<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Security in IPv6 Trial</title>
    <link>https://community.plus.net/t5/IPv6-Trial/Security/m-p/803192#M381</link>
    <description>&lt;BLOCKQUOTE&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;Quote from: David&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;PRE&gt;access-list 1 remark INSIDE_IF=Vlan1&lt;BR /&gt;access-list 1 remark CCP_ACL Category=2&lt;BR /&gt;access-list 1 permit 192.168.0.0 0.0.0.255&lt;BR /&gt;access-list 23 permit 192.168.0.0 0.0.0.255&lt;BR /&gt;access-list 100 remark CCP_ACL Category=128&lt;BR /&gt;access-list 100 permit ip host 255.255.255.255 any&lt;BR /&gt;access-list 100 permit ip 127.0.0.0 0.255.255.255 any&lt;BR /&gt;&amp;lt;snip&amp;gt;&lt;/PRE&gt;&lt;BR /&gt;There is nothing there that I can see would allow port 80 traffic through the firewall so there is a combination of PN's firewall and my Cisco firewall not picking it up and dropping it.&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BLOCKQUOTE&gt;&lt;BR /&gt;I know you're sorted but it's probably worth mentioning for anyone else reading: the access list above is, in Cisco terms, an 'ip' access list i.e. it is IPv4 only. Given that IPv4 and IPv6 are two separate network stacks and are implemented independently by the IOS then, as you now have, you also need an IPv6 access list applied to an interface in order to control IPv6 traffic through it. Thus, two access lists would be applied - one for IPv4 and one for IPv6.&lt;BR /&gt;Incidentally there is, amongst other IPv6-related tools, a good port scanner at &lt;A href="http://www.subnetonline.com/pages/ipv6-network-tools/online-ipv6-port-scanner.php" target="_blank"&gt;www.subnetonline.com/pages/ipv6-network-tools/online-ipv6-port-scanner.php&lt;/A&gt; which you may find useful as you can specify the target address i.e. you are not limited to only testing from your own machine (the understandable restriction being you can only check for one port at a time but this is often all that's required).&lt;BR /&gt;Mathew</description>
    <pubDate>Mon, 06 Jun 2011 11:48:00 GMT</pubDate>
    <dc:creator>MJN</dc:creator>
    <dc:date>2011-06-06T11:48:00Z</dc:date>
    <item>
      <title>Security</title>
      <link>https://community.plus.net/t5/IPv6-Trial/Security/m-p/803184#M373</link>
      <description>Using &lt;A href="http://ipv6.chappell-family.com/cgi-bin6/ipscan-js.cgi" target="_blank"&gt;this scanner&lt;/A&gt; shows common ports except 80 are closed (I don't believe it reports them as stealth, if no reply is met it responds with closed). &amp;nbsp;Naturally I'd prefer port 80 to be closed/stealth, if I run an IPV4 test it shows stealth on all ports (including 80) which begs the question, how does one secure an IPV6 based system?&lt;BR /&gt;Oddly I put my IPV6 address into Chrome and it did show up a webpage just saying "Hello!" and I have no idea where that came from, unless there is a html document on my router which just says Hello!&lt;BR /&gt;/edit - I found the Hello! file, it is on my webserver.&lt;BR /&gt;/edit2 - I turned on PlusNets firewall (which should block 80) and it had no effect (port 80 still open) so it looks like PN's firewall needs to be upgraded to support IPV6 too?</description>
      <pubDate>Sat, 04 Jun 2011 11:17:20 GMT</pubDate>
      <guid>https://community.plus.net/t5/IPv6-Trial/Security/m-p/803184#M373</guid>
      <dc:creator>David_W</dc:creator>
      <dc:date>2011-06-04T11:17:20Z</dc:date>
    </item>
    <item>
      <title>Re: Security</title>
      <link>https://community.plus.net/t5/IPv6-Trial/Security/m-p/803185#M374</link>
      <description>David,&lt;BR /&gt;Hi. It's my firewall tester that you've used/mentioned above. Apologies for not knowing how Plusnet are running their trial (despite being a Plusnet customer) - hence all the questions that follow. What OS are you running? Are you running a software firewall on your end machine(s) or are you just reliant on your router/modem (or Plusnet's) capabilities? Do you definitely have an IPv6 firewall configured - are there other services on your server that are supporting IPv6 -i.e. apart from your webserver? Does the firewall provide any traffic logs/statistics? An IPv4 firewall won't impact IPv6 traffic unless the IPv6 traffic is tunneled/encapsulated in IPv4 - and that will generally mean that the tunneled traffic is either allowed or disallowed via the IPv4 firewall - it won't impact individual IPv6 services/ports.&lt;BR /&gt;Best wishes,&lt;BR /&gt;Tim.</description>
