Remove Data Center Remove Firewall Remove IPv6 Remove Security
article thumbnail

Interop Liveblog: IPv6 Microsegmentation

Scott Lowe

This session was titled “IPv6 Microsegmentation,” and the speaker was Ivan Pepelnjak. The session starts with a discussion of the problems found in Layer 2 IPv6 networks. All of these messages derive from the assumption that one subnet = one security zone, and therefore intra-subnet communications are not secured.

IPv6 60
article thumbnail

How to eliminate the default route for greater security

Network World

If portions of enterprise data-center networks have no need to communicate directly with the internet, then why do we configure routers so every system on the network winds up with internet access by default? Also on Network World: IPv6 deployment guide ; What is edge computing and how it’s changing the network? +

IPv6 84
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to eliminate the default route for greater security

Network World

If portions of enterprise data-center networks have no need to communicate directly with the internet, then why do we configure routers so every system on the network winds up with internet access by default? Also on Network World: IPv6 deployment guide ; What is edge computing and how it’s changing the network? +

IPv6 83
article thumbnail

Technology Short Take #77

Scott Lowe

I’ve got a new collection of links and articles from around the Web on various data center-focused technologies. Simon Leinen (from SWITCHengines) explains their use of IPv6 with OpenStack. Vivek Gite over at nixCraft explains how to use ufw (Uncomplicated Firewall) on Ubuntu to limit SSH connections. Networking.

Linux 60
article thumbnail

Technology Short Take #49

Scott Lowe

I have here for your reading pleasure an eclectic collection of links and articles from around the web, focusing on data center-related technologies. As we evolve towards more automated/orchestrated environments, it’s important we don’t leave security behind. Here’s hoping you find something useful. Bring on the content!

Vmware 60