IPv6 - Security

Ronald Schlager

  • 出版商: CreateSpace Independ
  • 出版日期: 2013-08-23
  • 售價: $1,960
  • 貴賓價: 9.5$1,862
  • 語言: 英文
  • 頁數: 156
  • 裝訂: Paperback
  • ISBN: 1492234923
  • ISBN-13: 9781492234920
  • 相關分類: IPV6資訊安全
  • 無法訂購

商品描述

This is the seminar handout of our 1-day fully independent seminar "IPv6 - Security". You get fully independent and in detail information about possible IPv6 security threats and protection methods. The seminar offers you technical details to secure your computers and networks. Important security issues of migration concepts and procedures for your protection will be explained.

WHY you should attend:

* because you have to prepare the implementation of IPv6 in our network
* because you are interested in security implications and threats during the IPv6 implementation
* because you are interested in protection strategies and measures

Main Audience:
Planners, system technicians, consultants

Your PREVIOUS KNOWLEDGE:
Networking, TCP/IP and IPv6 knowledge is essential

CONTENT of the Seminar

Introduction
Why security - Threats - Security Concepts - Important Standards - Examples of TCP/IP specific Problems, IPv6 (History, Highlights, Addresses, ICMPv6, Neighbor / Router Discovery, automatic Configuration, Name Resolution, Migration)

IPv6 Security (Threats, Solutions)
General – Routing Headers and Hosts – Site-Scope Multicast – Bogus Packets – Privacy Extensions – Dynamic DNS – Extension Headers – Packet Fragmentation – (Secure) Neighbor Discovery and Router Advertisement – End-to-End Transparency

ICMPv6 Security
General – Security Considerations (Threats, Measures) – Neighbor Discovery Problems (Functionality, Threats, Measures) – Router- / Routing specific Problems (Functionality, Threats, Measures)

Further Security Issues in IPv6 Networks
Networking Security Concept - Firewall Filter Rules (Transit Filters, Interface-based Filters) – IPsec – DNSsec – DHCPv6 (Threats, Solutions)

Security Aspects for Migration to IPv6 Transition Mechanisms - Threats in Dual Stack Solutions – Tunneling Technologies and their Security Problems

Summary