Sander Steffann wrote:
Hi,
In fact, and call me crazy, but I can't help but wonder how many enterprises out there will see IPv6 and its concept of "real IPs for all machines, internal and external!" and respond with "Hell No."
Anyone got any numbers for that? I'm happy to admit I don't. :)
No numbers, but the customers I talked to usually have the feeling that public IP addresses on their machines seems to imply publicly (and thus unprotected) reachability for those machines. They don't understand the difference between NAT and stateful firewalls...
This is what leads to the "Hell No" attitude in my case. Educating them about security seems the only solution.
I think that rather than attempting to educate their customers about security firewall vendors will probably just sell a NAT capable IPv6 firewall. It's the path of least resistance to profit. (A lot of mainstream vendors have helped push the idea that NAT is synonymous with firewalling. Take the Cisco PIX as an example, where up until very recently you had to configure NAT to allow traffic through the device.) Even people I have spoken that understand the difference between firewalling/reachability and NATing are still in favour of NAT. The argument basically goes "Yes, I understand that have a public address does not neccessarily mean being publically reachable. But having a private address means that [inbound] public reachability is simply not possible without explicit configuration to enable it". i.e. NAT is seen as a extra layer of security. I want NAT to die but I think it won't. S