Chapter 12. IPv6 Security Conclusions

This chapter covers the following subjects:

Comparing IPv4 and IPv6 Security: Describes similarities and differences between securing IPv4 and IPv6 networks

Changing Security Perimeter: Describes how IPv6 can change security architecture models

Creating an IPv6 Security Policy: Details how to create a practical IPv6 corporate security policy

On the Horizon: Describes what to expect in the future with IPv6 security

Consolidated List of Recommendations: Summarizes all the recommendations made in the previous chapters

This book has presented many deeply technical concepts on IPv6 weaknesses and described how they can be strengthened. This chapter wraps up the discussion on IPv6 security. ...

Get IPv6 Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.