[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
IPv6 and forensic requests
- Subject: IPv6 and forensic requests
- From: maxtul at netassist.ua (Max Tulyev)
- Date: Sun, 10 Feb 2019 15:23:47 +0200
Hi All,
we are implementing IPv6 only infrastructure.
For IPv4 access, we using tayga for 6to4 translation and then CGN for NAT.
There is a number of ways for Linux based NAT to store information for
future forensic requests (i.e. "who was it cracking that website?").
But what about 6to4 translators, as tayga? I believe there should be
well-known patches or solutions. The aim is to have what /64 (not even
/128) was translated to what IPv4 at the requested time.
Is there any?