SlideShare a Scribd company logo
1 of 14
Download to read offline
IPv6 In the Enterprise
Peter Wyatt
Distinguished Technologist, Hewlett Packard
Global Telecommunications, ITI
May 19, 2010




1   ©2009 HP Confidential
AGENDA
– The Perfect Storm/Everything over IP
– IPv6 Readiness and Advantages
– IPv6 and Security
– Investing in IPv6
– Balanced Value Delivery
– Core Components
– Adoption Framework and Taskforce
– Key Points


2 of 14   ©2010 HP - IPv6 Irish Task Force Forum – May 2010.
THE MAKING OF THE “PERFECT STORM”




3 of 14   ©2010 HP - IPv6 Irish Task Force Forum – May 2010.
EYE OF THE STORM - EVERYTHING OVER
IP




4 of 14   ©2010 HP - IPv6 Irish Task Force Forum – May 2010.
IPV6 AND SECURITY
   Without Security, IPv6 adoption will be Challanging
   We    need proper design, configuration, testing and understanding around v6.
   Think   of the Control mechanisms we have in place for IPv4, We need these for v6
   Create a security infrastructure using IPv6-aware firewalls, intrusion detection systems,
    Proxies, VPNs, DNS security, ACLs
   IPv6provides many transition mechanisms which can easily circumvent existing IPv4
    based security mechanisms. These mechanisms need to be secured as well.
   IPv6mandates the implementation of IPsec but does not require that IPsec be actually
    used.
   IPsec  is not a new protocol and is defined for both IPv4 and IPv6. But IPsec configuration
    is an issue and adoption has not occurred widely.




5 of 14     ©2010 HP - IPv6 Irish Task Force Forum – May 2010.
IPV6 READINESS
                                                               •   ALL major operating systems are shipping with IPv6 which
                                                                   are often enabled by default
                                                                   –   Chrome OS, Apple MAC OS, BSD, HP-UX, AIX, Windows Vista, Windows Server 2008, Linux
                                                                       SuSe, Linux redhat and Solaris etc…

                                                                   –   Android, Windows Mobile 5 and 6, Symbian and WebOS…


                                                               •   On top of these platforms application vendors are at
                                                                   various stages of implementing IPv6 in their products.
                                                                   –   Examples: Sony PlayStation Network, Windows Server 2008 Network Load Balancing,
                                                                       Windows Vista Peer-to-Peer framework, Apple "Back to My Mac“ (BTMM), Mozilla Firefox,


                                                               •   Network Infrastructure
                                                                   –   Routers, Switches, Firewalls, Load balancers, Optimization Devices and Proxies


                                                               •   Internet Service Poviders (not an exhaustive list)
                                                                   –   NTT, ATT, Sprint, Free, Hurricane Electric , Bechtel, Google, Comcast…


                                                               •   Most world regions (and governments) have IPv6 on their
                                                                   road maps and requirements
                                                                   –   US Gov., Europe, France, Japan, Korea, India and China.


                                                               •   Alot of the Technical Ecosystem is ready for IPv6.




6 of 14   ©2010 HP - IPv6 Irish Task Force Forum – May 2010.
IPV6 ADVANTAGES




7 of 14   ©2010 HP - IPv6 Irish Task Force Forum – May 2010.
TIME TO STRATEGICALLY INVEST IN IPV6




8 of 14   ©2010 HP - IPv6 Irish Task Force Forum – May 2010.
ENSURING BALANCED VALUE DELIVERY

                                                                  – Evaluate your Business
                                                                    Drivers
                                                                   •   Business Operating Model
                                                                   •   Goals
                                                                   •   Customer Requirements
                                                                   •   Business Process Requirements

                                                                  – Technology Impacts
                                                                   •   Infrastructure Requirements
                                                                   •   Applications and
                                                                   •   Data
ust a technology approach will ultimately lead to failure
   9 of 14   ©2010 HP - IPv6 Irish Task Force Forum – May 2010.
IPV6 ARCHITECTURAL COMPONENTS

                                                                Four Architectural Components
                                                                – Organisational Goals and Drivers
                                                                 •   Overall business Case for IPv6 in the enterprise

                                                                – Sources and Types of Data
                                                                 •   Address Plans, Firewall Policies and ACL’s

                                                                – Applications
                                                                 •   Which Processes Data and Support Business
                                                                     Process

                                                                – Infrastructure
                                                                 •   Network, Compute, Middleware and End Points.




