{"id":423,"date":"2019-07-18T09:11:14","date_gmt":"2019-07-18T07:11:14","guid":{"rendered":"https:\/\/www.cipv6.de\/worp\/?p=423"},"modified":"2019-07-18T09:11:14","modified_gmt":"2019-07-18T07:11:14","slug":"twelve-steps-to-enable-ipv6-in-government-and-organizational-networks-apnic-blog","status":"publish","type":"post","link":"https:\/\/www.cipv6.de\/worp\/index.php\/2019\/07\/18\/twelve-steps-to-enable-ipv6-in-government-and-organizational-networks-apnic-blog\/","title":{"rendered":"Twelve steps to enable IPv6 in government and organizational networks | APNIC Blog"},"content":{"rendered":"<blockquote><p>Guest Post: 12 fundamental steps to deploy IPv6 within governmental and organizational networks.<\/p><\/blockquote>\n<p>Source: <em><a href=\"https:\/\/blog.apnic.net\/2018\/11\/23\/twelve-steps-to-enable-ipv6-in-government-and-organizational-networks\/\">Twelve steps to enable IPv6 in government and organizational networks | APNIC Blog<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Guest Post: 12 fundamental steps to deploy IPv6 within governmental and organizational networks. Source: Twelve steps to enable IPv6 in government and organizational networks | APNIC Blog<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1],"tags":[48,59],"class_list":["post-423","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-ipv6","tag-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Twelve steps to enable IPv6 in government and organizational networks | APNIC Blog - cipv6.de<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cipv6.de\/worp\/index.php\/2019\/07\/18\/twelve-steps-to-enable-ipv6-in-government-and-organizational-networks-apnic-blog\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Twelve steps to enable IPv6 in government and organizational networks | APNIC Blog - cipv6.de\" \/>\n<meta property=\"og:description\" content=\"Guest Post: 12 fundamental steps to deploy IPv6 within governmental and organizational networks. Source: Twelve steps to enable IPv6 in government and organizational networks | APNIC Blog\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cipv6.de\/worp\/index.php\/2019\/07\/18\/twelve-steps-to-enable-ipv6-in-government-and-organizational-networks-apnic-blog\/\" \/>\n<meta property=\"og:site_name\" content=\"cipv6.de\" \/>\n<meta property=\"article:published_time\" content=\"2019-07-18T07:11:14+00:00\" \/>\n<meta name=\"author\" content=\"ugu5ma\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ugu5ma\" \/>\n<meta name=\"twitter:site\" content=\"@ugu5ma\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ugu5ma\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cipv6.de\\\/worp\\\/index.php\\\/2019\\\/07\\\/18\\\/twelve-steps-to-enable-ipv6-in-government-and-organizational-networks-apnic-blog\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cipv6.de\\\/worp\\\/index.php\\\/2019\\\/07\\\/18\\\/twelve-steps-to-enable-ipv6-in-government-and-organizational-networks-apnic-blog\\\/\"},\"author\":{\"name\":\"ugu5ma\",\"@id\":\"https:\\\/\\\/www.cipv6.de\\\/worp\\\/#\\\/schema\\\/person\\\/5d62b275485540be9e5e9e33d4fab86d\"},\"headline\":\"Twelve steps to enable IPv6 in government and organizational networks | APNIC Blog\",\"datePublished\":\"2019-07-18T07:11:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cipv6.de\\\/worp\\\/index.php\\\/2019\\\/07\\\/18\\\/twelve-steps-to-enable-ipv6-in-government-and-organizational-networks-apnic-blog\\\/\"},\"wordCount\":37,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cipv6.de\\\/worp\\\/#\\\/schema\\\/person\\\/5d62b275485540be9e5e9e33d4fab86d\"},\"keywords\":[\"ipv6\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.cipv6.de\\\/worp\\\/index.php\\\/2019\\\/07\\\/18\\\/twelve-steps-to-enable-ipv6-in-government-and-organizational-networks-apnic-blog\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cipv6.de\\\/worp\\\/index.php\\\/2019\\\/07\\\/18\\\/twelve-steps-to-enable-ipv6-in-government-and-organizational-networks-apnic-blog\\\/\",\"url\":\"https:\\\/\\\/www.cipv6.de\\\/worp\\\/index.php\\\/2019\\\/07\\\/18\\\/twelve-steps-to-enable-ipv6-in-government-and-organizational-networks-apnic-blog\\\/\",\"name\":\"Twelve