News

I t's been a quarter of a century since the first IPv6 standard was finalized as RFC 2460, and to say adoption has been slow is an understatement. The pool of available IPv4 addresses has been ...
IPv6 also introduces IPsec, a companion technology that was created for IPv6, backported to IPv4, but which really comes into its own when connected end-to-end via IPv6. Basically, IPsec (IP ...
On the positive side, support for IPSec is now mandatory in IPv6. Developed by the IETF, IPSec was designed to provide security services such as data confidentiality, integrity and packet origin ...
The other significant improvement between IPv6 and IPv4 is the security baked into the protocol. IPsec, the time-proven standard for securing IP communications by encrypting and/or authenticating ...
In IPv6 IPSec is mandatory, so each individual data packet is encrypted and authenticated. Most of the PCs, IP-enabled devices, and network hardware sold over the past few years has included IPv6 ...
As IPv6 becomes more common, and it seems to be on a slow adoption curve, it will remove one of the barriers to people adopting IPSec VPNs, especially for remote access.
The US government is facing a June 2008 deadline to comply with an Office of Management and Budget requirement to turn IPv6 on in its networks. However, the directive only specifies that IPv6 has ...
IN DEPTH: As IPv4 disappears, transition poses hazards. Coupled with the continued deployment of DNS Security Extensions (DNSSEC), IPv6 will ultimately provide the stable and secure base for the ...
Historically, the shift to IPv6 was slow, with many regions taking years to offer IPv6 service. But currently, the transition has, in fact, picked off significantly and this represents the ...
To accommodate the security needs of developers building embedded applications for defense systems and network equipment, Mentor Graphics'Accelerated Technology has added theIPv6 IPSec protocol into ...
You know IPv6 must finally be making it: The first IPv6 Distributed Denial of Service Internet attacks have been spotted in the wild.