{"id":27763,"date":"2024-10-23T14:14:14","date_gmt":"2024-10-23T14:14:14","guid":{"rendered":"https:\/\/blog.lacnic.net\/?p=27763"},"modified":"2024-11-05T18:04:28","modified_gmt":"2024-11-05T18:04:28","slug":"the-risks-of-ignoring-ipv6-in-your-network","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/en\/the-risks-of-ignoring-ipv6-in-your-network\/","title":{"rendered":"The Risks of Ignoring IPv6 in Your Network"},"content":{"rendered":"\n<p>By <a href=\"https:\/\/blog.lacnic.net\/en\/author\/carolina-badano\/\">Carolina Badano<\/a>, Communications Coordinator at LACNIC<\/p>\n\n\n\n<p>During his presentation at the LACNIC 42 LACNOG 2024 event held in Asunci\u00f3n Paraguay, Henri Alves de Godoy, network analyst and professor at Campinas University, stressed the urgent need to monitor dual-stack networks and underscored the risks of ignoring the IPv6 protocol. The key aspects of his presentation are highlighted below.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>IPv6. What is the current state of connectivity?<\/strong><\/h2>\n\n\n\n<p>Despite living in an era where most devices support IPv6 and where adoption rates have already exceeded 50% in countries such as Mexico, Brazil, and Uruguay, Alves noted that it is common for people to approach him saying that they don&#8217;t have IPv6 in their networks. \u201cThis is a misconception and, at times, a risk because these people don&#8217;t understand why the provider does not make use of the global address,\u201d he added.<\/p>\n\n\n\n<p>Moreover, cybercriminals and botnets continue to evolve and are using IPv6.<\/p>\n\n\n\n<p>According to Alves, many honeypots (sensors that collect information about threat actor behavior on the Internet) are not yet configured to collect data over IPv6, and some threat intelligence reports continue to ignore the protocol. The image below shows the percentage of malicious behavior not identified by any security layer.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" width=\"1000\" height=\"1024\" src=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/10\/fig1-los-riesgos-de-ignorar-ipv6-en-su-red-1000x1024.png\" alt=\"\" class=\"wp-image-27747\" style=\"width:400px\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/10\/fig1-los-riesgos-de-ignorar-ipv6-en-su-red-1000x1024.png 1000w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/10\/fig1-los-riesgos-de-ignorar-ipv6-en-su-red-293x300.png 293w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/10\/fig1-los-riesgos-de-ignorar-ipv6-en-su-red-322x330.png 322w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/10\/fig1-los-riesgos-de-ignorar-ipv6-en-su-red-768x787.png 768w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/10\/fig1-los-riesgos-de-ignorar-ipv6-en-su-red-300x307.png 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/10\/fig1-los-riesgos-de-ignorar-ipv6-en-su-red.png 1308w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<p>Source: Morphus Cyber \u200b\u200bThreat Resilience Report, 2022<\/p>\n\n\n\n<p>As a result, Alves concluded that a portion of traffic is currently not being analyzed, adding that this issue should not be ignored and must be addressed urgently.<strong><\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What are the risks of ignoring IPv6 in our networks?<\/strong><strong><\/strong><\/h2>\n\n\n\n<p>When operators ignore the presence of IPv6 in their networks, they cannot implement robust access controls or traffic filters. A simple scan of the IPv4 network could reveal the existence of an IPv6 address, which would allow hackers to move laterally within the internal systems and thus escape detection mechanisms.<\/p>\n\n\n<section class=\"acf-view acf-view--id--21788 acf-view--object-id--27763\"><div class=\"acf-view__texto_fijo acf-view__row\"><div class=\"acf-view__texto_fijo-field acf-view__field\"><div class=\"acf-view__texto_fijo-choice acf-view__choice\">Additional reading:<\/div><\/div><\/div><div class=\"acf-view__enlace acf-view__row\"><div class=\"acf-view__enlace-field acf-view__field\"><a target=\"_self\" class=\"acf-view__enlace-link acf-view__link\" href=\"https:\/\/blog.lacnic.net\/en\/ipv6-and-its-importance-for-research-and-development-rd\/\">IPv6 and Its Importance for Research and Development (R+D)<\/a><\/div><\/div><\/section>\n\n\n<p>Alves presented three practical examples (tested in a controlled lab environment) that can occur if we don\u2019t monitor IPv6 traffic:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Automatic tunnels: compromise user experience and divert traffic<\/li>\n<\/ol>\n\n\n\n<p>In some operating systems, these methods are automatically enabled and, if not properly monitored, can redirect traffic, exposing critical vulnerabilities. Tunnels can also create openings for data exfiltration, if employing IPv6 packets encapsulated in IPv4 in a communication that is not properly monitored and protected.