[27132] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Yahoo! Lessons Learned

daemon@ATHENA.MIT.EDU (Chris Cappuccio)
Wed Feb 9 15:15:39 2000

Date: Wed, 9 Feb 2000 12:07:48 -0800 (PST)
From: Chris Cappuccio <chris@dqc.org>
To: Dan Hollis <goemon@sasami.anime.net>
Cc: Daniel Senie <dts@senie.com>,
	Andrew Brown <twofsonet@graffiti.com>,
	Vadim Antonov <avg@kotovnik.com>, nanog@nanog.org
In-Reply-To: <Pine.LNX.4.10.10002091133330.30532-100000@anime.net>
Message-ID: <Pine.BSO.4.21.0002091207080.11924-100000@dqc.org>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Errors-To: owner-nanog-outgoing@merit.edu


Funny.  On an as5300 with compression turned on, and 96 56K users dialed up
and active, I've never seen the CPU load go above 15%

On Wed, 9 Feb 2000, Dan Hollis wrote:

 | 
 | On Wed, 9 Feb 2000, Daniel Senie wrote:
 | > Dialup pools should also be protected. No sense in permitting problems
 | > to originate on a dialup modem or ISDN line. I know the Lucent/Ascend
 | > MAX product accepts an attribute Ascend-Source-IP-Check, which can be
 | > applied as a part of the RADIUS authentication. Have the large dialup
 | > wholesalers implemented this? 
 | 
 | When I asked a couple dialup wholesalers this question point blank last
 | year, the answer was no - because their routers/term servers didn't have
 | enough CPU to do filtering.
 | 
 | -Dan
 | 
 | 
 | 

---
Gates' Law: Every 18 months, the speed of software halves.



home help back first fref pref prev next nref lref last post