Abstract: | ABSTRACT This whitepaper introduces the concept of a transitional network, defines what it is, how it is used and why a transitional network is necessary. A brief history of IPv6 is given followed by a review of the known vulnerabilities associated with the IPv6 protocol. Popular transition strategies are explored in greater detail around issues of cost, implementation and security vulnerabilities. Mitigation techniques and counter-measures are reviewed against known exploits for each of the transition mechanisms. The last section offers an in depth investigation into the IPv6 mobility protocol, Network Address Translation - Protocol Translation (NAT-PT) and tunneling options. |