IPv6 Shadows Loom Over Enterprises

April 25, 2012
While enterprises might not feel the immediate pressure to evolve their infrastructure to IPv6, certain actions they and others are taking may be putting their networks at risk of shadow networks, malware, or other security breaches. As a result, web security firms like Blue Coat are warning companies to be proactive about monitoring for IPv6 traffic as both their external and internal networking worlds continue to change.Specifically, as the sun continues to set on IPv4, it is hoped that World IPv6 Launch, set for June 6, will mark the beginning of the permanent transition to the newer protocol, designed to alleviate the drain on IP addresses.Participating ISPs have committed to 1% of active IPv6 usage across their footprints by that date; home networking equipment manufacturers to enabling IPv6 by default in a range of products; Web companies to implementing IPv6 on major sites; and content delivery network (CDN) providers to enabling IPv6 throughout their infrastructure. (http://www.worldipv6launch.org/press/20120117-2//)But many enterprises, while they understand the ultimate importance of transitioning to IPv6, have a more leisurely adoption plan spanning the next two to five years. The reason is that by implementing network address translation (NAT), most only require a small number of public IP addresses even for fairly large organizations.Yet, these companies also are upgrading their switching and routing architecture or moving to the latest Internet Operating System from Cisco, and as a result are bringing IPv6 into the equation, said Mark Urban, Blue Coat senior director of product marketing. At the same time, employees are utilizing iPhones or tablets in the office and may configure them to connect with IPv6."Suddenly (an employee is) running (IPv6) over the enterprise network to the Internet, even though company policy says (IT) will support it in two to three years ... suddenly they have a bridge to the outside world that might not be covered by the gateway solution," Urban said. This covert channel or shadow network can be exploited by someone with malicious intent.Companies need network visibility now that can pinpoint IPv6 traffic and verify if the uses are valid, Urban said. If not, the enterprise can shut down the traffic and adjust its IPv6 support plans and infrastructure accordingly.Monta Monaco Hernon is a free-lance writer. She can be reached at [email protected].

Sponsored Recommendations

From Concept to Connection: Key Considerations for Rural Fiber Projects

Dec. 3, 2024
Building a fiber-to-the-home network in rural areas requires strategic planning, balancing cost efficiency with scalability, while considering factors like customer density, distance...

On Topic: Metro Network Evolution

Dec. 6, 2024
The metro network continues to evolve. As service providers have built out fiber in metro areas, they have offered Ethernet-based data services to businesses and other providers...

Meeting AI and Hyperscale Bandwidth Demands: The Role of 800G Coherent Transceivers

Nov. 25, 2024
Join us as we explore the technological advancements, features, and applications of 800G coherent modules, which will enable network growth and deployment in the future. During...

On Topic: Tech Forecast for 2025/ What Will Be Hot

Dec. 9, 2024
As we wind down 2024, Lightwave’s latest on-topic eBook will examine the hot topics for 2025. AI is at the top of the minds of optical industry players supporting...