SlideShare una empresa de Scribd logo
1 de 42
Descargar para leer sin conexión
IPv6 for the Enterprise John Rhoton ( [email_address] ) Distinguished Technologist HP EDS CTO Office June 2009
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],Agenda
Mysteries, Myths and Misconceptions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],June 19, 2009
What is IPv6? ,[object Object],[object Object],[object Object],[object Object],[object Object],June 2008
Need for IP address space Aren’t 4’294’967’296 addresses enough? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ARIN advised IPv6 migration   – May 2007 Class IP Address Pool A 2 24 ~16’777’216 B 2 16 ~65’536 C 2 8 ~256
The booming Internet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IANA Pool Exhaustion June 19, 2009
NAT Problems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Oct 21, 2008 HP CONFIDENTIAL
Mobile IP Data Flow Binding Update Physical Movement Mobile IP Tunnel Foreign   Network Home Network Mobile  Node Mobile Node Correspondent Node Home  Agent
Additional Benefits ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],Agenda
Adoption: Where are we really? E-Business Mobile Telephony Laggards Bowling Alley Tornado Main Street Early Market Internet Wireless  Data IPv6  Mobile Applications US DoD Mandate 2008 Innovators Early  Adopters Late  Majority Early  Majority
IPv6 Adoption Curve ,[object Object],[object Object],[object Object]
IPv6 Drivers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],June 2008
HP took an early Lead with IPv6 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],June 2008
HP IPv6 support ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],June 2008
[object Object],[object Object],[object Object],[object Object],[object Object],Agenda
The Path to IPv6 in the Enterprise ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Remote Access ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Dedicated Networks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],June 19, 2009
Beijing Olympics 2008 ,[object Object],[object Object],[object Object],June 19, 2009
Synergies between IPv6 and Cloud ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],June 19, 2009
[object Object],[object Object],[object Object],[object Object],[object Object],Agenda
Return on Investment? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],June 19, 2009 But there is another perspective …
Risk Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],June 19, 2009
Rogue Devices / Networks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],What you don’t know will hurt you
Hacker Tools and Attacks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],"Last year IPv6 didn't register in scale, but now it's emerging as a concern on the security side. Attackers are going to try it or use it as a transport mechanism for botnets. IPv6 has become a problem on the operational side.“ Arbor Networks CTO Rob Malan
IPv6 Transition Exposure ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Application Impact ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],June 19, 2009
Potential Triggers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],June 19, 2009
Financial impact ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],June 19, 2009
[object Object],[object Object],[object Object],[object Object],[object Object],Agenda
Phased Deployment ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],June 19, 2009
Discovery ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],June 19, 2009
Application audit/support ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Preparation and Planning ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
HP IPv6 Frequently Asked Questions June 2008 www.hp.com/network/ipv6   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IPv6 FAQs
IPv6 resources ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],June 2008
More information ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

Colt IPv6 for Business Customers Case Study - Swiss IPv6 Council Jun 2013-v3
Colt IPv6 for Business Customers Case Study - Swiss IPv6 Council Jun 2013-v3Colt IPv6 for Business Customers Case Study - Swiss IPv6 Council Jun 2013-v3
Colt IPv6 for Business Customers Case Study - Swiss IPv6 Council Jun 2013-v3Javier Benitez
 
Ole Ipv4onlifesupport
Ole Ipv4onlifesupport Ole Ipv4onlifesupport
Ole Ipv4onlifesupport IPv6no
 
IPV6 Network Simulation Projects Research Guidance
IPV6 Network Simulation Projects Research GuidanceIPV6 Network Simulation Projects Research Guidance
IPV6 Network Simulation Projects Research GuidancePhdtopiccom
 
IPv6 translation methods
IPv6 translation methodsIPv6 translation methods
IPv6 translation methodsAhmad Hijazi
 
Jan zorz procurement-ripe-501
Jan zorz procurement-ripe-501Jan zorz procurement-ripe-501
Jan zorz procurement-ripe-501IPv6no
 
Norway - IPv6 World Leader: Tore Anderson, IPv6 guru, Redpill Linpro
Norway - IPv6 World Leader: Tore Anderson, IPv6 guru, Redpill LinproNorway - IPv6 World Leader: Tore Anderson, IPv6 guru, Redpill Linpro
Norway - IPv6 World Leader: Tore Anderson, IPv6 guru, Redpill LinproIPv6no
 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assuranceCisco Canada
 
