This book is a straightforward discussion of the concepts, principles, and processes of
Internet Protocol version 6 (IPv6) and how it is supported by the Microsoft Windows Server 2008
and Windows Vista operating systems. Note that this book does not contain programming
code-level details of the IPv6 protocol for Windows Server 2008 and Windows Vista, such as
structures, tables, buffers, or coding logic. These details are highly guarded Microsoft intellectual
property that is of interest only to a relative handful of software developers.
Ensure that system and network administrators are trained and capable. Security testing must be
performed by capable and trained staff. Often, individuals recruited for this task are already involved in
system administration. While system administration is an increasingly complex task, the numbers of
trained system administrators generally has not kept pace with the increase in computing systems.
Key planning considerations for federal agencies include recognizing that the
transition is already under way, because IPv6-capable software and
equipment already exists in agency networks. Other important agency
planning considerations include developing inventories and assessing risks;
creating business cases that identify organizational needs and goals;
establishing policies and enforcement mechanisms; determining costs; and
identifying timelines and methods for transition.