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"631\" src=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/10\/fig2-los-riesgos-de-ignorar-ipv6-en-su-red-1024x631.png\" alt=\"\" class=\"wp-image-27750\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/10\/fig2-los-riesgos-de-ignorar-ipv6-en-su-red-1024x631.png 1024w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/10\/fig2-los-riesgos-de-ignorar-ipv6-en-su-red-300x185.png 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/10\/fig2-los-riesgos-de-ignorar-ipv6-en-su-red-535x330.png 535w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/10\/fig2-los-riesgos-de-ignorar-ipv6-en-su-red-768x473.png 768w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/10\/fig2-los-riesgos-de-ignorar-ipv6-en-su-red-1536x947.png 1536w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/10\/fig2-los-riesgos-de-ignorar-ipv6-en-su-red.png 1788w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Data exfiltration in unmonitored networks: uses secret channels and can be used for intentional secret data transfers. It is difficult to detect because it uses legitimate protocols and ports (for more information, see the following <a href=\"https:\/\/blog.lacnic.net\/info-stealers-prevencion-y-proteccion-contra-el-robo-de-informacion\/\">article on infostealers<\/a>).<\/li>\n<\/ul>\n\n\n\n<p>Exfiltration via ICMPv6:<\/p>\n\n\n\n<p>The ICMPv6 protocol is essential for IPv6 operation and is mainly used for network diagnostic purposes, for example, sending \u201cping\u201d packets. However, cybercriminals can abuse this protocol to exfiltrate data, using ICMPv6 packets to transport sensitive information.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"451\" src=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/10\/fig3-los-riesgos-de-ignorar-ipv6-en-su-red-1024x451.png\" alt=\"\" class=\"wp-image-27753\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/10\/fig3-los-riesgos-de-ignorar-ipv6-en-su-red-1024x451.png 1024w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/10\/fig3-los-riesgos-de-ignorar-ipv6-en-su-red-300x132.png 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/10\/fig3-los-riesgos-de-ignorar-ipv6-en-su-red-680x300.png 680w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/10\/fig3-los-riesgos-de-ignorar-ipv6-en-su-red-768x339.png 768w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/10\/fig3-los-riesgos-de-ignorar-ipv6-en-su-red-1536x677.png 1536w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/10\/fig3-los-riesgos-de-ignorar-ipv6-en-su-red-2048x903.png 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Figure 1<\/p>\n\n\n\n<p>In Figure 1, an attacker can use ICMPv6 to encapsulate data contained in a confidential spreadsheet into 1024-byte packets that are invisible to monitoring solutions, as these tend to focus on higher layers, such as the application layer.<\/p>\n\n\n\n<p>Exfiltration via Flow Label<\/p>\n\n\n\n<p>Because it is considered harmless, the Flow Label field in the IPv6 header is a feature often ignored by security systems. However, it can be used to create secret communication channels, storing and transmitting data without the traffic being identified as suspicious.<br><br>In Figure 2, with a tool such as IPv6teal, an attacker can hide data, for example system password files (passwd in the case of Linux), inside the Flow Label field. Because Flow Label is a legitimate field, it goes unnoticed by intrusion detection systems (IDS) or firewalls that are not configured to monitor it.