ARIN 34 IPv6 IAB/IETF Activities Report
ARIN 34 IPv6 IAB/IETF Activities ReportARIN 34 IPv6 IAB/IETF Activities Report
ARIN 34 IPv6 IAB/IETF Activities ReportARIN
 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...Cisco Canada
 
IETF Activities Update
IETF Activities UpdateIETF Activities Update
IETF Activities UpdateARIN
 
TechWiseTV Workshop: Cisco Hybrid Cloud Platform for Google Cloud
TechWiseTV Workshop:  Cisco Hybrid Cloud Platform for Google CloudTechWiseTV Workshop:  Cisco Hybrid Cloud Platform for Google Cloud
TechWiseTV Workshop: Cisco Hybrid Cloud Platform for Google CloudRobb Boyd
 
IPv6 - A Real World Deployment for Mobiles
IPv6 - A Real World Deployment for MobilesIPv6 - A Real World Deployment for Mobiles
IPv6 - A Real World Deployment for MobilesAPNIC
 
Applying IPv6 to LTE Networks
Applying IPv6 to LTE NetworksApplying IPv6 to LTE Networks
Applying IPv6 to LTE NetworksAPNIC
 
Evolution of Mobile Networks and IPv6 - APEC TEL49
Evolution of Mobile Networks and IPv6 - APEC TEL49Evolution of Mobile Networks and IPv6 - APEC TEL49
Evolution of Mobile Networks and IPv6 - APEC TEL49APNIC
 
Innovations in the Enterprise Routing & Switching Space
Innovations in the Enterprise Routing & Switching SpaceInnovations in the Enterprise Routing & Switching Space
Innovations in the Enterprise Routing & Switching SpaceCisco Canada
 
M2M関連状況 roll&core WG meeting in IETF86
M2M関連状況 roll&core WG meeting in IETF86M2M関連状況 roll&core WG meeting in IETF86
M2M関連状況 roll&core WG meeting in IETF86Shoichi Sakane
 
WINS: Peering and IXPs
WINS: Peering and IXPsWINS: Peering and IXPs
WINS: Peering and IXPsAPNIC
 

La actualidad más candente (20)

Colt IPv6 for Business Customers Case Study - Swiss IPv6 Council Jun 2013-v3
Colt IPv6 for Business Customers Case Study - Swiss IPv6 Council Jun 2013-v3Colt IPv6 for Business Customers Case Study - Swiss IPv6 Council Jun 2013-v3
Colt IPv6 for Business Customers Case Study - Swiss IPv6 Council Jun 2013-v3
 
Ole Ipv4onlifesupport
Ole Ipv4onlifesupport Ole Ipv4onlifesupport
Ole Ipv4onlifesupport
 
IPV6 Network Simulation Projects Research Guidance
IPV6 Network Simulation Projects Research GuidanceIPV6 Network Simulation Projects Research Guidance
IPV6 Network Simulation Projects Research Guidance
 
IPv6 translation methods
IPv6 translation methodsIPv6 translation methods
IPv6 translation methods
 
Jan zorz procurement-ripe-501
Jan zorz procurement-ripe-501Jan zorz procurement-ripe-501
Jan zorz procurement-ripe-501
 
Norway - IPv6 World Leader: Tore Anderson, IPv6 guru, Redpill Linpro
Norway - IPv6 World Leader: Tore Anderson, IPv6 guru, Redpill LinproNorway - IPv6 World Leader: Tore Anderson, IPv6 guru, Redpill Linpro
Norway - IPv6 World Leader: Tore Anderson, IPv6 guru, Redpill Linpro
 
ION Sri Lanka - IPv6 Deployment at IIJ (IPv6 Panel)
ION Sri Lanka - IPv6 Deployment at IIJ (IPv6 Panel)ION Sri Lanka - IPv6 Deployment at IIJ (IPv6 Panel)
ION Sri Lanka - IPv6 Deployment at IIJ (IPv6 Panel)
 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assurance
 
