My Linux as an IPv6 dual stack Firewall Talk from SCaLE11x
Friday, 1. March 2013
Friday, 1. March 2013
Wednesday, 16. January 2013
Saturday, 12. January 2013
Friday, 2. July 2010
Back in December `09, my company ACT USA, began testing IPv6. These tests quickly advanced to our production environment. Over the last six months, I have been in the process of setting up native IPv6 connectivity for all our data centers. This connectivity is based on the dual stack model. This article attempts to cover the technology available, and the choices I made based on that technology.
Monday, 7. June 2010
I recently was asked to put together a brief web presentation on the different methods of creating redundant networks. I couldn’t think of a better place to put it, then right here on my blog. After all, I was overdue for a post anyways…
A redundant network is two or more distinct paths for data to travel to and from an upstream network. In it’s simplest form, it can be a piece of equipment that can be manually placed into service easily upon a failure. More often though it is set up so that any single device or connection can fail, and without user intervention, a backup system or connection will automatically step in and take over the job of the failed device, or connection. A redundant network does not mean that no mater what happens, your data will still be reachable. There are many factors that need to be considered, ranging anywhere from your providers, to your applications, that can cause a failure.
Friday, 12. March 2010
This is the second installment all about the technologies used for SCALE8x. The first installment dealt with the services that the technology group has setup and maintains for the event year round. This installment will cover the pre-show setup that went into the technologies that were used at the show.
Monday, 22. February 2010
Every February in Los Angeles CA, a group of dedicated volunteers get together to put on what many believe to be the largest all volunteer organized open source technology conventions in the US. This three day event features talks and exhibits specifically targeted at Open Source users, programmers, and system administrators.
Saturday, 15. August 2009
Here are the notes regarding what I covered in my presentation to the Simi Conejo Linux User Group. The actual presentation covered these subjects in more detail then I was able to fit in here, but you should get the general idea of the concepts covered by reading this all the way through. If you would like me to present this presentation for your organization or group, please contact me via email.
Monday, 10. August 2009
I will be speaking at the Simi Conejo Linux Users Group (SCLug) on August 15th 2009.
I will be demonstrating how to setup a Linux based PC with multiple network interfaces to act as a firewall. The presentation will cover the following topics:
I plan to start with a base Debian install, and take the group step by step through setting up NAT for both static and DHCP internet connections. I’ll then move to setting up a second internet connection, and demonstrate the use of policy routing to choose an outbound route for different types of connections. Once we’ve covered policy routing, I”ll finish up with session based load balancing across both connections.
If you are going to be in the East Ventura County area on the 15th, I encourage you to join us!
The presentation will be held at the Simi Valley YMCA at 2:00PM on August 15th, 2009.
I look forward to seeing you there!
— Stu