September 2015
Intermediate to advanced
608 pages
21h 29m
English
Implementing security measures at the beginning of a deployment improves the initial security posture instead of waiting until after an attack has occurred. IPv6 best practices include the following:
Filter bogus addresses: Drop, at the edge of your network, any addresses that should never be valid source or destination addresses. These are also referred to as bogon addresses.
Filter nonlocal multicast addresses: If you are ...
Read now
Unlock full access