Preparing for IPv6 migration

Similar documents
Protocol Security Where?

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

IPv6: Network Security and the Next Generation of IP Communication

The Network and The Cloud: Addressing Security And Performance. How Your Enterprise is Impacted Today and Tomorrow

Installing and Configuring Windows 7 Client

Network Design Best Practices for Deploying WLAN Switches

ITL BULLETIN FOR JANUARY 2011

J ai pas de TUN et je m en TAP

Building a BYOD Strategy For Education

Configuring a Site-to-Site VPN Tunnel Between Cisco RV320 Gigabit Dual WAN VPN Router and Cisco (1900/2900/3900) Series Integrated Services Router

Network Security - ISA 656 Application Firewalls

Transition to IPv6 for Managed Service Providers: Meet Customer Requirements for IP Addressing

Exam Name: Cisco Sales Associate Exam Exam Type: Cisco Exam Code: Doc Type: Q & A with Explanations Total Questions: 50

VIGILANCE INTERCEPTION PROTECTION

Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks

CompTIA Security+ Cert Guide

IPv6 and Fortinet: Network Security in the Next Generation of IP Communication

FIREWALL. Features SECURITY OF INFORMATION TECHNOLOGIES

IT 3202 Internet Working (New)

( Increased usage of IP addresses )

Directory and File Transfer Services. Chapter 7

NETWORK SECURITY SOLUTIONS

Virtual Privacy vs. Real Security

Smart Grid Security: A roadmap

Mission-Critical Mobile Security: A Stronger, Sensible Approach

21.4 Network Address Translation (NAT) NAT concept

Securing end devices

Preparing VoIP and Unified Communications Systems for IPv6 Technical Summary September 2014

Security in the smart grid

Reduce Your Virus Exposure with Active Virus Protection

INFORMATION ASSURANCE DIRECTORATE

PCI Compliance 3.1. About Us

COSC 472 Network Security

Securing IP Networks with Implementation of IPv6

AGAINST OUTSIDE THREATS

SSL VPN. Virtual Appliance Installation Guide. Virtual Private Networks

Reducing Configuration Complexity with Next Gen IoT Networks

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

OPC UA vs OPC Classic

Cisco and VMware Virtualization Planning and Design Service

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions

70-685: Enterprise Desktop Support Technician

My FreeScan Vulnerabilities Report

Mobile Device Management A Functional Overview

Jort Kollerie SonicWALL

SSL VPN Technology White Paper

Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications

Industrial Communication. Securing Industrial Wireless

Nine Network Considerations in the New HIPAA Landscape

Course 6292A: Installing and Configuring Windows 7 Client. About this Course. Audience Profile

Windows 7, Enterprise Desktop Support Technician

TECHNICAL WHITE PAPER. Symantec pcanywhere Security Recommendations

SECURITY ADVISORY FROM PATTON ELECTRONICS

Cisco Services for Intrusion Prevention Systems Customer Q&A

Catapult PCI Compliance

Enterprise Network Virus Protection Research Yanjie Zhou 1, Li Ma 2 Min Wen3

Virtual Private Networks

Application Defined E2E Security for Network Slices. Linda Dunbar Diego Lopez

Are You Prepared for a HIPAA Audit? 7 Steps to Security Readiness GUIDE BOOK

User Documentation Web Traffic Security. University of Stavanger

Design and Implementation Guide. Apple iphone Compatibility

Basics of Internet Security

Best Practices for Outdoor Wireless Security

PERSONAL FIREWALL SHOWDOWN: SOFTWARE VERSUS APPLIANCE

EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C June 8, 2015

Configuring Security for FTP Traffic

UMTS security. Helsinki University of Technology S Security of Communication Protocols

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

7.1. Remote Access Connection

Network Security. Introduction. Security services. Players. Conclusions. Distributed information Distributed processing Remote smart systems access

IPv6 Market Drivers and IPv6

Managed Internet Service Express

AT&T. ip vpn portfolio. integrated. IP VPN solutions. for the enterprise. Communication Systems International Incorporated

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

I. What is VPN? II. Types of VPN connection. There are two types of VPN connection:

Putting the Network Redesign Principles and Concepts into Practice

Next Generation Network Firewall

VPN. Date: 4/15/2004 By: Heena Patel

VPN Technologies: Definitions and Requirements

6lowpan security considerations

SECURE AND MANAGE YOUR MOBILE FLEET Freedome for Business

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

Man, Machine and DDoS Mitigation

INCIDENT RESPONSE CHECKLIST

TCG Trusted Network Connect IF-MAP Metadata for ICS Security. Document Draft Comments. Prepared by Joseph J. Januszewski, III, CISSP

HughesNet Broadband VPN End-to-End Security Enabled by the HN7700S-R

Hands on, field experiences with BYOD. BYOD Seminar

COORDINATED THREAT CONTROL

Global VPN Client Getting Started Guide

3.5 IPv6 Forum Certified Security Course, Engineer, Trainer & Certification (GOLD)

Chapter 6: Fundamental Cloud Security

Smart Grid Security: Ground Zero for Cyber Security. June 2, 2010 at 12:51 PM by Larry Karisny

Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Current and Future Research into Network Security Prof. Madjid Merabti

DNS Security FAQ for Registrants

GOVERNMENT USE OF MOBILE TECHNOLOGY

Creating a Client-To-Site VPN. BT Cloud Compute. The power to build your own cloud solutions to serve your specific business needs.

