<DIV>why do you think this asks IPSEC traffic to expose its content to others? </DIV>
<DIV> </DIV>
<DIV>What interests me in this news is: how could e2e priciple account for increasing demands from goverment( or enterprise) to set up checkpoint across network while mainteining high performance? </DIV>
<DIV> </DIV>
<DIV>Is that easy to maintein flexibility, scalability and the "freedom" while providing what government asks?<BR></DIV>
<DIV> </DIV>
<DIV><B><I>"David P. Reed" <dpreed@reed.com></I></B> wrote:</DIV>
<BLOCKQUOTE style="PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #1010ff 2px solid">One more brick in the wall, the news story below tells us that major vendors continue to create damage to be routed around.<BR><BR>One could have hoped that in creating the IPv6 stacks of end systems, vendor OS stacks and apps would be properly authenticated using IPSEC, thus eliminating the need for (and ability to implement) firewalls that must read payload content as if they knew what it meant.<BR><BR>But alas, and to my great sadness, that was not to be. Instead Cisco adopts the maze of twisty little passages approach, and continues to encourage balkanization of the Internet. I presume that these firewalls will demand that IPSEC traffic expose its content before being allowed passage so instead of being more secure, the traffic gets less secure.<BR><BR>By 2006, I suspect there will be no "Inter" net to speak of. Only a collection of nets that cannot send data to
each other.<BR><BR><FONT face="Courier New, Courier" size=2>CISCO AIMS FOR IPV6 FIREWALLS<BR>Posted June 27, 2003 4:44 PM Pacific Time<BR><BR> <BR><BR> <BR><BR>Attacking one of the key problems early adopters have had<BR><BR>with IPv6 (Internet Protocol Version 6), Cisco plans to<BR><BR>beef up security, adding support for stateful packet<BR><BR>filtering of IPv6 traffic to its software and hardware<BR><BR>firewall products in the first half of next year.<BR><BR> <BR><BR>The dominant maker of Internet routers, also a major vendor<BR><BR>of firewalls, provided that statement of direction at the<BR><BR>North American IPv6 Global Summit, held this week in San<BR><BR>Diego. Cisco demonstrated the filtering capability in its<BR><BR>IOS (Internetwork Operating System) firewall at the<BR><BR>conference, said Patrick Grossetete, Cisco IOS IPv6 product manager, in an interview from the conference.<BR><BR> <BR><BR>For the full story: <A
href="http://www.infoworld.com/article/03/06/27/HNfirewallscisco_1.html">http://www.infoworld.com/article/03/06/27/HNfirewallscisco_1.html</A><BR><BR></FONT><FONT face=arial size=2> <BR></FONT></BLOCKQUOTE><BR><BR>Jing Shen<br><br>State Key Lab of CAD&CG<br>ZheJiang University(YuQuan)<br>HangZhou, ZheJiang Province 310027<br>P.R.China<p><br><hr size=1><b>Do You Yahoo!?</b><br>
<a href="http://cn.rd.yahoo.com/mail_cn/tag/?http://cn.surveys.yahoo.com/netlove">ÍøÁµµÄÚ¹ÊÍ£ºÕæÇ黹ÊÇ·Å×Ý£¿</a>