Team Liquid - Shop now
Add Prime to get Fast, Free delivery
Amazon prime logo
Buy new:
-20% $51.20
FREE delivery Wednesday, December 11
Ships from: Amazon.com
Sold by: Amazon.com
$51.20 with 20 percent savings
List Price: $64.00
FREE Returns
FREE delivery Wednesday, December 11
Or fastest delivery Sunday, December 8. Order within 14 hrs 36 mins
Only 1 left in stock (more on the way).
$$51.20 () Includes selected options. Includes initial monthly payment and selected options. Details
Price
Subtotal
$$51.20
Subtotal
Initial payment breakdown
Shipping cost, delivery date, and order total (including tax) shown at checkout.
Ships from
Amazon.com
Ships from
Amazon.com
Sold by
Amazon.com
Sold by
Amazon.com
Returns
Returnable until Jan 31, 2025
Returnable until Jan 31, 2025
For the 2024 holiday season, eligible items purchased between November 1 and December 31, 2024 can be returned until January 31, 2025.
Returns
Returnable until Jan 31, 2025
For the 2024 holiday season, eligible items purchased between November 1 and December 31, 2024 can be returned until January 31, 2025.
Payment
Secure transaction
Your transaction is secure
We work hard to protect your security and privacy. Our payment security system encrypts your information during transmission. We don’t share your credit card details with third-party sellers, and we don’t sell your information to others. Learn more
Payment
Secure transaction
We work hard to protect your security and privacy. Our payment security system encrypts your information during transmission. We don’t share your credit card details with third-party sellers, and we don’t sell your information to others. Learn more
$29.80
Get Fast, Free Shipping with Amazon Prime FREE Returns
Used - Good. Used books have different signs of use. Carefully inspected to ensure it remains a worthwhile addition on your shelf or backpack. Satisfaction guaranteed or return for a full refund. Your purchase supports a small business. Please note: used books may show signs of wear, such as writing, highlighting, and dust jackets, if still present, may exhibit varying degrees of wear or damage; supplemental materials like CDs, DVDs, access codes, or charts are not included, and all images are stock photos, not the actual item. Used - Good. Used books have different signs of use. Carefully inspected to ensure it remains a worthwhile addition on your shelf or backpack. Satisfaction guaranteed or return for a full refund. Your purchase supports a small business. Please note: used books may show signs of wear, such as writing, highlighting, and dust jackets, if still present, may exhibit varying degrees of wear or damage; supplemental materials like CDs, DVDs, access codes, or charts are not included, and all images are stock photos, not the actual item. See less
FREE delivery Monday, December 16 on orders shipped by Amazon over $35
Or fastest delivery Wednesday, December 11
Only 1 left in stock - order soon.
$$51.20 () Includes selected options. Includes initial monthly payment and selected options. Details
Price
Subtotal
$$51.20
Subtotal
Initial payment breakdown
Shipping cost, delivery date, and order total (including tax) shown at checkout.
Access codes and supplements are not guaranteed with used items.
Kindle app logo image

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.

Read instantly on your browser with Kindle for Web.

Using your mobile phone camera - scan the code below and download the Kindle app.

QR code to download the Kindle App

Follow the author

Something went wrong. Please try your request again later.

IPv6 Security 1st Edition

4.5 4.5 out of 5 stars 16 ratings

{"desktop_buybox_group_1":[{"displayPrice":"$51.20","priceAmount":51.20,"currencySymbol":"$","integerValue":"51","decimalSeparator":".","fractionalValue":"20","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"KbU6pc5Uy3nC1Kvs0wTLDwkqizR%2FSJ0cIQycvrZsV2M0Lx00HCidCVXrY9EyUPdzH4T8%2B%2FDM6b9UkG1dhbLRRIYcGLJ%2Fei%2FWR4EnTvuRmH7vdpxlHfC%2BOMhPIMZbXs57Px2%2BS5%2Bvjto%3D","locale":"en-US","buyingOptionType":"NEW","aapiBuyingOptionIndex":0}, {"displayPrice":"$29.80","priceAmount":29.80,"currencySymbol":"$","integerValue":"29","decimalSeparator":".","fractionalValue":"80","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"KbU6pc5Uy3nC1Kvs0wTLDwkqizR%2FSJ0cgWCk1eQ7oVIlniCzn1AMOLJ%2FMc9DrIMHGS9vTG%2F2nzLv7GzXYD2eXVkJJorVXiKe5AJo3TxcBlaB0LkZ49pyghEFWvY%2BXDWdsSJvMVq58c1NVLmub6ezCiVhsTkUFPjuIJ9X36oZdt00OiBlslR0gw%3D%3D","locale":"en-US","buyingOptionType":"USED","aapiBuyingOptionIndex":1}]}

Purchase options and add-ons

IPv6 Security

Protection measures for the next Internet Protocol

As the world’s networks migrate to the IPv6 protocol, networking professionals need a clearer understanding of the security risks, threats, and challenges this transition presents. In IPv6 Security, two of the world’s leading Internet security practitioners review each potential security issue introduced by IPv6 networking and present today’s best solutions.

