IPv6 Security (Networking Technology Series)

IPv6 Security (Networking Technology Series)

5.0 2
by Scott Hogg

View All Available Formats & Editions

IPv6 Security


Protection measures for the next Internet Protocol


As the world’s networks migrate to the IPv6 protocol, networking professionals need a clearer understanding of the security risks, threats, and challenges this transition presents. In IPv6 Security, two of the world’s leading Internet


IPv6 Security


Protection measures for the next Internet Protocol


As the world’s networks migrate to the IPv6 protocol, networking professionals need a clearer understanding of the security risks, threats, and challenges this transition presents. In IPv6 Security, two of the world’s leading Internet security practitioners review each potential security issue introduced by IPv6 networking and present today’s best solutions.


IPv6 Security offers guidance for avoiding security problems prior to widespread IPv6 deployment. The book covers every component of today’s networks, identifying specific security deficiencies that occur within IPv6 environments and demonstrating how to combat them.


The authors describe best practices for identifying and resolving weaknesses as you maintain a dual stack network. Then they describe the security mechanisms you need to implement as you migrate to an IPv6-only network. The authors survey the techniques hackers might use to try to breach your network, such as IPv6 network reconnaissance, address spoofing, traffic interception, denial of service, and tunnel injection.


The authors also turn to Cisco® products and protection mechanisms. You learn how to use Cisco IOS® and ASA firewalls and ACLs to selectively filter IPv6 traffic. You also learn about securing hosts with Cisco Security Agent 6.0 and about securing a network with IOS routers and switches. Multiple examples are explained for Windows, Linux, FreeBSD, and Solaris hosts. The authors offer detailed examples that are consistent with today’s best practices and easy to adapt to virtually any IPv6 environment.


Scott Hogg, CCIE® No. 5133, is Director of Advanced Technology Services at Global Technology Resources, Inc. (GTRI). He is responsible for setting the company’s technical direction and helping it create service offerings for emerging technologies such as IPv6. He is the Chair of the Rocky Mountain IPv6 Task Force.


Eric Vyncke, Cisco Distinguished System Engineer, consults on security issues throughout Europe. He has 20 years’ experience in security and teaches security seminars as a guest professor at universities throughout Belgium. He also participates in the Internet Engineering Task Force (IETF) and has helped several organizations deploy IPv6 securely.


  • Understand why IPv6 is already a latent threat in your IPv4-only network
  • Plan ahead to avoid IPv6 security problems before widespread deployment
  • Identify known areas of weakness in IPv6 security and the current state of attack tools and hacker skills
  • Understand each high-level approach to securing IPv6 and learn when to use each
  • Protect service provider networks, perimeters, LANs, and host/server connections
  • Harden IPv6 network devices against attack
  • Utilize IPsec in IPv6 environments
  • Secure mobile IPv6 networks
  • Secure transition mechanisms in use during the migration from IPv4 to IPv6
  • Monitor IPv6 security
  • Understand the security implications of the IPv6 protocol, including issues related to ICMPv6 and the IPv6 header structure
  • Protect your network against large-scale threats by using perimeter filtering techniques and service provider—focused security practices
  • Understand the vulnerabilities that exist on IPv6 access networks and learn solutions for mitigating each



This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.


Category: Networking: Security

Covers: IPv6 Security

Product Details

Pearson Education
Publication date:
Networking Technology: Security
Sold by:
Barnes & Noble
File size:
7 MB

Meet the Author

Scott Hogg, CCIE No. 5133, has been a network computing consultant for more than 17 years. Scott provides network engineering, security consulting, and training services, focusing on creating reliable, high-performance, secure, manageable, and cost-effective network solutions. He has a bachelor’s degree in computer science from Colorado State University and a master’s degree in telecommunications from the University of Colorado. In addition to his CCIE he has his CISSP (No. 4610) and many other vendor and industry certifications. Scott has designed, implemented, and troubleshot networks for many large enterprises, service providers, and government organizations. For the past eight years, Scott has been researching IPv6 technologies. Scott has written several white papers on IPv6 and has given numerous presentations and demonstrations of IPv6 technologies. He is also currently the chair of the Rocky Mountain IPv6 Task Force and the Director of Advanced Technology Services at Global Technology Resources, Inc. (GTRI), a Cisco Gold partner headquartered in Denver, Colorado.