steps to enable IPv6 in government and organizational networks | APNIC Blog - cipv6.de\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cipv6.de\\\/worp\\\/#website\"},\"datePublished\":\"2019-07-18T07:11:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cipv6.de\\\/worp\\\/index.php\\\/2019\\\/07\\\/18\\\/twelve-steps-to-enable-ipv6-in-government-and-organizational-networks-apnic-blog\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cipv6.de\\\/worp\\\/index.php\\\/2019\\\/07\\\/18\\\/twelve-steps-to-enable-ipv6-in-government-and-organizational-networks-apnic-blog\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cipv6.de\\\/worp\\\/index.php\\\/2019\\\/07\\\/18\\\/twelve-steps-to-enable-ipv6-in-government-and-organizational-networks-apnic-blog\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cipv6.de\\\/worp\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Twelve steps to enable IPv6 in government and organizational networks | APNIC Blog\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cipv6.de\\\/worp\\\/#website\",\"url\":\"https:\\\/\\\/www.cipv6.de\\\/worp\\\/\",\"name\":\"cipv6.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cipv6.de\\\/worp\\\/#\\\/schema\\\/person\\\/5d62b275485540be9e5e9e33d4fab86d\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cipv6.de\\\/worp\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/www.cipv6.de\\\/worp\\\/#\\\/schema\\\/person\\\/5d62b275485540be9e5e9e33d4fab86d\",\"name\":\"ugu5ma\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7211dd31d32612293e4228c8f880721a803dcc15211868f096ea9a8e77b6f316?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7211dd31d32612293e4228c8f880721a803dcc15211868f096ea9a8e77b6f316?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7211dd31d32612293e4228c8f880721a803dcc15211868f096ea9a8e77b6f316?s=96&d=mm&r=g\",\"caption\":\"ugu5ma\"},\"logo\":{\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7211dd31d32612293e4228c8f880721a803dcc15211868f096ea9a8e77b6f316?s=96&d=mm&r=g\"},\"sameAs\":[\"https:\\\/\\\/cipv6.de\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Twelve steps to enable IPv6 in government and organizational networks | APNIC Blog - cipv6.de","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cipv6.de\/worp\/index.php\/2019\/07\/18\/twelve-steps-to-enable-ipv6-in-government-and-organizational-networks-apnic-blog\/","og_locale":"en_US","og_type":"article","og_title":"Twelve steps to enable IPv6 in government and organizational networks | APNIC Blog - cipv6.de","og_description":"Guest Post: 12 fundamental steps to deploy IPv6 within governmental and organizational networks. Source: Twelve steps to enable IPv6 in government and organizational networks | APNIC Blog","og_url":"https:\/\/www.cipv6.de\/worp\/index.php\/2019\/07\/18\/twelve-steps-to-enable-ipv6-in-government-and-organizational-networks-apnic-blog\/","og_site_name":"cipv6.de","article_published_time":"2019-07-18T07:11:14+00:00","author":"ugu5ma","twitter_card":"summary_large_image","twitter_creator":"@ugu5ma","twitter_site":"@ugu5ma","twitter_misc":{"Written by":"ugu5ma"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cipv6.de\/worp\/index.php\/2019\/07\/18\/twelve-steps-to-enable-ipv6-in-government-and-organizational-networks-apnic-blog\/#article","isPartOf":{"@id":"https:\/\/www.cipv6.de\/worp\/index.php\/2019\/07\/18\/twelve-steps-to-enable-ipv6-in-government-and-organizational-networks-apnic-blog\/"},"author":{"name":"ugu5ma","@id":"https:\/\/www.cipv6.de\/worp\/#\/schema\/person\/5d62b275485540be9e5e9e33d4fab86d"},"headline":"Twelve steps to enable IPv6 in government and organizational networks | APNIC