<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to Understand and Approach IPv8 if It Becomes a Standard? in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-Understand-and-Approach-IPv8-if-It-Becomes-a-Standard/m-p/276625#M105274</link>
    <description>&lt;P&gt;Excellent Feedback,&amp;nbsp;IPv6 covers 128 bits, and now you’re talking about 256 bits. It sometimes feels like humanity is obsessed with assigning identifiers even to every grain of sand. In 20 years, someone might be updating this post talking about 512-bit systems or even more, because every day we see innovations that require more bandwidth, mapping, and scale.&lt;/P&gt;
&lt;P data-end="601" data-start="458"&gt;I’m making a slightly bold prediction here; I might be wrong, but it could happen. It’s fascinating to see what others think about this.&lt;/P&gt;</description>
    <pubDate>Thu, 07 May 2026 06:55:54 GMT</pubDate>
    <dc:creator>sjni01</dc:creator>
    <dc:date>2026-05-07T06:55:54Z</dc:date>
    <item>
      <title>How to Understand and Approach IPv8 if It Becomes a Standard?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-Understand-and-Approach-IPv8-if-It-Becomes-a-Standard/m-p/276095#M105103</link>
      <description>&lt;P data-end="470" data-start="141"&gt;Hi CheckMate Community,&lt;/P&gt;
&lt;P data-end="470" data-start="141"&gt;While the world is still adopting IPv6, some visionaries are already exploring what could be the next revolution in networking: IPv8. It’s not an official standard yet; there is a draft.&amp;nbsp;&lt;/P&gt;
&lt;P data-end="470" data-start="141"&gt;This would be the way to interpret it so that you can preliminarily understand what IPv8 might handle:&lt;/P&gt;
&lt;P data-end="470" data-start="141"&gt;&lt;STRONG&gt;Conceptual IPv8 Header (Experimental/Research):&lt;/STRONG&gt;&lt;/P&gt;
&lt;TABLE&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH width="204.744px" height="19px"&gt;&lt;STRONG&gt;Field&lt;/STRONG&gt;&lt;/TH&gt;
&lt;TH width="158.04px" height="19px"&gt;&lt;STRONG&gt;Size (conceptual)&lt;/STRONG&gt;&lt;/TH&gt;
&lt;TH width="556.875px" height="19px"&gt;&lt;STRONG&gt;Purpose / Description&lt;/STRONG&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="204.744px" height="24px"&gt;Version / Protocol Type&lt;/TD&gt;
&lt;TD width="158.04px" height="24px"&gt;4-8 bits&lt;/TD&gt;
&lt;TD width="556.875px" height="24px"&gt;Indicates IPv8 version and protocol/subprotocol type.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="204.744px" height="46px"&gt;Source Address&lt;/TD&gt;
&lt;TD width="158.04px" height="46px"&gt;variable (128–256 bits)&lt;/TD&gt;
&lt;TD width="556.875px" height="46px"&gt;Modular address including location, identity, and optional permissions.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="204.744px" height="46px"&gt;Destination Address&lt;/TD&gt;
&lt;TD width="158.04px" height="46px"&gt;variable (128–256 bits)&lt;/TD&gt;
&lt;TD width="556.875px" height="46px"&gt;Modular address for routing and access control.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="204.744px" height="24px"&gt;QoS / Priority&lt;/TD&gt;
&lt;TD width="158.04px" height="24px"&gt;8-16 bits&lt;/TD&gt;
&lt;TD width="556.875px" height="24px"&gt;Specifies traffic priority, quality of service, or special routing instructions.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="204.744px" height="24px"&gt;Security / Authentication&lt;/TD&gt;
&lt;TD width="158.04px" height="24px"&gt;variable&lt;/TD&gt;
&lt;TD width="556.875px" height="24px"&gt;Optional fields for encryption, integrity checks, and identity verification.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="204.744px" height="46px"&gt;Mobility / Routing Metadata&lt;/TD&gt;
&lt;TD width="158.04px" height="46px"&gt;variable&lt;/TD&gt;
&lt;TD width="556.875px" height="46px"&gt;Information for node mobility, multi-path routing, or decentralized network handling.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="204.744px" height="46px"&gt;Extension / Optional Headers&lt;/TD&gt;
&lt;TD width="158.04px" height="46px"&gt;variable&lt;/TD&gt;
&lt;TD width="556.875px" height="46px"&gt;Can include additional features like service metadata, tokens, or microservice tags.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="204.744px" height="24px"&gt;Payload Length&lt;/TD&gt;
&lt;TD width="158.04px" height="24px"&gt;16-32 bits&lt;/TD&gt;
&lt;TD width="556.875px" height="24px"&gt;Length of the actual data payload.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="204.744px" height="24px"&gt;Checksum / Integrity&lt;/TD&gt;
&lt;TD width="158.04px" height="24px"&gt;16-32 bits&lt;/TD&gt;
&lt;TD width="556.875px" height="24px"&gt;Ensures header and payload integrity.&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P data-end="470" data-start="141"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="470" data-start="141"&gt;The latest update just over a week ago in April 2026, but it aims to &lt;STRONG data-start="325" data-end="351"&gt;rethink how we connect&lt;/STRONG&gt;, integrating anonymity, advanced security, full mobility, and even native digital identity into the protocol itself.&lt;/P&gt;
