Sabtu, 23 April 2011

[A826.Ebook] PDF Download IPv6 Security, by Scott Hogg, Eric Vyncke

PDF Download IPv6 Security, by Scott Hogg, Eric Vyncke

Be the very first to download this publication now and also get all factors why you should review this IPv6 Security, By Scott Hogg, Eric Vyncke The book IPv6 Security, By Scott Hogg, Eric Vyncke is not just for your responsibilities or need in your life. Publications will certainly constantly be a good pal in every single time you check out. Now, allow the others learn about this web page. You can take the benefits and also discuss it also for your close friends and also people around you. By this way, you could really get the definition of this book IPv6 Security, By Scott Hogg, Eric Vyncke beneficially. Exactly what do you consider our suggestion right here?

IPv6 Security, by Scott Hogg, Eric Vyncke

IPv6 Security, by Scott Hogg, Eric Vyncke



IPv6 Security, by Scott Hogg, Eric Vyncke

PDF Download IPv6 Security, by Scott Hogg, Eric Vyncke

Exceptional IPv6 Security, By Scott Hogg, Eric Vyncke book is consistently being the very best pal for investing little time in your office, evening time, bus, as well as everywhere. It will certainly be a great way to merely look, open, and also read the book IPv6 Security, By Scott Hogg, Eric Vyncke while because time. As understood, experience as well as skill do not constantly featured the much cash to get them. Reading this publication with the title IPv6 Security, By Scott Hogg, Eric Vyncke will allow you understand more things.

Often, checking out IPv6 Security, By Scott Hogg, Eric Vyncke is really monotonous as well as it will certainly take long time starting from obtaining the book and also start reading. However, in modern-day period, you could take the establishing technology by using the internet. By internet, you can see this web page and start to look for guide IPv6 Security, By Scott Hogg, Eric Vyncke that is required. Wondering this IPv6 Security, By Scott Hogg, Eric Vyncke is the one that you need, you can opt for downloading and install. Have you recognized ways to get it?

After downloading the soft data of this IPv6 Security, By Scott Hogg, Eric Vyncke, you could start to read it. Yeah, this is so pleasurable while somebody needs to check out by taking their big books; you are in your brand-new means by just handle your gizmo. Or perhaps you are working in the workplace; you can still utilize the computer system to check out IPv6 Security, By Scott Hogg, Eric Vyncke totally. Obviously, it will certainly not obligate you to take numerous pages. Merely page by page depending on the time that you need to check out IPv6 Security, By Scott Hogg, Eric Vyncke

After understanding this very simple way to review and also get this IPv6 Security, By Scott Hogg, Eric Vyncke, why do not you inform to others about this way? You could inform others to see this site and opt for searching them preferred books IPv6 Security, By Scott Hogg, Eric Vyncke As known, right here are lots of listings that provide many type of books to collect. Merely prepare few time as well as net connections to obtain guides. You can actually delight in the life by reviewing IPv6 Security, By Scott Hogg, Eric Vyncke in a very basic fashion.

IPv6 Security, by Scott Hogg, Eric Vyncke

IPv6 Security

 

Protection measures for the next Internet Protocol

 

As the world’s networks migrate to the IPv6 protocol, networking professionals need a clearer understanding of the security risks, threats, and challenges this transition presents. In IPv6 Security, two of the world’s leading Internet security practitioners review each potential security issue introduced by IPv6 networking and present today’s best solutions.

 

IPv6 Security offers guidance for avoiding security problems prior to widespread IPv6 deployment. The book covers every component of today’s networks, identifying specific security deficiencies that occur within IPv6 environments and demonstrating how to combat them.

 

The authors describe best practices for identifying and resolving weaknesses as you maintain a dual stack network. Then they describe the security mechanisms you need to implement as you migrate to an IPv6-only network. The authors survey the techniques hackers might use to try to breach your network, such as IPv6 network reconnaissance, address spoofing, traffic interception, denial of service, and tunnel injection.

