Remove Data Remove Firewall Remove IPv6 Remove Security
article thumbnail

Interop Liveblog: IPv6 Microsegmentation

Scott Lowe

This session was titled “IPv6 Microsegmentation,” and the speaker was Ivan Pepelnjak. The session starts with a discussion of the problems found in Layer 2 IPv6 networks. All of these messages derive from the assumption that one subnet = one security zone, and therefore intra-subnet communications are not secured.

IPv6 60
article thumbnail

How to eliminate the default route for greater security

Network World

If portions of enterprise data-center networks have no need to communicate directly with the internet, then why do we configure routers so every system on the network winds up with internet access by default? Also on Network World: IPv6 deployment guide ; What is edge computing and how it’s changing the network? +

IPv6 84
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to eliminate the default route for greater security

Network World

If portions of enterprise data-center networks have no need to communicate directly with the internet, then why do we configure routers so every system on the network winds up with internet access by default? Also on Network World: IPv6 deployment guide ; What is edge computing and how it’s changing the network? +

IPv6 83
article thumbnail

Beyond the Office: Securing Home Devices and Networks Against Corporate Breaches

SecureWorld News

However, many end-users do not recognize their home networks as extensions of their company's security boundaries. They often feel that using a company-provided laptop linked to the corporate security system is sufficient. As a result, they might not take enough measures to secure their other home devices.

Network 82
article thumbnail

Bogons: Do not let them in or through your networks

CTOvision

Many ISPs and end-user firewalls seek to block bogons, because they have no legitimate use (more details on how successful they can be at this are below). But filtering the full bogon list requires about 5000 rules for IPv4 and about 70,000 rules for IPv6. Communications CTO Cyber Security Infrastructure'

IPv6 242
article thumbnail

Technology Short Take #77

Scott Lowe

I’ve got a new collection of links and articles from around the Web on various data center-focused technologies. Simon Leinen (from SWITCHengines) explains their use of IPv6 with OpenStack. Vivek Gite over at nixCraft explains how to use ufw (Uncomplicated Firewall) on Ubuntu to limit SSH connections. Networking. Good advice.

Linux 60
article thumbnail

Technology Short Take #49

Scott Lowe

I have here for your reading pleasure an eclectic collection of links and articles from around the web, focusing on data center-related technologies. Anthony Burke (disclaimer: Anthony works for VMware in the NSBU) has a post on how to use Python to automate the bulk creation of firewall rules for use with the VMware NSX distributed firewall.

Vmware 60