IPv6 ThreatsSlides from June 2011 webcast
2View the recorded webcast on SlideShare at… http://www.slideshare.net/Commtouch/commtouch-ipv6-threatson
Eyal OrgilMarketing DirectorCommtouchWelcome to Part 2IPv6 Informational Series
IPv6 Informational SeriesPart 1: An Introduction to IPv6onEyal OrgilMarketing DirectorCommtouchhttp://www.slideshare.net/Commtouchor atwww.commtouch.com/introduction-ipv6
IPv6 Informational SeriesPart 1: An Introduction to IPv6Part 2: IPv6 Security ThreatsEyal OrgilMarketing DirectorCommtouch
SpeakersAsaf GreinerVP ProductsCommtouchGabriel M. MizrahiVP TechnologiesCommtouch
Have a question? Send questions to: IPv6@commtouch.comResponses posted: http://blog.commtouch.com
Is the Change to IPv6 aSignificant Security Event?
Is IPv6 a Significant EventMove to IPv6 a transition, not an eventTaking place for several yearsWill continue for many more yearsThere will be security implicationsDuring the transition periodAfter fully implementedMany threats same as IPv4Especially while dual-stacks are in use
Is IPv6 a Significant EventMany IPv4 threats not applicable to IPv6Care must be taken when using dual-networksMany existing security solutions can protect against IPv6 threatsBut, must be properly configuredMany threats related to transition to IPv6, not new threats
Is IPv6 a Significant EventMany IPv6 users today are experts and enthusiastsIPv6 is not yet in widespread usageStill see minimal usage of IPv6Wider adoption of IPv6 depends on readiness of network infrastructuresCurrently no big incentive to move to IPv6
Is IPv6 a Significant EventHackers will utilize IPv6 when it will bring them valueNot deployed widely enough in order to invest timeAs IPv6 grows it will appear on the Hacker radarTransition a long process, not a one day eventAdvise that you learn and adjust
The Hype About IPv6 – Is it Just Another Y2K Scare?
Is IPv6 Another Y2K?Don’t be scared of IPv6, but don’t take lightly IPv6 is a technology which offers:New opportunitiesNew challengesNo date for IPv6Will take years for IPv6 to become the main protocol
Is IPv6 Another Y2K?Expect many mission critical infrastructures to remain IPv4Enough IPv4 addresses for theseUnlikely websites will be moved to be IPv6 in near futureWhen a large move occurs, we will know:There is a large user IPv6 baseEnd of transition period is near
Top Security Issues with IPv6
IPv6 Security IssuesTop three security related issues IPv6:Tunneling of IPv6 over IPv4 (6 to 4)Rogue devicesIP Reputation
Threat: IP Tunneling
IPv6 Tunneling ThreatIPv4 ConfiguredFirewallIPv4 NetworkIPv4IPv4IPv4IPv4 AddressInternalNetworkInternet
IPv6 Tunneling ThreatIPv4 ConfiguredFirewallIPv4 NetworkIPv4IPv4IPv4IPv6 AddressInternalNetworkInternet
IPv6 Tunneling ThreatIPv4 ConfiguredFirewallIPv4 NetworkGWIPv4-to-IPv6GatewayIPv4IPv6IPv4IPv4IPv6IPv6 over IPv4IPv6 AddressIPv6 over IPv4 tunnelInternalNetworkInternet
IPv6 Tunneling ThreatIPv4 ConfiguredFirewallIPv4websiteFW Policy: No Angry BirdsIPv4 NetworkIPv4IPv4IPv4InternalNetworkInternet
