Chapter 10. Securing the Transition Mechanisms
This chapter covers the following subjects:
• Understanding IPv4-to-IPv6 Transition Techniques: Reviews dual-stack, tunnels (ISATAP, configured, 6to4, Teredo), and translation
• Implementing Dual-Stack Security: Describes dual-stack and the IPv6 latent threats and the associated mitigation techniques
• Hacking the Tunnels: Describes threats against static and dynamic tunnels, including sniffing, packet injection, and unauthorized use and shows how to protect the tunnels with IPsec and ACLs
• Attacking NAT-PT: Describes the vulnerabilities of the translation mechanisms
• IPv6 Latent Threats Against IPv4 Networks: Describes how IPv6 can be used as an attack vector, even in a pure IPv4 network ...
Get IPv6 Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.