What a lot of simmering frogs we are…

A network operators’ mailing list I am on has just gone through yet another multi-day discussion of how to comply with Microsoft licensing. No-one understands it. I don’t think Microsoft itself understands it. What finally compelled me to write this rant was this quote from some Microsoft document or other: Continue reading

Malware and the question that never gets asked

Just read this article on the ABC website, about securing your enterprise against malware. They gave great advice – “detect and block at the perimeter and inside the network”, “assess and protect endpoints”, “analyse threats through context”, “eradicate malware and prevent reinfection”, “remediate attacks with retrospective security” and “be sure to implement integrated rules on the perimeter security gateway”. But one important bit of advice was missing.

Continue reading

Controlling IPv6 source address selection

In a previous article, I discussed how IPv6 source address selection worked. Normally it all Just Works, but there are several situations where you may want or need to control the address selection process. In this article, we’ll look at why you might want to control source address selection, and how you can do it.

Continue reading

IPv6 Source Address Selection – what, why, how

Source address selection must be very irritated; destination address selection gets all the press coverage.

This article will start to redress the balance, by talking about what source address selection is, why it is needed, and how it works. If you want the nitty-gritty, check out RFC 6724 (which obsoletes RFC 3484).

Continue reading