‹ Back
Deploy360 30 June 2014

IPv6 for the End User

By mcconachieFormer Intern

IPv6 BadgeSo much IPv6 talk is centered around operators and their configurations. With this post we’re going to focus on end user IPv6 configuration. We recently completed three resource pages dedicated to helping end users configure their desktop operating systems for IPv6.

The resources aim to help users of Apple’s Mac OS X, Microsoft Windows and Linux operating systems get up and running fast on IPv6. End users don’t have to be power end users to configure IPv6 in their client operating systems. With both DHCPv6 and SLAAC, IPv6 was designed with ease of use in mind. Usually all that is required is turning it on. However, if you are the power user type, you’ll find links in each resource page for you.

After you enable IPv6 on your machine you should check out some of the other client-oriented IPv6 content we have. This video from the American Registry for Internet Numbers(ARIN) explains the basics of IPv6 for a non-technical audience. Still confused about what IPv6 is all about and why it matters? Check out A Layman’s Guide to IPv6 or the IPv6 Consumer Guide.

If you’re stuck in an environment that doesn’t yet offer IPv6 but want to get on board, this page on IPv6 transition technologies is for you. If you want IPv6 connectivity, but are currently stuck at an operator that only support IPv4, the specific video on 6in4 is for you.

IPv6 adoption is accelerating and it’s easier than ever to get onboard as an IPv6 end user. Join the conversation and get up and running with IPv6 today.


If you would like to get started with IPv6, please visit our IPv6 resources or begin with our “Start Here” page to help find resources most appropriate for your type of organization. If you have an IPv6 case study you think we should consider for inclusion on our site, please contact us – we are always looking for more!

‹ Back

Disclaimer: Viewpoints expressed in this post are those of the author and may or may not reflect official Internet Society positions.

Related articles

Improving Technical Security 15 March 2019

DNS Privacy Frequently Asked Questions (FAQ)

We previously posted about how the DNS does not inherently employ any mechanisms to provide confidentiality for DNS transactions,...

Improving Technical Security 14 March 2019

Introduction to DNS Privacy

Almost every time we use an Internet application, it starts with a DNS (Domain Name System) transaction to map...

Improving Technical Security 13 March 2019

IPv6 Security for IPv4 Engineers

It is often argued that IPv4 practices should be forgotten when deploying IPv6, as after all IPv6 is a...

Join the conversation with Internet Society members around the world