arrow-left2arrow-right2Vector Smart Object7Vector Smart Object2Vector Smart Object111Vector Smart Object1snapchat

Internetwork Engineering Blog

IE and industry related news, articles, announcements, and more.

VPNFilter and The Importance of The Home Network

[fa icon="calendar'] August 15, 2018 - Written by Bill Baerwalde
Posted in Intelligent Infrastructure, Security

Since May of 2018, we’ve heard a lot about VPNFilter malware and the growing number of affected devices. We’ve even been given the directive to reboot our routers to stop the malware which also enables the FBI and other security groups to better track it. While rebooting the router won’t remove the malware, it will stop the advanced portions of VPNFilter from continuing. To remove the Stage 1 VPNFilter payload, you must apply the proper patch and updates from the manufacturer.

Read More

IPv4 To IPv6 Migration: Why the wait?

[fa icon="calendar'] August 6, 2018 - Written by Jeff Patterson
Posted in Intelligent Infrastructure, Mobility


Have you transitioned your company’s network away from IPv4 and over to IPv6 yet? If not, why? For years now, we’ve heard apocalypse-type theories of how we need to move to IPv6 or the internet will die. IPv4 exhaustion has been rumored since the 1990s and IPv6 has been around for 19 years, so if you haven’t made the jump, you’re not alone. Google tracks IPv6 statistics and, as of December 2017, only 18.67% of the world has deployed IPv6, with the United States adopting at a faster approximate 25% rate. If we all know that IPv6 will be the standard at some point, then why is it taking so long to transition?

Read More

What’s a Whitelist and Why Do You Need One?

[fa icon="calendar'] July 17, 2018 - Written by Richard Babb
Posted in Intelligent Infrastructure, Security


With the internet, in all its glory, playing host to over 1.8 billion websites that can be accessed by virtually anyone in the world, it stands to reason that businesses may not want users accessing some of these websites due to security threats, inappropriateness, or other factors while on their network. How can businesses control what websites their users gain access to? Typically, most organizations have utilized a blacklist, which identifies websites that users are not allowed to access. This method is not very restrictive and can be problematic in that it allows access to everything, and I do mean EVERYTHING, that is not on the blacklist. A whitelist, as you might guess, is the exact opposite of a blacklist, and only grants access to websites explicitly identified on the list. If the site isn’t on the list, then the user isn’t granted access to it. The concept of a whitelist has been around for many years in website filtering but has seldom been implemented. It can also be problematic because, given the breadth and depth of the internet, only a fraction of the available websites would be allowed.

Read More