Department of Defense
High Performance Computing Modernization Program

The Security section provides a wide variety of information for individuals and organizations interested in benefitting from the experience of others about planning for, configuring, and deploying secure IPv6 devices and networks. As was the case with security for Internet Protocol version 4 (IPv4), there are no easy or quick solutions. This observation from the Network Working Group of the Internet Engineering Task Force (IETF) in Request For Comments (RFC) 4942, IPv6 Transition/Coexistence Security Considerations is still valid:

“It is important to understand that deployments are unlikely to be replacing IPv4 with IPv6 (in the short term), but rather will be adding IPv6 to be operated in parallel with IPv4 over a considerable period, so that security issues with transition mechanisms and dual stack networks will be of ongoing concern. This extended transition and coexistence period stems primarily from the scale of the current IPv4 network. It is unreasonable to expect that the many millions of IPv4 nodes will be converted overnight. It is more likely that it will take two or three capital equipment replacement cycles (between nine and 15 years) for IPv6 capabilities to spread through the network, and many services will remain available over IPv4 only for a significant period whilst others will be offered either just on IPv6 or on both protocols.”


Top