10 of 14   ©2010 HP - IPv6 Irish Task Force Forum – May 2010.
DEVELOP IPV6 FRAMEWORK

                A: Strategy Establishment




11 of 14   ©2010 HP - IPv6 Irish Task Force Forum – May 2010.
ESTABLISH YOUR TASKFORCE
   •   IPv6 is not a network Centric Affair
   •   Adoption will be a complex multifaceted undertaking.
   •   Establish your Taskforce with a Cross Section of Business
       and IT functions
   •   Seek Executive Sponsorship and a Mandate
   •   Establish the Governance Model for your deployment
   •   IPv6 Deployment and planning in the Enterprise will
       touch everyone in the organisation.
   •   Communicate, Communicate & Communicate




12 of 14     ©2010 HP - IPv6 Irish Task Force Forum – May 2010.
KEY POINTS
 Now is the time to develop your Strategy:
 i. Assess the drivers appropriate to your organization
 ii. Global IPv4 Address Depletion by 2012
 iii. Customers moving to IPv6
 iv. Evaluate Government Mandates and Incentives
 v. Internal Requirements (Product Development etc.)
 vi. Develop your Implementation and Deployment Strategy
 vii.Start training and educating your staff now
 viii.Determine address space needs, acquire PA or PI space, develop Address Plan
 ix. Build IPv6 requirements into all Technology and Sourcing Decisions




13 of 14   ©2010 HP - IPv6 Irish Task Force Forum – May 2010.
Q&A


14
©2010 HP Confidential
    ©2009 HP Confidential

More Related Content

Similar to Peter Wyatt_

The Build vs. Buy Decision for SaaS Delivery
The Build vs. Buy Decision for SaaS DeliveryThe Build vs. Buy Decision for SaaS Delivery
The Build vs. Buy Decision for SaaS DeliveryOpSource
 
IPv6 for the Enterprise
IPv6 for the EnterpriseIPv6 for the Enterprise
IPv6 for the EnterpriseJohn Rhoton
 
Successfully Deploying IPv6
Successfully Deploying IPv6Successfully Deploying IPv6
Successfully Deploying IPv6Zivaro Inc
 
Successfully Deploying IPv6
Successfully Deploying IPv6Successfully Deploying IPv6
Successfully Deploying IPv6Zivaro Inc
 
IMT Solutions - Overview of IMT
IMT Solutions - Overview of IMTIMT Solutions - Overview of IMT
IMT Solutions - Overview of IMTnamtvh
 
Cloud Computing and Electronic Design: Xuropa EDPS, 2010
Cloud Computing and Electronic Design: Xuropa EDPS, 2010Cloud Computing and Electronic Design: Xuropa EDPS, 2010
Cloud Computing and Electronic Design: Xuropa EDPS, 2010James Colgan
 
Peter Mell Cloud Standards 20090915
Peter Mell Cloud Standards 20090915Peter Mell Cloud Standards 20090915
Peter Mell Cloud Standards 20090915GovCloud Network
 
Content over IPv6: no excuses
Content over IPv6: no excusesContent over IPv6: no excuses
Content over IPv6: no excusesIvan Pepelnjak
 
Gautam middleware consultant 2016
Gautam middleware consultant 2016Gautam middleware consultant 2016
Gautam middleware consultant 2016Gautam M Reddy
 
Managing Complexity in Mobile Application Deployment Using the OSGi Service P...
Managing Complexity in Mobile Application Deployment Using the OSGi Service P...Managing Complexity in Mobile Application Deployment Using the OSGi Service P...
Managing Complexity in Mobile Application Deployment Using the OSGi Service P...mfrancis
 
Enterprise Preparation for IPv6
Enterprise Preparation for IPv6Enterprise Preparation for IPv6
Enterprise Preparation for IPv6John Rhoton
 
Customer Presentation - Ford Network Operations Adminstration
Customer Presentation - Ford Network Operations AdminstrationCustomer Presentation - Ford Network Operations Adminstration
Customer Presentation - Ford Network Operations AdminstrationSplunk
 
Cloud Computing Architecture Primer
Cloud Computing Architecture PrimerCloud Computing Architecture Primer
Cloud Computing Architecture PrimerIlham Ahmed
 
IBM: The Linux Ecosystem
IBM: The Linux EcosystemIBM: The Linux Ecosystem
IBM: The Linux EcosystemKangaroot
 
