Computer Networks: 10 years ago vs. today
May. 5th, 2008 01:42 pm1995-8: Explaining over and over to people that when one uses NAT to “hide a company behind one IP address”, you get a certain amount of firewall protection “for free”
2008-9: Explain over and over to people that with IPv6 you don’t need NAT, and you can STILL have a firewall.
2008-9: Explain over and over to people that with IPv6 you don’t need NAT, and you can STILL have a firewall.
no subject
Date: 2008-05-05 06:02 pm (UTC)LOLz!
no subject
Date: 2008-05-05 06:24 pm (UTC)Why yes; we've finally got rid of the NAT gateway resulting from the 2004 merger... and now we've just taken over someone else and have to start it all again.
GAH!
no subject
Date: 2008-05-07 03:31 am (UTC)They got an inkling that something might be wrong when they tried to add country #127 and it really got funky when they asked the consultant (me) how they could 'access the internet without proxies'.
Oh and ipv6: I'm using a TCL script on my router to use 6to4 to distribute and route IPv6, so I'm farther along the road then my ISP :-).
no subject
Date: 2008-05-05 06:41 pm (UTC)no subject
Date: 2008-05-05 08:15 pm (UTC)no subject
Date: 2008-05-06 01:17 am (UTC)However....I didn't know that you could have a firewall w/out a NAT and get the same result as IPV4 firewall.....meaning I could VPN somewhere *and* print on my local network at the same time? that'd be sweet!
no subject
Date: 2008-05-06 04:02 am (UTC)And if you're setting up a net-10 LAN behind your NAT firewall, you can avoid the IP address conflict by making your netork 10.13.37.x or some other middle octets that aren't likely to be stumbled on by someone else.
no subject
Date: 2008-05-06 04:37 pm (UTC)With plain (non-NAT) firewalls, you would have, for example, 64.32.179.* in your office, and when you SSH out the connection looks like it comes from your actual address. The only reason that people couldn't SSH to your machine was due to the fact that your firewall would block inbound SSH connections. (Or, more accurately... block all inbound connections except a well-defined list).
This doesn't have anything to do with being able to print to a local network printer while on a VPN. The VPN needs to have a route table that determines which destinations are scooped up, encrypted, and sent down the VPN tunnel. Some VPN clients can't be configured to let you talk unencrypted to machines on your local network. On the other hand, some VPN clients are configured to not let you talk to local devices on purpose... security policy doesn't trust your local network.
Ok, that's a long answer to a short question... and probably covered things you knew already.
Tom
no subject
Date: 2008-05-06 02:36 am (UTC)no subject
Date: 2008-05-06 04:31 pm (UTC)1. Cisco has IPv6 support in hardware, not in IOS
2. The 2-3 major OS vendors have good support (Linux, Solaris, and Windows all do)
3. A major ISP will support it (not yet, but they use it for their infrastructure)
I have to add a new pre-condition since writing those 3 many years ago: The home firewalls like Linksys need to support it. That hasn't happened yet, but they all use a stack that could support it (embedded linux) once the ISPs start asking them to enable it.