IPv6 Security
English | 2008 | ISBN: 1587055945 | 576 pages | PDF | 8,2 MB
IPv6 Security
Protection measures for the next Internet Protocol
The authors describe best practices for identifying and resolving weaknesses as you maintain a dual stack network. Then they describe the security mechanisms you need to implement as you migrate to an IPv6-only network. The authors survey the techniques hackers might use to try to breach your network, such as IPv6 network reconnaissance, address spoofing, traffic interception, denial of service, and tunnel injection.
Understand why IPv6 is already a latent threat in your IPv4-only network
Plan ahead to avoid IPv6 security problems before widespread deployment
Identify known areas of weakness in IPv6 security and the current state of attack tools and hacker skills
Understand each high-level approach to securing IPv6 and learn when to use each
Protect service provider networks, perimeters, LANs, and host/server connections
Harden IPv6 network devices against attack
Utilize IPsec in IPv6 environments
Secure mobile IPv6 networks
Secure transition mechanisms in use during the migration from IPv4 to IPv6
Monitor IPv6 security
Understand the security implications of the IPv6 protocol, including issues related to ICMPv6 and the IPv6 header structure
Understand the vulnerabilities that exist on IPv6 access networks and learn solutions for mitigating each
11:09 AM
Amarjit Singh
Posted in:






0 Visitor Reactions & Comments:
Post a Comment
For Guest Posts or your valuable suggestions... drop email on "[email protected]"