12 steps for IPv6 Deployment in Governments and Enterprises
12 steps for IPv6 Deployment in Governments and Enterprises12 steps for IPv6 Deployment in Governments and Enterprises
12 steps for IPv6 Deployment in Governments and EnterprisesAPNIC
 
ARIN 36 IETF IPv6 Activities Report
ARIN 36 IETF IPv6 Activities ReportARIN 36 IETF IPv6 Activities Report
ARIN 36 IETF IPv6 Activities ReportARIN
 

Similar to Peter Wyatt_ (20)

IPv6: the what, why and how
IPv6: the what, why and howIPv6: the what, why and how
IPv6: the what, why and how
 
Intel Cloud Foundry and OpenStack
Intel Cloud Foundry and OpenStackIntel Cloud Foundry and OpenStack
Intel Cloud Foundry and OpenStack
 
The Build vs. Buy Decision for SaaS Delivery
The Build vs. Buy Decision for SaaS DeliveryThe Build vs. Buy Decision for SaaS Delivery
The Build vs. Buy Decision for SaaS Delivery
 
IPv6 for the Enterprise
IPv6 for the EnterpriseIPv6 for the Enterprise
IPv6 for the Enterprise
 
Successfully Deploying IPv6
Successfully Deploying IPv6Successfully Deploying IPv6
Successfully Deploying IPv6
 
Successfully Deploying IPv6
Successfully Deploying IPv6Successfully Deploying IPv6
Successfully Deploying IPv6
 
IMT Solutions - Overview of IMT
IMT Solutions - Overview of IMTIMT Solutions - Overview of IMT
IMT Solutions - Overview of IMT
 
Cloud Computing and Electronic Design: Xuropa EDPS, 2010
Cloud Computing and Electronic Design: Xuropa EDPS, 2010Cloud Computing and Electronic Design: Xuropa EDPS, 2010
Cloud Computing and Electronic Design: Xuropa EDPS, 2010
 
Peter Mell Cloud Standards 20090915
Peter Mell Cloud Standards 20090915Peter Mell Cloud Standards 20090915
Peter Mell Cloud Standards 20090915
 
Content over IPv6: no excuses
Content over IPv6: no excusesContent over IPv6: no excuses
Content over IPv6: no excuses
 
AMIS OOW Review 2012 - Deel 7 - Lucas Jellema
AMIS OOW Review 2012 - Deel 7 - Lucas JellemaAMIS OOW Review 2012 - Deel 7 - Lucas Jellema
AMIS OOW Review 2012 - Deel 7 - Lucas Jellema
 
Gautam middleware consultant 2016
Gautam middleware consultant 2016Gautam middleware consultant 2016
Gautam middleware consultant 2016
 
Managing Complexity in Mobile Application Deployment Using the OSGi Service P...
Managing Complexity in Mobile Application Deployment Using the OSGi Service P...Managing Complexity in Mobile Application Deployment Using the OSGi Service P...
Managing Complexity in Mobile Application Deployment Using the OSGi Service P...
 
Enterprise Preparation for IPv6
Enterprise Preparation for IPv6Enterprise Preparation for IPv6
Enterprise Preparation for IPv6
 
Customer Presentation - Ford Network Operations Adminstration
Customer Presentation - Ford Network Operations AdminstrationCustomer Presentation - Ford Network Operations Adminstration
Customer Presentation - Ford Network Operations Adminstration
 
Cloud Computing Architecture Primer
Cloud Computing Architecture PrimerCloud Computing Architecture Primer
Cloud Computing Architecture Primer
 
Adressing IPv6 strategy
Adressing IPv6 strategyAdressing IPv6 strategy
Adressing IPv6 strategy
 
IBM: The Linux Ecosystem
IBM: The Linux EcosystemIBM: The Linux Ecosystem
IBM: The Linux Ecosystem
 
12 steps for IPv6 Deployment in Governments and Enterprises
12 steps for IPv6 Deployment in Governments and Enterprises12 steps for IPv6 Deployment in Governments and Enterprises
12 steps for IPv6 Deployment in Governments and Enterprises
 
ARIN 36 IETF IPv6 Activities Report
ARIN 36 IETF IPv6 Activities ReportARIN 36 IETF IPv6 Activities Report
ARIN 36 IETF IPv6 Activities Report
 