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"568\" src=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/10\/fig4-los-riesgos-de-ignorar-ipv6-en-su-red-1024x568.png\" alt=\"\" class=\"wp-image-27756\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/10\/fig4-los-riesgos-de-ignorar-ipv6-en-su-red-1024x568.png 1024w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/10\/fig4-los-riesgos-de-ignorar-ipv6-en-su-red-300x166.png 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/10\/fig4-los-riesgos-de-ignorar-ipv6-en-su-red-595x330.png 595w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/10\/fig4-los-riesgos-de-ignorar-ipv6-en-su-red-768x426.png 768w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/10\/fig4-los-riesgos-de-ignorar-ipv6-en-su-red-1536x851.png 1536w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/10\/fig4-los-riesgos-de-ignorar-ipv6-en-su-red.png 1826w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Figure 2<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Unauthorized Router Advertisements (RA). Since all devices can receive an IPv6 address, an unauthorized advertisement can modify network behavior, potentially leading to violations of security policies.<\/li>\n<\/ul>\n\n\n\n<p>Alves recommends analyzing the actual need to keep router advertisements in datacenters and servers.<\/p>\n\n\n\n<p>The main issues are:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Connectivity disruptions: An unauthorized RA might cause devices to automatically switch to IPv6, bypassing the security policies configured for IPv4. This can lead to connectivity failures or expose the network to new types of attacks.<\/li>\n\n\n\n<li>Security policy vulnerabilities: Networks often have robust policies in place for IPv4, but an automatic transition to IPv6 can create significant openings, as firewall rules and other control mechanisms may not be configured for IPv6 traffic.<\/li>\n<\/ul>\n\n\n\n<p>For instance, an unauthorized RA could cause a server to switch from IPv4 to IPv6, bypassing the firewall rules configured for IPv4. This would allow malicious traffic to be routed with no restrictions, exposing the network to attacks. Implementing tools such as RA Guard can help mitigate this type of threat, but it is crucial that security policies are aligned for both IPv4 and IPv6.<\/p>\n\n\n\n<p>During the LACNIC41 meeting, Ernesto Sanchez presented his work titled IPv6 Security Analysis with Containerlab, which deals precisely with the application of RA Guard. This presentation is available at <a href=\"https:\/\/lacnic41.lacnic.net\/es\/programa\/presentaciones-y-videos\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/lacnic41.lacnic.net\/es\/programa\/presentaciones-y-videos<\/a><\/p>\n\n\n\n<p>To conclude, Alves provided a series of best practices that should be considered:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Monitor outbound traffic patterns<\/li>\n\n\n\n<li>Monitor the volume and frequency of data transmission by users (this can be done by analyzing network flows)<\/li>\n\n\n\n<li>Install proper technical controls to avoid phishing attacks<\/li>\n\n\n\n<li>Implement identity and access management (IAM)<\/li>\n<\/ul>\n\n\n\n<p>In conclusion, IPv6 integration and monitoring are essential, and IPv6 should never be disabled. \u201cThis is a crime that people commit,\u201d Alvez stressed.<\/p>\n\n\n\n<p>Furthermore, we must adequately prepare our teams to manage dual-stack networks effectively.<\/p>\n\n\n\n<p>Currently, security information and event management (SIEM) systems have some limitations when used in dual-stack environments. Therefore, it is necessary to develop strategies for an effective integration for both the IPv4 and the IPv6 protocols in security systems.<\/p>\n\n\n\n<p>Click <a href=\"https:\/\/www.youtube.com\/watch?v=jA8_eAWUF4s\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a> to watch Henri Alves&#8217;s presentation.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Os riscos de ignorar o IPv6 na sua rede\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/jA8_eAWUF4s?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>By Carolina Badano, Communications Coordinator at LACNIC During his presentation at the LACNIC 42 LACNOG 2024 event held in Asunci\u00f3n Paraguay, Henri Alves de Godoy, network analyst and professor at Campinas University, stressed the urgent need to monitor dual-stack networks and underscored the risks of ignoring the IPv6 protocol. The key aspects of his presentation [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":27759,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[531],"tags":[1304],"archivo":[1345,1451],"taxonomy-authors":[1364],"tipo_autor":[],"class_list":["post-27763","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ipv6","tag-ipv6","archivo-editions","archivo-highlights-2023","taxonomy-authors-carolina-badano-en"],"acf":{"author":"Carolina