recommended reading

Agencies likely to miss network upgrade deadline

Rob Bouwman/

Agencies probably will not meet a Sept. 30 deadline to upgrade their publically facing external servers to Internet protocol version 6, according to Federal News Radio.

A 2010 memo from the Office of Management and Budget directed all government agencies to transition their servers to IPv6 by the end of fiscal 2012, but a weekly report from the National Institute of Standards and Technology said only 58 percent had met the target several weeks before the deadline.

IP addresses are numerical labels assigned to every Internet-capable device. IPv4 relied on a 32-bit system that allowed for approximately 232, or  4.3 billion IP addresses. FNR reported there were approximately 1.6 million IPv4 addresses left, and many projections estimate that the world will run out of IPv4 addresses within a couple of years. According to the Internet Society, IPv6 addresses, which use a complex alphanumeric system to label devices, will never be depleted.

FNR also reported this will not be the first time that federal agencies have missed a key deadline for systems upgrades. The White House issued a memo in 2005 directing all agencies to convert their network backbones to IPv6 by 2008, but according to FNR, many agencies were still dual stacking, or running these services using both IPv4 and IPv6. FNR said the Treasury Department, General Services Administration and the Commerce Department were the furthest behind in upgrading to IPv6. 

(Image via Rob Bouwman/

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.