Chapter 12. IPv6 Security Conclusions
This chapter covers the following subjects:
• Comparing IPv4 and IPv6 Security: Describes similarities and differences between securing IPv4 and IPv6 networks
• Changing Security Perimeter: Describes how IPv6 can change security architecture models
• Creating an IPv6 Security Policy: Details how to create a practical IPv6 corporate security policy
• On the Horizon: Describes what to expect in the future with IPv6 security
• Consolidated List of Recommendations: Summarizes all the recommendations made in the previous chapters
This book has presented many deeply technical concepts on IPv6 weaknesses and described how they can be strengthened. This chapter wraps up the discussion on IPv6 security. ...
Get IPv6 Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.