IPv6 Security offers guidance for avoiding security problems prior to widespread IPv6 deployment. The book covers every component of today’s networks, identifying specific security deficiencies that occur within IPv6 environments and demonstrating how to combat them.

The authors describe best practices for identifying and resolving weaknesses as you maintain a dual stack network. Then they describe the security mechanisms you need to implement as you migrate to an IPv6-only network. The authors survey the techniques hackers might use to try to breach your network, such as IPv6 network reconnaissance, address spoofing, traffic interception, denial of service, and tunnel injection.

The authors also turn to Cisco® products and protection mechanisms. You learn how to use Cisco IOS® and ASA firewalls and ACLs to selectively filter IPv6 traffic. You also learn about securing hosts with Cisco Security Agent 6.0 and about securing a network with IOS routers and switches. Multiple examples are explained for Windows, Linux, FreeBSD, and Solaris hosts. The authors offer detailed examples that are consistent with today’s best practices and easy to adapt to virtually any IPv6 environment.

Scott Hogg, CCIE® No. 5133, is Director of Advanced Technology Services at Global Technology Resources, Inc. (GTRI). He is responsible for setting the company’s technical direction and helping it create service offerings for emerging technologies such as IPv6. He is the Chair of the Rocky Mountain IPv6 Task Force.

Eric Vyncke, Cisco Distinguished System Engineer, consults on security issues throughout Europe. He has 20 years’ experience in security and teaches security seminars as a guest professor at universities throughout Belgium. He also participates in the Internet Engineering Task Force (IETF) and has helped several organizations deploy IPv6 securely.

  • Understand why IPv6 is already a latent threat in your IPv4-only network
  • Plan ahead to avoid IPv6 security problems before widespread deployment
  • Identify known areas of weakness in IPv6 security and the current state of attack tools and hacker skills
  • Understand each high-level approach to securing IPv6 and learn when to use each
  • Protect service provider networks, perimeters, LANs, and host/server connections
  • Harden IPv6 network devices against attack
  • Utilize IPsec in IPv6 environments
  • Secure mobile IPv6 networks
  • Secure transition mechanisms in use during the migration from IPv4 to IPv6
  • Monitor IPv6 security
  • Understand the security implications of the IPv6 protocol, including issues related to ICMPv6 and the IPv6 header structure
  • Protect your network against large-scale threats by using perimeter filtering techniques and service provider–focused security practices
  • Understand the vulnerabilities that exist on IPv6 access networks and learn solutions for mitigating each

This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.

Category: Networking: Security

Covers: IPv6 Security


Amazon First Reads | Editors' picks at exclusive prices

Editorial Reviews

From the Back Cover

IPv6 Security

Protection measures for the next Internet Protocol

As the world's networks migrate to the IPv6 protocol, networking professionals need a clearer understanding of the security risks, threats, and challenges this transition presents. In IPv6 Security, two of the world's leading Internet security practitioners review each potential security issue introduced by IPv6 networking and present today's best solutions.

IPv6 Security offers guidance for avoiding security problems prior to widespread IPv6 deployment. The book covers every component of today's networks, identifying specific security deficiencies that occur within IPv6 environments and demonstrating how to combat them.

The authors describe best practices for identifying and resolving weaknesses as you maintain a dual stack network. Then they describe the security mechanisms you need to implement as you migrate to an IPv6-only network. The authors survey the techniques hackers might use to try to breach your network, such as IPv6 network reconnaissance, address spoofing, traffic interception, denial of service, and tunnel injection.

The authors also turn to Cisco® products and protection mechanisms. You learn how to use Cisco IOS® and ASA firewalls and ACLs to selectively filter IPv6 traffic. You also learn about securing hosts with Cisco Security Agent 6.0 and about securing a network with IOS routers and switches. Multiple examples are explained for Windows, Linux, FreeBSD, and Solaris hosts. The authors offer detailed examples that are consistent with today's best practices and easy to adapt to virtually any IPv6 environment.

