IPv6 Security

Nonfiction, Computers, Networking & Communications
Cover of the book IPv6 Security by Scott Hogg, Eric Vyncke, Pearson Education
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Scott Hogg, Eric Vyncke ISBN: 9781587058363
Publisher: Pearson Education Publication: December 11, 2008
Imprint: Cisco Press Language: English
Author: Scott Hogg, Eric Vyncke
ISBN: 9781587058363
Publisher: Pearson Education
Publication: December 11, 2008
Imprint: Cisco Press
Language: English

IPv6 Security

 

Protection measures for the next Internet Protocol

 

As the world’s networks migrate to the IPv6 protocol, networking professionals need a clearer understanding of the security risks, threats, and challenges this transition presents. In IPv6 Security, two of the world’s leading Internet security practitioners review each potential security issue introduced by IPv6 networking and present today’s best solutions.

 

IPv6 Security offers guidance for avoiding security problems prior to widespread IPv6 deployment. The book covers every component of today’s networks, identifying specific security deficiencies that occur within IPv6 environments and demonstrating how to combat them.

 

The authors describe best practices for identifying and resolving weaknesses as you maintain a dual stack network. Then they describe the security mechanisms you need to implement as you migrate to an IPv6-only network. The authors survey the techniques hackers might use to try to breach your network, such as IPv6 network reconnaissance, address spoofing, traffic interception, denial of service, and tunnel injection.

 

The authors also turn to Cisco® products and protection mechanisms. You learn how to use Cisco IOS® and ASA firewalls and ACLs to selectively filter IPv6 traffic. You also learn about securing hosts with Cisco Security Agent 6.0 and about securing a network with IOS routers and switches. Multiple examples are explained for Windows, Linux, FreeBSD, and Solaris hosts. The authors offer detailed examples that are consistent with today’s best practices and easy to adapt to virtually any IPv6 environment.

 

Scott Hogg, CCIE® No. 5133, is Director of Advanced Technology Services at Global Technology Resources, Inc. (GTRI). He is responsible for setting the company’s technical direction and helping it create service offerings for emerging technologies such as IPv6. He is the Chair of the Rocky Mountain IPv6 Task Force.

 

Eric Vyncke, Cisco Distinguished System Engineer, consults on security issues throughout Europe. He has 20 years’ experience in security and teaches security seminars as a guest professor at universities throughout Belgium. He also participates in the Internet Engineering Task Force (IETF) and has helped several organizations deploy IPv6 securely.

 

  • Understand why IPv6 is already a latent threat in your IPv4-only network
  • Plan ahead to avoid IPv6 security problems before widespread deployment
  • Identify known areas of weakness in IPv6 security and the current state of attack tools and hacker skills
  • Understand each high-level approach to securing IPv6 and learn when to use each
  • Protect service provider networks, perimeters, LANs, and host/server connections
  • Harden IPv6 network devices against attack
  • Utilize IPsec in IPv6 environments
  • Secure mobile IPv6 networks
  • Secure transition mechanisms in use during the migration from IPv4 to IPv6
  • Monitor IPv6 security
  • Understand the security implications of the IPv6 protocol, including issues related to ICMPv6 and the IPv6 header structure
  • Protect your network against large-scale threats by using perimeter filtering techniques and service provider—focused security practices
  • Understand the vulnerabilities that exist on IPv6 access networks and learn solutions for mitigating each

 

 

This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.

 

Category: Networking: Security

Covers: IPv6 Security

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

IPv6 Security

 

Protection measures for the next Internet Protocol

 

As the world’s networks migrate to the IPv6 protocol, networking professionals need a clearer understanding of the security risks, threats, and challenges this transition presents. In IPv6 Security, two of the world’s leading Internet security practitioners review each potential security issue introduced by IPv6 networking and present today’s best solutions.

 

IPv6 Security offers guidance for avoiding security problems prior to widespread IPv6 deployment. The book covers every component of today’s networks, identifying specific security deficiencies that occur within IPv6 environments and demonstrating how to combat them.

 

The authors describe best practices for identifying and resolving weaknesses as you maintain a dual stack network. Then they describe the security mechanisms you need to implement as you migrate to an IPv6-only network. The authors survey the techniques hackers might use to try to breach your network, such as IPv6 network reconnaissance, address spoofing, traffic interception, denial of service, and tunnel injection.

 

The authors also turn to Cisco® products and protection mechanisms. You learn how to use Cisco IOS® and ASA firewalls and ACLs to selectively filter IPv6 traffic. You also learn about securing hosts with Cisco Security Agent 6.0 and about securing a network with IOS routers and switches. Multiple examples are explained for Windows, Linux, FreeBSD, and Solaris hosts. The authors offer detailed examples that are consistent with today’s best practices and easy to adapt to virtually any IPv6 environment.

 

Scott Hogg, CCIE® No. 5133, is Director of Advanced Technology Services at Global Technology Resources, Inc. (GTRI). He is responsible for setting the company’s technical direction and helping it create service offerings for emerging technologies such as IPv6. He is the Chair of the Rocky Mountain IPv6 Task Force.

 

Eric Vyncke, Cisco Distinguished System Engineer, consults on security issues throughout Europe. He has 20 years’ experience in security and teaches security seminars as a guest professor at universities throughout Belgium. He also participates in the Internet Engineering Task Force (IETF) and has helped several organizations deploy IPv6 securely.

 

 

 

This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.

 

Category: Networking: Security

Covers: IPv6 Security

More books from Pearson Education

Cover of the book Practices for Engaging the 21st Century Workforce by Scott Hogg, Eric Vyncke
Cover of the book Facebook for Grown-Ups by Scott Hogg, Eric Vyncke
Cover of the book Implementing Cisco IOS Network Security (IINS) by Scott Hogg, Eric Vyncke
Cover of the book Pictures of the Mind: What the New Neuroscience Tells Us About Who We Are by Scott Hogg, Eric Vyncke
Cover of the book I.M. Wright's Hard Code by Scott Hogg, Eric Vyncke
Cover of the book Sams Teach Yourself iCloud in 10 Minutes by Scott Hogg, Eric Vyncke
Cover of the book MCSA 70-741 Cert Guide by Scott Hogg, Eric Vyncke
Cover of the book Programming in Objective-C by Scott Hogg, Eric Vyncke
Cover of the book The Hidden Power of Adjustment Layers in Adobe Photoshop by Scott Hogg, Eric Vyncke
Cover of the book Essential Windows Workflow Foundation by Scott Hogg, Eric Vyncke
Cover of the book Succeeding at Your Yahoo! Business by Scott Hogg, Eric Vyncke
Cover of the book Get Mad, Not Even by Scott Hogg, Eric Vyncke
Cover of the book Common System and Software Testing Pitfalls by Scott Hogg, Eric Vyncke
Cover of the book System Identification by Scott Hogg, Eric Vyncke
Cover of the book Analysis, Synthesis and Design of Chemical Processes by Scott Hogg, Eric Vyncke
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy