IPv6 Security (Networking Technology: Security) and over one million other books are available for Amazon Kindle. Learn more
  • List Price: $64.00
  • Save: $42.62 (67%)
Rented from RentU
To Rent, select Shipping State from options above
Due Date: Dec 18, 2014
FREE return shipping at the end of the semester. Access codes and supplements are not guaranteed with rentals.
Used: Good | Details
Sold by RentU
Condition: Used: Good
Comment: Fast shipping from Amazon! Qualifies for Prime Shipping and FREE standard shipping for orders over $35. Overnight, 2 day and International shipping available! Excellent Customer Service.. May not include supplements such as CD, access code or DVD.
Access codes and supplements are not guaranteed with used items.
Add to Cart
Qty:1
  • List Price: $64.00
  • Save: $13.94 (22%)
Only 7 left in stock (more on the way).
Ships from and sold by Amazon.com.
Gift-wrap available.
Add to Cart
Trade in your item
Get a $9.54
Gift Card.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

IPv6 Security Paperback – December 21, 2008

ISBN-13: 978-1587055942 ISBN-10: 1587055945 Edition: 1st

Buy New
Price: $50.06
Rent
Price: $21.38
24 New from $45.52 22 Used from $31.65
Rent from Amazon Price New from Used from
eTextbook
"Please retry"
Paperback
"Please retry"
$21.38
$50.06
$45.52 $31.65

Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student



Frequently Bought Together

IPv6 Security + IPv6 Fundamentals: A Straightforward Approach to Understanding IPv6 + IPv6 for Enterprise Networks (Networking Technology)
Price for all three: $142.10

Buy the selected items together

NO_CONTENT_IN_FEATURE

Shop the new tech.book(store)
New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

Product Details

  • Paperback: 576 pages
  • Publisher: Cisco Press; 1 edition (December 21, 2008)
  • Language: English
  • ISBN-10: 1587055945
  • ISBN-13: 978-1587055942
  • Product Dimensions: 1.4 x 7.1 x 8.9 inches
  • Shipping Weight: 2 pounds (View shipping rates and policies)
  • Average Customer Review: 4.6 out of 5 stars  See all reviews (5 customer reviews)
  • Amazon Best Sellers Rank: #228,297 in Books (See Top 100 in Books)

Editorial Reviews

About the Author

Scott Hogg, CCIE No. 5133, has been a network computing consultant for more than 17 years. Scott provides network engineering, security consulting, and training services, focusing on creating reliable, high-performance, secure, manageable, and cost-effective network solutions. He has a bachelor’s degree in computer science from Colorado State University and a master’s degree in telecommunications from the University of Colorado. In addition to his CCIE he has his CISSP (No. 4610) and many other vendor and industry certifications. Scott has designed, implemented, and troubleshot networks for many large enterprises, service providers, and government organizations. For the past eight years, Scott has been researching IPv6 technologies. Scott has written several white papers on IPv6 and has given numerous presentations and demonstrations of IPv6 technologies. He is also currently the chair of the Rocky Mountain IPv6 Task Force and the Director of Advanced Technology Services at Global Technology Resources, Inc. (GTRI), a Cisco Gold partner headquartered in Denver, Colorado.

 

Eric Vynckeis a Distinguished System Engineer for Cisco working as a technical consultant for security covering Europe. His main area of expertise for 20 years has been security from Layer 2 to applications. He has helped several organizations deploy IPv6 securely. For the past eight years, Eric has participated in the Internet Engineering Task Force (IETF) (he is the author of RFC 3585). Eric is a frequent speaker at security events (notably Cisco Live [formerly Networkers]) and is also a guest professor at Belgian Universities for security seminars. He has a master’s degree in computer science engineering from the University of Liège in Belgium. He worked as a research assistant in the same university before joining Network Research Belgium, where he was the head of R&D; he then joined Siemens as a project manager for security projects including a proxy firewall. He coauthored the Cisco Press book LAN Switch Security: What Hackers Know About Your Switches. He is CISSP No. 75165.

 

Excerpt. © Reprinted by permission. All rights reserved.