 

The authors also turn to Cisco® products and protection mechanisms. You learn how to use Cisco IOS® and ASA firewalls and ACLs to selectively filter IPv6 traffic. You also learn about securing hosts with Cisco Security Agent 6.0 and about securing a network with IOS routers and switches. Multiple examples are explained for Windows, Linux, FreeBSD, and Solaris hosts. The authors offer detailed examples that are consistent with today’s best practices and easy to adapt to virtually any IPv6 environment.

 

Scott Hogg, CCIE® No. 5133, is Director of Advanced Technology Services at Global Technology Resources, Inc. (GTRI). He is responsible for setting the company’s technical direction and helping it create service offerings for emerging technologies such as IPv6. He is the Chair of the Rocky Mountain IPv6 Task Force.

 

Eric Vyncke, Cisco Distinguished System Engineer, consults on security issues throughout Europe. He has 20 years’ experience in security and teaches security seminars as a guest professor at universities throughout Belgium. He also participates in the Internet Engineering Task Force (IETF) and has helped several organizations deploy IPv6 securely.

 

  • Understand why IPv6 is already a latent threat in your IPv4-only network
  • Plan ahead to avoid IPv6 security problems before widespread deployment
  • Identify known areas of weakness in IPv6 security and the current state of attack tools and hacker skills
  • Understand each high-level approach to securing IPv6 and learn when to use each
  • Protect service provider networks, perimeters, LANs, and host/server connections
  • Harden IPv6 network devices against attack
  • Utilize IPsec in IPv6 environments
  • Secure mobile IPv6 networks
  • Secure transition mechanisms in use during the migration from IPv4 to IPv6
  • Monitor IPv6 security
  • Understand the security implications of the IPv6 protocol, including issues related to ICMPv6 and the IPv6 header structure
  • Protect your network against large-scale threats by using perimeter filtering techniques and service provider–focused security practices
  • Understand the vulnerabilities that exist on IPv6 access networks and learn solutions for mitigating each

 

 

This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.

 

Category: Networking: Security

Covers: IPv6 Security

 

 

  • Sales Rank: #1068086 in Books
  • Brand: Brand: Cisco Press
  • Published on: 2008-12-21
  • Original language: English
  • Number of items: 1
  • Dimensions: 9.10" h x 1.40" w x 7.40" l, 2.00 pounds
  • Binding: Paperback
  • 576 pages
Features
  • Used Book in Good Condition

From the Back Cover
"IPv6 Security" Protection measures for the next Internet Protocol As the world's networks migrate to the IPv6 protocol, networking professionals need a clearer understanding of the security risks, threats, and challenges this transition presents. In IPv6 Security, two of the world's leading Internet security practitioners review each potential security issue introduced by IPv6 networking and present today's best solutions. "IPv6 Security" offers guidance for avoiding security problems prior to widespread IPv6 deployment. The book covers every component of today's networks, identifying specific security deficiencies that occur within IPv6 environments and demonstrating how to combat them. The authors describe best practices for identifying and resolving weaknesses as you maintain a dual stack network. Then they describe the security mechanisms you need to implement as you migrate to an IPv6-only network. The authors survey the techniques hackers might use to try to breach your network, such as IPv6 network reconnaissance, address spoofing, traffic interception, denial of service, and tunnel injection. The authors also turn to Cisco(R) products and protection mechanisms. You learn how to use Cisco IOS(R) and ASA firewalls and ACLs to selectively filter IPv6 traffic. You also learn about securing hosts with Cisco Security Agent 6.0 and about securing a network with IOS routers and switches. Multiple examples are explained for Windows, Linux, FreeBSD, and Solaris hosts. The authors offer detailed examples that are consistent with today's best practices and easy to adapt to virtually any IPv6 environment. Scott Hogg, CCIE(R) No. 5133, is Director of Advanced Technology Services at Global Technology Resources, Inc. (GTRI). He is responsible for setting the company's technical direction and helping it create service offerings for emerging technologies such as IPv6. He is the Chair of the Rocky Mountain IPv6 Task Force. Eric Vyncke, Cisco Distinguished System Engineer, consults on security issues throughout Europe. He has 20 years' experience in security and teaches security seminars as a guest professor at universities throughout Belgium. He also participates in the Internet Engineering Task Force (IETF) and has helped several organizations deploy IPv6 securely.