ARIN 34 IPv6 IAB/IETF Activities Report
ARIN 34 IPv6 IAB/IETF Activities ReportARIN 34 IPv6 IAB/IETF Activities Report
ARIN 34 IPv6 IAB/IETF Activities Report
 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
 
IETF Activities Update
IETF Activities UpdateIETF Activities Update
IETF Activities Update
 
TechWiseTV Workshop: Cisco Hybrid Cloud Platform for Google Cloud
TechWiseTV Workshop:  Cisco Hybrid Cloud Platform for Google CloudTechWiseTV Workshop:  Cisco Hybrid Cloud Platform for Google Cloud
TechWiseTV Workshop: Cisco Hybrid Cloud Platform for Google Cloud
 
IPv6 - A Real World Deployment for Mobiles
IPv6 - A Real World Deployment for MobilesIPv6 - A Real World Deployment for Mobiles
IPv6 - A Real World Deployment for Mobiles
 
Applying IPv6 to LTE Networks
Applying IPv6 to LTE NetworksApplying IPv6 to LTE Networks
Applying IPv6 to LTE Networks
 
Evolution of Mobile Networks and IPv6 - APEC TEL49
Evolution of Mobile Networks and IPv6 - APEC TEL49Evolution of Mobile Networks and IPv6 - APEC TEL49
Evolution of Mobile Networks and IPv6 - APEC TEL49
 
Innovations in the Enterprise Routing & Switching Space
Innovations in the Enterprise Routing & Switching SpaceInnovations in the Enterprise Routing & Switching Space
Innovations in the Enterprise Routing & Switching Space
 
IPv6 Can No Longer Be Ignored
IPv6 Can No Longer Be IgnoredIPv6 Can No Longer Be Ignored
IPv6 Can No Longer Be Ignored
 
M2M関連状況 roll&core WG meeting in IETF86
M2M関連状況 roll&core WG meeting in IETF86M2M関連状況 roll&core WG meeting in IETF86
M2M関連状況 roll&core WG meeting in IETF86
 
WINS: Peering and IXPs
WINS: Peering and IXPsWINS: Peering and IXPs
WINS: Peering and IXPs
 
Adressing IPv6 strategy
Adressing IPv6 strategyAdressing IPv6 strategy
Adressing IPv6 strategy
 

Similar a Enterprise Preparation for IPv6

IPv6 for the Enterprise
IPv6 for the EnterpriseIPv6 for the Enterprise
IPv6 for the EnterpriseJohn Rhoton
 
Ipv6 - Hamzeh Al-Qudah
Ipv6 - Hamzeh Al-QudahIpv6 - Hamzeh Al-Qudah
Ipv6 - Hamzeh Al-QudahHamza Al-Qudah
 
IPv6IntegrationBestPracticesfinal.pdf
IPv6IntegrationBestPracticesfinal.pdfIPv6IntegrationBestPracticesfinal.pdf
IPv6IntegrationBestPracticesfinal.pdfCPUHogg
 
2011 TWNIC SP IPv6 Transition
2011 TWNIC SP IPv6 Transition2011 TWNIC SP IPv6 Transition
2011 TWNIC SP IPv6 TransitionJohnson Liu
 
Internet6: A Digital Game Changer
Internet6: A Digital Game ChangerInternet6: A Digital Game Changer
Internet6: A Digital Game ChangerCARLOS RALLI-UCENDO
 
Future protocol IP v6
Future protocol IP v6Future protocol IP v6
Future protocol IP v6Manesh Sharma
 
Nt1310 Unit 5 Term Paper
Nt1310 Unit 5 Term PaperNt1310 Unit 5 Term Paper
Nt1310 Unit 5 Term PaperAmanda Gray
 
Advances in IPv6 Mobile Access
Advances in IPv6 Mobile AccessAdvances in IPv6 Mobile Access
Advances in IPv6 Mobile AccessJohn Loughney
 
Ipv6 tutorial
Ipv6 tutorialIpv6 tutorial
Ipv6 tutorialsaryu2011
 
Ip Netwk Trans Forum 2008
Ip Netwk Trans Forum 2008Ip Netwk Trans Forum 2008
Ip Netwk Trans Forum 2008kquinn
 
Jorgenson Loki
Jorgenson LokiJorgenson Loki
Jorgenson LokiCarl Ford
 
It security
It securityIt security
It securityMutten
 

Similar a Enterprise Preparation for IPv6 (20)