More from IPv6 Summit 2010

Daniel Karrenbourg - KEYNOTE
Daniel Karrenbourg - KEYNOTEDaniel Karrenbourg - KEYNOTE
Daniel Karrenbourg - KEYNOTEIPv6 Summit 2010
 
Martin List-Petersen, AirWire
Martin List-Petersen, AirWireMartin List-Petersen, AirWire
Martin List-Petersen, AirWireIPv6 Summit 2010
 
12.00 - Dr. Tim Chown - University of Southampton
12.00 - Dr. Tim Chown - University of Southampton12.00 - Dr. Tim Chown - University of Southampton
12.00 - Dr. Tim Chown - University of SouthamptonIPv6 Summit 2010
 
14.30 Michele Neylon, Blacknight
14.30 Michele Neylon, Blacknight14.30 Michele Neylon, Blacknight
14.30 Michele Neylon, BlacknightIPv6 Summit 2010
 
Prof. Brian Carpenter - Keynote
Prof. Brian Carpenter - KeynoteProf. Brian Carpenter - Keynote
Prof. Brian Carpenter - KeynoteIPv6 Summit 2010
 
Prof. Brian Carpenter (University of Auckland)
Prof. Brian Carpenter (University of Auckland)Prof. Brian Carpenter (University of Auckland)
Prof. Brian Carpenter (University of Auckland)IPv6 Summit 2010
 

More from IPv6 Summit 2010 (11)

Daniel Karrenbourg - KEYNOTE
Daniel Karrenbourg - KEYNOTEDaniel Karrenbourg - KEYNOTE
Daniel Karrenbourg - KEYNOTE
 
Martin List-Petersen, AirWire
Martin List-Petersen, AirWireMartin List-Petersen, AirWire
Martin List-Petersen, AirWire
 
12.00 - Dr. Tim Chown - University of Southampton
12.00 - Dr. Tim Chown - University of Southampton12.00 - Dr. Tim Chown - University of Southampton
12.00 - Dr. Tim Chown - University of Southampton
 
SFI - Prof. Fionn Murtagh
SFI - Prof. Fionn MurtaghSFI - Prof. Fionn Murtagh
SFI - Prof. Fionn Murtagh
 
Dave Northey - Microsoft
Dave Northey - MicrosoftDave Northey - Microsoft
Dave Northey - Microsoft
 
Mat Ford - ISOC
Mat Ford - ISOCMat Ford - ISOC
Mat Ford - ISOC
 
14.30 Michele Neylon, Blacknight
14.30 Michele Neylon, Blacknight14.30 Michele Neylon, Blacknight
14.30 Michele Neylon, Blacknight
 
Marco Hogewoning -XS4all
Marco Hogewoning -XS4allMarco Hogewoning -XS4all
Marco Hogewoning -XS4all
 
Prof. Brian Carpenter - Keynote
Prof. Brian Carpenter - KeynoteProf. Brian Carpenter - Keynote
Prof. Brian Carpenter - Keynote
 
Micheal O'Foghlu - TSSG
Micheal O'Foghlu - TSSGMicheal O'Foghlu - TSSG
Micheal O'Foghlu - TSSG
 
Prof. Brian Carpenter (University of Auckland)
Prof. Brian Carpenter (University of Auckland)Prof. Brian Carpenter (University of Auckland)
Prof. Brian Carpenter (University of Auckland)
 

