Remove .Net Remove Infrastructure Remove IPv6 Remove Performance
article thumbnail

Bogons: Do not let them in or through your networks

CTOvision

But bogon’s can be used to launch TCP SYN attacks and are used in about 10% of DDoS attacks on the net. But filtering the full bogon list requires about 5000 rules for IPv4 and about 70,000 rules for IPv6. Additionally, IPv4 networks are not safe from an IPv6 bogon bandwidth flooding attack.

IPv6 96
article thumbnail

The (Net)Flow That Kentik Makes Go: Know Your Traffic Flow Data Protocols

Kentik

“NetFlow” may be the most common short-hand term for this network flow data, but that doesn’t mean it’s the only important protocol for the exchange of metadata related to flows transiting network infrastructure. Some versions, but not all, support other data fields such as MAC address, VLAN ID, and IPv6. Flow Exporting Devices.

IPv6 40