Fluke Networks today released a new version of its OptiView Series III Integrated Network Analyzer, which identifie...
October 28, 2008
Fluke Networks today released a new version of its OptiView Series III Integrated Network Analyzer, which identifies and analyzes IPv6 enabled devices and networks, including IPv6-IPv4 tunneling that could represent a security risk.
The company says many networking professionals are unaware of the risks associated with IPv6 and the default settings in many operating systems today, with dual stacks and tunneling protocols automatically enabled.
Joe Klein, a security researcher with Command Information, a provider of networking services to Fortune 1000 and government entities, said many organizations have IPv6, an Internet Layer protocol for packet-switched internetworks, enabled on their systems by default but do not know it.
“They also don’t have protection in place to block malicious traffic, since some intrusion detection systems and firewalls aren’t set up to monitor IPv6 traffic, presenting an avenue through which outsiders can attack their networks undetected,” he added. “It’s like having wireless on your network without knowing it.”
Command Information tested the OptiView analyzer’s ability to identify and manage IPv6 addressing.
OptiView permits analysis of IPv6 router advertisements, spotting global and self-assigned link local addresses that cause configuration issues between network devices.