Chapter 17. IPv6 Security Considerations

At the end of this chapter, you should be able to do the following:

  • Describe how to prevent unauthorized hosts from obtaining automatic Internet Protocol version 6 (IPv6) configuration.

  • Describe how to protect your intranet from rogue IPv6 routers.

  • Describe how to provide protection for IPv6 packets.

  • Describe how to protect IPv6 hosts from address and port scanning attacks.

  • Describe how to control IPv6 tunneled traffic on your intranet.

  • Describe how to control what traffic is exchanged with the Internet.

IPv6 Security Considerations

Before deploying IPv6 you should be aware of the following aspects of security for IPv6 traffic:

  • Authorization for automatically assigned addresses and configurations

  • Prevention of rogue ...

Get Understanding IPv6, Third Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.