IPv6 for the Enterprise
IPv6 for the EnterpriseIPv6 for the Enterprise
IPv6 for the Enterprise
 
IPv6: the what, why and how
IPv6: the what, why and howIPv6: the what, why and how
IPv6: the what, why and how
 
Ipv6 - Hamzeh Al-Qudah
Ipv6 - Hamzeh Al-QudahIpv6 - Hamzeh Al-Qudah
Ipv6 - Hamzeh Al-Qudah
 
Davis Chris
Davis ChrisDavis Chris
Davis Chris
 
IPv6IntegrationBestPracticesfinal.pdf
IPv6IntegrationBestPracticesfinal.pdfIPv6IntegrationBestPracticesfinal.pdf
IPv6IntegrationBestPracticesfinal.pdf
 
2011 TWNIC SP IPv6 Transition
2011 TWNIC SP IPv6 Transition2011 TWNIC SP IPv6 Transition
2011 TWNIC SP IPv6 Transition
 
I pv6
I pv6I pv6
I pv6
 
Presentation
PresentationPresentation
Presentation
 
IPv6: Forecasts and Trends
IPv6: Forecasts and TrendsIPv6: Forecasts and Trends
IPv6: Forecasts and Trends
 
Internet6: A Digital Game Changer
Internet6: A Digital Game ChangerInternet6: A Digital Game Changer
Internet6: A Digital Game Changer
 
Future protocol IP v6
Future protocol IP v6Future protocol IP v6
Future protocol IP v6
 
Nt1310 Unit 5 Term Paper
Nt1310 Unit 5 Term PaperNt1310 Unit 5 Term Paper
Nt1310 Unit 5 Term Paper
 
Advances in IPv6 Mobile Access
Advances in IPv6 Mobile AccessAdvances in IPv6 Mobile Access
Advances in IPv6 Mobile Access
 
Ipv6 tutorial
Ipv6 tutorialIpv6 tutorial
Ipv6 tutorial
 
Ipv6 tutorial
Ipv6 tutorialIpv6 tutorial
Ipv6 tutorial
 
Ip Netwk Trans Forum 2008
Ip Netwk Trans Forum 2008Ip Netwk Trans Forum 2008
Ip Netwk Trans Forum 2008
 
Jorgenson Loki
Jorgenson LokiJorgenson Loki
Jorgenson Loki
 
10 fn s05
10 fn s0510 fn s05
10 fn s05
 
10 fn s05
10 fn s0510 fn s05
10 fn s05
 
It security
It securityIt security
It security
 

Más de John Rhoton

Cloud Computing: New Approaches for Security
Cloud Computing: New Approaches for SecurityCloud Computing: New Approaches for Security
Cloud Computing: New Approaches for SecurityJohn Rhoton
 
Cloud Computing 2013: Status and Trends
Cloud Computing 2013: Status and TrendsCloud Computing 2013: Status and Trends
Cloud Computing 2013: Status and TrendsJohn Rhoton
 
Cloud Deployment Strategy: Challenges to consider
Cloud Deployment Strategy: Challenges to considerCloud Deployment Strategy: Challenges to consider
Cloud Deployment Strategy: Challenges to considerJohn Rhoton
 
Cloud Computing Challenges - Beamap
Cloud Computing Challenges - BeamapCloud Computing Challenges - Beamap
Cloud Computing Challenges - BeamapJohn Rhoton
 
Business Perspectives on Cloud Computing
Business Perspectives on Cloud ComputingBusiness Perspectives on Cloud Computing
Business Perspectives on Cloud ComputingJohn Rhoton
 
Cloud Computing Explained: Guide to Enterprise Implementation
Cloud Computing Explained: Guide to Enterprise ImplementationCloud Computing Explained: Guide to Enterprise Implementation
Cloud Computing Explained: Guide to Enterprise ImplementationJohn Rhoton
 
Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6John Rhoton
 
Securing Cloud Services
Securing Cloud ServicesSecuring Cloud Services
Securing Cloud ServicesJohn Rhoton
 
Clouds in the Enterprise
Clouds in the EnterpriseClouds in the Enterprise
Clouds in the EnterpriseJohn Rhoton
 