      <pubDate>Sun, 05 Jun 2011 17:03:42 GMT</pubDate>
      <guid>https://community.plus.net/t5/IPv6-Trial/Security/m-p/803185#M374</guid>
      <dc:creator>customersmatter</dc:creator>
      <dc:date>2011-06-05T17:03:42Z</dc:date>
    </item>
    <item>
      <title>Re: Security</title>
      <link>https://community.plus.net/t5/IPv6-Trial/Security/m-p/803186#M375</link>
      <description>I used the scanner on Linux, Windows 7 &amp;amp; Android.&lt;BR /&gt;It reported closed on the listed ports on all three Operating Systems.&lt;BR /&gt;PB</description>
      <pubDate>Mon, 06 Jun 2011 04:59:55 GMT</pubDate>
      <guid>https://community.plus.net/t5/IPv6-Trial/Security/m-p/803186#M375</guid>
      <dc:creator>brueton</dc:creator>
      <dc:date>2011-06-06T04:59:55Z</dc:date>
    </item>
    <item>
      <title>Re: Security</title>
      <link>https://community.plus.net/t5/IPv6-Trial/Security/m-p/803187#M376</link>
      <description>One other thing to mention - the link that David referenced above isn't optimal - if you enter at that point with an IPv4 address then you will get an error from my Apache server. Please use the following link in preference which checks your address suitability first:&lt;BR /&gt;&lt;A href="http://ipv6.chappell-family.com/ipv6tcptest/index.php"&gt;http://ipv6.chappell-family.com/ipv6tcptest/index.php&lt;/A&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;Tim.</description>
      <pubDate>Mon, 06 Jun 2011 07:41:49 GMT</pubDate>
      <guid>https://community.plus.net/t5/IPv6-Trial/Security/m-p/803187#M376</guid>
      <dc:creator>customersmatter</dc:creator>
      <dc:date>2011-06-06T07:41:49Z</dc:date>
    </item>
    <item>
      <title>Re: Security</title>
      <link>https://community.plus.net/t5/IPv6-Trial/Security/m-p/803188#M377</link>
      <description>I'm running Windos 7 with Kaspersky Internet Security for my firewall on my system, my router is a Cisco 877W with firewall enabled (I'll post the firewall bits) and also with PlusNets own firewall system turned on (which should block 80 but needs upgrading to support IPV6 traffic).&lt;BR /&gt;&lt;PRE&gt;access-list 1 remark INSIDE_IF=Vlan1&lt;BR /&gt;access-list 1 remark CCP_ACL Category=2&lt;BR /&gt;access-list 1 permit 192.168.0.0 0.0.0.255&lt;BR /&gt;access-list 23 permit 192.168.0.0 0.0.0.255&lt;BR /&gt;access-list 100 remark CCP_ACL Category=128&lt;BR /&gt;access-list 100 permit ip host 255.255.255.255 any&lt;BR /&gt;access-list 100 permit ip 127.0.0.0 0.255.255.255 any&lt;BR /&gt;access-list 101 remark CCP_ACL Category=128&lt;BR /&gt;access-list 101 permit ip host 255.255.255.255 any&lt;BR /&gt;access-list 101 permit ip 127.0.0.0 0.255.255.255 any&lt;BR /&gt;access-list 102 permit ip host 66.220.2.74 any&lt;BR /&gt;access-list 102 permit ip host 216.66.80.26 any&lt;BR /&gt;access-list 103 remark auto generated by CCP firewall configuration&lt;BR /&gt;access-list 103 remark CCP_ACL Category=1&lt;BR /&gt;access-list 103 deny &amp;nbsp; ip host 255.255.255.255 any&lt;BR /&gt;access-list 103 deny &amp;nbsp; ip 127.0.0.0 0.255.255.255 any&lt;BR /&gt;access-list 103 permit ip any any&lt;BR /&gt;access-list 104 remark auto generated by CCP firewall configuration&lt;BR /&gt;access-list 104 remark CCP_ACL Category=1&lt;BR /&gt;access-list 104 remark HE-Tunnel-Tunnel&lt;BR /&gt;access-list 104 permit ip host 216.66.80.26 any&lt;BR /&gt;access-list 104 remark HE-Tunnel-Ping&lt;BR /&gt;access-list 104 permit ip host 66.220.2.74 any&lt;BR /&gt;access-list 104 remark Auto generated by CCP for NTP (123) 212.159.13.50&lt;BR /&gt;access-list 104 permit udp host 212.159.13.50 eq ntp any eq ntp&lt;BR /&gt;access-list 104 deny &amp;nbsp; ip 192.168.0.0 0.0.0.255 any&lt;BR /&gt;access-list 104 permit icmp any any echo-reply&lt;BR /&gt;access-list 104 permit icmp any any time-exceeded&lt;BR /&gt;access-list 104 permit icmp any any unreachable&lt;BR /&gt;access-list 104 deny &amp;nbsp; ip 10.0.0.0 0.255.255.255 any&lt;BR /&gt;access-list 104 deny &amp;nbsp; ip 172.16.0.0 0.15.255.255 any&lt;BR /&gt;access-list 104 deny &amp;nbsp; ip 192.168.0.0 0.0.255.255 any&lt;BR /&gt;access-list 104 deny &amp;nbsp; ip 127.0.0.0 0.255.255.255 any&lt;BR /&gt;access-list 104 deny &amp;nbsp; ip host 255.255.255.255 any&lt;BR /&gt;access-list 104 deny &amp;nbsp; ip host 0.0.0.0 any&lt;BR /&gt;access-list 104 deny &amp;nbsp; ip any any log&lt;BR /&gt;dialer-list 1 protocol ip permit&lt;/PRE&gt;&lt;BR /&gt;There is nothing there that I can see would allow port 80 traffic through the firewall so there is a combination of PN's firewall and my Cisco firewall not picking it up and dropping it.