  • Understand why IPv6 is already a latent threat in your IPv4-only network
  • Plan ahead to avoid IPv6 security problems before widespread deployment
  • Identify known areas of weakness in IPv6 security and the current state of attack tools and hacker skills
  • Understand each high-level approach to securing IPv6 and learn when to use each
  • Protect service provider networks, perimeters, LANs, and host/server connections
  • Harden IPv6 network devices against attack
  • Utilize IPsec in IPv6 environments
  • Secure mobile IPv6 networks
  • Secure transition mechanisms in use during the migration from IPv4 to IPv6
  • Monitor IPv6 security
  • Understand the security implications of the IPv6 protocol, including issues related to ICMPv6 and the IPv6 header structure
  • Protect your network against large-scale threats by using perimeter filtering techniques and service provider-focused security practices
  • Understand the vulnerabilities that exist on IPv6 access networks and learn solutions for mitigating each
This security book is part of the Cisco Press(R) Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks. Category: Networking: SecurityCovers: IPv6 Security

About the Author

Scott Hogg, CCIE No. 5133, has been a network computing consultant for more than 17 years. Scott provides network engineering, security consulting, and training services, focusing on creating reliable, high-performance, secure, manageable, and cost-effective network solutions. He has a bachelor’s degree in computer science from Colorado State University and a master’s degree in telecommunications from the University of Colorado. In addition to his CCIE he has his CISSP (No. 4610) and many other vendor and industry certifications. Scott has designed, implemented, and troubleshot networks for many large enterprises, service providers, and government organizations. For the past eight years, Scott has been researching IPv6 technologies. Scott has written several white papers on IPv6 and has given numerous presentations and demonstrations of IPv6 technologies. He is also currently the chair of the Rocky Mountain IPv6 Task Force and the Director of Advanced Technology Services at Global Technology Resources, Inc. (GTRI), a Cisco Gold partner headquartered in Denver, Colorado.

 

Eric Vynckeis a Distinguished System Engineer for Cisco working as a technical consultant for security covering Europe. His main area of expertise for 20 years has been security from Layer 2 to applications. He has helped several organizations deploy IPv6 securely. For the past eight years, Eric has participated in the Internet Engineering Task Force (IETF) (he is the author of RFC 3585). Eric is a frequent speaker at security events (notably Cisco Live [formerly Networkers]) and is also a guest professor at Belgian Universities for security seminars. He has a master’s degree in computer science engineering from the University of Liège in Belgium. He worked as a research assistant in the same university before joining Network Research Belgium, where he was the head of R&D; he then joined Siemens as a project manager for security projects including a proxy firewall. He coauthored the Cisco Press book LAN Switch Security: What Hackers Know About Your Switches. He is CISSP No. 75165.

 

Excerpt. © Reprinted by permission. All rights reserved.
Introduction Introduction

Internet Protocol version 6 (IPv6) is the next version of the protocol that is used for communications on the Internet. IPv6 is a protocol that has been in existence for many years, but it has not yet replaced IPv4. IPv4 has some limitations that were not anticipated when it was first created. Because IPv6 overcomes many of these limitations, it is the only viable long-term replacement for IPv4.

While the migration to IPv6 has started, it is still in its early stages. Many international organizations already have IPv6 networks, the U.S. federal organizations are working on their transitions to IPv6, and others are contemplating what IPv6 means to them. However, many organizations already have IPv6 running on their networks and they do not even realize it. Many computer operating systems now default to running both IPv4 and IPv6, which could cause security vulnerabilities if one is less secure than the other. IPv6 security vulnerabilities currently exist, and as the popularity of the IPv6 protocol increases, so do the number of threats.