Unauthorized Wireless Network Connections
Unauthorized Wireless Network ConnectionsUnauthorized Wireless Network Connections
Unauthorized Wireless Network ConnectionsJohn Rhoton
 
ISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy EnforcementISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy EnforcementJohn Rhoton
 
RSA - WLAN Hacking
RSA - WLAN HackingRSA - WLAN Hacking
RSA - WLAN HackingJohn Rhoton
 
Cloud Computing: Hindernisse und Chancen für Großunternehmen
Cloud Computing: Hindernisse und Chancen für GroßunternehmenCloud Computing: Hindernisse und Chancen für Großunternehmen
Cloud Computing: Hindernisse und Chancen für GroßunternehmenJohn Rhoton
 
Peer-based Enterprise Document Workflow
Peer-based EnterpriseDocument WorkflowPeer-based EnterpriseDocument Workflow
Peer-based Enterprise Document WorkflowJohn Rhoton
 
A Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection SolutionsA Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection SolutionsJohn Rhoton
 
Windows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best PracticesWindows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best PracticesJohn Rhoton
 
System Center Mobile Device Manager
System Center Mobile Device ManagerSystem Center Mobile Device Manager
System Center Mobile Device ManagerJohn Rhoton
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device ManagementJohn Rhoton
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityJohn Rhoton
 

Más de John Rhoton (19)

Cloud Computing: New Approaches for Security
Cloud Computing: New Approaches for SecurityCloud Computing: New Approaches for Security
Cloud Computing: New Approaches for Security
 
Cloud Computing 2013: Status and Trends
Cloud Computing 2013: Status and TrendsCloud Computing 2013: Status and Trends
Cloud Computing 2013: Status and Trends
 
Cloud Deployment Strategy: Challenges to consider
Cloud Deployment Strategy: Challenges to considerCloud Deployment Strategy: Challenges to consider
Cloud Deployment Strategy: Challenges to consider
 
Cloud Computing Challenges - Beamap
Cloud Computing Challenges - BeamapCloud Computing Challenges - Beamap
Cloud Computing Challenges - Beamap
 
Business Perspectives on Cloud Computing
Business Perspectives on Cloud ComputingBusiness Perspectives on Cloud Computing
Business Perspectives on Cloud Computing
 
Cloud Computing Explained: Guide to Enterprise Implementation
Cloud Computing Explained: Guide to Enterprise ImplementationCloud Computing Explained: Guide to Enterprise Implementation
Cloud Computing Explained: Guide to Enterprise Implementation
 
Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6
 
Securing Cloud Services
Securing Cloud ServicesSecuring Cloud Services
Securing Cloud Services
 
Clouds in the Enterprise
Clouds in the EnterpriseClouds in the Enterprise
Clouds in the Enterprise
 
Unauthorized Wireless Network Connections
Unauthorized Wireless Network ConnectionsUnauthorized Wireless Network Connections
Unauthorized Wireless Network Connections
 
ISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy EnforcementISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy Enforcement
 
RSA - WLAN Hacking
RSA - WLAN HackingRSA - WLAN Hacking
RSA - WLAN Hacking
 
Cloud Computing: Hindernisse und Chancen für Großunternehmen
Cloud Computing: Hindernisse und Chancen für GroßunternehmenCloud Computing: Hindernisse und Chancen für Großunternehmen
Cloud Computing: Hindernisse und Chancen für Großunternehmen
 
Peer-based Enterprise Document Workflow
Peer-based EnterpriseDocument WorkflowPeer-based EnterpriseDocument Workflow
Peer-based Enterprise Document Workflow
 
A Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection SolutionsA Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection Solutions
 
Windows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best PracticesWindows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best Practices
 
System Center Mobile Device Manager
System Center Mobile Device ManagerSystem Center Mobile Device Manager
System Center Mobile Device Manager
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device Management
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 

Último

Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 

Último (20)

Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 

Enterprise Preparation for IPv6

  • 1. IPv6 for the Enterprise John Rhoton ( [email_address] ) Distinguished Technologist HP EDS CTO Office June 2009
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. IANA Pool Exhaustion June 19, 2009
  • 9.
  • 10. Oct 21, 2008 HP CONFIDENTIAL
  • 11. Mobile IP Data Flow Binding Update Physical Movement Mobile IP Tunnel Foreign Network Home Network Mobile Node Mobile Node Correspondent Node Home Agent
  • 12.
  • 13.
  • 14. Adoption: Where are we really? E-Business Mobile Telephony Laggards Bowling Alley Tornado Main Street Early Market Internet Wireless Data IPv6 Mobile Applications US DoD Mandate 2008 Innovators Early Adopters Late Majority Early Majority
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.

