Banner image

Network Operations

All articles

Introducing NAT64 Checker

Introducing NAT64 Checker

Author image
Jan Zorz

6 min read

There has been much discussion about the need for IPv6 over the past decade and more, but with IPv4 addresses approaching exhaustion, this has seen an upsurge in IPv6 deployments over the past year. In particular, mobile operators are increasingly deploying IPv6-only in their consumer networks, whi…

Article tags:

0 Likes are disabled for this article.
18
When It Comes to Cybercrime, Can the RIPE NCC Help? Of Course We Can!

When It Comes to Cybercrime, Can the RIPE NCC Help? Of Course We Can!

Author image
Gerardo Viviers

5 min read

We've been working with law enforcement to help them tackle the ever-growing problem of cybercrime.

Article tags:

0 Likes are disabled for this article.
0
Join the RIPE NCC Hackathon Version 6

Join the RIPE NCC Hackathon Version 6

Author image
Vesna Manojlovic

8 min read

Together with Comcast and DKNOG, the RIPE NCC is organising our sixth hackathon, the topic of which will be IPv6! Our goals are to promote IPv6 in Denmark, come up with new and creative ways to visualise IPv6 measurements, and hack together the tools helpful for IPv6 deployment.

Article tags:

0 Likes are disabled for this article.
0
The Secrets of De-Peering

The Secrets of De-Peering

Author image
Uta Meier-Hahn

10 min read

There are many resources available to learn about Internet peering. But when it comes to de-peering, networkers are mostly left with their gut feeling.

Article tags:

0 Likes are disabled for this article.
2
SHA2017: Hackers' Camping, RIPE Topics

SHA2017: Hackers' Camping, RIPE Topics

Author image
Vesna Manojlovic

9 min read

Today begins the newest edition of four-yearly Dutch summer camping conferences for and by hackers: SHA2017. Since there is an overlap between topics and participants within the RIPE community, this is an invitation to the talks and workshops that might interest you.

Article tags:

0 Likes are disabled for this article.
0
Botnets: As We See Them in 2017

Botnets: As We See Them in 2017

Author image
Alireza Vaziri

8 min read

Year after year, botnets make impressive progress over counter-attack methods. Botmasters have deployed encryption and P2P connectivity to bots and we are always a step behind.

Article tags:

0 Likes are disabled for this article.
0
On the Operators' Perspective on Security Misconfigurations ㄧ The Survey

On the Operators' Perspective on Security Misconfigurations ㄧ The Survey

Author image
Constanze Dietrich

4 min read

We want to fully understand the issue of security misconfigurations. We have some preliminary findings. But we need your help: Please, participate in our anonymous survey on security misconfigurations.

Article tags:

0 Likes are disabled for this article.
0
RFC 8195 "Use of BGP Large Communities" was Published!

RFC 8195 "Use of BGP Large Communities" was Published!

Author image
Job Snijders

1 min read

RFC 8195 presents examples and inspiration for the operational application of BGP Large Communities.

Article tags:

0 Likes are disabled for this article.
0
Heads-up: RFC 8212 on Default EBGP Route Handling Behaviour

Heads-up: RFC 8212 on Default EBGP Route Handling Behaviour

Author image
Job Snijders

4 min read

"External BGP (EBGP) Route Propagation Behavior without Policies” was published as RFC 8112 . What does this mean for network operators and vendors?

Article tags:

0 Likes are disabled for this article.
0
Local Packet Filtering with IPv6

Local Packet Filtering with IPv6

Author image
Enno Rey

8 min read

Recently my organisation discussed IPv6 filter rules for NIC-level firewalls (in a virtualised data center) with a customer. I’d like to take this opportunity to lay out potential approaches for local packet filtering of IPv6, which might somewhat depend on the address configuration strategy you ch…

Article tags:

5 Likes are disabled for this article.
0

Showing 892 article(s)