Thus wrote Roger Marquis ([email protected]):

> _Also_?  Some?  Really?  I don't mean to question Margaret's experience
> but I have to wonder what this statement is based on.  Most of us
> security professionals use NAT to block _all_ incoming connections
> _by_default_.  This is known as fail-closed.

I use firewall rules for that. :)

Given that your NAT device is likely your firewall, why do you trust
your co-admins not to accidentially change N:1 NAT if you don't trust
them to keep the incoming block around?

I don't think N:1 NAT is in the long-term best interest of enterprises,
even if it will likely take about as long to un-learn NAPT as it took
to learn CIDR. Privacy is a concern, but newer Windows machines seem
to do privacy addressing with great abandon, and other current OSes
at least use them if told.

I don't see much point in trying to prevent people from using whatever
they want now, though, as long as it has no immediate impact on
third parties; standard practise will change by itself when the
advantages are apparent. Same holds true for NAT at all and potential
better solutions, btw.

regards,
        spz
-- 
[email protected] (S.P.Zeidler)
_______________________________________________
nat66 mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/nat66

Reply via email to