This presentation assumes you have IPv6 working at your house or business. But now want to leverage the security features in IPv6 to create better systems and networks. The presentation will include:
· IPv6 is growing quickly
o What are you doing about it?
· IPv4 vs. IPv6 Security models
o 1960’s vs. 1990’s
· Your ISP – We trust them right?
o Tunnel or native
o Their router or yours
· ISP redundancy – When uptime is King!
o NAT (Bad)
· Your Infrastructure – Application of the security model
o IPv4 with IPv6 tunnels
o Dual Stack
o IPv6 with IPv4 Tunnels
o IPv6 with Proxies
· Address management - Active address scanning is for newbies and the weak
· Address allocation – Methods and management
o Home users (non-managed)
o Home users (Managed)
· Boot process from the network view
We are looking for a logo. Please submit your ideas. If you aren't artistic, talk with a friend who is. We will use the logo on the website and make it available for purchase on items (at cost).
One of our junior sys admins told me he was trying to figure out how to modify his monitoring script during maintenance windows (the monitoring script is called automatically by the monitoring agent on the box.) I told him to use a "stop file."
At or near the top of your script (a simple bash script,) put a block like this:
if test -f /tmp/do_not_run
Then, during maintenance windows, create the /tmp/do_not_run file and the script will simply exit without attempting to perform any actions against the system. When the maintenance window is over, remove the file and everything goes back to normal.
Video demo of setting up Fedora 16.