Introduction

Introduction

Internet Protocol version 6 (IPv6) is the next version of the protocol that is used for communications on the Internet. IPv6 is a protocol that has been in existence for many years, but it has not yet replaced IPv4. IPv4 has some limitations that were not anticipated when it was first created. Because IPv6 overcomes many of these limitations, it is the only viable long-term replacement for IPv4.

While the migration to IPv6 has started, it is still in its early stages. Many international organizations already have IPv6 networks, the U.S. federal organizations are working on their transitions to IPv6, and others are contemplating what IPv6 means to them. However, many organizations already have IPv6 running on their networks and they do not even realize it. Many computer operating systems now default to running both IPv4 and IPv6, which could cause security vulnerabilities if one is less secure than the other. IPv6 security vulnerabilities currently exist, and as the popularity of the IPv6 protocol increases, so do the number of threats.

When a security officer wants to secure an organization, he must be aware of all potential threats, even if this threat is a ten-year-old protocol that represents less than 1 percent of the overall Internet traffic in 2008. Don’t be blinded by this 1 percent: This figure is doomed to increase in the coming years, and chances are good that your network is already exposed to some IPv6 threats. It’s better to be safe than sorry.

Just like the early deployment of many technologies, security is often left to the final stages of implementation. Our intent in writing this book is to improve the security of early IPv6 deployments from day one. Any organization considering or already in the midst of transitioning to IPv6 does not want to deploy a new technology that cannot be secured right from the outset. The transition to IPv6 is inevitable, and therefore this book can help you understand the threats that exist in IPv6 networks and give you ways to protect against them. Therefore, this book gives guidance on how to improve the security of IPv6 networks.

Goals and Methods

Currently, many organizations have slowed their migration to IPv6 because they realize that the security products for IPv6 might be insufficient, despite the fact that the network infrastructure is ready to support IPv6 transport. They realize that they cannot deploy IPv6 without first considering the security of this new protocol. This book intends to survey the threats against IPv6 networks and provide solutions to mitigate those threats. It covers the issues and the best current practices.

This book is arranged so that it covers the threats first and then describes ways to combat these threats. By outlining all the risks and showing that a solution exists for each threat, you can feel more comfortable with continuing the transition to IPv6. You learn about techniques attackers might use to breach your networks and what Cisco products to use to protect the networks.

However, showing attacks without solutions is socially irresponsible, so the focus is on the current techniques that are available to make the IPv6 network more secure and on the best current practices.

By reading this book, you can gain an understanding of the full range of IPv6 security topics.

Who Should Read This Book

This book is intended to be read by people in the IT industry who are responsible for securing computer networks. You should already know the basics of the IPv6 protocol and networking technology. This book is not an introduction to IPv6. There are many good books and online resources that can teach you about IPv6, and there are many great books on computer network security.

The intent of this book is to dive deeper into the protocol and discuss the protocol details from a security practitioner’s perspective. It is a book for experts by experts. It covers the theory but at the same time gives practical examples that can be implemented.

How This Book Is Organized

This book starts with a foundation of the security aspects of the IPv6 protocol. The early topics of this book are arranged from the outward perimeter of an organization’s network inward to the LAN and server farms. The later chapters of the book cover advanced topics. This book can be read completely from start to finish; however, if you want to “skip around,” that is fine. You should eventually read every chapter to gain a comprehensive knowledge of the subject matter.

Some of the information (such as tables and commands) in this book is for reference. You should refer back to this book when it comes time to implement. This gives you cookie-cutter examples to follow that should be in line with the best current practices for securing IPv6. However, do not just go through this book and implement every command listed. Perform some of your own basic research on these commands to make sure that they perform exactly what you intend your network to do.

IPv6 security is an incredibly active research area, and new protocols and new products will continually be developed after this book is written. It is our goal that the “shelf life” of this book is many years because the concepts will still be valid even as Cisco security products continue to evolve with the threat landscape. Every effort was made to make this book as current as possible at the time it was published, but you are advised to check whether new methods are available at the time of reading. The IPv6 security field is quickly evolving as IPv6 gets more widely deployed.

