Cyberspace has emerged as the “fourth commons” after sea, air, and space in the defense world, and a broad variety of private and public networks make up the critical infrastructure that enables governments to provide essential services. The network has become both a platform for innovation and a mission-critical resource for the civilian, defense, and intelligence operations of governments. - Cisco’s Don Proctor, SVP -- Office of the CEO
The growing number of attacks on our cyber networks has become, in President Obama’s words, “one of the most serious economic and national security threats our nation faces.” Addressing these issues means working across the government, partnering with the private sector, and empowering the general public to create a safe, secure, and resilient cyber environment, and promote cybersecurity knowledge and innovation.
If you are, or want to be part of this effort, please join us at the National Town Hall on Cybersecurity, a provocative on-line discussion, May 24th at 1:00 PM ET.
Cisco Locator/ID Separation Protocol (LISP) is routing architecture that provides new semantics for IP addressing. The current IP routing and addressing architecture uses a single numbering space, the IP address, to express two pieces of information:
The way the device attaches to the network
The LISP routing architecture design separates the device identity, or endpoint identifier (EID), from its location, or routing locator (RLOC), into two different numbering spaces. Splitting EID and RLOC functions yields several advantages.
Check out this video for a quick review of LISP.
Although LISP was designed to deal with the route scalability problem in the Internet, it turns out is has the capability to help with the transition to IP Version 6 (IPv6), the next-generation Internet protocol.
The transition to IPv6 is an immediate challenge facing Public Sector, and specifically Federal customers today due to Government mandates and impending IPv4 address exhaustion for consumers of Government services.
Because IPv6 is not backward compatible with IPv4, and because its deployment and operation are different from that of IPv4, development and implementation of an IPv6 transition strategy is imperative. Many techniques exist to ease the transition to IPv6, and the network-based IPv6 transition techniques can be divided generally into three categories: dual-stack IPv4 and IPv6, IPv6 tunneling, and IPv6 translation.
Each approach has its features, benefits, and limitations; they are not all equivalent in terms of cost, complexity, or capabilities. Most likely, a combination of these techniques will provide the best solution. The role that the Locator/ID Separation Protocol (LISP) being developed by Cisco and the IETF can play in IPv6 transition strategies is documented in this Whitepaper.
Incorporating LISP into an IPv6 transition strategy can simplify the initial rollout of IPv6 by taking advantage of the LISP mechanisms to encapsulate IPv6 host packets within IPv4 headers (or IPv4 host packets within IPv6 headers). For example, you can build IPv6 islands and connect them with existing IPv4 Internet connectivity.
LISP is a Cisco innovation that is being promoted as an open standard. Cisco participates in standards bodies such as the IETF LISP Working Group to develop the LISP architecture.
Welcome to our government blog! I hope you will become an active participant and visitor to this community. Each week, we will explore various topics that are top of mind in government. I encourage you to share, comment, and probe so that we can have genuine discussions about what is happening in this ever-changing industry.
The experts on our team, who bring together decades of experience in advanced technologies and government know-how, will be blogging about cloud, cybersecurity, security, teleworking, innovations in government , and much more. If you have a topic of interest related to government and technology that you would like to discuss, please comment on this post. We’d love to hear from you!