Description
Question: In response to your peers, review their initial posts. Then, compare and contrast the reasoning behind your decision with the reasoning behind the decisions of your peers.PEER POST # 1 IPv6 provides more IP addresses and provides end to end encryption due to its Internet Protocol Security that authenticates and encrypts data. IPv6 has the IPSec that is Internet Protocol security that confirms and authenticates that a host is really the person that they say they are. With the advancement of technology making our lives easier and the ability to work remotely, more types of devices are accessing the internet every day. Additionally, with the increase of people on the internet on the rise the IPv6 offers trillions of more addresses for the additional phones, tablets, iPads, laptops, and desk computers that people utilize.There are valid concerns that the IPv6 technology upgrade will require companies to invest in costly software and recruit the skilled technicians necessary to successfully migrate their networks to meet the IPv6 requirements. Companies that do not upgrade risk system crashes because the IPv6 may be too much of a strain on the network because of the increased digit string. If companies do not take initiative-taking steps to invest in educating and training their employees with the addition of upgrading their software before integrating to the IPv6 it will create the possibility of exposure to serious risks and disruptions to their current networks.PEER POST # 2In this weeks’ discussion, we will discuss the the integration of IPv6. IPv6 is crucial for the internet community as it avoids Network Address Translation (NAT), expands address space, is compatible with the Internet of Things (IoT), is globally connected, and fosters internet innovation. As IPv4 addresses become scarce, IPv6 offers unique addresses for an increasing number of devices. IPv6 supports end-to-end connectivity and ease of network setting, making direct internet connection easier. It facilitates internet expansion by providing infrastructure to link more users, devices, and services. However, organizations must handle potential security issues such as insufficient knowledge of IPv6, complexity of the dual stack, risks unique to IPv6, insufficient security rules, transition methods, address spoofing and scanning, and support for devices and applications. To avoid these issues, organizations must properly plan and execute the shift using IPv6-specific security measures, recommended practices, and education.