IPv6 Security

IPv6 Security – Server Operating Systems

The DoD has done an excellent job in annotating the best security practices for operating systems for years with its Security Technical Implementation Guides, or STIGs.  In fact, STIGs for networking systems like routers, IDS/IPS, switches, devices, etc have been updated to reflect the new reality: IPv6.  However, with STIGs on the operating system there …

IPv6 Security – Server Operating SystemsRead More »

Tachyon Dynamics Speaking on IPv6 NFV at the North American IPv6 Summit

Tomorrow, our very own Jeremy Duncan will be speaking on “IPv6 Best Practices in Network Functions Virtualization (NFV) with Vmware NSX,” tomorrow around 11:10 am MDT.  We are also here in the Denver Tech Center, so come on by and let’s talk!  We have a booth right in front of the main conference room. If …

Tachyon Dynamics Speaking on IPv6 NFV at the North American IPv6 SummitRead More »

DNS: Back to Basics for Network Engineers

Speaking with quite a few network engineers in the last few months, I was shocked by the lack of real understanding of the Domain Naming System (DNS).  It shocked me because it is the singular application functionality that is entirely network-based.  Meaning that DNS is the foundation of the Internet, and from their perspective, should …

DNS: Back to Basics for Network EngineersRead More »

Authentication for OSPFv3 Address Family support in IOS-XE? Think again

Bottom line up front: Cisco has a broken implementation of OSPFv3 authentication. This story begins like many do with network engineers trying to do their best in implementing IPv6 after a thorough and exhaustive engineering exercise.  Cisco’s Aggregation Services Router (ASR) routing platform running IOS-XE, starting with version 3.1.0 until the most recent  3.09.02 S, …

Authentication for OSPFv3 Address Family support in IOS-XE? Think againRead More »

Secure and Affordable 2-factor authentication: Yubikey

In the DoD there is a strong requirement for 2-factor authentication in the network.  For systems and workstations they use a successful implementation with Public Key Infrastructure (PKI) and a DoD common access card (CAC) which has a client certificate.  The user has a PIN; therefore, 2-factor.   Nothing like this exists for network devices (routers, …

Secure and Affordable 2-factor authentication: YubikeyRead More »

Cisco IPv6 IOS Hardening – DoD Style

***Updated on 14 May 2014 – regarding NET-IPv6-022, See below*** Thousands of network engineers in the DoD out there looking at implementing IPv6 now have to address a few Security and Technical Implementation Guidance (STIG) items that they used to just annotate as “Not Applicable – NA.”  Now, IPv6 security is important.  If you are …

Cisco IPv6 IOS Hardening – DoD StyleRead More »

Why 802.1x is Not Enough: How to Implement SeND – Part 2

Last month I presented the case as to why 802.1x authentication is not enough for local network (wired or wireless) security (go back here to read).  In this post I will present an alternative: IPv6 Secure Neighbor Discovery (SeND).  If you have an IPv6 enterprise, small IPv6 deployment, or a little IPv6 lab then pay …

Why 802.1x is Not Enough: How to Implement SeND – Part 2Read More »

Why 802.1x is Not Enough: Use IPv6 SeND – Part 1

There’s been much debate in the IPv6 community regarding the abysmal support or IPv6 Secure Neighbour Discovery (SeND).  To get you up to speed on what IPv6 Secure Neighbour Discovery is think IPv6 + 802.1x-like + ARP security + PKI environment.  Later in this blog I’ll show you how to set up an IPv6 SeND …

Why 802.1x is Not Enough: Use IPv6 SeND – Part 1Read More »

Scroll to Top