There are many security advantages to doing the migration to IPv6, though: stateless auto configuration, native...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
IPSec support and sparsely populated address space with room to grow are just three that come to mind. But keep in mind also that black hats are already well established in the IPv6 space and are using this infrastructure to communicate securely and for command and control. Deploying IPv6 can help secure applications but should not be treated as a panacea.
Dig Deeper on Network Protocols and Security
Related Q&A from Anand Sastry
While encrypting production servers may seem like a good security move, according to Anand Sastry, doing so may not be worth the resources it uses.continue reading
Transferring files from a DMZ to an internal FTP server can be risky. In this expert response, Anand Sastry explains how to use SFTP automation to ...continue reading
When setting up a site-to-site VPN, where should the VPN endpoint be in the DMZ? Learn more in this expert response.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.