Notas del editor

  1. This session is aimed at IT managers and architects who have a basic familiarity with networking and need to assess the impact of IPv6 and/or plan for its eventual adoption. Recent reports of IPv4 address exhaustion have made many IT managers take notice. IPv6 may be technically better than IPv4 but until now most corporations have been slow to even consider a major network overhaul. They are waiting for a business case before investing in a new technology. Unfortunately, this has put them in a very precarious situation. The case for IPv6 is not an immediate return on financial investment. Rather it is a necessary step to reduce risk. Poor preparation leaves enterprises exposed to significant procurement and redesign costs when IPv6 crosses a critical threshold of adoption and displaces IPv4 in any critical points or interfaces of the enterprise. A single important customer or supplier can force a degree of IPv6 implementation. That point in time is visibly approaching. A more urgent risk already leaves critical enterprise resources vulnerable today: the default enablement of IPv6 in the most popular platforms on the market. Vista, Windows Server 2008 and most Linux distributions use IPv6 internally and automatically establish connectivity which can subvert the most powerful IPv4-based enterprise protection. Corporate networks can only be protected with a comprehensive security approach that includes IPv6. Implementing IPv6 is not a trivial exercise. It requires a complete audit of all network components, an analysis of all networked applications, a thorough dual-stack transition plan and an opportunity assessment of new protocol benefits. Fortunately, there is no urgent need for most organizations to fully embrace IPv6 at this time. The cost and effort of minimal preparation is almost negligible. On the other hand, the impact of a critical security incident, the need to write off a major equipment purchase or to fundamentally redesign a network can be devastating. The business case for widespread corporate IPv6 adoption may not yet be compelling. But we have certainly reached the time for all enterprises to consider IPv6 and assess its impact. Ignoring it any longer is alarmingly irresponsible.
  2. http://www.ietf.org/html.charters/mip6-charter.html
  3. The IPv6 family of protocols were designed to support a range of new functionally, examples of which are listed below. All the designs were optimized for use on 64-bit hardware and software. · Addressing: The size of an IP address increases from 32 bits in IPv4 to 128 bits in IPv6. This provides enough IP addresses such that for the foreseeable future, all nodes can have their own global unique address, enabling true peer-to-peer communication. The IPv6 addressing scheme uses hierarchically assigned addresses. This structure provides a logical separation of "who you are" (interface ID) from "where you are connected to" (prefix) thus allowing a more efficient routing. · Support for Renumbering: IPv6 brings network level support for renumbering (changing IP addresses across a network). IPv6 addresses can have lifetimes associated with them. As the lifetime of the old address expires, a new address can be automatically configured. Renumbering IPv6 Hosts is easy, just add a new Prefix to the Router and reduce the Lifetime of the old prefix. As nodes depreciate the old prefix the new Prefix will start to be used for new connections. Renumbering is designed to happen! Thus providing an end of ISP “lock in” and improved competition. · Management: IPv6 makes getting on the network is as simple as plugging a cable into your computer. IPv6 nodes automatically configure themselves using IPv6 stateless auto-configuration or a version of the dynamic host configuration protocol (DHCPv6), all without human intervention. These features make for true plug-&-play network access, putting the IT director in control and r e-focus network operation staff on running the network. · Mandated Security: Security is an add-on in IPv4 – clearly unacceptable for today’s e-commerce. IPv6 brings mandated standard security, at the network level, boosting the prospects for e-commerce. All traffic running over IP can be secured. · Efficient Mobility-support: Built-in mobility support. Every network is mobile ready . Very little infrastructure is required. Each IPv6 node can act as a correspondent and redirect packets to the new address of the mobile node. · QoS: The IPv6 packet format contains a new 20-bit traffic-flow identification field that lays the foundation for quality-of-service (QoS) functions, such as bandwidth reservation, in an open, interoperable manner. This is practically impossible in using standard Ipv4 technologies.
