Chapter 15. IPv6 Security Considerations

At the end of this chapter, you should be able to do the following:

  • Describe how to prevent unauthorized hosts from obtaining automatic Internet Protocol version 6 (IPv6) configuration.

  • Describe how to provide protection for IPv6 packets.

  • Describe how to protect IPv6 hosts from address and port scanning attacks.

  • Describe how to control what traffic is exchanged with the Internet.

IPv6 Security Considerations

Before deploying IPv6 you should be aware of the following aspects of security for IPv6 traffic:

The following sections ...

Get Understanding IPv6, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.