IPv6 Tunneling ThreatIPv4 ConfiguredFirewallIPv4websiteFW Policy: No Angry BirdsIPv4 NetworkGWIPv4-to-IPv6GatewayIPv6websiteIPv6IPv4IPv6IPv4IPv4IPv6 over IPv4Bypass firewall policyInternalNetworkInternet
IPv6 Tunneling ThreatNeed to be aware that security devices are configured for IPv6For example firewallsAnother example – IDS (Intrusion Detection System) Can inspect IPv6, but you need to enable itIf not, you won’t be enforcing the policy on IPv6
Threat: Rogue Devices
Rogue Devices
Rogue DevicesRogue Device
Rogue DevicesIPv6 PrefixIPv6 PrefixRogue Device
Rogue DevicesWindows 7Windows 7Windows 7IPv4 Network
Rogue DevicesWindows 7Windows 7Windows 7IPv6 NetworkIPv4 NetworkIPv6 enabledby default
Rogue DevicesWindows 7Windows 7Windows 7Internet?Internet?Internet?IPv6 NetworkIPv4 NetworkIPv6 searchesfor accessto the Internet
Rogue DevicesWindows 7Windows 7Windows 7Internet?Internet?Internet?IPv6 NetworkIPv4 NetworkIPv6 PrefixIPv6 PrefixInternetIPv6Rogue Device
Rogue DevicesThe difference is:IPv4 is used dailyIf a different allocation is provided, there will be noticeable effectsWith IPv6, the insertion of a rogue device may go unnoticed
Rogue DevicesIPv6 NetworkMan in the middleInternetIPv6Rogue Device
Rogue DevicesIPv6 NetworkMan in the middleInternetIPv6Rogue Device
Rogue DevicesIPv6 NetworkMan in the middleInternetIPv6Rogue Device
Rogue DevicesIPv6 NetworkMan in the middleInternetIPv6Rogue Device
Rogue DevicesNot only a Windows problemAn issue with most operating systemsIPv6 is defined by defaultIPv6 could run in the background without anyone’s knowledgeSecurity risk also in IPv4 with DHCPMake sure unauthorized devices cannot connect to your network
Threat: IP Reputation
IP ReputationFar more IP addresses in IPv6232 compared to  2128ChallengesIP allocation will be different from IPv4Anyone can get a large IP allocationAny person can get a 64 bit allocation (264)The entire Internet today is 232
IP ReputationLast 64 bits define the device IDComplicate issue by using randomizer to change 64 bitEvery spam message could be sent from different IPFrom IP address: wwwwFrom IP address: xxxxFrom IP address: yyyy264 DifferentIP AddressesInternetFrom IP address: zzzz
IP ReputationIP reputation on 128 bits very difficult
Need other methods to build reputation
Such as subnets
Storing IP information in memory
Vast amount of memory will be needed
No NAT in IPv6
Some believe a security issue
They believe NAT provides a layer of security
IPv6 provides public IPs for all devicesCommtouch Compliancewith IPv6
Commtouch and IPv6Commtouch has been working on IPv6 for some timeMaking changes to client side and back-endClient side will be transparentFocus has been on the back-endGlobalView Mail Reputation transparently supports more IPs addressesStill single query of an IP address but data storage more efficient
Commtouch and IPv6Monitoring the Internet Identifying IPv6 threatsClassifying threatsCurrently seeing minor IPv6 spam activityBelieve spammers experimenting with IPv6Too noticeable today to send spam via IPv6 when there is very little email on this network
Recommendations for MinimizingIPv6 threats