  4. http://www.btgtm.com/BTGlobalTelecomNewsGTMA/Article.asp?ArticleCode=40065132&EditionCode=91632210 Critical for Comcast to be able to manage its cable modems and set top boxes after all of the IPv4 addresses are used up. 25% plan to have IPv6 in production within 2 years 10% of respondents are currently deploying or have deployed IPv6. An additional 15% of respondents plan to deploy IPv6 within the next two years. 50% do not have a clear strategy
  5. massively scalable internet architecture underneath the compute cloud platform (since cloud platforms are completely internet based and assume sound internet infrastructure) use of mobile ipv6 to migrate or transition virtual machines across geographical boundaries / affinities inherent security between compute elements by way of IPSec in v6 aid dynamic allocation of capacity by autoconfiguring virtual machines based on demand fluctuation use of extension headers for new capabilities for cloud services However: Extension headers are problematic for hardware-based packet-forwarding/-classification engines, FYI. Also, in keeping with the end-to-end principle as expressed by Salter, et. al., the utility and desirability of extension headers in the underlying transport is contraindicated. Overencryption is actually a serious and growing security problem, as it degrades the ability to classify and detect undesirable network traffic. Autoconfiguration of computing/networking/application/service resources is orthogonal to the underlying layer-3 transport. Workload mobility <> VM mobility. Where IPv6 comes into play is that it is the solution, such as it is, for IPv4 address exhaustion. IPv6 plus LISP is probably the best solution we currently have on the table to both address exhaustion and routing-table bloat in the DFZ (which is only going to increase as more and more entities are multi-homed, not to mention the additional memory/ASIC requirements for carrying 128-bit IPv6 addresses in the RIB and mapping them into the FIB). Mobility, the rise of spimes, and M2M all require copious and flexible addressing, and a world of NAT isn’t going to the the optimal solution. Renumbering, autoconfiguration?
  6. http://seclists.org/lists/honeypots/2002/Oct-Dec/0105.html http://project.honeynet.org/scans/scan25/sol/NCSU/main.html http://pcworld.about.com/od/securit1/Denial-of-Service-Attacks-Inte.htm RP Murphy : DefCon : IPv6 Covert Channels James Hoagland : Blackhat : Teredo/IPv6-related flaw in Vista Joe Klein: 2001 10/1/2001 DOS bot Ipv4.ipv6.tcp.connec*on 2003 9/26/2003 Worm W32/Raleka!worm 2004 7/6/2004 Worm W32/Sdbot‐JW 2005 2/18/2005 Worm W32/Sdbot‐VJ 8/24/2005 Trojan Troj/LegMir‐AT 9/5/2005 Trojan Troj/LegMir‐AX 2006 4/28/2006 Trojan W32/Agent.ABU!tr.dldr 2007 1/2/2007 Trojan Cimuz.CS 4/10/2007 Trojan Cimuz.EL 5/4/2007 Trojan Cimuz.FH 11/5/2007 Worm W32/Nofupat 11/15/2007 Trojan Trojan.Astry 12/1/2007 Rootkit W32/Agent.EZM!tr.dldr 12/16/2007 Trojan W32/Agent.GBU!tr.dldr 12/29/2007 Worm W32/VB‐DYF 2008 4/22/2008 Trojan Troj/PWS‐ARA 5/29/2008 Trojan Generic.dx!1DAEE3B9 http://www.securecomputing.net.au/News/117402,ipv6-insecurity-is-a-clear-and-present-danger.aspx
  7. Sun ’s socket scrubber https://sdlc4e.sun.com/ECom/EComActionServlet;jsessionid=B39AB3694679C27E9F99934A8F86CA16
  8. Procurement Follow lead of DoD ROI - Begin to consider. Will be hard to quantify in the initial stages but as product availability shifts the numbers are going to change The challenge is to be ready. The deadline is 2000 but we do not know if it is 1994 or November 1999. Timeline mainly influenced by stubbornness and influence of DoD et al on the industry. Cisco close to ready. Microsoft will probably be 2005/2006 timeframe with apps. Others will follow lead. Don’t invest heavily. Take precautions so that you are not caught off-guard.