[-] [email protected] 1 points 6 days ago* (last edited 6 days ago)

Honestly, these days I have no idea. When I said "wouldn't recommend" that wasn't an assertion to avoid; just a lack of opinion. Most of my recent experience is with Cloud vendors wherein the problem domain is quite different.

I've had experience with most of the big vendors and they've all had quirks etc. that you just have to deal with. Fundamentally it'll come down to a combination of price, support requirements, and internal competence with the kit. (Don't undermine the last item; it's far better if you can fix problems yourself.)

Personally I'd actually argue that most corporates could get by with a GNU/Linux VM (or two) for most of their routing and firewalling and it would absolutely be good enough; functionally you can do the same and more. That's not to say dedicated machines for the task aren't valuable but I'd say it's the exception rather than rule that you need ASICs and the like.

[-] [email protected] 8 points 6 days ago* (last edited 6 days ago)

I agree. GeoIP was never a good idea, but here we are. Any ASN could be broken up and routed wherever (and changed) but it's still far too prevalent.

[-] [email protected] 2 points 6 days ago

I might be misunderstanding. It's definitely possible to have as many IPv4 aliases on an interface as you want with whatever routing preferences you want. Can you clarify?

I agree with your stance on deployment.

[-] [email protected] 10 points 6 days ago

Given how large the address space is, it's super easy to segregate out your networks to the nth degree and apply proper firewall rules.

There's no reason your clients can't have public, world routeable IPs as well as security.

Security via obfuscation isn't security. It's a crutch.

[-] [email protected] 8 points 6 days ago

This article is biased to selling you more F5 equipment but is a reasonable summary:

https://www.f5.com/resources/white-papers/the-myth-of-network-address-translation-as-security

Long story short is that NAT is eggshell security and you should be relying on actual firewall rules (I wouldn't recommend F5) instead of the implicit but not very good protections of NAT.

[-] [email protected] 1 points 6 days ago* (last edited 6 days ago)

I can potentially see that scenario if your transit provider is giving you a dynamic prefix but I've never seen that in practice. The address space is so enormous there is no reason to.

Otherwise with either of RADVD or DHCPv6 the local routers should still be able to handle the traffic.

My home internal network (v6, SLAAC) with all publicly routeable addresses doesn't break if I unplug my modem.

[-] [email protected] 23 points 6 days ago

Hurricane Electric have a free tunnel broker that is super simple to set up if you really want to get on the bandwagon.

https://tunnelbroker.net/

Though honestly I'd say the benefits of setting it up aren't really worth the trouble unless you're keen.

[-] [email protected] 3 points 6 days ago

IMO they shouldn't have allowed ULA as part of the standard. There's no good reason for it.

[-] [email protected] 10 points 6 days ago

It also means you no longer need the kludge that is NAT. Full E2E connectivity is really nice -- though I've found some network admins dislike this idea because they're so used to thinking about it differently or (mistakenly) think it adds to their security.

eclipse

joined 1 year ago