More Related Content

PDF
Emerging Threats - The State of Cyber Security
PDF
Behind the Curtain: Exposing Advanced Threats
PDF
IoT Attack Surfaces -- DEFCON 2015
PDF
Security in the FaaS Lane
PDF
Source Address Validation Everywhere, by Paul Vixie [APNIC 38 / Technical Key...
PPTX
It security
PDF
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
PDF
The Next Generation Security
Emerging Threats - The State of Cyber Security
Behind the Curtain: Exposing Advanced Threats
IoT Attack Surfaces -- DEFCON 2015
Security in the FaaS Lane
Source Address Validation Everywhere, by Paul Vixie [APNIC 38 / Technical Key...
It security
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
The Next Generation Security

What's hot (20)

PDF
Guy Podjarmy - Secure Node Code
PDF
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
PDF
Open Source in the Era of 5G
PPTX
Elizabeth Lawler - Devops, security, and compliance working in unison
PDF
CODE BLUE 2014 : [Keynote] The 5 biggest problems of cyber security - and how...
ODP
Introduction To NIDS
PDF
RSA2015: Securing the Internet of Things
ODP
Wireguard VPN
PPTX
Detect HTTP Brute Force attack using Snort IDS/IPS on PFSense Firewall
PDF
Avoiding damage, shame and regrets data protection for mobile client-server a...
DOCX
Snort Intrusion Detection / Prevention System on PFSense Firewall
PPT
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
PPTX
Pxosys Webinar Amplify your Security
PDF
The IoT Attack Surface
PDF
Presentación - Cisco ASA with FirePOWER Services
DOCX
Migration to cisco next generation firewall
PDF
Linux security cookbook
PDF
IoT security is a nightmare. But what is the real risk?
PDF
Hack wifi password using kali linux
PDF
On the impact of security vulnerabilities in the npm package dependency network
Guy Podjarmy - Secure Node Code
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
Open Source in the Era of 5G
Elizabeth Lawler - Devops, security, and compliance working in unison
CODE BLUE 2014 : [Keynote] The 5 biggest problems of cyber security - and how...
Introduction To NIDS
RSA2015: Securing the Internet of Things
Wireguard VPN
Detect HTTP Brute Force attack using Snort IDS/IPS on PFSense Firewall
Avoiding damage, shame and regrets data protection for mobile client-server a...
Snort Intrusion Detection / Prevention System on PFSense Firewall
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
Pxosys Webinar Amplify your Security
The IoT Attack Surface
Presentación - Cisco ASA with FirePOWER Services
Migration to cisco next generation firewall
Linux security cookbook
IoT security is a nightmare. But what is the real risk?
Hack wifi password using kali linux
On the impact of security vulnerabilities in the npm package dependency network
Ad

Similar to Slides from IPv6 Threats (20)

PPT
IPv6 for the Enterprise
PPTX
Slides from Introduction to IPv6
PPT
Enterprise Preparation for IPv6
PDF
10 fn s05
PDF
10 fn s05
PDF
IPv6 Adoption --- Acceleration
PDF
Ireland Dublin VPS and Dedicated Server Hosting Provider TheServerHost IPV6
PDF
TheServerHost offering IPV6 Philippines VPS and Dedicated Server
PDF
ION Malta - Seeweb Thoughts on IPv6 Transition
PDF
Hacking 05 2011
PPT
June 2004 IPv6 – Hands on
DOCX
IPv6: The New Internet Protocol
PPT
NAv6TF I Pv6 State Of Union Jan 2008
PDF
TheServerHost offering USA, Phoenix VPS and Dedicated Server Hosting with IPV6
PPTX
Future Internet Week - IPv6 the way forward: IPv6 and security from a user’s ...
PPTX
IETF Activities Update
PDF
IPv6 - A Real World Deployment for Mobiles
PDF
IPv6IntegrationBestPracticesfinal.pdf
PPT
Wim Delrue - Trends in IPv6 Training
PDF
Next Generation Security
IPv6 for the Enterprise
Slides from Introduction to IPv6
Enterprise Preparation for IPv6
10 fn s05
10 fn s05
IPv6 Adoption --- Acceleration
Ireland Dublin VPS and Dedicated Server Hosting Provider TheServerHost IPV6
TheServerHost offering IPV6 Philippines VPS and Dedicated Server
ION Malta - Seeweb Thoughts on IPv6 Transition
Hacking 05 2011
June 2004 IPv6 – Hands on
IPv6: The New Internet Protocol
NAv6TF I Pv6 State Of Union Jan 2008
TheServerHost offering USA, Phoenix VPS and Dedicated Server Hosting with IPV6
Future Internet Week - IPv6 the way forward: IPv6 and security from a user’s ...
IETF Activities Update
IPv6 - A Real World Deployment for Mobiles
IPv6IntegrationBestPracticesfinal.pdf
Wim Delrue - Trends in IPv6 Training
Next Generation Security
Ad