When a security officer wants to secure an organization, he must be aware of all potential threats, even if this threat is a ten-year-old protocol that represents less than 1 percent of the overall Internet traffic in 2008. Don’t be blinded by this 1 percent: This figure is doomed to increase in the coming years, and chances are good that your network is already exposed to some IPv6 threats. It’s better to be safe than sorry.

Just like the early deployment of many technologies, security is often left to the final stages of implementation. Our intent in writing this book is to improve the security of early IPv6 deployments from day one. Any organization considering or already in the midst of transitioning to IPv6 does not want to deploy a new technology that cannot be secured right from the outset. The transition to IPv6 is inevitable, and therefore this book can help you understand the threats that exist in IPv6 networks and give you ways to protect against them. Therefore, this book gives guidance on how to improve the security of IPv6 networks.

Goals and Methods

Currently, many organizations have slowed their migration to IPv6 because they realize that the security products for IPv6 might be insufficient, despite the fact that the network infrastructure is ready to support IPv6 transport. They realize that they cannot deploy IPv6 without first considering the security of this new protocol. This book intends to survey the threats against IPv6 networks and provide solutions to mitigate those threats. It covers the issues and the best current practices.

This book is arranged so that it covers the threats first and then describes ways to combat these threats. By outlining all the risks and showing that a solution exists for each threat, you can feel more comfortable with continuing the transition to IPv6. You learn about techniques attackers might use to breach your networks and what Cisco products to use to protect the networks.

However, showing attacks without solutions is socially irresponsible, so the focus is on the current techniques that are available to make the IPv6 network more secure and on the best current practices.

By reading this book, you can gain an understanding of the full range of IPv6 security topics.

Who Should Read This Book

This book is intended to be read by people in the IT industry who are responsible for securing computer networks. You should already know the basics of the IPv6 protocol and networking technology. This book is not an introduction to IPv6. There are many good books and online resources that can teach you about IPv6, and there are many great books on computer network security.

The intent of this book is to dive deeper into the protocol and discuss the protocol details from a security practitioner’s perspective. It is a book for experts by experts. It covers the theory but at the same time gives practical examples that can be implemented.

How This Book Is Organized

This book starts with a foundation of the security aspects of the IPv6 protocol. The early topics of this book are arranged from the outward perimeter of an organization’s network inward to the LAN and server farms. The later chapters of the book cover advanced topics. This book can be read completely from start to finish; however, if you want to “skip around,” that is fine. You should eventually read every chapter to gain a comprehensive knowledge of the subject matter.

Some of the information (such as tables and commands) in this book is for reference. You should refer back to this book when it comes time to implement. This gives you cookie-cutter examples to follow that should be in line with the best current practices for securing IPv6. However, do not just go through this book and implement every command listed. Perform some of your own basic research on these commands to make sure that they perform exactly what you intend your network to do.

IPv6 security is an incredibly active research area, and new protocols and new products will continually be developed after this book is written. It is our goal that the “shelf life” of this book is many years because the concepts will still be valid even as Cisco security products continue to evolve with the threat landscape. Every effort was made to make this book as current as possible at the time it was published, but you are advised to check whether new methods are available at the time of reading. The IPv6 security field is quickly evolving as IPv6 gets more widely deployed.

Chapters 1 through 12 cover the following topics:

