In analyzing these differences, Table 3: Comparing Technological and Operational benefits of IPv6-based SSL and IPv4-based IPSec VPNS, was created. Starting first with the client access options, IPv6-based SSL can support a clientless interface through its browser at longer address lengths, support for semi-clientless through Java and ActiveX clients developed in AJAX, and also in a full client configuration. This flexibility in use of the IPv6-based SSL protocol is leading to significantly higher levels of adoption overall. IPv4-based IPSec has a single client access option that needs to be pre-installed on every system. Requiring a full client software application translates into higher levels of it maintenance, yet at the same time greater flexibility in creating highly customized security parameters.
Another significant technological difference between IPv6 and IPv4', specifically from an it standpoint, is the client-side security integration possible using IPv4 versus IPv6. The fact that IPv6 can specifically integrate with a variety of web-based applications and provide security and authentication through the use of digital certificates has lead to its adoption throughout many areas it wasn't initially designed for. In effect the breadths of integration options for IPv6-based SSL VPNs are creating entirely new classes of users. Another factor that leads it departments to favor IPv6-based SSL over IPv4-based IPSec is the support for auto-updates through configuration, and the fact there is very little it support required to keep a secured IPv6-based SSL-based network up and running from the client side. Conversely, there is often a significant level of it administration and support required for IPSec-based configurations.
Table 3: Comparing Technological and Operational benefits of SSL and IPSec VPNS
Technological Benefit
Category
IPv6-based SSL VPNs
IPv4-based IPSec VPNs
Client Access Options
Three options:
Clientless (browser)
Semi-clientless (auto downloadable Java or ActiveX agent)
Full Client (statically installed)
One option: full client (statically installed) for network-level connection
Access Control
Very granular - per use and per application
Very little granularity - typically permit or deny
Client-side security
Tight integration with a wide variety of client types
Tight integration with only PCs
Operational Benefit
Installation
Often doesn't require installation
Requires installation on every client machine
Client configuration
Native abilities to auto-update
Requires third-party software to facilitate auto-updates
Evaluating the differences between IPv4 and IPv6 it's valuable to consider the various user segments and their uses of these protocols for their specific needs and requirements. The needs of those employees who are traveling the majority of time, often working with customers and in sales and sales support roles are often called road warriors, and have significantly different needs than it administrators and field engineers. Table 4: Comparing the Use of IPv4 versus IPv6 VPNs by Type of User, presents an analysis of the needs of road warriors, channel partners and executives, in addition to field engineers and it administrators regarding their application requirements including typical applications used, remote access frequency, and selection of IPv4 versus IPv6.
Power users are those types of users who require VPNs over 70% of the time to do their jobs.
Table 4: Comparing the Use of IPv6 versus IPv4 VPNs by Type of User
Type of User Power User? (meaning using VPNs 70% or more of the time on their jobs) Typical Applications Relative number of employees Remote access frequency IPv4 or IPv6 Comments Road Warriors
E-mail and front-office suites including CRM and ERP applications including order management
Many
Very Often (over 80% of the time)
IPv6
SSL used extensively in this area as it negates firewall traversal; works will from locations that may block IPSec sessions and queries from clients (hotels, convention centers)
Partners
Extranet portals; ERP and supply chain applications; pricing and order status access
Many
IPv6; previous generation applications support IPv4 through legacy applications
IPSec legacy systems required partners to get login and password; administratively difficult to complete; SSL easier to administer; strong integration with portals
Executives
E-mail and front office suites of applications; multimedia
Very Few
IPv6
Ease of configuration and use; SSL typically has a less intrusive interface.
Table 4: Comparing the Use of IPv6 versus IPv4 VPNs by Type of User (continued)
Type of User Power User? (meaning using VPNs 70% or more of the time on their jobs) Typical Applications Relative number of employees Remote access frequency IPv4 or IPv6 Comments Field engineers
CAD/CAM and engineering applications; inventory and ERP queries only sporadically
Few
Not Often
IPv4 (IPv6 becoming more used in this are)
Bandwidth-intensive applications work best in Level 3 operation (OSI Model).
IPSec also is backward compatible with many other legacy field applications
IT Administrators
Diagnostic and monitoring through the use of VPNS; Extensive use of Telnet sessions to administer systems remotely; database access and queries
Very Few
Not Often
IPv4 (IPv6 is slowly making inroads into this area)
IPv4 running the IPSec VPN protocol is favored by this class of user due to the integration and extension to LANs and more network administration applications;
IPv6 running SSL is optimum for configuring it management portals
Another useful analytical approach to evaluating the differences...
This is however, not considered foolproof. It is possible to break the security by a person having adequate technical expertise and access to the network at hardware level. In view of this the SSL method with right configuration is considered perfectly sufficient for all commercial purposes.5In order to safeguard the data while in transit it is customary to adopt a practical SSL protocol covering all network services that use
References www.questiaschool.com/PM.qst?a=o&d=113454035 Cole, C., Ray, K., & Zanetis, J. (2004). Videoconferencing for K-12 Classrooms: A Program Development Guide. Eugene, or: International Society for Technology in Education. Retrieved November 26, 2008, from Questia database: http://www.questia.com/PM.qst?a=o&d=113454035 FAQs about Internet2. Retrieved November 26, 2008, at http://www.internet2.edu/about/faq.html www.questiaschool.com/PM.qst?a=o&d=106217067 Goodman, P.S. (Ed.). (2002). Technology Enhanced Learning: Opportunities for Change. Mahwah, NJ: Lawrence Erlbaum Associates. Retrieved November 26, 2008, from Questia database: http://www.questia.com/PM.qst?a=o&d=106217070 Hanss T. Internet2: Building and Deploying Advanced,
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now