More from Cyren, Inc (20)

PDF
Webinar: Is your web security broken? - 10 things you need to know
PDF
Webinar: Insights from Cyren's 2016 cyberthreat report
PDF
Webinar: A deep dive on ransomware
PDF
Webinar: Stopping evasive malware - how a cloud sandbox array works
PDF
Webinar: Why evasive zero day attacks are killing traditional sandboxing
PDF
Webinar: IT security at SMBs: 2016 benchmarking survey
PDF
Webinar: A deep dive on phishing, today's #1 business threat
PDF
Webinar: Botnets - The clone army of cybercrime
PDF
Webinar: How hackers are making your security obsolete
PDF
Webinar: 10 steps you can take to protect your business from phishing attacks
PDF
Webinar: Cloud-Based Web Security as First/Last Line of Defense
PDF
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
PDF
Webinar: Dispelling the Myths about Cloud Security
PDF
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
PPTX
Webinar: CYREN WebSecurity for Healthcare
PPTX
Webinar: CYREN WebSecurity for Enterprise
PDF
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
PPTX
CeBIT 2015 Presentation
PDF
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
PDF
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: Is your web security broken? - 10 things you need to know
Webinar: Insights from Cyren's 2016 cyberthreat report
Webinar: A deep dive on ransomware
Webinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: IT security at SMBs: 2016 benchmarking survey
Webinar: A deep dive on phishing, today's #1 business threat
Webinar: Botnets - The clone army of cybercrime
Webinar: How hackers are making your security obsolete
Webinar: 10 steps you can take to protect your business from phishing attacks
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Dispelling the Myths about Cloud Security
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for Enterprise
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
CeBIT 2015 Presentation
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...

Recently uploaded (20)

PPT
What is a Computer? Input Devices /output devices
PPT
Module 1.ppt Iot fundamentals and Architecture
PPTX
2018-HIPAA-Renewal-Training for executives
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Five Habits of High-Impact Board Members
PDF
UiPath Agentic Automation session 1: RPA to Agents
PPTX
Modernising the Digital Integration Hub
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PPTX
Microsoft Excel 365/2024 Beginner's training
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
DOCX
search engine optimization ppt fir known well about this
PDF
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
PDF
Abstractive summarization using multilingual text-to-text transfer transforme...
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
What is a Computer? Input Devices /output devices
Module 1.ppt Iot fundamentals and Architecture
2018-HIPAA-Renewal-Training for executives
Zenith AI: Advanced Artificial Intelligence
Five Habits of High-Impact Board Members
UiPath Agentic Automation session 1: RPA to Agents
Modernising the Digital Integration Hub
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
sustainability-14-14877-v2.pddhzftheheeeee
Microsoft Excel 365/2024 Beginner's training
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
search engine optimization ppt fir known well about this
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
Abstractive summarization using multilingual text-to-text transfer transforme...
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
Benefits of Physical activity for teenagers.pptx
NewMind AI Weekly Chronicles – August ’25 Week III
A proposed approach for plagiarism detection in Myanmar Unicode text
From MVP to Full-Scale Product A Startup’s Software Journey.pdf

