ALEXANDRIA, Va. Jan. 25, 2011 deadlines set by Obama’s Chief Information Officer
"There is a new sense of urgency by our clients as we help agencies accelerate their IPv6 planning, design, and implementation," said Command Information EVP for Cyber Security Lisa Donnan. "But moving to IPv6 isn’t enough. Networks must add layers of defense to their security infrastructure to address specific IPv6 threats."
The Obama Administration has mandated that by 2012, all public facing servers and services must use native IPv6 and by 2014 all internal applications that communicate with public Internet servers must also transition. Additionally each agency is required to designate an IPv6 Transition Manager to ensure agency procurements of networked IT comply with FAR requirements.
The number of IPv6 vulnerabilities that traditional hardware and software assurance vendors can detect is limited because there are significant differences between IPv4 and IPv6 protocols. Attackers are actively using IPv6 to tunnel into networks because traffic traversing through IPv6 transition mechanisms is undetectable by today’s firewalls and routers. Even if IPv6 is not enabled on the network, many of these security concerns still exist.
About Command Information
SOURCE Command Information