Solved

IPv4 and IPv6

Posted on 2009-04-07
2
463 Views
Last Modified: 2012-05-06
Hi,

1)In one of the Exam, it was asked the NAME of the combination of The IPV4 and IPV6 routing?
2) Somebody knows what is the name of the combination?
3) Thank you

Tjie
0
Comment
Question by:tjie
  • 2
2 Comments
 
LVL 5

Accepted Solution

by:
mfhorizon earned 500 total points
ID: 24094161
It's called "Dual Stack Approach"
Because IPv6 is not backwards compatible with IPv4, a dual stack approach is needed to enable nodes to communicate over both IPv4 and IPv6 simultaneously.

Cheers!
0
 
LVL 5

Expert Comment

by:mfhorizon
ID: 24094185
MLPS: "MULTI PROTOCOL LABEL SWITCHING" is another term used in combination for IPv4 and IPv6 during migration.

//From an Article:Prerequisites for MPLS VPNVRF CLI for IPv4 and IPv6 VPNs
The MPLS VPNVRF CLI for IPv4 and IPv6 VPNs feature has the following prerequisites:
" For migrationAn IPv4 Multiprotocol Label Switching (MPLS) VPN VRF must exist.
" For a new VRF configurationCisco Express Forwarding and an MPLS label distribution method,
either Label Distribution Protocol (LDP) or MPLS traffic engineering (TE), must be enabled on all
routers in the core, including the provider edge (PE) routers.

http://www.cisco.com/en/US/docs/ios/mpls/configuration/guide/mp_vpn_ipv4_ipv6.pdf


0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

We've been using the Cisco/Linksys RV042 for years as: - an internet Gateway - a site-to-site VPN device - a leased line site-to-site subnet-to-subnet interface (And, here I'm assuming that any RV0xx behaves the same way as an RV042.  So that's …
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now