Eric Vynckeis a Distinguished System Engineer for Cisco working as a technical consultant for security covering Europe. His main area of expertise for 20 years has been security from Layer 2 to applications. He has helped several organizations deploy IPv6 securely. For the past eight years, Eric has participated in the Internet Engineering Task Force (IETF) (he is the author of RFC 3585). Eric is a frequent speaker at security events (notably Cisco Live [formerly Networkers]) and is also a guest professor at Belgian Universities for security seminars. He has a master’s degree in computer science engineering from the University of Liège in Belgium. He worked as a research assistant in the same university before joining Network Research Belgium, where he was the head of R&D; he then joined Siemens as a project manager for security projects including a proxy firewall. He coauthored the Cisco Press book LAN Switch Security: What Hackers Know About Your Switches. He is CISSP No. 75165.

Customer Reviews

Average Review:

Write a Review

and post it to your social network


Most Helpful Customer Reviews

See all customer reviews >

IPv6 Security 5 out of 5 based on 0 ratings. 2 reviews.
DMolfetas More than 1 year ago
This reference explains how to secure an IPV6 network across the major boundaries and potential targets for breaches: LAN, WAN, firewall-perimeter, VPN, and locking down the router. Many of these guidelines are also relevant to an IPV4 infrastructure and this book is a resource for both network and information security specialists who construct and maintain production environments. IPV6 Security encompasses two sets of concepts: the Self Defending Network's Collaboration, Integration, and Adaptability and InfoSec's Confidentiality, Integrity and Availability. Some noteworthy citations for ensuring security include configuring a WAN BGP session with a Message Digest 5 (MD5) algorithm password and using Secure Neighbor Discovery (SEND) for safeguarding IPV6 layer two addresses. As IPV6 uses named access control lists instead of numbered ACLs, the book explores both access control entries (ACE) and the IPV6 IOS commands in detail. Security is also examined for the IPV6 routing protocols, which include EIGRPv6, RIPng, and OSPFv3. Endpoint and server safeguards are also discussed since BSD, Vista and Server 2008 have IPV6 support incorporated in the operating systems. Since adopting a protection policy is one segment of a secure network, utilities such as Multi-Router Traffic Grapher (MRTG) and CiscoWorks LAN Management Solution are examined for capturing data traffic statistics. Setting a baseline and measuring performance are necessary steps for detecting when a security violation has occurred. IPV6 Security is a must-read resource for those actively engaged in both IPV6 and security implementation. As IPV6 is in its beginning stages and is incorporated into dual-stack architectures with IPV4, there is much to learn. Since information security should always be a consideration, this book offers many examples to consider for protecting the integrity of both the network and data. From a scale of 1-5, this book receives a 5 ranking and I look forward to reading the next book from the authors.
network_guy More than 1 year ago
In my quest to learn and transition to IPv6 from IPv4, I learned that you have to have a stable background in learning new materials. IPv6 has been around awhile but now just getting a little more used from many companies and myself. Along with the transition comes concerns with security as IPv4 didn't have much security. With this book [IPv6 Security] the authors took the technology and really explained some very detail and practical aspects of IPv6 with security enhancements. I realyy enjoyed reading this book. The authors did a good job in bringing the IPv6 protocol to the forefront by explaning different parts of the security features like mobile security, running dual stack protocols, IPv6 deployment solutions, address spoofing, and many other network problems. The authors used Cisco products to explain the security mechanisms. they also teach you how to use Cisco IOS® and ASA firewalls and ACLs to filter out IPv6 traffic. This book is one for the ages in describing, explaining, and implementing security in an IPv6 netowrk. Overall the book is great. I gave it a 5 start because of the deep explaining of the IPv6 protocol and security.