Remove Data Remove Firewall Remove IPv6 Remove Network
article thumbnail

Bogons: Do not let them in or through your networks

CTOvision

With this post we will dive a bit deeper into bogosity in networks, paying particular attention to the fundamental element of bogosity, the Bogon. We will then articulate a use case for the Centripetal Networks RuleGate which can ensure bogons never get to your enterprise. Filtering private IP addresses requires only a few rules.

IPv6 242
article thumbnail

Interop Liveblog: IPv6 Microsegmentation

Scott Lowe

This session was titled “IPv6 Microsegmentation,” and the speaker was Ivan Pepelnjak. Ivan is, of course, a well-known figure in the networking space, and publishes content at [link]. The session starts with a discussion of the problems found in Layer 2 IPv6 networks. Can we use shared Layer 3 IPv6 subnets?

IPv6 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Beyond the Office: Securing Home Devices and Networks Against Corporate Breaches

SecureWorld News

The rise of personal gadgets, the shift towards remote work, the BYOD trend , and advances in AI have all contributed to home networks becoming an extension of companies' cyber defense perimeters. However, many end-users do not recognize their home networks as extensions of their company's security boundaries.

Network 83
article thumbnail

How to eliminate the default route for greater security

Network World

If portions of enterprise data-center networks have no need to communicate directly with the internet, then why do we configure routers so every system on the network winds up with internet access by default? Also on Network World: IPv6 deployment guide ; What is edge computing and how it’s changing the network? +

IPv6 84
article thumbnail

How to eliminate the default route for greater security

Network World

If portions of enterprise data-center networks have no need to communicate directly with the internet, then why do we configure routers so every system on the network winds up with internet access by default? Also on Network World: IPv6 deployment guide ; What is edge computing and how it’s changing the network? +

IPv6 83
article thumbnail

Product Review: Paessler PRTG Network Monitor

Galido

Information Technology Blog - - Product Review: Paessler PRTG Network Monitor - Information Technology Blog. PRTG Network Monitor from Paessler AG is a powerful network monitoring solution. This network software is not only powerful but also easy to use. Problems in the network cause emergencies in business.

Network 60
article thumbnail

Technology Short Take #77

Scott Lowe

I’ve got a new collection of links and articles from around the Web on various data center-focused technologies. Networking. Michael Kashin has a great article on how Open Virtual Network (OVN, part of the Open vSwitch project) implements virtual networks in OpenStack. Good advice. Servers/Hardware.

Linux 60