http://www.w3.org/ns/prov#value | - Blogger Pablo Lucena at PacketPushers writes in great depth about how to exploit LISP's encapsulation mechanisms, covering such topics as configuration and addressing of hosts, zone-based firewall configurations and how to secure the newly exposed endpoint identifier IPv6 LAN leveraged through LISP.
|