Network Operations

All articles

SHA2017: Hackers' Camping, RIPE Topics

SHA2017: Hackers' Camping, RIPE Topics

Vesna Manojlovic

9 min read

Today begins the newest edition of four-yearly Dutch summer camping conferences for and by hackers: SHA2017. Since there is an overlap between topics and participants within the RIPE community, this is an invitation to the talks and workshops that might interest you.

Article tags:

0 You have liked this article 0 times.
0
Botnets: As We See Them in 2017

Botnets: As We See Them in 2017

Alireza Vaziri

8 min read

Year after year, botnets make impressive progress over counter-attack methods. Botmasters have deployed encryption and P2P connectivity to bots and we are always a step behind.

Article tags:

0 You have liked this article 0 times.
0
On the Operators' Perspective on Security Misconfigurations ㄧ The Survey

On the Operators' Perspective on Security Misconfigurations ㄧ The Survey

Constanze Dietrich

4 min read

We want to fully understand the issue of security misconfigurations. We have some preliminary findings. But we need your help: Please, participate in our anonymous survey on security misconfigurations.

Article tags:

0 You have liked this article 0 times.
0
RFC 8195 "Use of BGP Large Communities" was Published!

RFC 8195 "Use of BGP Large Communities" was Published!

Job Snijders

1 min read

RFC 8195 presents examples and inspiration for the operational application of BGP Large Communities.

Article tags:

0 You have liked this article 0 times.
0
Heads-up: RFC 8212 on Default EBGP Route Handling Behaviour

Heads-up: RFC 8212 on Default EBGP Route Handling Behaviour

Job Snijders

4 min read

"External BGP (EBGP) Route Propagation Behavior without Policies” was published as RFC 8112 . What does this mean for network operators and vendors?

Article tags:

0 You have liked this article 0 times.
0
Local Packet Filtering with IPv6

Local Packet Filtering with IPv6

Enno Rey

8 min read

Recently my organisation discussed IPv6 filter rules for NIC-level firewalls (in a virtualised data center) with a customer. I’d like to take this opportunity to lay out potential approaches for local packet filtering of IPv6, which might somewhat depend on the address configuration strategy you ch…

Article tags:

5 You have liked this article 0 times.
0
Simplifying IPv6 Addressing for Customers - Part 2

Simplifying IPv6 Addressing for Customers - Part 2

Jordi Palet Martinez

10 min read

One of the main issues when an ISP is planning to deliver IPv6 services is to decide how to address the customers. In this second part we describe choices for numbering the WAN and customer LANs.

Article tags:

0 You have liked this article 0 times.
8
BGP Even-More Specifics in 2017

BGP Even-More Specifics in 2017

Stephen Strowes

8 min read

Since October 2014, we have been advertising two IPv4 /25s and two IPv4 /28s, to better understand how far they propagate across the network. In this article, we review how things have (or have not) changed over the years.

Article tags:

1 You have liked this article 0 times.
1
Simplifying IPv6 Addressing for Customers - Part 1

Simplifying IPv6 Addressing for Customers - Part 1

Jordi Palet Martinez

8 min read

One of the main issues when an ISP is planning to deliver IPv6 services is to decide how to address the customers.

Article tags:

2 You have liked this article 0 times.
5
The Internet was Built on Trust. But What Does it Run On?

The Internet was Built on Trust. But What Does it Run On?

Uta Meier-Hahn

12 min read

One of the most noble narratives about the Internet is that it is built on trust. This article sets out to check if that saying still holds true.

Article tags:

0 You have liked this article 0 times.
2

Showing 868 article(s)