Skip to Main Content
IPv6 Advanced Protocols Implementation
book

IPv6 Advanced Protocols Implementation

by Qing Li, Jinmei Tatuya, Keiichi Shima
July 2010
Intermediate to advanced content levelIntermediate to advanced
1008 pages
35h 43m
English
Morgan Kaufmann
Content preview from IPv6 Advanced Protocols Implementation
310 Chapter 4—DHCPv6
FIGURE 4-17
Time
server
client
Solicit
Advertise
Reply
(Auth, key=xxx)
key:
xxx
key:
xxx
Request
verify
Reconfigure
(Auth, HMAC)
Renew
DHCPv6 message exchanges using the r econfigure key protocol.
is a difficult challenge in any security mechanisms, not just for DHCPv6, and a fully secure
mechanism often is not feasible because of this issue. The compromise in the reconfigure key
protocol is thus considered as a tradeoff between feasibility and the level of security.
Exchanges with Relay Agents
If there is no server on a link to which a client is attached, the client needs to contact servers
via a DHCPv6 relay agent. The basic notion of relay agents ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

IPv6 Core Protocols Implementation

IPv6 Core Protocols Implementation

Qing Li, Tatuya Jinmei, Keiichi Shima
IPv6 Security

IPv6 Security

Scott Hogg, Eric Vyncke
IPv6 for Enterprise Networks

IPv6 for Enterprise Networks

Shannon McFarland, Muninder Sambi, Nikhil Sharma, Sanjay Hooda
IPv6 Network Programming

IPv6 Network Programming

Jun-ichiro itojun Hagino

Publisher Resources

ISBN: 9780080489308