&lt;BR /&gt;/edit&lt;BR /&gt;Found a sample config to modify so will give it a whirl:&lt;BR /&gt;&lt;PRE&gt;ipv6 inspect name traffic tcp&lt;BR /&gt;ipv6 inspect name traffic udp&lt;BR /&gt;ipv6 inspect name traffic ftp&lt;BR /&gt;ipv6 inspect name traffic icmp&lt;BR /&gt;!&lt;BR /&gt;interface tunnel1&lt;BR /&gt; ipv6 traffic-filter tu1-in in&lt;BR /&gt; ipv6 traffic-filter tu1-out out&lt;BR /&gt;!&lt;BR /&gt;ipv6 access-list tu1-in&lt;BR /&gt; permit icmp any any echo-request&lt;BR /&gt; permit icmp any any echo-reply&lt;BR /&gt; permit tcp 2001:4fff::/32 any eq 22&lt;BR /&gt; evaluate reflectout&lt;BR /&gt; deny ipv6 any any log-input&lt;BR /&gt;!&lt;BR /&gt;ipv6 access-list tu1-out&lt;BR /&gt; permit icmp any any echo-reply&lt;BR /&gt; permit icmp any any echo-request&lt;BR /&gt; permit tcp any any reflect reflectout&lt;BR /&gt; permit udp any any reflect reflectout&lt;BR /&gt; deny ipv6 any any log-input&lt;BR /&gt;!&lt;/PRE&gt;</description>
      <pubDate>Mon, 06 Jun 2011 10:34:21 GMT</pubDate>
      <guid>https://community.plus.net/t5/IPv6-Trial/Security/m-p/803188#M377</guid>
      <dc:creator>David_W</dc:creator>
      <dc:date>2011-06-06T10:34:21Z</dc:date>
    </item>
    <item>
      <title>Re: Security</title>
      <link>https://community.plus.net/t5/IPv6-Trial/Security/m-p/803189#M378</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;Quote from: David&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;/edit2 - I turned on PlusNets firewall (which should block 80) and it had no effect (port 80 still open) so it looks like PN's firewall needs to be upgraded to support IPV6 too?&lt;BR /&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BLOCKQUOTE&gt;&lt;BR /&gt;There are many parts of the platform that have not been touched for this IPv6 trial, the Plusnet firewall is one of those&lt;BR /&gt;Carl</description>
      <pubDate>Mon, 06 Jun 2011 10:50:04 GMT</pubDate>
      <guid>https://community.plus.net/t5/IPv6-Trial/Security/m-p/803189#M378</guid>
      <dc:creator>_CN_</dc:creator>
      <dc:date>2011-06-06T10:50:04Z</dc:date>
    </item>
    <item>
      <title>Re: Security</title>
      <link>https://community.plus.net/t5/IPv6-Trial/Security/m-p/803190#M379</link>
      <description>Hi David&lt;BR /&gt;Test reports all closed on my setup using Cisco 877W&lt;BR /&gt;My firewall config&lt;BR /&gt;ipv6 inspect name myfw6 ftp&lt;BR /&gt;ipv6 inspect name myfw6 icmp&lt;BR /&gt;ipv6 inspect name myfw6 udp&lt;BR /&gt;ipv6 inspect name myfw6 tcp&lt;BR /&gt;ipv6 access-list in-acl6&lt;BR /&gt; permit icmp any any&lt;BR /&gt; permit tcp any any established&lt;BR /&gt; permit udp any any eq 546&lt;BR /&gt; permit udp any eq domain any&lt;BR /&gt; deny ipv6 any any log&lt;BR /&gt;interface Dialer1&lt;BR /&gt; ipv6 traffic-filter in-acl6 in&lt;BR /&gt; ipv6 inspect myfw6 out&lt;BR /&gt;The logs showing the scan&lt;BR /&gt;Jun&amp;nbsp; 6 11:53:39: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(22963) -&amp;gt; 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(21), 1 packet&lt;BR /&gt;Jun&amp;nbsp; 6 11:53:39: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(18331) -&amp;gt; 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(22), 1 packet&lt;BR /&gt;Jun&amp;nbsp; 6 11:53:39: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(27710) -&amp;gt; 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(23), 1 packet&lt;BR /&gt;Jun&amp;nbsp; 6 11:53:39: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(5429) -&amp;gt; 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(25), 1 packet&lt;BR /&gt;Jun&amp;nbsp; 6 