Chapters 1 through 12 cover the following topics:

  • Chapter 1, “Introduction to IPv6 Security”: This short chapter reintroduces IPv6, describes how widely it is deployed, discusses its vulnerabilities, and identifies what hackers already know about IPv6. Some initial mitigation techniques are presented.
  • Chapter 2, “IPv6 Protocol Security Vulnerabilities”: This chapter discusses the aspects of the IPv6 protocol itself that have security implications. Security issues related to ICMPv6 and the IPv6 header structure are covered. Demonstrations are conducted that show the protocol vulnerabilities, and solutions are given to mitigate those risks. This chapter also covers security issues of IPv6 network reconnaissance and address spoofing.
  • Chapter 3, “IPv6 Internet Security”: This chapter covers the large-scale threats against the IPv6 Internet and describes perimeter-filtering techniques that can help protect against those threats. Security for BGP peering is detailed in addition to other service provider–focused security practices. IPv6 MPLS security, security of customer equipment, IPv6 prefix delegation, and multihoming are reviewed.
  • Chapter 4, “IPv6 Perimeter Security”: This chapter covers the security threats that exist for perimeter networks that utilize IPv6. The chapter covers common filtering techniques that are deployed at the perimeter of the network. This chapter also covers IPv6 access lists, the IOS Firewall feature set, and the PIX/ASA/FWSM firewalls.
  • Chapter 5, “Local Network Security”: This chapter examines the threats against LANs. Many vulnerabilities exist on IPv6 access networks, and these vulnerabilities are covered along with many solutions for mitigating them. The chapter covers issues related to Neighbor Discovery Protocol, autoconfiguration addressing, and DHCPv6 communications on a LAN. This chapter also reviews SEND and describes how it can be implemented.
  • Chapter 6, “Hardening IPv6 Network Devices”: This chapter covers the security improvements that can be made to a network device running IPv6. Techniques for securing the management of network devices are reviewed. This chapter reviews ways to secure routing protocols and covers first-hop router redundancy protocols. Techniques for controlling the device’s resources are detailed in addition to ways to control network traffic.
  • Chapter 7, “Server and Host Security”: This chapter covers the ways to secure a computer running IPv6. It is important to harden IPv6 nodes from the threats that exist. Microsoft, Linux, BSD, and Solaris operating system IPv6 security techniques are detailed. This chapter covers how host-based firewalls and Cisco Security Agent (CSA) can be used to protect IPv6 hosts.
  • Chapter 8, “IPsec and SSL Virtual Private Networks”: This chapter covers the basics of IPsec. The chapter reviews techniques for setting up site-to-site VPN links using IPv6, dynamic multipoint VPNs, as well as remote-access VPNs. The use of ISATAP over an IPsec client connection and the use of SSL VPNs with AnyConnect client are covered.
  • Chapter 9, “Security for IPv6 Mobility”: This chapter covers Mobile IPv6 and describes how securing this protocol can be challenging. Mobile IPv6 is reviewed, and the security implications are discussed. This chapter gives recommendations on how Mobile IPv6 can be used responsibly and safely. Additional IPv6-capable mobility solutions are covered along with their security implications.
  • Chapter 10, “Securing the Transition Mechanisms”: This chapter discusses the various techniques that are used to help organi...

More About the Author

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

4.6 out of 5 stars
5 star
4
4 star
0
3 star
1
2 star
0
1 star
0
See all 5 customer reviews
Share your thoughts with other customers

Most Helpful Customer Reviews

5 of 5 people found the following review helpful By Richard Bejtlich on August 5, 2009
Format: Paperback
I've read and reviewed three other books on IPv6 in the last four years: "IPv6 Essentials, 2nd Ed" (IE2E) in September 2006, "Running IPv6" (RI) in January 2006, and "IPv6 Network Administration" (INA) in August 2005. All three were five-star books, but they lacked the sort of attention to security that I hoped would be covered one day. IPv6 Security by Scott Hogg and Eric Vyncke is the book for which we have been waiting. Although some of the early "philosophical" security discussions (what's a threat, where are they) are lacking, the overwhelming amount of thorough and actionable content makes this book a winner.

