<?xml version="1.0" encoding="utf-8"?>
<?xml-stylesheet type="text/xsl" href="../../assets/xml/rss.xsl" media="all"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Philippe Strauss website (Articles sur Internet networking)</title><link>https://straussengineering.ch/</link><description></description><atom:link href="https://straussengineering.ch/fr/categories/internet-networking.xml" rel="self" type="application/rss+xml"></atom:link><language>fr</language><copyright>Contents © 2025 &lt;a href="mailto:catseyechandra74 at gmail dot com"&gt;Philippe Strauss&lt;/a&gt; 
&lt;a rel="license" href="https://creativecommons.org/licenses/by-nc-sa/4.0/"&gt;
&lt;img alt="Creative Commons License BY-NC-SA"
style="border-width:0; margin-bottom:12px;"
src="https://i.creativecommons.org/l/by-nc-sa/4.0/88x31.png"&gt;&lt;/a&gt;</copyright><lastBuildDate>Thu, 11 Dec 2025 18:50:49 GMT</lastBuildDate><generator>Nikola (getnikola.com)</generator><docs>http://blogs.law.harvard.edu/tech/rss</docs><item><title>Blackholing and blackhole routing relay setup leveraging BGP communities</title><link>https://straussengineering.ch/fr/posts/blackhole/</link><dc:creator>Philippe Strauss</dc:creator><description>&lt;div&gt;&lt;p&gt;Here is a simple yet powerful mean of blackholing, as an ISP, an internal or customer IP address victim of a DDoS, with the goal of minimizing the impact for other customers and services.
The first Cisco IOS config snippet is to be set on a router acting only as a route server. The first BGP peer shows Cogent route blackhole server setup of some years back.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://straussengineering.ch/fr/posts/blackhole/"&gt;Lire la suite…&lt;/a&gt; (Il reste encore 2 min. de lecture)&lt;/p&gt;&lt;/div&gt;</description><guid>https://straussengineering.ch/fr/posts/blackhole/</guid><pubDate>Thu, 15 Jun 2023 14:30:21 GMT</pubDate></item><item><title>Backing up and archiving Cisco IOS/ASA configurations live from the router without TFTP</title><link>https://straussengineering.ch/fr/posts/cisco-configs-archiving/</link><dc:creator>Philippe Strauss</dc:creator><description>&lt;div&gt;&lt;h3&gt;In Python and with Subversion archiving&lt;/h3&gt;
&lt;p&gt;At some point as a network admin, I did find easier to parse config file
using python expect and some regexp, rather than relying on the
unreliable TFTP. Here's a script which worked fine for one year or so.
It also does automate archiving in subversion. It's delibaretly in a
shape suitable for a blog page, working after tuning two paths in the
first script, but without a tarball and 12 pages of doco. Python is
simple enough to read and understand even for peoples having never
learned this language.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://straussengineering.ch/fr/posts/cisco-configs-archiving/"&gt;Lire la suite…&lt;/a&gt; (Il reste encore 5 min. de lecture)&lt;/p&gt;&lt;/div&gt;</description><guid>https://straussengineering.ch/fr/posts/cisco-configs-archiving/</guid><pubDate>Sat, 31 May 2008 23:00:00 GMT</pubDate></item></channel></rss>