Recently uploaded

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 

Recently uploaded (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 

Peter Wyatt_

  • 1. IPv6 In the Enterprise Peter Wyatt Distinguished Technologist, Hewlett Packard Global Telecommunications, ITI May 19, 2010 1 ©2009 HP Confidential
  • 2. AGENDA – The Perfect Storm/Everything over IP – IPv6 Readiness and Advantages – IPv6 and Security – Investing in IPv6 – Balanced Value Delivery – Core Components – Adoption Framework and Taskforce – Key Points 2 of 14 ©2010 HP - IPv6 Irish Task Force Forum – May 2010.
  • 3. THE MAKING OF THE “PERFECT STORM” 3 of 14 ©2010 HP - IPv6 Irish Task Force Forum – May 2010.
  • 4. EYE OF THE STORM - EVERYTHING OVER IP 4 of 14 ©2010 HP - IPv6 Irish Task Force Forum – May 2010.
  • 5. IPV6 AND SECURITY Without Security, IPv6 adoption will be Challanging  We need proper design, configuration, testing and understanding around v6.  Think of the Control mechanisms we have in place for IPv4, We need these for v6  Create a security infrastructure using IPv6-aware firewalls, intrusion detection systems, Proxies, VPNs, DNS security, ACLs  IPv6provides many transition mechanisms which can easily circumvent existing IPv4 based security mechanisms. These mechanisms need to be secured as well.  IPv6mandates the implementation of IPsec but does not require that IPsec be actually used.  IPsec is not a new protocol and is defined for both IPv4 and IPv6. But IPsec configuration is an issue and adoption has not occurred widely. 5 of 14 ©2010 HP - IPv6 Irish Task Force Forum – May 2010.
  • 6. IPV6 READINESS • ALL major operating systems are shipping with IPv6 which are often enabled by default – Chrome OS, Apple MAC OS, BSD, HP-UX, AIX, Windows Vista, Windows Server 2008, Linux SuSe, Linux redhat and Solaris etc… – Android, Windows Mobile 5 and 6, Symbian and WebOS… • On top of these platforms application vendors are at various stages of implementing IPv6 in their products. – Examples: Sony PlayStation Network, Windows Server 2008 Network Load Balancing, Windows Vista Peer-to-Peer framework, Apple "Back to My Mac“ (BTMM), Mozilla Firefox, • Network Infrastructure – Routers, Switches, Firewalls, Load balancers, Optimization Devices and Proxies • Internet Service Poviders (not an exhaustive list) – NTT, ATT, Sprint, Free, Hurricane Electric , Bechtel, Google, Comcast… • Most world regions (and governments) have IPv6 on their road maps and requirements – US Gov., Europe, France, Japan, Korea, India and China. • Alot of the Technical Ecosystem is ready for IPv6. 6 of 14 ©2010 HP - IPv6 Irish Task Force Forum – May 2010.
  • 7. IPV6 ADVANTAGES 7 of 14 ©2010 HP - IPv6 Irish Task Force Forum – May 2010.
  • 8. TIME TO STRATEGICALLY INVEST IN IPV6 8 of 14 ©2010 HP - IPv6 Irish Task Force Forum – May 2010.
  • 9. ENSURING BALANCED VALUE DELIVERY – Evaluate your Business Drivers • Business Operating Model • Goals • Customer Requirements • Business Process Requirements – Technology Impacts • Infrastructure Requirements • Applications and • Data ust a technology approach will ultimately lead to failure 9 of 14 ©2010 HP - IPv6 Irish Task Force Forum – May 2010.
  • 10. IPV6 ARCHITECTURAL COMPONENTS Four Architectural Components – Organisational Goals and Drivers • Overall business Case for IPv6 in the enterprise – Sources and Types of Data • Address Plans, Firewall Policies and ACL’s – Applications • Which Processes Data and Support Business Process – Infrastructure • Network, Compute, Middleware and End Points. 10 of 14 ©2010 HP - IPv6 Irish Task Force Forum – May 2010.
  • 11. DEVELOP IPV6 FRAMEWORK A: Strategy Establishment 11 of 14 ©2010 HP - IPv6 Irish Task Force Forum – May 2010.
  • 12. ESTABLISH YOUR TASKFORCE • IPv6 is not a network Centric Affair • Adoption will be a complex multifaceted undertaking. • Establish your Taskforce with a Cross Section of Business and IT functions • Seek Executive Sponsorship and a Mandate • Establish the Governance Model for your deployment • IPv6 Deployment and planning in the Enterprise will touch everyone in the organisation. • Communicate, Communicate & Communicate 12 of 14 ©2010 HP - IPv6 Irish Task Force Forum – May 2010.
  • 13. KEY POINTS Now is the time to develop your Strategy: i. Assess the drivers appropriate to your organization ii. Global IPv4 Address Depletion by 2012 iii. Customers moving to IPv6 iv. Evaluate Government Mandates and Incentives v. Internal Requirements (Product Development etc.) vi. Develop your Implementation and Deployment Strategy vii.Start training and educating your staff now viii.Determine address space needs, acquire PA or PI space, develop Address Plan ix. Build IPv6 requirements into all Technology and Sourcing Decisions 13 of 14 ©2010 HP - IPv6 Irish Task Force Forum – May 2010.
  • 14. Q&A 14 ©2010 HP Confidential ©2009 HP Confidential