11:53:39: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(19946) -&amp;gt; 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(53), 1 packet&lt;BR /&gt;Jun&amp;nbsp; 6 11:53:39: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(29261) -&amp;gt; 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(79), 1 packet&lt;BR /&gt;Jun&amp;nbsp; 6 11:53:39: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(12198) -&amp;gt; 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(80), 1 packet&lt;BR /&gt;Jun&amp;nbsp; 6 11:53:40: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(24158) -&amp;gt; 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(110), 1 packet&lt;BR /&gt;Jun&amp;nbsp; 6 11:53:40: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(7895) -&amp;gt; 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(111), 1 packet&lt;BR /&gt;Jun&amp;nbsp; 6 11:53:40: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(5758) -&amp;gt; 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(113), 1 packet&lt;BR /&gt;Jun&amp;nbsp; 6 11:53:40: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(19683) -&amp;gt; 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(119), 1 packet&lt;BR /&gt;Jun&amp;nbsp; 6 11:53:40: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(15637) -&amp;gt; 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(135), 1 packet&lt;BR /&gt;Jun&amp;nbsp; 6 11:53:40: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(4721) -&amp;gt; 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(139), 1 packet&lt;BR /&gt;Jun&amp;nbsp; 6 11:53:40: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(19006) -&amp;gt; 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(143), 1 packet&lt;BR /&gt;Jun&amp;nbsp; 6 11:53:40: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(4301) -&amp;gt; 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(389), 1 packet&lt;BR /&gt;Jun&amp;nbsp; 6 11:53:41: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(29049) -&amp;gt; 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(427), 1 packet&lt;BR /&gt;Jun&amp;nbsp; 6 11:53:41: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(20105) -&amp;gt; 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(443), 1 packet&lt;BR /&gt;Jun&amp;nbsp; 6 11:53:41: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(16043) -&amp;gt; 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(445), 1 packet&lt;BR /&gt;Jun&amp;nbsp; 6 11:53:41: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(2025) -&amp;gt; 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(631), 1 packet&lt;BR /&gt;Jun&amp;nbsp; 6 11:53:41: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(9981) -&amp;gt; 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(873), 1 packet&lt;BR /&gt;Jun&amp;nbsp; 6 11:53:41: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(18106) -&amp;gt; 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(993), 1 packet&lt;BR /&gt;Jun&amp;nbsp; 6 11:53:41: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(8710) -&amp;gt; 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(1025), 1 packet&lt;BR /&gt;Jun&amp;nbsp; 6 11:53:41: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(20647) -&amp;gt; 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(1026), 1 packet&lt;BR /&gt;Jun&amp;nbsp; 6 11:53:41: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(3058) -&amp;gt; 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(1029), 1 packet&lt;BR /&gt;Jun&amp;nbsp; 6 11:53:41: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(21502) -&amp;gt; 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(1030), 1 packet&lt;BR /&gt;Jun&amp;nbsp; 6 11:53:41: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(22303) -&amp;gt; 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(1080), 1 packet&lt;BR /&gt;Jun&amp;nbsp; 6 11:53:42: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(6856) -&amp;gt; 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(1720), 1 packet&lt;BR /&gt;Jun&amp;nbsp; 6 11:53:42: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(8466) -&amp;gt; 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(3128), 1 packet&lt;BR /&gt;Jun&amp;nbsp; 6 11:53:42: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(25300) -&amp;gt; 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(5000), 1 packet&lt;BR /&gt;HTH&lt;BR /&gt;</description>
