Will the SIDR model succeed where the IRR model failed? (Part I)
Guest post: In this two-part post, PacketDesign’s Cengiz Alaettinoglou, gives a brief overview and comparison of the IRR and SIDR security models.
Guest post: In this two-part post, PacketDesign’s Cengiz Alaettinoglou, gives a brief overview and comparison of the IRR and SIDR security models.
A report on the discussions at the RIPE 70 BoF session on Internet Routing Registries.
Secure you place now at the APNIC 40 workshops. Choose from MPLS Deployment, Advanced BGP and Network Security.
At the IEPG session at IETF92, Dallas, Yasuhiro Ohara from NTT showed his BGP tool bgpdump2. This is a really sweet package which can be used to compare BGP RIB dumps.
Geoff Huston outlines some examples of route hijacks from a presentation by Andree Toonk at NANOG 63.
APNIC staff attended and presented at the 2015 NZNOG conference from 26 to 30 January 2015.
The 25th South Asia Network Operators Group (SANOG) conference was held in Kandy, Sri Lanka from 16 to 24 January 2015.
No doubt we have all heard that the Internet is really quite big. Is there anyway to “see” the entirety of this network?
What’s the average announcement?
Are you Ready to ROA? Adli Wahid discusses Resource Origin Authorizations and why you should create yours now in MyAPNIC.