article thumbnail

Interop Liveblog: IPv6 Microsegmentation

Scott Lowe

This session was titled “IPv6 Microsegmentation,” and the speaker was Ivan Pepelnjak. The session starts with a discussion of the problems found in Layer 2 IPv6 networks. Note that some of these attacks are also common to IPv4 and are not necessarily unique to IPv6. Can we use shared Layer 3 IPv6 subnets?

IPv6 60
article thumbnail

Bogons: Do not let them in or through your networks

CTOvision

Many ISPs and end-user firewalls seek to block bogons, because they have no legitimate use (more details on how successful they can be at this are below). But filtering the full bogon list requires about 5000 rules for IPv4 and about 70,000 rules for IPv6. Filtering private IP addresses requires only a few rules.

IPv6 242
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

How to eliminate the default route for greater security

Network World

If portions of enterprise data-center networks have no need to communicate directly with the internet, then why do we configure routers so every system on the network winds up with internet access by default? Also on Network World: IPv6 deployment guide ; What is edge computing and how it’s changing the network? +

IPv6 84
article thumbnail

How to eliminate the default route for greater security

Network World

If portions of enterprise data-center networks have no need to communicate directly with the internet, then why do we configure routers so every system on the network winds up with internet access by default? Also on Network World: IPv6 deployment guide ; What is edge computing and how it’s changing the network? +

IPv6 83
article thumbnail

Beyond the Office: Securing Home Devices and Networks Against Corporate Breaches

SecureWorld News

This involves several steps, including: Regularly back up your data, saving it to external drives or cloud services to protect against data loss. Fully utilize firewall capabilities. If your internet provider offers IPv6, be sure to implement security precautions tailored for this protocol. Use the 3-2-1 backup rule.

Network 80
article thumbnail

Product Review: Paessler PRTG Network Monitor

Galido

The PRTG solution will provide you with detailed tracking data and historical reports on all network components. IPv6 support. They also provide a Windows, Android and iOS app, enabling you to connect to more than one core server to retrieve monitoring data. Paessler’s CEO talks about PRTG. Complete Network monitoring.

Network 60
article thumbnail

Technology Short Take #77

Scott Lowe

I’ve got a new collection of links and articles from around the Web on various data center-focused technologies. Simon Leinen (from SWITCHengines) explains their use of IPv6 with OpenStack. Vivek Gite over at nixCraft explains how to use ufw (Uncomplicated Firewall) on Ubuntu to limit SSH connections. Networking. Good advice.

Linux 60