Chapter 17. IPv6 Security Considerations
At the end of this chapter, you should be able to do the following:
Describe how to prevent unauthorized hosts from obtaining automatic Internet Protocol version 6 (IPv6) configuration.
Describe how to protect your intranet from rogue IPv6 routers.
Describe how to provide protection for IPv6 packets.
Describe how to protect IPv6 hosts from address and port scanning attacks.
Describe how to control IPv6 tunneled traffic on your intranet.
Describe how to control what traffic is exchanged with the Internet.
IPv6 Security Considerations
Before deploying IPv6 you should be aware of the following aspects of security for IPv6 traffic:
Authorization for automatically assigned addresses and configurations
Prevention of rogue ...