Scott Hogg, CCIE® No. 5133, is Director of Advanced Technology Services at Global Technology Resources, Inc. (GTRI). He is responsible for setting the company's technical direction and helping it create service offerings for emerging technologies such as IPv6. He is the Chair of the Rocky Mountain IPv6 Task Force.

Eric Vyncke, Cisco Distinguished System Engineer, consults on security issues throughout Europe. He has 20 years' experience in security and teaches security seminars as a guest professor at universities throughout Belgium. He also participates in the Internet Engineering Task Force (IETF) and has helped several organizations deploy IPv6 securely.

  • Understand why IPv6 is already a latent threat in your IPv4-only network
  • Plan ahead to avoid IPv6 security problems before widespread deployment
  • Identify known areas of weakness in IPv6 security and the current state of attack tools and hacker skills
  • Understand each high-level approach to securing IPv6 and learn when to use each
  • Protect service provider networks, perimeters, LANs, and host/server connections
  • Harden IPv6 network devices against attack
  • Utilize IPsec in IPv6 environments
  • Secure mobile IPv6 networks
  • Secure transition mechanisms in use during the migration from IPv4 to IPv6
  • Monitor IPv6 security
  • Understand the security implications of the IPv6 protocol, including issues related to ICMPv6 and the IPv6 header structure
  • Protect your network against large-scale threats by using perimeter filtering techniques and service provider–focused security practices
  • Understand the vulnerabilities that exist on IPv6 access networks and learn solutions for mitigating each

This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.

Category: Networking: Security

Covers: IPv6 Security

About the Author

Scott Hogg, CCIE No. 5133, has been a network computing consultant for more than 17 years. Scott provides network engineering, security consulting, and training services, focusing on creating reliable, high-performance, secure, manageable, and cost-effective network solutions. He has a bachelor’s degree in computer science from Colorado State University and a master’s degree in telecommunications from the University of Colorado. In addition to his CCIE he has his CISSP (No. 4610) and many other vendor and industry certifications. Scott has designed, implemented, and troubleshot networks for many large enterprises, service providers, and government organizations. For the past eight years, Scott has been researching IPv6 technologies. Scott has written several white papers on IPv6 and has given numerous presentations and demonstrations of IPv6 technologies. He is also currently the chair of the Rocky Mountain IPv6 Task Force and the Director of Advanced Technology Services at Global Technology Resources, Inc. (GTRI), a Cisco Gold partner headquartered in Denver, Colorado.

Eric Vynckeis a Distinguished System Engineer for Cisco working as a technical consultant for security covering Europe. His main area of expertise for 20 years has been security from Layer 2 to applications. He has helped several organizations deploy IPv6 securely. For the past eight years, Eric has participated in the Internet Engineering Task Force (IETF) (he is the author of RFC 3585). Eric is a frequent speaker at security events (notably Cisco Live [formerly Networkers]) and is also a guest professor at Belgian Universities for security seminars. He has a master’s degree in computer science engineering from the University of Liège in Belgium. He worked as a research assistant in the same university before joining Network Research Belgium, where he was the head of R&D; he then joined Siemens as a project manager for security projects including a proxy firewall. He coauthored the Cisco Press book LAN Switch Security: What Hackers Know About Your Switches. He is CISSP No. 75165.

Product details

  • Publisher ‏ : ‎ Cisco Press; 1st edition (December 11, 2008)
  • Language ‏ : ‎ English
  • Paperback ‏ : ‎ 576 pages
  • ISBN-10 ‏ : ‎ 1587055945
  • ISBN-13 ‏ : ‎ 978-1587055942
  • Item Weight ‏ : ‎ 2.05 pounds
  • Dimensions ‏ : ‎ 7.3 x 1.2 x 9 inches
  • Customer Reviews:
    4.5 4.5 out of 5 stars 16 ratings

About the author

Follow authors to get new release updates, plus improved recommendations.
Scott Hogg
Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.

Scott Hogg is CTO and a co-founder of HexaBuild.io, and IPv6 consulting and training firm. Scott is a CCIE #5133 and CISSP #4610 with over 25 years of network and security experience. Scott actively works on cloud systems, possessing many AWS certifications along with the CCSK and CCSP cloud security certifications. Scott is Chair Emeritus of the Rocky Mountain IPv6 Task Force (RMv6TF), and a member of the Infoblox IPv6 Center of Excellence (COE). Scott has authored the Cisco Press book on IPv6 Security and also writes for NetworkWorld.com.

Customer reviews

4.5 out of 5 stars
16 global ratings

Top reviews from the United States

Reviewed in the United States on April 21, 2015
IP V6 is such an upgrade to security in the architecture itself.
Reviewed in the United States on March 30, 2012
...overall it is more enterprise-centric than service-provider centric. The e-book is also fairly poorly formatted. I'd bump it to four if it were reformatted.
Reviewed in the United States on April 15, 2009
This reference explains how to secure an IPv6 network across the major boundaries and potential targets for breaches: LAN, WAN, firewall-perimeter, VPN, and locking down the router. Many of these guidelines are also relevant to an IPv4 infrastructure and this book is a resource for both network and information security specialists who construct and maintain production environments. IPv6 Security encompasses two sets of concepts: the Self Defending Network's Collaboration, Integration, and Adaptability and InfoSec's Confidentiality, Integrity and Availability.

Some noteworthy citations for ensuring security include configuring a WAN BGP session with a Message Digest 5 (MD5) algorithm password and using Secure Neighbor Discovery (SEND) for safeguarding IPv6 layer two addresses. As IPv6 uses named access control lists instead of numbered ACLs, the book explores both access control entries (ACE) and the IPv6 IOS commands in detail. Security is also examined for the IPv6 routing protocols, which include EIGRPv6, RIPng, and OSPFv3. Endpoint and server safeguards are also discussed since BSD, Vista and Windows Server 2008 have IPv6 support incorporated in the operating systems. Since adopting a protection policy is one segment of a secure network, utilities such as Multi-Router Traffic Grapher (MRTG) and CiscoWorks LAN Management Solution are examined for capturing data traffic statistics. Setting a baseline and measuring performance are necessary steps for detecting when a security violation has occurred.

IPv6 Security is a must-read resource for those actively engaged in both IPv6 and security implementation. As IPv6 is in its beginning stages and is incorporated into dual-stack architectures with IPv4, there is much to learn. Since information security should always be a consideration, this book offers many examples to consider for protecting the integrity of both the network and data. From a scale of 1-5, this book receives a 5 ranking and I look forward to reading the next book from the authors.
2 people found this helpful
Report
Reviewed in the United States on January 2, 2009
In my quest to learn and transition to IPv6 from IPv4, I learned that you have to have a stable background in learning new materials. IPv6 has been around awhile but now just getting a little more used from many companies and myself. Along with the transition comes concerns with security as IPv4 didn't have much security. With this book [IPv6 Security] the authors took the technology and really explained some very detail and practical aspects of IPv6 with security enhancements. I realyy enjoyed reading this book. The authors did a good job in bringing the IPv6 protocol to the forefront by explaning different parts of the security features like mobile security, running dual stack protocols, IPv6 deployment solutions, address spoofing, and many other network problems. The authors used Cisco products to explain the security mechanisms. they also teach you how to use Cisco IOS® and ASA firewalls and ACLs to filter out IPv6 traffic. This book is one for the ages in describing, explaining, and implementing security in an IPv6 netowrk. Overall the book is great. I gave it a 5 start because of the deep explaining of the IPv6 protocol and security.
One person found this helpful
Report

Top reviews from other countries

Jason Murray
3.0 out of 5 stars Ageing but still worth it.
Reviewed in Canada on March 17, 2013
Is this the book for you? The foreword claims it is "for experts by experts." It also says it is not an introduction to IPv6. Having read it I can also tell you it's not an introduction to networking in general. You'll need to have a high level of familiarity with internetworking technologies, particularly IP related ones, to get the most out of this book. This book is also not an introduction to information security; it assumes you are well versed in the CIA triad, MitM attacks, DoS etc.

You might be concerned that this book is from 2009, just over 4 years ago. But it was one of the more recent books on the topic I could find. Not to fear though, it is more than current enough for dealing with IPv6 security. After all IPv6 has been in development for over a decade and has a lot of teting in the field, even if we haven't seen it very much in North America.

So is this book for you? If you are well versed in information security and networking, yes. If not you may find the concepts and examples difficult to understand. Fortunately there are many references to the related RFCs and other supporting (Cisco Press) titles that you can refer to, to gain the knowledge necessary.

The Good:
The book is very thorough. It covers a lot of ground and tackles not just the core protocols: IPv6 and ICMPv6. It tackles all the bits of "glue" that are used to run a network as well. Things like RIPNG, OSPFv6, IS-IS, BGP, DHCPv6, etc.

It covers what vulnerabiliteis from the IPv4 universe will no longer be an issue (e.g. dense vs. sparse address space and the impact on network scanning), it covers what vulnerabilities remain but are updated for the new IPv6 universe (the latent threat of having dual stack hosts but only protecting IPv4), and it covers that new issues that IPv6 raises (Mobile IP attacks, lack of NAT).