IPv6 Security reminded me of Cisco Router Firewall Security (CRFS) by Richard Deal, which I also liked a lot. CRFS was Cisco-specific and helped readers squeeze all the network-level security features they could from their routers. IPv6 Security is similar, but even better because readers receive guidance for Windows, FreeBSD, Fedora, and even Solaris, in addition to Cisco gear. One note on FreeBSD, however: p 42 says "FreeBSD systems are susceptible to RH0 attacks," although FreeBSD issued a fix in April 2007 with Security Advisory FreeBSD-SA-07:03.ipv6.

In addition to offering configuration guidance for a variety of products, IPv6 Security used Scapy6 to demonstrate various IPv6 traffic types. I liked this approach, although a brief appendix explaining Scapy usage would have been appreciated. The book also covered material I had not seen elsewhere, like shim6 for multihoming. I would have liked some examples of IPv6 NetFlow output, as hinted at in Ch 11. Using SCTP with IPv6, also mentioned in the book, would have been helpful and innovative too.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
1 of 1 people found the following review helpful By D. Molfetas on April 15, 2009
Format: Paperback
This reference explains how to secure an IPv6 network across the major boundaries and potential targets for breaches: LAN, WAN, firewall-perimeter, VPN, and locking down the router. Many of these guidelines are also relevant to an IPv4 infrastructure and this book is a resource for both network and information security specialists who construct and maintain production environments. IPv6 Security encompasses two sets of concepts: the Self Defending Network's Collaboration, Integration, and Adaptability and InfoSec's Confidentiality, Integrity and Availability.

Some noteworthy citations for ensuring security include configuring a WAN BGP session with a Message Digest 5 (MD5) algorithm password and using Secure Neighbor Discovery (SEND) for safeguarding IPv6 layer two addresses. As IPv6 uses named access control lists instead of numbered ACLs, the book explores both access control entries (ACE) and the IPv6 IOS commands in detail. Security is also examined for the IPv6 routing protocols, which include EIGRPv6, RIPng, and OSPFv3. Endpoint and server safeguards are also discussed since BSD, Vista and Windows Server 2008 have IPv6 support incorporated in the operating systems. Since adopting a protection policy is one segment of a secure network, utilities such as Multi-Router Traffic Grapher (MRTG) and CiscoWorks LAN Management Solution are examined for capturing data traffic statistics. Setting a baseline and measuring performance are necessary steps for detecting when a security violation has occurred.

IPv6 Security is a must-read resource for those actively engaged in both IPv6 and security implementation. As IPv6 is in its beginning stages and is incorporated into dual-stack architectures with IPv4, there is much to learn.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
1 of 1 people found the following review helpful By Richard Tucker on January 1, 2009
Format: Paperback
In my quest to learn and transition to IPv6 from IPv4, I learned that you have to have a stable background in learning new materials. IPv6 has been around awhile but now just getting a little more used from many companies and myself. Along with the transition comes concerns with security as IPv4 didn't have much security. With this book [IPv6 Security] the authors took the technology and really explained some very detail and practical aspects of IPv6 with security enhancements. I realyy enjoyed reading this book. The authors did a good job in bringing the IPv6 protocol to the forefront by explaning different parts of the security features like mobile security, running dual stack protocols, IPv6 deployment solutions, address spoofing, and many other network problems. The authors used Cisco products to explain the security mechanisms. they also teach you how to use Cisco IOS® and ASA firewalls and ACLs to filter out IPv6 traffic. This book is one for the ages in describing, explaining, and implementing security in an IPv6 netowrk. Overall the book is great. I gave it a 5 start because of the deep explaining of the IPv6 protocol and security.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
By Fruitcake on March 30, 2012
Format: Kindle Edition Verified Purchase
...overall it is more enterprise-centric than service-provider centric. The e-book is also fairly poorly formatted. I'd bump it to four if it were reformatted.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
Format: Paperback
College-level and advanced software developer's collections will find important IPv6 Security, a survey of security issues identifying all components of modern networks, identifying specific security deficiencies that occur within the IPv6 environment and showing how to correct them. From preventing network attack to monitoring security and understanding large-scale threats and filtering techniques, this is a fine guide advanced software engineers need.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Customer Images

Search

What Other Items Do Customers Buy After Viewing This Item?