how does a typical tier-1 ISP configure their BGP filters to block illegal : advertisement from a peer or a customer? do they participate RPKI? if so, : dothey use some kind of offline tool to generate configuration? what if a : legitimate prefix owner did not participate RPKI? : Another side question, you work for Qwest or Time Warner :-)
|
x*********n 发帖数: 28013 | 9 早就亏废了,哈哈哈哈哈哈。
【在 j*a 的大作中提到】 : 专心炒股去
|
t*******r 发帖数: 3271 | 10 别嫌我嘴碎啊, 你就得考试才行. 来考JNCIE Lab吧
光为学习而学习对绝大多数人要求太高了, 这是大实话.
CCIE SP也行. |
x*********n 发帖数: 28013 | 11 我也想啊。考不出啊。
【在 t*******r 的大作中提到】 : 别嫌我嘴碎啊, 你就得考试才行. 来考JNCIE Lab吧 : 光为学习而学习对绝大多数人要求太高了, 这是大实话. : CCIE SP也行.
|
n**********l 发帖数: 271 | 12 这个败火的方法很有效的.....
CCIE SP感觉经验不够的话太难了
最近看到每个net eng position都要求Python/Perl/Shell... |
x*********n 发帖数: 28013 | 13 然后大家还在用MRTG?
【在 n**********l 的大作中提到】 : 这个败火的方法很有效的..... : CCIE SP感觉经验不够的话太难了 : 最近看到每个net eng position都要求Python/Perl/Shell...
|