Op werkdagen voor 23:00 besteld, morgen in huis Gratis verzending vanaf €20

IPv6 Security

Protection measures for the next Internet Protocol

Paperback Engels 2009 9781587055942
Verwachte levertijd ongeveer 8 werkdagen


As the world's networks migrate to the IPv6 protocol, networking professionals need a clearer understanding of the security risks, threats, and challenges this transition presents. In IPv6 Security, two of the world's leading Internet security practitioners review each potential security issue introduced by IPv6 networking and present today's best solutions.

'IPv6 Security' offers guidance for avoiding security problems prior to widespread IPv6 deployment. The book covers every component of today's networks, identifying specific security deficiencies that occur within IPv6 environments and demonstrating how to combat them.

The authors describe best practices for identifying and resolving weaknesses as you maintain a dual stack network. Then they describe the security mechanisms you need to implement as you migrate to an IPv6-only network. The authors survey the techniques hackers might use to try to breach your network, such as IPv6 network reconnaissance, address spoofing, traffic interception, denial of service, and tunnel injection.

The authors also turn to Cisco products and protection mechanisms. You learn how to use Cisco IOS and ASA firewalls and ACLs to selectively filter IPv6 traffic. You also learn about securing hosts with Cisco Security Agent 6.0 and about securing a network with IOS routers and switches. Multiple examples are explained for Windows, Linux, FreeBSD, and Solaris hosts. The authors offer detailed examples that are consistent with today's best practices and easy to adapt to virtually any IPv6 environment.

- Understand why IPv6 is already a latent threat in your IPv4-only network
- Plan ahead to avoid IPv6 security problems before widespread deployment
- Identify known areas of weakness in IPv6 security and the current state of attack tools and hacker skills
- Understand each high-level approach to securing IPv6 and learn when to use each
- Protect service provider networks, perimeters, LANs, and host/server connections
- Harden IPv6 network devices against attack
- Utilize IPsec in IPv6 environments
- Secure mobile IPv6 networks
- Secure transition mechanisms in use during the migration from IPv4 to IPv6
- Monitor IPv6 security
- Understand the security implications of the IPv6 protocol, including issues related to ICMPv6 and the IPv6 header structure
- Protect your network against large-scale threats by using perimeter filtering techniques and service provider-focused security practices
- Understand the vulnerabilities that exist on IPv6 access networks and learn solutions for mitigating each

This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.


Aantal pagina's:540
Uitgever:Cisco Press
Hoofdrubriek:IT-management / ICT


Wees de eerste die een lezersrecensie schrijft!

Geef uw waardering

Zeer goed Goed Voldoende Matig Slecht

Over Scott Hogg

Scott Hogg, CCIE No. 5133, is Director of Advanced Technology Services at Global Technology Resources, Inc. (GTRI). He is responsible for setting the company's technical direction and helping it create service offerings for emerging technologies such as IPv6. He is the Chair of the Rocky Mountain IPv6 Task Force.

Andere boeken door Scott Hogg

Over Eric Vyncke

Eric Vyncke, Cisco Distinguished System Engineer, consults on security issues throughout Europe. He has 20 years' experience in security and teaches security seminars as a guest professor at universities throughout Belgium. He also participates in the Internet Engineering Task Force (IETF) and has helped several organizations deploy IPv6 securely.

Andere boeken door Eric Vyncke



1. Introduction to IPv6 Security
-Reintroduction to IPv6 3
-IPv6 Update 6
-IPv6 Vulnerabilities 7
-Hacker Experience 8
-IPv6 Security Mitigation Techniques 9
-Recommended Readings and Resources

2. IPv6 Protocol Security Vulnerabilities
-The IPv6 Protocol Header
-Extension Header Threats
-Reconnaissance on IPv6 Networks
-Layer 3 and Layer 4 Spoofing

3. IPv6 Internet Security
-Large-Scale Internet Threats
-Ingress/Egress Filtering
-Securing BGP Sessions
-IPv6 over MPLS Security
-Customer Premises Equipment
-Prefix Delegation Threats
-Multihoming Issues

4. IPv6 Perimeter Security
-IPv6 Firewalls
-Cisco IOS Router ACLs
-Cisco IOS Firewall
-Cisco PIX/ASA/FWSM Firewalls

5. Local Network Security
-Why Layer 2 Is Important
-ICMPv6 Layer 2 Vulnerabilities for IPv6
-ICMPv6 Protocol Protection
-Network Detection of ICMPv6 Attacks
-Network Mitigation Against ICMPv6 Attacks
-Privacy Extension Addresses for the Better and the Worse
-DHCPv6 Threats and Mitigation
-Point-to-Point Link
-Endpoint Security

6. Hardening IPv6 Network Devices
-Threats Against Network Devices
-Cisco IOS Versions
-Disabling Unnecessary Network Services
-Limiting Router Access
-IPv6 Device Management
-Threats Against Interior Routing Protocol
-First-Hop Redundancy Protocol Security
-Controlling Resources
-QoS Threats

7. Server and Host Security
-IPv6 Host Security
-Host Firewalls
-Securing Hosts with Cisco Security Agent 6.0

8. IPsec and SSL Virtual Private Networks
-IP Security with IPv6
-Host-to-Host IPsec
-Site-to-Site IPsec Configuration
-Remote Access with IPsec

9. Security for IPv6 Mobility
-Mobile IPv6 Operation
-MIPv6 Messages
-Threats Linked to MIPv6
-Using IPsec with MIPv6
-Filtering for MIPv6
-Other IPv6 Mobility Protocols

10. Securing the Transition Mechanisms
-Understanding IPv4-to-IPv6 Transition Techniques
-Implementing Dual-Stack Security
-Hacking the Tunnels
-Attacking NAT-PT
-IPv6 Latent Threats Against IPv4 Networks

11. Security Monitoring
-Managing and Monitoring IPv6 Networks
-Managing IPv6 Tunnels
-Using Forensics
-Using Intrusion Detection and Prevention Systems
-Managing Security Information with CS-MARS
-Managing the Security Configuration

12. IPv6 Security Conclusions
-Comparing IPv4 and IPv6 Security
-Changing Security Perimeter
-Creating an IPv6 Security Policy
-On the Horizon
-Consolidated List of Recommendations

Alle 100 bestsellers


Populaire producten



        IPv6 Security