Cisco Blogs

Search Results

93 posts found

Cisco Live 2013 – a Showcase for IPv6 Technology

…you were very interested in these topics and very satisfied with the quality of the information that you gained at the event. We will be striving to do an even better job in Orlando. The event itself served as a showcase for IPv6 technologies in other respects: We demonstrated IPv6 in use for a variety of real world deployments such as LISP and NAT64 (both of which were showcased on the Exhibition floor of the “World of Solutions” The show…

Read More >>

Tags: , , , , , , , ,

How to Find and Measure IPv6 Traffic on Your Network

…export IPv6 flow information. This only impacts the configuration on the device, but also services that access the flow information as there will be a change to the record format. Testing should be done prior to implementing IPv6 data collection and exporting of IPv6 netflow information to ensure that all services and applications that use the data are not impacted. Cisco switching infrastructure: IPv6 traffic can flow on a network even though…

Read More >>

Tags: , , , , , , , ,

Cisco Live London 2013: IPv6 Security Lab Recap

…nd controls that were implemented and deployed on infrastructure devices as well as validate their effectiveness. Some of the nefarious behaviors included IPv6 spoofing, using IPv6 in IPv4 tunneling to bypass, and DDoS using IPv6 packets. This IPv6 security training was first delivered at Cisco Live USA 2012, where 19 students participated in the class. At Cisco Live London, we welcomed 21 Cisco Customers, giving them access to our lab-hosted…

Read More >>

Tags: , , ,

Worldwide IPv6 Usage Reaches Key Threshold

…verage user in the US visits an IPv6 reachable website.  You can also dig down into the methodology we are using to create the various rankings and percentages. Moving the needle Back in 2007 when Google began publishing its IPv6 measurements, native IPv6 deployment stood at 0.04%. Working together, the industry moved the needle 2500% over the past five years (while adding an additional billion users to the Internet during the same period). To…

Read More >>

Tags: , , , , , , , , , , ,

IPv6 and the Security Implications You Don’t Want to Miss

…wers to these questions will guide the security architecture and design for IPv6 integration.  They will provide a basis for how the security policies should be updated and how to dapply IPv6 features to support that policy. IPv6 Security Features IPv6 has many features available that would typically be deployed at the Internet edge.  Features such as Access Control Lists (ACL), unicast Reverse Path Forwarding (uRPF), routing protocol…

Read More >>

Tags: , , , ,