      <pubDate>Mon, 06 Jun 2011 10:59:25 GMT</pubDate>
      <guid>https://community.plus.net/t5/IPv6-Trial/Security/m-p/803190#M379</guid>
      <dc:creator>_CN_</dc:creator>
      <dc:date>2011-06-06T10:59:25Z</dc:date>
    </item>
    <item>
      <title>Re: Security</title>
      <link>https://community.plus.net/t5/IPv6-Trial/Security/m-p/803191#M380</link>
      <description>Cheers Carl, I used your config and it's now showing as all closed, which is a major improvement on my config which stopped IPV6 working &lt;img class="lia-deferred-image lia-image-emoji" src="https://community.plus.net/html/@13ACAF1B4DB3038AD540E11CDD6AB984/images/emoticons/cheesy.gif" alt="Cheesy" title="Cheesy" /&gt;</description>
      <pubDate>Mon, 06 Jun 2011 11:10:16 GMT</pubDate>
      <guid>https://community.plus.net/t5/IPv6-Trial/Security/m-p/803191#M380</guid>
      <dc:creator>David_W</dc:creator>
      <dc:date>2011-06-06T11:10:16Z</dc:date>
    </item>
    <item>
      <title>Re: Security</title>
      <link>https://community.plus.net/t5/IPv6-Trial/Security/m-p/803192#M381</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;Quote from: David&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;PRE&gt;access-list 1 remark INSIDE_IF=Vlan1&lt;BR /&gt;access-list 1 remark CCP_ACL Category=2&lt;BR /&gt;access-list 1 permit 192.168.0.0 0.0.0.255&lt;BR /&gt;access-list 23 permit 192.168.0.0 0.0.0.255&lt;BR /&gt;access-list 100 remark CCP_ACL Category=128&lt;BR /&gt;access-list 100 permit ip host 255.255.255.255 any&lt;BR /&gt;access-list 100 permit ip 127.0.0.0 0.255.255.255 any&lt;BR /&gt;&amp;lt;snip&amp;gt;&lt;/PRE&gt;&lt;BR /&gt;There is nothing there that I can see would allow port 80 traffic through the firewall so there is a combination of PN's firewall and my Cisco firewall not picking it up and dropping it.&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BLOCKQUOTE&gt;&lt;BR /&gt;I know you're sorted but it's probably worth mentioning for anyone else reading: the access list above is, in Cisco terms, an 'ip' access list i.e. it is IPv4 only. Given that IPv4 and IPv6 are two separate network stacks and are implemented independently by the IOS then, as you now have, you also need an IPv6 access list applied to an interface in order to control IPv6 traffic through it. Thus, two access lists would be applied - one for IPv4 and one for IPv6.&lt;BR /&gt;Incidentally there is, amongst other IPv6-related tools, a good port scanner at &lt;A href="http://www.subnetonline.com/pages/ipv6-network-tools/online-ipv6-port-scanner.php" target="_blank"&gt;www.subnetonline.com/pages/ipv6-network-tools/online-ipv6-port-scanner.php&lt;/A&gt; which you may find useful as you can specify the target address i.e. you are not limited to only testing from your own machine (the understandable restriction being you can only check for one port at a time but this is often all that's required).&lt;BR /&gt;Mathew</description>
      <pubDate>Mon, 06 Jun 2011 11:48:00 GMT</pubDate>
      <guid>https://community.plus.net/t5/IPv6-Trial/Security/m-p/803192#M381</guid>
      <dc:creator>MJN</dc:creator>
      <dc:date>2011-06-06T11:48:00Z</dc:date>
    </item>
    <item>
      <title>Re: Security</title>
      <link>https://community.plus.net/t5/IPv6-Trial/Security/m-p/803193#M382</link>
      <description>As an update to this, I played with my config today (ok, I broke my config and got it working today but the theory is sound!) and switched from classic based firewall to the newer zone based firewall.&amp;nbsp; By default it appears it's treating IPV6 and IPV4 traffic the same so is applying the rules no matter where the traffic comes from.&amp;nbsp; The IPV6 firewall test showed all my ports as stealth (yay) so it looks like if your router supports zone based firewalling you already got an IPV6 firewall in place without any further kerfuffle.</description>
      <pubDate>Sun, 14 Aug 2011 21:14:28 GMT</pubDate>
      <guid>https://community.plus.net/t5/IPv6-Trial/Security/m-p/803193#M382</guid>
      <dc:creator>David_W</dc:creator>
      <dc:date>2011-08-14T21:14:28Z</dc:date>
    </item>
  </channel>
</rss>