Transcription:

Preparing for IPv6 migration

What is IPv6 The current Internet Protocol (IP) addressing system IPv4 will eventually run out of addresses IPv6 is a new protocol that has been introduced that will, over time, fully replace IPv4 IPv6 offers many new capabilities that will benefit Canadian organizations including enhanced security and advanced mobile capabilities Page 2

What is happening with IP addresses? IPv4 addresses are running out If an atom were used to represent the 4 billion IPv4 addresses, the 16 billion billion IPv6 addresses is equivalent to an 80-tonne whale Page 3

Why this is happening Explosion of wireless and wireline devices that require IP addresses tablets, GPS, phones, PDAs, appliances Growth in smart networks to address vertical needs (health, transportation, home, etc.) Exponential growth in developing nations requiring vast quantities of IP addresses Page 4

How this impacts businesses Opportunities Productivity (mobility) Enriched monitoring, reporting, tracking, command-and-control Connect to organizations that are already transitioning to IPv6 Future-proof legacy services I P V 6 Challenges Adoption and migration Security changes IP based network equipment setup and retrofits Software and application upgrades Migration and overlap timeline Page 5

What you need to know 1. While Bell will continue to support IPv4, over time, applications will be increasingly built on the IPv6 platform (e.g. for machine-to-machine communication) 2. You may have to align with government or corporate policy that requires the use of IPv6 3. Some of the multinational companies that have policies and mandates around IPv6 may require you to be IPv6-ready so companies need to make IPv6 migration plans accordingly 4. You may not be able to purchase new IPv4 addresses 5. You need to revisit your security controls as a result of this transition 6. You may want to take advantage of the enhanced security capabilities (strong IP-layer encryption and authentication) provided with IPv6 Page 6

What you need to know (Con t) 7. You may require IPv6 to enable new content and applications requiring the use of many machines/devices 8. Bell will continue to support IPv4 services well after the exhaustion of IPv4 addresses, with a dual-stack approach that allows continued communication between IPv4 and IPv6 for years to come 9. As a result, when IPv6 is introduced, customers can move to IPv6 at their own pace and our IPv4 customers will be able to use their existing IPv4 addresses with the same Internet reach that they have today 10. You may want to establish a governance team and process to ensure a smooth transition A successful transition to IPv6 will require significant planning and strategy Page 7

Benefits of transition to IPv6 Cost savings architectural changes associated with the transition to IPv6 will create greater cost efficiencies Growth increases the range of goods and services that organizations can provide and opens new markets, as the availability of unlimited addresses allows exponential growth in the devices that can be connected to the Internet Page 8

Benefits of transition to IPv6 (Con t) Enhanced security and compliance Vulnerabilities that were present in IPv4 were removed from protocol e.g., broadcast-based attacks, man-in-the-middle attacks that can intercept and modify traffic prior to being sent to its destination Improved mobility maintain VPN sessions more efficiently, avoiding the need for repeated logins and minimizing credential compromise Privacy extensions allows your device to change IP addresses frequently, to remain more anonymous Additional IPsec encryption software no longer as it s built into the network stack Encryption is also end-to-end, from device to device IPv6 adoption will allow your business to communicate better in a globally networked world Page 9

We support our customers Bell will offer support for customers who want to get started on their IPv6 migration now As you migrate, we will provide continuing IPv4 interoperability We can help you develop a secure and complete transition plan with our phased approach to IPv6 adoption Bell has made significant investments to upgrade our network infrastructure and our products and services Page 10

Key IPv6 transition considerations To ensure a successful IPv6 transition, you ll need to: Look at your current IPv4 and IPv6 capabilities and security needs Define your end goals Design a secure infrastructure and network Test systems and services in a dual-stack and/or IPv6-only environment Bell can help you develop your implementation roadmap with a secure, phased approach to ensure success Page 11

How Bell can help you transition Bell offers IPv6 Professional services to support you every step of the way: Network traffic and threat discovery Business strategy planning Security training service Readiness services Proof-of-concept/Simulation plan Implementation (production piloting) Network optimization and diagram refresh services Identify IPv6 enabled devices that could attack the IPv4 network with malicious traffic Determine drivers and plan business requirements Learn how to secure network against threats, analyze and react to denial-of-service attacks and implement security standards and processes to protect it Inventory and map devices and software, assess what changes are needed and initiate design Establish and document the testing environment, provide knowledge transfer for customer s IT team Deploy pilot sites to validate integration across systems and networks Provide support for incremental IPv6 changes and provide on-going diagram refresh based on network activities Page 12

A phased approach to IPv6 adoption Addressing critical areas in priority order Implementation (Production planning) Training (Security policies/governance) Proof-of-Concept / Simulation plan 5 Network Diagram refresh Network Traffic and Threat Discovery 1 Business Strategy plan 2 Readiness services 3 4 Training (Transfer knowledge) Network Optimization Plan Build Execute Page 13

For more information Please contact your Bell representative or request that a Bell representative contact you. You may also download our IPv6 Starter Kit 01/06/2011