Blog","datePublished":"2019-07-18T07:11:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cipv6.de\/worp\/index.php\/2019\/07\/18\/twelve-steps-to-enable-ipv6-in-government-and-organizational-networks-apnic-blog\/"},"wordCount":37,"commentCount":0,"publisher":{"@id":"https:\/\/www.cipv6.de\/worp\/#\/schema\/person\/5d62b275485540be9e5e9e33d4fab86d"},"keywords":["ipv6"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.cipv6.de\/worp\/index.php\/2019\/07\/18\/twelve-steps-to-enable-ipv6-in-government-and-organizational-networks-apnic-blog\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.cipv6.de\/worp\/index.php\/2019\/07\/18\/twelve-steps-to-enable-ipv6-in-government-and-organizational-networks-apnic-blog\/","url":"https:\/\/www.cipv6.de\/worp\/index.php\/2019\/07\/18\/twelve-steps-to-enable-ipv6-in-government-and-organizational-networks-apnic-blog\/","name":"Twelve steps to enable IPv6 in government and organizational networks | APNIC Blog - cipv6.de","isPartOf":{"@id":"https:\/\/www.cipv6.de\/worp\/#website"},"datePublished":"2019-07-18T07:11:14+00:00","breadcrumb":{"@id":"https:\/\/www.cipv6.de\/worp\/index.php\/2019\/07\/18\/twelve-steps-to-enable-ipv6-in-government-and-organizational-networks-apnic-blog\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cipv6.de\/worp\/index.php\/2019\/07\/18\/twelve-steps-to-enable-ipv6-in-government-and-organizational-networks-apnic-blog\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cipv6.de\/worp\/index.php\/2019\/07\/18\/twelve-steps-to-enable-ipv6-in-government-and-organizational-networks-apnic-blog\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cipv6.de\/worp\/"},{"@type":"ListItem","position":2,"name":"Twelve steps to enable IPv6 in government and organizational networks | APNIC Blog"}]},{"@type":"WebSite","@id":"https:\/\/www.cipv6.de\/worp\/#website","url":"https:\/\/www.cipv6.de\/worp\/","name":"cipv6.de","description":"","publisher":{"@id":"https:\/\/www.cipv6.de\/worp\/#\/schema\/person\/5d62b275485540be9e5e9e33d4fab86d"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cipv6.de\/worp\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/www.cipv6.de\/worp\/#\/schema\/person\/5d62b275485540be9e5e9e33d4fab86d","name":"ugu5ma","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/7211dd31d32612293e4228c8f880721a803dcc15211868f096ea9a8e77b6f316?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7211dd31d32612293e4228c8f880721a803dcc15211868f096ea9a8e77b6f316?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7211dd31d32612293e4228c8f880721a803dcc15211868f096ea9a8e77b6f316?s=96&d=mm&r=g","caption":"ugu5ma"},"logo":{"@id":"https:\/\/secure.gravatar.com\/avatar\/7211dd31d32612293e4228c8f880721a803dcc15211868f096ea9a8e77b6f316?s=96&d=mm&r=g"},"sameAs":["https:\/\/cipv6.de"]}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9uBTs-6P","jetpack-related-posts":[{"id":780,"url":"https:\/\/www.cipv6.de\/worp\/index.php\/2022\/05\/14\/pi-hole-send-pihole-log-and-pihole-ftl-log-to-external-syslog-server\/","url_meta":{"origin":423,"position":0},"title":"Pi-hole: send pihole.log and pihole-FTL.log to external Syslog-server","author":"ugu5ma","date":"May 14, 2022","format":false,"excerpt":"The option to send Pihole-logs to a remote syslogserver is not implemented.Good thing is that Pi-hole creates log-files.How about adding these logfiles to the local (R-)Syslog-daemon and send it over to the external Syslog-Server via port 514 TCP\/UDP ? I use Dietpi as the OS on my Raspi3+ and added\u2026","rel":"","context":"In &quot;Home-Assistant&quot;","block_context":{"text":"Home-Assistant","link":"https:\/\/www.cipv6.de\/worp\/index.php\/category\/linux\/home-assistant\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.cipv6.de\/worp\/wp-content\/uploads\/2022\/05\/dietpilog-1.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.cipv6.de\/worp\/wp-content\/uploads\/2022\/05\/dietpilog-1.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.cipv6.de\/worp\/wp-content\/uploads\/2022\/05\/dietpilog-1.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.cipv6.de\/worp\/wp-content\/uploads\/2022\/05\/dietpilog-1.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/www.cipv6.de\/worp\/wp-content\/uploads\/2022\/05\/dietpilog-1.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/www.cipv6.de\/worp\/wp-content\/uploads\/2022\/05\/dietpilog-1.