当前位置:网站首页>In 2022, IPv6 deployment and application will be further promoted. How can we comprehensively realize security upgrading and transformation?
In 2022, IPv6 deployment and application will be further promoted. How can we comprehensively realize security upgrading and transformation?
2022-06-22 10:34:00 【Know Chuangyu kcsc】

2022 year 4 month 25 Japan , Central network information office 、 National development and reform commission 、 The Ministry of industry and information technology jointly issued 《 Further advance IPv6 Scale deployment and application 2022 Annual work arrangement 》( hereinafter referred to as 《 Work arrangement 》).
Notice requirements , Continue to implement 《 On accelerating the promotion of the sixth edition of Internet Protocol (IPv6) Notification of scale deployment and application work 》, Solid promotion IPv6 Scale deployment and application are developing in depth , Improve in an all-round way IPv6 Level of development , Greet the victory of the 20th CPC National Congress with practical actions .

chart / Internet Information Office
《 Work arrangement 》 Make it clear 2022 Annual work objectives :
To 2022 end of the year ,IPv6 The number of active users has reached 7 Billion , The Internet of things IPv6 The number of connections reaches 1.8 Billion , Fixed network IPv6 The flow proportion reaches 13%, The mobile network IPv6 The flow proportion reaches 45%.
Government portals above the county level IPv6 The support rate reached 85%, Major domestic commercial websites and mobile Internet applications IPv6 The support rate reached 85%.IPv6 The ability of network security protection has been greatly improved .
Data Center 、 Content distribution network 、 In depth support of application infrastructure such as cloud platform and domain name resolution system IPv6 service . The newly manufactured home wireless router fully supports IPv6, And it turns on by default IPv6 Address allocation function .
Key tasks are arranged around many aspects , Emphasis on central enterprises 、 Financial institutions 、 Government service platform 、 Radio and television networks and other industries , The penetration shall be deepened IPv6 The scale of deployment 、 Continue to optimize IPv6 network performance 、 perfect “IPv6+” Technology industry ecosystem 、 deepen IPv6 Integrated development with new technologies, new applications and new scenes , Especially strengthen the safety guarantee : To speed up the IPv6 Research, development and application of key safety technologies 、 promote IPv6 Network security protection, monitoring and early warning capabilities 、 To strengthen IPv6 Network security management, supervision and inspection .
The state has made it clear that this year IPv6 The goal and task of , However, there are still many difficulties in practice . For example, the transformation technology is not mature , As a result, the original security system is damaged , Cause information and data leakage , Affect the normal operation of the current business website .
Know that Chuangyu cloud defense is based on more than ten years of rich security protection experience , Implement the national policies on IPv6 The policy of . According to different business application scenarios , Launched Two sets IPv6 Safety transformation scheme , Help you quickly solve the high transformation cost 、 Large investment 、 Cycle is long 、 Upgrade complex and other issues .
01
IPv6-IPv4 Two way conversion service scheme
in the light of Not yet supported IPv6 Business system of , use IPv4-IPv6 Two way transformation service , Quick support in a few minutes IPv6 Visitors visit , And connect the traffic to the Chuangyu defense cluster , Conduct defensive cleaning , Provide safety acceleration and safety protection capability , Ensure the security of the website .

Scheme Architecture 1
02
IPv4/IPv6 Double stack security protection scheme
in the light of The website itself supports IPv6 Business systems accessed , Know that Chuangyu cloud defense will access the newly upgraded business system IPv4/IPv6 Dual stack defense cluster , Direct reception IPv6 Request and safely clean it , Return safe traffic , Blocking cyber attacks .

Scheme Architecture 2
Program advantages :
Rapid access deployment : adopt DNS Drainage access , No other O & M workload is required
Safe acceleration 、 Safety protection : At the same time provide IPv6 Traffic safety acceleration and safety protection capability , At the completion of IPv6 At the same time of compliance , Protect the security of the website
Elastic resources , High availability : according to IPv6 Access situation and attack situation , Dynamically adjust resources , Make sure IPv6 High availability being accessed
Efficient solution IPv6 The skylight problem : Know Chuangyu cloud defense IPv6 The solution is through the use of “ Sunroof proxy gateway ” Proxy access is not supported IPv6 The outer chain of , Efficient solution “ The skylight problem ”
Some customer achievements :
at present , I know that Chuangyu has actively cooperated with government units 、 State owned enterprises, central enterprises 、 Finance 、 A number of customers from all walks of life, such as education, have conducted IPv6 Safety modification . Based on adequate technical preparation and safety capability , Know that Chuangyu helps the customer's business system to complete successfully IPv6 Double stack security transformation , It ensures the security and smooth operation of its business system .


chart / Customer thank you letter

if there be IPv6 Safety transformation requirements
Please scan the code for expert support


Click on Read the original Learn more about products ![]()

边栏推荐
- Isn't this another go bug?
- 【jmeter】shell脚本自动执行jmeter
- Read the history of it development in one breath
- 【Shell】常用指令集锦
- thinkphp5.0.24反序列化漏洞分析
- What kind of experience is middle-aged unemployment
- 外贸专题:外贸邮件营销模板
- IPO Configuration Guide
- 2022-06-09 work record --yarn/npm-error-eperm: operation not permitted, UV_ cwd
- Zero‐Copy API
猜你喜欢

超简单的C语言贪吃蛇 不闪屏 双缓冲

Cobalt strike from entry to imprisonment (III)

YOLOv3目标检测

大学生期末考试SQL语句

MySQL skip scan range small function to solve big problems?

等重构完这系统,我就提离职!

HMS core news industry solution: let technology add humanistic temperature

Spark精简面试

【无标题】#修复日志#

传iPhone 14将全系涨价;TikTok美国用户数据转移到甲骨文,字节无法访问;SeaTunnel 2.1.2发布|极客头条...
随机推荐
Niuke.com Huawei question bank (31~40)
10-2xxe漏洞原理和案例实验演示
2022各大厂最新总结的软件测试宝典,看完不怕拿不到offer
[untitled] repair log
Backbone! Youxuan software was selected as one of the top 100 digital security companies in China in 2022
Good news - agile technology was selected into the 2022 China top 100 Digital Security Report
Kirin software and Geer software focus on the development of network data security
Cache penetration tool "Bloom filter"
字节三面:到底知不知道什么是Eureka?
代码签名证书一旦泄露 危害有多大
蓝牙、wifi、zigbee和lora、NB-lot,通话信号,网络信号4G
Pycharm调试卡住,出现connected
From in MySQL_ Unixtime and UNIX_ Timestamp processing database timestamp conversion - Case
社区文章|MOSN 构建 Subset 优化思路分享
普乐蛙5d飞行影院5d动感影院体验馆设备7d多人互动影院
Pule frog 5D flying cinema 5D dynamic cinema experience hall equipment 7d multi person interactive cinema
LeetCode Algorithm 21. 合并两个有序链表
thinkphp5.0.24反序列化漏洞分析
It is said that the price of the iPhone 14 will rise; TikTok US user data is transferred to Oracle, and bytes cannot be accessed; Seatunnel 2.1.2 releases geek headlines
牛客网——华为题库(31~40)