October 22nd, 2015

Five myths about cyberattacks

Over the last few decades we've seen the trend of B2B and B2C applications becoming a standard way of doing business. Almost every company is now connected, in both directions, interacting with both customers and suppliers. Big companies rush to adhere to PCI compliance (payment card industry data security standards), whilst small and medium companies just deal with infrastructure and ongoing matters. Usually, they are not concerned with security ... Continue reading →
July 17th, 2015

New REANNZ Weathermap shows our improved network

As you may have noticed – the layout of the network as presented on the front page of our live Weathermap has recently changed quite dramatically. This change is a result of the multiple improvements made to the network over the past year or so. These improvements have often been hidden from view through the Weathermap, so we are pleased that this now represents the network as it stands. The old ... Continue reading →
May 6th, 2015

Starting to think about security

The internet is a strange and wonderful place. You can find unicorns and videos of grumpy cats.  Unfortunately there are also bad guys on the internet. Today, we would like to talk about one way to deal with a specific type of event on the internet and how to respond to it. There is a type of disruptive event called a denial of service (DoS) attack.  (Some of you may ... Continue reading →
March 27th, 2015

The technical details of rate-limiting

Dylan Hall, a REANNZ network engineer, explains some of the technical details that underpin rate-limiting. In this post, he covers classification and enforcement, and how each are implemented on our Juniper-based network. This blog post expands on the rate-limiting information from last week. There are two significant parts of the international commodity rate-limiting that need to be implemented in our Juniper routers. The first is classification, distinguishing one member’s ... Continue reading →
March 19th, 2015

A more thorough explanation of rate-limiting

Recently, we sent out an email letting our members know that we will be implementing rate-limiting on our international commodity Internet network.  We received a nice email back asking for further information about what information we will provide to the membership about their network usage and how rate-limiting will be implemented.  Below is a slightly modified version of the email response we sent. The below is a general explanation of ... Continue reading →