Badano","related_notes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC Blog | The Risks of Ignoring IPv6 in Your Network<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/en\/the-risks-of-ignoring-ipv6-in-your-network\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC Blog | The Risks of Ignoring IPv6 in Your Network\" \/>\n<meta property=\"og:description\" content=\"By Carolina Badano, Communications Coordinator at LACNIC During his presentation at the LACNIC 42 LACNOG 2024 event held in Asunci\u00f3n Paraguay, Henri Alves de Godoy, network analyst and professor at Campinas University, stressed the urgent need to monitor dual-stack networks and underscored the risks of ignoring the IPv6 protocol. The key aspects of his presentation [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/en\/the-risks-of-ignoring-ipv6-in-your-network\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-23T14:14:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-05T18:04:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/10\/los-riesgos-de-ignorar-ipv6-en-su-red-lacnic42.png\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gianni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/the-risks-of-ignoring-ipv6-in-your-network\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/the-risks-of-ignoring-ipv6-in-your-network\/\"},\"author\":{\"name\":\"Gianni\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\"},\"headline\":\"The Risks of Ignoring IPv6 in Your Network\",\"datePublished\":\"2024-10-23T14:14:14+00:00\",\"dateModified\":\"2024-11-05T18:04:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/the-risks-of-ignoring-ipv6-in-your-network\/\"},\"wordCount\":950,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/the-risks-of-ignoring-ipv6-in-your-network\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/10\/los-riesgos-de-ignorar-ipv6-en-su-red-lacnic42.png\",\"keywords\":[\"IPv6\"],\"articleSection\":[\"IPv6\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/the-risks-of-ignoring-ipv6-in-your-network\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/the-risks-of-ignoring-ipv6-in-your-network\/\",\"url\":\"https:\/\/blog.lacnic.net\/en\/the-risks-of-ignoring-ipv6-in-your-network\/\",\"name\":\"LACNIC Blog | The Risks of Ignoring IPv6 in Your Network\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/the-risks-of-ignoring-ipv6-in-your-network\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/the-risks-of-ignoring-ipv6-in-your-network\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/10\/los-riesgos-de-ignorar-ipv6-en-su-red-lacnic42.png\",\"datePublished\":\"2024-10-23T14:14:14+00:00\",\"dateModified\":\"2024-11-05T18:04:28+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/the-risks-of-ignoring-ipv6-in-your-network\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/the-risks-of-ignoring-ipv6-in-your-network\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/the-risks-of-ignoring-ipv6-in-your-network\/#primaryimage\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/10\/los-riesgos-de-ignorar-ipv6-en-su-red-lacnic42.png\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/10\/los-riesgos-de-ignorar-ipv6-en-su-red-lacnic42.png\",\"width\":680,\"height\":330},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/the-risks-of-ignoring-ipv6-in-your-network\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Risks of Ignoring IPv6 in Your Network\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\",\"name\":\"Gianni\",\"url\":\"https:\/\/blog.lacnic.net\/en\/author\/gianni\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC Blog | The Risks of Ignoring IPv6 in Your Network","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/en\/the-risks-of-ignoring-ipv6-in-your-network\/","og_locale":"en_US","og_type":"article","og_title":"LACNIC Blog | The Risks of Ignoring IPv6 in Your Network","og_description":"By Carolina Badano, Communications Coordinator at LACNIC During his presentation at the LACNIC 42 LACNOG 2024 event held in Asunci\u00f3n Paraguay, Henri Alves de Godoy, network analyst and professor at Campinas University, stressed the urgent need to monitor dual-stack networks and underscored the risks of ignoring the IPv6 protocol. The key aspects of his presentation [&hellip;]","og_url":"https:\/\/blog.lacnic.net\/en\/the-risks-of-ignoring-ipv6-in-your-network\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2024-10-23T14:14:14+00:00","article_modified_time":"2024-11-05T18:04:28+00:00","og_image":[{"width":680,"height":330,"url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/10\/los-riesgos-de-ignorar-ipv6-en-su-red-lacnic42.png","type":"image\/png"}],"author":"Gianni","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/en\/the-risks-of-ignoring-ipv6-in-your-network\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/en\/the-risks-of-ignoring-ipv6-in-your-network\/"},"author":{"name":"Gianni","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab"},"headline":"The Risks of Ignoring IPv6 in Your Network","datePublished":"2024-10-23T14:14:14+00:00","dateModified":"2024-11-05T18:04:28+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/the-risks-of-ignoring-ipv6-in-your-network\/"},"wordCount":950,"commentCount":0,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/the-risks-of-ignoring-ipv6-in-your-network\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/10\/los-riesgos-de-ignorar-ipv6-en-su-red-lacnic42.png","keywords":["IPv6"],"articleSection":["IPv6"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.lacnic.net\/en\/the-risks-of-ignoring-ipv6-in-your-network\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/en\/the-risks-of-ignoring-ipv6-in-your-network\/","url":"https:\/\/blog.lacnic.net\/en\/the-risks-of-ignoring-ipv6-in-your-network\/","name":"LACNIC Blog | The Risks of Ignoring IPv6 in Your Network","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/the-risks-of-ignoring-ipv6-in-your-network\/#primaryimage"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/the-risks-of-ignoring-ipv6-in-your-network\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/10\/los-riesgos-de-ignorar-ipv6-en-su-red-lacnic42.png","datePublished":"2024-10-23T14:14:14+00:00","dateModified":"2024-11-05T18:04:28+00:00","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/en\/the-risks-of-ignoring-ipv6-in-your-network\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/en\/the-risks-of-ignoring-ipv6-in-your-network\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/en\/the-risks-of-ignoring-ipv6-in-your-network\/#primaryimage","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/10\/los-riesgos-de-ignorar-ipv6-en-su-red-lacnic42.png","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/10\/los-riesgos-de-ignorar-ipv6-en-su-red-lacnic42.png","width":680,"height":330},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/en\/the-risks-of-ignoring-ipv6-in-your-network\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/en\/"},{"@type":"ListItem","position":2,"name":"The Risks of Ignoring IPv6 in Your Network"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab","name":"Gianni","url":"https:\/\/blog.lacnic.net\/en\/author\/gianni\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/10\/los-riesgos-de-ignorar-ipv6-en-su-red-lacnic42.png","jetpack_sharing_enabled":true,"wpml_current_locale":"en_US","wpml_translations":[{"locale":"es_ES","id":27744,"post_title":"Los riesgos de ignorar IPv6 en su red","slug":"los-riesgos-de-ignorar-ipv6-en-su-red","href":"https:\/\/blog.lacnic.net\/los-riesgos-de-ignorar-ipv6-en-su-red\/"},{"locale":"pt_BR","id":27768,"post_title":"Os riscos de ignorar o IPv6 na sua rede","slug":"os-riscos-de-ignorar-o-ipv6-na-sua-rede","href":"https:\/\/blog.lacnic.net\/pt-br\/os-riscos-de-ignorar-o-ipv6-na-sua-rede\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/27763","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=27763"}],"version-history":[{"count":3,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/27763\/revisions"}],"predecessor-version":[{"id":27851,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/27763\/revisions\/27851"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media\/27759"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=27763"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=27763"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=27763"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/archivo?post=27763"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/taxonomy-authors?post=27763"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tipo_autor?post=27763"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}