IPv4 and IPv6 don't interoperate, and while there are mediocre technologies for getting from IPv6-only clients to legacy IPv4-only servers such as NAT64+DNS64, the IETF gave up on trying to get from legacy IPv4-only clients to bleeding edge IPv6-only servers back in 2007 - see RFC 4966. A killer problem is that you can't reliably fake enough DNS 'A' records to cover the 'AAAA' address space at ISP scales.
Welcome to the IPv4 to IPv6 conversion interregnum, where we are running two internets and you can't get here from there. Yes, you have to concerned that older IPv4-only clients, this week about 96% of the planet, can't reach a v6-only eCommerce site. However, with mobile networks such as Verizon's LTE4 stuff being v6-only, you also have to be concerned if your eCommerce site were v4-only. Going through an ISP NAT64 translator will give a radically inferior user experience compared to a native v6 connection, and well as destroying all your geolocation analytics.
The recommended way to deal with this, e.g. what facebook is doing, is to run the back-end datacenter on v6-only, but to have perimeter services such as DNS and web load balancers dual-stacked on a small amount of public v4. Given the mediocre state of IPv6 reputation lists compared to IPv4 to date, I don't yet recommend running border mail gateways with live v6 as you are liable to leak more spam through.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...