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":1103,"url":"https:\/\/www.cipv6.de\/worp\/index.php\/2025\/01\/11\/automate-your-cloud-backups-rclone-and-duplicati\/","url_meta":{"origin":423,"position":1},"title":"Automate Your Cloud Backups: rclone and Duplicati","author":"ugu5ma","date":"January 11, 2025","format":false,"excerpt":"In today's digital age, safeguarding your data is more crucial than ever. With the increasing reliance on cloud storage, it's essential to have a robust backup strategy in place. This blog post will guide you through automating your cloud backups (like Onedrive in this example) using\u00a0rclone\u00a0and\u00a0Duplicati\u00a0on a Linux system (in\u2026","rel":"","context":"In &quot;Linux&quot;","block_context":{"text":"Linux","link":"https:\/\/www.cipv6.de\/worp\/index.php\/category\/linux\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.cipv6.de\/worp\/wp-content\/uploads\/2024\/12\/himage.jpg?fit=1024%2C1024&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.cipv6.de\/worp\/wp-content\/uploads\/2024\/12\/himage.jpg?fit=1024%2C1024&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.cipv6.de\/worp\/wp-content\/uploads\/2024\/12\/himage.jpg?fit=1024%2C1024&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.cipv6.de\/worp\/wp-content\/uploads\/2024\/12\/himage.jpg?fit=1024%2C1024&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":1203,"url":"https:\/\/www.cipv6.de\/worp\/index.php\/2025\/01\/29\/run-deepseek-llm-locally-on-your-m-series-mac-with-lm-studio-and-integrate-iterm2\/","url_meta":{"origin":423,"position":2},"title":"Run DeepSeek LLM locally on your M series Mac with LM Studio and integrate iTerm2","author":"ugu5ma","date":"January 29, 2025","format":false,"excerpt":"With the integration of LM Studio and iTerm2, powered by the cutting-edge DeepSeek LLM, developers can now streamline their workflows. This setup enhances coding efficiency while maintaining complete control over their data.Running DeepSeek LLM locally offers several benefits: Enhanced Privacy: Your data stays on your machine, ensuring that sensitive information\u2026","rel":"","context":"In &quot;MacOS\/IOS&quot;","block_context":{"text":"MacOS\/IOS","link":"https:\/\/www.cipv6.de\/worp\/index.php\/category\/macos\/"},"img":{"alt_text":"DeepSeek LM Studio iTerm2 integration","src":"https:\/\/i0.wp.com\/www.cipv6.de\/worp\/wp-content\/uploads\/2025\/01\/lmdImage2.jpg?fit=1024%2C1024&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.cipv6.de\/worp\/wp-content\/uploads\/2025\/01\/lmdImage2.jpg?fit=1024%2C1024&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.cipv6.de\/worp\/wp-content\/uploads\/2025\/01\/lmdImage2.jpg?fit=1024%2C1024&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.cipv6.de\/worp\/wp-content\/uploads\/2025\/01\/lmdImage2.jpg?fit=1024%2C1024&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":1279,"url":"https:\/\/www.cipv6.de\/worp\/index.php\/2025\/02\/25\/secure-networking-with-hub-and-spoke-topology-using-wireguard-and-ebgp\/","url_meta":{"origin":423,"position":3},"title":"Secure Networking with Hub-and-Spoke Topology Using WireGuard and eBGP","author":"ugu5ma","date":"February 25, 2025","format":false,"excerpt":"Free Range Routing (FRR)\u00a0is a powerful, open-source routing software suite that provides implementations of various routing protocols, including BGP, OSPF, IS-IS, RIP, PIM, and more. It\u2019s designed to run on Linux and Unix-like systems, making it a flexible solution for a wide range of network setups\u2014from small labs to large-scale\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.cipv6.de\/worp\/wp-content\/uploads\/2025\/02\/VPN-BGP-WireGuard-topology.jpg?fit=1024%2C1024&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.cipv6.de\/worp\/wp-content\/uploads\/2025\/02\/VPN-BGP-WireGuard-topology.jpg?fit=1024%2C1024&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.cipv6.de\/worp\/wp-content\/uploads\/2025\/02\/VPN-BGP-WireGuard-topology.jpg?fit=1024%2C1024&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.cipv6.de\/worp\/wp-content\/uploads\/2025\/02\/VPN-BGP-WireGuard-topology.jpg?fit=1024%2C1024&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":939,"url":"https:\/\/www.cipv6.de\/worp\/index.php\/2024\/08\/26\/duplicati-rpi-setup-on-64-bit-ubuntu-os-jammy-22-04\/","url_meta":{"origin":423,"position":4},"title":"Duplicati