Shopping Cart  |  Live Chat  |  Contact Us  |  1-800-555-1212

IPv6 & IPSec

Clearly Understand the Benefits and Ramifications of an IPV6 Implementation

In this 2-day course, you will also learn about Internet Protocol security to protect communications and provide authentication.


What does Ipv6 mean for IT security? What aspects need critical security measures to ensure the NexGen is not hampered by increased threats and vulnerabilities? Security in the Ipv6 model has raised many questions. We will explore the possibilities and the areas to consider as points of vulnerability as the IEFT finalizes standards and practices.

Here’s what you’ll learn:

  • Who are the impacted industry leaders and how are they affected?
  • What we should look for in the coming months
  • How secure is ipv6?
  • IPv6 and firewalls
  • IPv6 and Access Control
  • IPv6 and IDS
  • IPv6 –IPSEC support and interoperability issues
  • IPSEC a must for routing protocols in IPv6

Who should attend?:

This series is designed for professionals who need to understand the business dynamics, infrastructure impact, policy and economical ramifications of IPV6 implementations.

About IPv6 and IPSec

Have you ever tried to come up with the actual number combinations you can get from 4 sets of 3 numbers? That’s the format of today’s IPv4 ip addressing scheme, and we seem to be just about out of numbers. Think of it as not having any additional phone numbers or IP addresses to issue to the next 4 million iPhones or PC users around the globe. Welcome to the world of IPV6- the Next Generation Internet protocol.

IPv6 is short for “Internet Protocol Version 6. Its designed to replace IPv4 and provide a limitless number of IP addresses for routers, mobile devices and other end user appliances which are existing or planned for users of “the big fat digital pipe” known as the internet. The extended address length eliminates the need to use network address translation to avoid address exhaustion, and also simplifies aspects of address assignment and renumbering when changing providers.

Over the course of the next 4-6 years, we’ll see a transition in router configurations, telecommunications systems, data applications, increased security measures and a reliance on a host of new devices passing data and pulling the future into the present.

IPSec provides security services at the IP layer by enabling a system to select required security protocols, determine the algorithm(s) to use for the service(s), and put in place any cryptographic keys required to provide the requested services. IPSec can be used to protect one or more “paths” between a pair of hosts, between a pair of security gateways, or between a security gateway and a host.- RFC 2401