The Bad:
Being a Cisco Press book it should be expected that coverage of Cisco products would be high. But pretty much every example is covered only as a Cisco configuration example. There are some Linux based examples, but no Windows examples, or Mac OS X. Certainly nothing from a network equipment competitor like Juniper.

Speaking of RFCs, I didn't count the total number referenced, but did make note of 25 of them that I want to read to fully understand the topics under discussion. They range from the definition of IPCMv6 to "Security Considerations for 6to4." I realize the book expects you to have a high level of expertise in networking, but too often they provide a high level gloss over of a topic and refer you to the RFC.

The Ugly:
Denial of Service gets a lot of play in this book. As infrastructure people I suppose that is understandable, but there is more threat to a network than just attackers affecting the availability of your network. What about the confidentiality and integrity aspect of a MitM attack? That's covered in some instances, but not in enough circumstance or enough detail.

What I learned:

* NAT is not used in IPv6. With the ease and availability of addresses you no longer need RFC1918 address, nor NAT to overload your publicly routable addresses. So all of you out there who rely on NAT as part of your security architecture will have to adapt and learn to write proper ingress/egress/firewall filters. This is a good thing in my opinion as you will want to get good at this as we move to the deperimeterized future.
* ICMPv6 and multicast will be a big deal, particularly in the local network. ICMP is no longer just a companion protocol that is nice to have and allows your to ping things. It is an integral part of how you'll operate a IPv6 network. You won't be able to just simply disallow all ICMP, you will have to carefully tune what is allowed (or not) at each security perimeter. The wonder of autoconfiguration relies on a number of ICMPv6 messages, and multicast. We will have to get used to it, where most of us from back in the IPv4 days don't have a ton of experience with it.
* IPv6 is a "latent" threat. It is already here on most of our equipment. All current versions of common OSes are already running a dual stack with IPv6 ready to go. If you have a router advertising a prefix then you have probably got outbound unfiltered IPv6, and possibly inbound as well. Are you sure you have your 6to4 turned off? Toredo on your Windows hosts? Have you accounted for the fact that all your IPv4 services and apps are maybe now also offered on IPv6? Are your traditional network defenses able to understand IPv6? Will they provide protection on par with IPv4? You don't want IPv6 to be the weak link in your security chain do you?
* It's best to get out front of this and not repeat the errors of the past. Dont repeat the tactical errors of the WLAN days where you outlawed it and hoped you wouldn't have to deal with it. You eventually did, and by then you were playing catchup. But I suppose if you're reading a book on IPv6 security in 2013 and you have enterprise network responipsibilities you're already playing catchup.
Amazon Customer
5.0 out of 5 stars A good read in spite of the Cisco-centricity
Reviewed in the United Kingdom on January 3, 2010
I had the opportunity to read this book along with one claiming to be the first practical primer on the subject. Unfortunately for the practical primer, my opinion is that this book is doing a much better job at being just that. The language is easy even for a non-native like me, the layout of the book makes it easy to grasp both the IPv6 protocol, the quirks and the security issues. I have yet to find a quirk described without providing ideas on how it can be used in an attack as well as providing countermeasures and a discussion on potential problems.

The book begins with a short ipv6 recap, then covers protocol issues, perimeter issues, internal and external routing issues, host firewalling, IPsec/SSL/VPN issues, mobility, issues related to transition from ipv4, monitoring and more, all in great detail, while providing helpful hints on how to test and fix issues.

The texts are very in depth but still self contained, eliminating the need to read up on the subject in other books.

The index is 25 pages and grouped on two levels to make searching easy.

The book is a bit thin on figures (although figures have been used where needed to provide insight into the subject being written about) and there are screen dumps that have not fared well in print making them hard to read. Fortunately the screen dumps are mainly to show configuration in Cisco routers, so to the rest of us using other hardware no damage is done. A substantial portion of the book consists on hands-on how to - if you are using cisco equipment, which I am not, so I can not really review the quality of those how-to's.

At the time this is my favourite book on the subject in spite of being so centered on Cisco hardware. The reason for this is that it is written in such a way that non-cisco users still get a good feel for the underlying mechanisms, the problems and in what way they should be solved. Even the passages describing very specific cisco configuration are written so they provide enough information as to be useful in other environments.

If you are running IPv6 and want to read up on security, don't be turned off by it being marketed as for Cisco users, the remaining part of the book is well worth the price. The authors have a wealth of knowledge on the subject, are not afraid to share and in a form that is easy to read.