Slides from IPv6 Threats

  • 1. IPv6 ThreatsSlides from June 2011 webcast
  • 2. 2View the recorded webcast on SlideShare at… http://www.slideshare.net/Commtouch/commtouch-ipv6-threatson
  • 3. Eyal OrgilMarketing DirectorCommtouchWelcome to Part 2IPv6 Informational Series
  • 4. IPv6 Informational SeriesPart 1: An Introduction to IPv6onEyal OrgilMarketing DirectorCommtouchhttp://www.slideshare.net/Commtouchor atwww.commtouch.com/introduction-ipv6
  • 5. IPv6 Informational SeriesPart 1: An Introduction to IPv6Part 2: IPv6 Security ThreatsEyal OrgilMarketing DirectorCommtouch
  • 6. SpeakersAsaf GreinerVP ProductsCommtouchGabriel M. MizrahiVP TechnologiesCommtouch
  • 7. Have a question? Send questions to: IPv6@commtouch.comResponses posted: http://blog.commtouch.com
  • 8. Is the Change to IPv6 aSignificant Security Event?
  • 9. Is IPv6 a Significant EventMove to IPv6 a transition, not an eventTaking place for several yearsWill continue for many more yearsThere will be security implicationsDuring the transition periodAfter fully implementedMany threats same as IPv4Especially while dual-stacks are in use
  • 10. Is IPv6 a Significant EventMany IPv4 threats not applicable to IPv6Care must be taken when using dual-networksMany existing security solutions can protect against IPv6 threatsBut, must be properly configuredMany threats related to transition to IPv6, not new threats
  • 11. Is IPv6 a Significant EventMany IPv6 users today are experts and enthusiastsIPv6 is not yet in widespread usageStill see minimal usage of IPv6Wider adoption of IPv6 depends on readiness of network infrastructuresCurrently no big incentive to move to IPv6
  • 12. Is IPv6 a Significant EventHackers will utilize IPv6 when it will bring them valueNot deployed widely enough in order to invest timeAs IPv6 grows it will appear on the Hacker radarTransition a long process, not a one day eventAdvise that you learn and adjust
  • 13. The Hype About IPv6 – Is it Just Another Y2K Scare?
  • 14. Is IPv6 Another Y2K?Don’t be scared of IPv6, but don’t take lightly IPv6 is a technology which offers:New opportunitiesNew challengesNo date for IPv6Will take years for IPv6 to become the main protocol
  • 15. Is IPv6 Another Y2K?Expect many mission critical infrastructures to remain IPv4Enough IPv4 addresses for theseUnlikely websites will be moved to be IPv6 in near futureWhen a large move occurs, we will know:There is a large user IPv6 baseEnd of transition period is near
  • 17. IPv6 Security IssuesTop three security related issues IPv6:Tunneling of IPv6 over IPv4 (6 to 4)Rogue devicesIP Reputation
  • 19. IPv6 Tunneling ThreatIPv4 ConfiguredFirewallIPv4 NetworkIPv4IPv4IPv4IPv4 AddressInternalNetworkInternet
  • 20. IPv6 Tunneling ThreatIPv4 ConfiguredFirewallIPv4 NetworkIPv4IPv4IPv4IPv6 AddressInternalNetworkInternet
  • 21. IPv6 Tunneling ThreatIPv4 ConfiguredFirewallIPv4 NetworkGWIPv4-to-IPv6GatewayIPv4IPv6IPv4IPv4IPv6IPv6 over IPv4IPv6 AddressIPv6 over IPv4 tunnelInternalNetworkInternet
  • 22. IPv6 Tunneling ThreatIPv4 ConfiguredFirewallIPv4websiteFW Policy: No Angry BirdsIPv4 NetworkIPv4IPv4IPv4InternalNetworkInternet
  • 23. IPv6 Tunneling ThreatIPv4 ConfiguredFirewallIPv4websiteFW Policy: No Angry BirdsIPv4 NetworkGWIPv4-to-IPv6GatewayIPv6websiteIPv6IPv4IPv6IPv4IPv4IPv6 over IPv4Bypass firewall policyInternalNetworkInternet
  • 24. IPv6 Tunneling ThreatNeed to be aware that security devices are configured for IPv6For example firewallsAnother example – IDS (Intrusion Detection System) Can inspect IPv6, but you need to enable itIf not, you won’t be enforcing the policy on IPv6
  • 28. Rogue DevicesIPv6 PrefixIPv6 PrefixRogue Device