&lt;P data-end="675" data-start="472"&gt;&lt;STRONG&gt;What does Check Point think about this?&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="675" data-start="472"&gt;In the cybersecurity world, the introduction of a new protocol always raises questions: how will it impact firewalls, threat detection, and policy management?&lt;/P&gt;
&lt;P data-end="969" data-start="677"&gt;&lt;STRONG&gt;And here’s a key point:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P data-end="969" data-start="677"&gt;From a development and hardware perspective, if IPv8 moves beyond a draft and becomes a public standard, Will current devices adapt easily through software/firmware updates?&lt;/P&gt;
&lt;P data-end="969" data-start="677"&gt;Or will existing hardware be challenged, prompting a major infrastructure refresh?&amp;nbsp;&lt;/P&gt;
&lt;P data-end="969" data-start="677"&gt;&lt;div class="video-embed-center video-embed"&gt;&lt;iframe class="embedly-embed" src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2Fw6cBf42bvz8%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3Dw6cBf42bvz8&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2Fw6cBf42bvz8%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" width="400" height="225" scrolling="no" title="Have you heard about IPv8?" frameborder="0" allow="autoplay; fullscreen; encrypted-media; picture-in-picture;" allowfullscreen="true"&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;/P&gt;
&lt;P data-end="969" data-start="677"&gt;&lt;STRONG&gt;How will it impact routing, Layer 2, Layer 3, Layer 4, etc.?&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P data-end="969" data-start="677"&gt;It’s a great question for both internal and external networks, and basically for any service or microservices architecture. However, what has Check Point thought about this? It would be very interesting to know.&lt;/P&gt;
&lt;P data-end="969" data-start="677"&gt;&lt;STRONG&gt;Would history repeat itself?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P data-end="1100" data-start="971"&gt;We already saw how IPv6 adoption left many legacy devices behind or required significant upgrades.&amp;nbsp;&lt;/P&gt;
&lt;P data-end="1353" data-start="1221"&gt;IPv8 is a reminder that the future of the Internet could be &lt;STRONG data-end="1328" data-start="1281"&gt;smarter, more secure, and far more flexible&lt;/STRONG&gt; than we ever imagined.&lt;/P&gt;
&lt;P data-end="1353" data-start="1221"&gt;&lt;STRONG&gt;&amp;nbsp;What do you think?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P data-end="1353" data-start="1221"&gt;A natural evolution, or a disruptive shift too big for today’s infrastructure?&amp;nbsp;&lt;/P&gt;
&lt;P data-end="1353" data-start="1221"&gt;This is information I have been researching. If I am mistaken about anything, please feel free to correct me. The goal is to contribute and learn in a friendly way from what you might observe.&lt;/P&gt;
&lt;P data-end="1353" data-start="1221"&gt;With this post, I’m trying to send a message to the internal team responsible for Check Point, to anticipate the arrival of something as significant as this if it is ever adopted, and to see if, as a community, we might be prepared. Thank you for the space.&lt;/P&gt;
&lt;P data-end="1353" data-start="1221"&gt;Regards&lt;/P&gt;</description>
      <pubDate>Sun, 26 Apr 2026 22:34:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-Understand-and-Approach-IPv8-if-It-Becomes-a-Standard/m-p/276095#M105103</guid>
      <dc:creator>sjni01</dc:creator>
      <dc:date>2026-04-26T22:34:40Z</dc:date>
    </item>
    <item>
      <title>Re: How to Understand and Approach IPv8 if It Becomes a Standard?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-Understand-and-Approach-IPv8-if-It-Becomes-a-Standard/m-p/276274#M105133</link>
      <description>&lt;P&gt;To provide some historical context, IPv6 was initially defined by&amp;nbsp;&lt;A href="https://www.rfc-editor.org/rfc/rfc2460" target="_self"&gt;RFC 2460&lt;/A&gt;&amp;nbsp;at the end of 1998.&lt;BR /&gt;There wasn't any real pressure to move to IPv6 until &lt;A href="https://en.wikipedia.org/wiki/IPv4_address_exhaustion" target="_blank"&gt;we actually ran out of IPv4 addresses&lt;/A&gt; in January 2011.&lt;BR /&gt;I don't think we're going to run out of IPv6 addresses anytime soon.&lt;BR /&gt;Given this history and absent some other market driver, I don't see businesses embracing it.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2026 21:20:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-Understand-and-Approach-IPv8-if-It-Becomes-a-Standard/m-p/276274#M105133</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2026-04-29T21:20:05Z</dc:date>
    </item>
    <item>
      <title>Re: How to Understand and Approach IPv8 if It Becomes a Standard?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-Understand-and-Approach-IPv8-if-It-Becomes-a-Standard/m-p/276461#M105218</link>
