- The possibility that attackers might have more expertise with IPv6 than an organization in the early stages of deployment.
- Difficulty in detecting and managing unknown or unauthorized IPv6 assets on existing IPv4 production networks.
- The added complexity of operating parallel IPv4 and IPv6 networks.
- A lack of IPv6 maturity in security products.
- The proliferation of IPv6 and IPv4 tunnels can complicate defenses.