  • 29. Rogue DevicesWindows 7Windows 7Windows 7IPv4 Network
  • 30. Rogue DevicesWindows 7Windows 7Windows 7IPv6 NetworkIPv4 NetworkIPv6 enabledby default
  • 31. Rogue DevicesWindows 7Windows 7Windows 7Internet?Internet?Internet?IPv6 NetworkIPv4 NetworkIPv6 searchesfor accessto the Internet
  • 32. Rogue DevicesWindows 7Windows 7Windows 7Internet?Internet?Internet?IPv6 NetworkIPv4 NetworkIPv6 PrefixIPv6 PrefixInternetIPv6Rogue Device
  • 33. Rogue DevicesThe difference is:IPv4 is used dailyIf a different allocation is provided, there will be noticeable effectsWith IPv6, the insertion of a rogue device may go unnoticed
  • 34. Rogue DevicesIPv6 NetworkMan in the middleInternetIPv6Rogue Device
  • 35. Rogue DevicesIPv6 NetworkMan in the middleInternetIPv6Rogue Device
  • 36. Rogue DevicesIPv6 NetworkMan in the middleInternetIPv6Rogue Device
  • 37. Rogue DevicesIPv6 NetworkMan in the middleInternetIPv6Rogue Device
  • 38. Rogue DevicesNot only a Windows problemAn issue with most operating systemsIPv6 is defined by defaultIPv6 could run in the background without anyone’s knowledgeSecurity risk also in IPv4 with DHCPMake sure unauthorized devices cannot connect to your network
  • 40. IP ReputationFar more IP addresses in IPv6232 compared to 2128ChallengesIP allocation will be different from IPv4Anyone can get a large IP allocationAny person can get a 64 bit allocation (264)The entire Internet today is 232
  • 41. IP ReputationLast 64 bits define the device IDComplicate issue by using randomizer to change 64 bitEvery spam message could be sent from different IPFrom IP address: wwwwFrom IP address: xxxxFrom IP address: yyyy264 DifferentIP AddressesInternetFrom IP address: zzzz
  • 42. IP ReputationIP reputation on 128 bits very difficult
  • 43. Need other methods to build reputation
  • 46. Vast amount of memory will be needed
  • 47. No NAT in IPv6
  • 48. Some believe a security issue
  • 49. They believe NAT provides a layer of security
  • 50. IPv6 provides public IPs for all devicesCommtouch Compliancewith IPv6
  • 51. Commtouch and IPv6Commtouch has been working on IPv6 for some timeMaking changes to client side and back-endClient side will be transparentFocus has been on the back-endGlobalView Mail Reputation transparently supports more IPs addressesStill single query of an IP address but data storage more efficient
  • 52. Commtouch and IPv6Monitoring the Internet Identifying IPv6 threatsClassifying threatsCurrently seeing minor IPv6 spam activityBelieve spammers experimenting with IPv6Too noticeable today to send spam via IPv6 when there is very little email on this network
  • 54. Gabriel Mizrahi’s IPv6 RecommendationsMake sure you have mapped all devices on your networkImplement IPv6 step-by-stepHave a written procedure of how you will introduce IPv6Plan to implement a dual stack as a first stage
  • 55. Asaf Greiner’s IPv6 RecommendationsGet educated about IPv6Everyone should go back to networking fundamentalsUnderstand what’s implemented on our network today, and whyThen look at what needs to remain or changeLearn from othersWhat mistakes and successes other have experienced
  • 56. Asaf Greiner’s IPv6 RecommendationsLockdown from IPv6 as a startThen implement staged plan to roll out IPv6Take care to avoid configuration errors
  • 57. Thank you toAsaf GreinerCommtouch VP ProductsGabriel M. MizrahiCommtouch VP Technologies
  • 58. 51View the recorded webcast on SlideShare at… http://www.slideshare.net/Commtouch/commtouch-ipv6-threatson
  • 59. Have a question? Send questions to: IPv6@commtouch.comResponses posted: http://blog.commtouch.com
  • 60. Please check back for future informational webcasts