RPi setup on 64-bit Ubuntu OS Jammy (22.04)","author":"ugu5ma","date":"August 26, 2024","format":false,"excerpt":"Setting up Duplicati on Ubuntu Jammy (22.04) for Raspberry Pi (RPI) is a great way to ensure your data is securely backed up. Duplicati is a free, open-source backup solution that allows you to store encrypted, incremental, and compressed backups on various cloud storage services and remote file servers.\u00a0It supports\u2026","rel":"","context":"In &quot;Linux&quot;","block_context":{"text":"Linux","link":"https:\/\/www.cipv6.de\/worp\/index.php\/category\/linux\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.cipv6.de\/worp\/wp-content\/uploads\/2024\/08\/CleanShot-2024-08-26-at-11.43.33%402x.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.cipv6.de\/worp\/wp-content\/uploads\/2024\/08\/CleanShot-2024-08-26-at-11.43.33%402x.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.cipv6.de\/worp\/wp-content\/uploads\/2024\/08\/CleanShot-2024-08-26-at-11.43.33%402x.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.cipv6.de\/worp\/wp-content\/uploads\/2024\/08\/CleanShot-2024-08-26-at-11.43.33%402x.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/www.cipv6.de\/worp\/wp-content\/uploads\/2024\/08\/CleanShot-2024-08-26-at-11.43.33%402x.png?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":1316,"url":"https:\/\/www.cipv6.de\/worp\/index.php\/2025\/03\/11\/iso-27001-27006-and-27009-the-essential-normative-standards-for-isms\/","url_meta":{"origin":423,"position":5},"title":"ISO 27001, 27006, and 27009: The Essential Normative Standards for ISMS","author":"ugu5ma","date":"March 11, 2025","format":false,"excerpt":"Introduction ISO 27000 is a family of standards focused on information security management systems (ISMS). Within this series, some standards are\u00a0normative, meaning they define essential requirements, while others are\u00a0informative, providing guidelines and recommendations. Difference Between Normative and Informative Standards Normative standards\u00a0are mandatory for certification and compliance. They establish requirements that\u2026","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/www.cipv6.de\/worp\/index.php\/category\/security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.cipv6.de\/worp\/wp-content\/uploads\/2025\/03\/isonormatinform.webp?fit=1024%2C1024&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.cipv6.de\/worp\/wp-content\/uploads\/2025\/03\/isonormatinform.webp?fit=1024%2C1024&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.cipv6.de\/worp\/wp-content\/uploads\/2025\/03\/isonormatinform.webp?fit=1024%2C1024&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.cipv6.de\/worp\/wp-content\/uploads\/2025\/03\/isonormatinform.webp?fit=1024%2C1024&ssl=1&resize=700%2C400 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.cipv6.de\/worp\/index.php\/wp-json\/wp\/v2\/posts\/423","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cipv6.de\/worp\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cipv6.de\/worp\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cipv6.de\/worp\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cipv6.de\/worp\/index.php\/wp-json\/wp\/v2\/comments?post=423"}],"version-history":[{"count":0,"href":"https:\/\/www.cipv6.de\/worp\/index.php\/wp-json\/wp\/v2\/posts\/423\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cipv6.de\/worp\/index.php\/wp-json\/wp\/v2\/media?parent=423"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cipv6.de\/worp\/index.php\/wp-json\/wp\/v2\/categories?post=423"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cipv6.de\/worp\/index.php\/wp-json\/wp\/v2\/tags?post=423"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}