      <description>&lt;P&gt;Thanks for your feedback, PB. It will always be useful!!&lt;/P&gt;</description>
      <pubDate>Tue, 05 May 2026 04:50:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-Understand-and-Approach-IPv8-if-It-Becomes-a-Standard/m-p/276461#M105218</guid>
      <dc:creator>sjni01</dc:creator>
      <dc:date>2026-05-05T04:50:10Z</dc:date>
    </item>
    <item>
      <title>Re: How to Understand and Approach IPv8 if It Becomes a Standard?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-Understand-and-Approach-IPv8-if-It-Becomes-a-Standard/m-p/276495#M105236</link>
      <description>&lt;P&gt;The drive behind "IPv8" was low adoption of IPv6. The only mention of IPv6 in the draft is "IPv6 [RFC8200] addressed address exhaustion but did not address management fragmentation. After 25 years of deployment effort IPv6 carries a minority of global internet traffic.", which is insane.&lt;/P&gt;
&lt;P&gt;The "IPv8" draft has clear signs of being LLM slop rather than a serious proposal. For example, the second sentence is "Every manageable element in an IPv8 network is authorised via OAuth2 JWT tokens served from a local cache.", and that's wildly impossible. How are you supposed to make a DHCP8 request if you have to be authorized via a JSON Web Token to get any access to the network?&lt;/P&gt;
&lt;P&gt;Finally, it's published at the same level as&amp;nbsp;&lt;A href="https://datatracker.ietf.org/doc/draft-meow-mrrp/" target="_self"&gt;draft-meow-mrrp-00&lt;/A&gt;, and should be taken just as seriously.&lt;/P&gt;</description>
      <pubDate>Tue, 05 May 2026 13:28:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-Understand-and-Approach-IPv8-if-It-Becomes-a-Standard/m-p/276495#M105236</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2026-05-05T13:28:14Z</dc:date>
    </item>
    <item>
      <title>Re: How to Understand and Approach IPv8 if It Becomes a Standard?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-Understand-and-Approach-IPv8-if-It-Becomes-a-Standard/m-p/276608#M105260</link>
      <description>&lt;P&gt;Remember that it's a draft and could be updated, beyond your comments, we should try answer the questions mentioned on the post, if later this draft or any other proposal is adopted, it would be important to fix how legacy, new and future appliances are going to operate.&lt;/P&gt;</description>
      <pubDate>Wed, 06 May 2026 18:56:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-Understand-and-Approach-IPv8-if-It-Becomes-a-Standard/m-p/276608#M105260</guid>
      <dc:creator>sjni01</dc:creator>
      <dc:date>2026-05-06T18:56:46Z</dc:date>
    </item>
    <item>
      <title>Re: How to Understand and Approach IPv8 if It Becomes a Standard?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-Understand-and-Approach-IPv8-if-It-Becomes-a-Standard/m-p/276612#M105270</link>
      <description>&lt;P&gt;Strictly, IPv8 is already allocated. It was the P Internet Protocol, which was merged into the Simple Internet Protocol in 1993. SIP was IP protocol version 6, and eventually became what we know today as IPv6. Version 7 was assigned to TP/IX, and 9 was assigned to TUBA. SIP, TP/IX, PIP, and TUBA were all candidates to become IPv6.&lt;/P&gt;
&lt;P&gt;The "IPv8" draft which is making the rounds uses 64-bit addresses (and ties ASNs to addressing in ways which will never work in practice). Your mention of 256-bit addresses makes me think you got some information about China's proposed IPv9. That's the only mention of 256-bit addressing I ever remember hearing about.&lt;/P&gt;</description>
      <pubDate>Wed, 06 May 2026 21:18:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-Understand-and-Approach-IPv8-if-It-Becomes-a-Standard/m-p/276612#M105270</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2026-05-06T21:18:43Z</dc:date>
    </item>
    <item>
      <title>Re: How to Understand and Approach IPv8 if It Becomes a Standard?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-Understand-and-Approach-IPv8-if-It-Becomes-a-Standard/m-p/276625#M105274</link>
      <description>&lt;P&gt;Excellent Feedback,&amp;nbsp;IPv6 covers 128 bits, and now you’re talking about 256 bits. It sometimes feels like humanity is obsessed with assigning identifiers even to every grain of sand. In 20 years, someone might be updating this post talking about 512-bit systems or even more, because every day we see innovations that require more bandwidth, mapping, and scale.&lt;/P&gt;
&lt;P data-end="601" data-start="458"&gt;I’m making a slightly bold prediction here; I might be wrong, but it could happen. It’s fascinating to see what others think about this.&lt;/P&gt;</description>
      <pubDate>Thu, 07 May 2026 06:55:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-Understand-and-Approach-IPv8-if-It-Becomes-a-Standard/m-p/276625#M105274</guid>
      <dc:creator>sjni01</dc:creator>
      <dc:date>2026-05-07T06:55:54Z</dc:date>
    </item>
  </channel>
</rss>