  • Chapter 1, “Introduction to IPv6 Security”: This short chapter reintroduces IPv6, describes how widely it is deployed, discusses its vulnerabilities, and identifies what hackers already know about IPv6. Some initial mitigation techniques are presented.
  • Chapter 2, “IPv6 Protocol Security Vulnerabilities”: This chapter discusses the aspects of the IPv6 protocol itself that have security implications. Security issues related to ICMPv6 and the IPv6 header structure are covered. Demonstrations are conducted that show the protocol vulnerabilities, and solutions are given to mitigate those risks. This chapter also covers security issues of IPv6 network reconnaissance and address spoofing.
  • Chapter 3, “IPv6 Internet Security”: This chapter covers the large-scale threats against the IPv6 Internet and describes perimeter-filtering techniques that can help protect against those threats. Security for BGP peering is detailed in addition to other service provider–focused security practices. IPv6 MPLS security, security of customer equipment, IPv6 prefix delegation, and multihoming are reviewed.
  • Chapter 4, “IPv6 Perimeter Security”: This chapter covers the security threats that exist for perimeter networks that utilize IPv6. The chapter covers common filtering techniques that are deployed at the perimeter of the network. This chapter also covers IPv6 access lists, the IOS Firewall feature set, and the PIX/ASA/FWSM firewalls.
  • Chapter 5, “Local Network Security”: This chapter examines the threats against LANs. Many vulnerabilities exist on IPv6 access networks, and these vulnerabilities are covered along with many solutions for mitigating them. The chapter covers issues related to Neighbor Discovery Protocol, autoconfiguration addressing, and DHCPv6 communications on a LAN. This chapter also reviews SEND and describes how it can be implemented.
  • Chapter 6, “Hardening IPv6 Network Devices”: This chapter covers the security improvements that can be made to a network device running IPv6. Techniques for securing the management of network devices are reviewed. This chapter reviews ways to secure routing protocols and covers first-hop router redundancy protocols. Techniques for controlling the device’s resources are detailed in addition to ways to control network traffic.
  • Chapter 7, “Server and Host Security”: This chapter covers the ways to secure a computer running IPv6. It is important to harden IPv6 nodes from the threats that exist. Microsoft, Linux, BSD, and Solaris operating system IPv6 security techniques are detailed. This chapter covers how host-based firewalls and Cisco Security Agent (CSA) can be used to protect IPv6 hosts.
  • Chapter 8, “IPsec and SSL Virtual Private Networks”: This chapter covers the basics of IPsec. The chapter reviews techniques for setting up site-to-site VPN links using IPv6, dynamic multipoint VPNs, as well as remote-access VPNs. The use of ISATAP over an IPsec client connection and the use of SSL VPNs with AnyConnect client are covered.
  • Chapter 9, “Security for IPv6 Mobility”: This chapter covers Mobile IPv6 and describes how securing this protocol can be challenging. Mobile IPv6 is reviewed, and the security implications are discussed. This chapter gives recommendations on how Mobile IPv6 can be used responsibly and safely. Additional IPv6-capable mobility solutions are covered along with their security implications.
  • Chapter 10, “Securing the Transition Mechanisms”: This chapter discusses the various techniques that are used to help organizations migrate from IPv4 to IPv6. Dual-stack, tunnel, and NAT migration techniques are covered along with their security issues. Each of these techniques has its own security implications and solutions for securing the traffic. This chapter covers the threats by showing examples of how an attacker might try to infiltrate a network. The security protections that can be used to keep the network safe during migration are also covered.
  • Chapter 11, “Security Monitoring”: This chapter covers the various systems that are currently available to monitor the security of IPv6 networks. Monitoring a network and the computers on the network is a critical aspect of any security practice. IPv6 networks are the same in this regard and must be managed appropriately. The topics of forensics, intrusion detection and prevention, security information management, and configuration management are covered.
  • Chapter 12, “IPv6 Security Conclusions”: This chapter summarizes the common themes discussed throughout the book. Commonalities between IPv4 security and IPv6 security are discussed. This chapter contains discussions about creating IPv6-specific security policies. This chapter also reviews what the future holds for IPv6 security. A consolidated list of IPv6 security recommendations is provided.

© Copyright Pearson Education. All rights reserved.

Most helpful customer reviews

0 of 0 people found the following review helpful.
Decent, but...
By Fruitcake
...overall it is more enterprise-centric than service-provider centric. The e-book is also fairly poorly formatted. I'd bump it to four if it were reformatted.

5 of 5 people found the following review helpful.
The IPv6 security book the world needs
By Richard Bejtlich
I've read and reviewed three other books on IPv6 in the last four years: "IPv6 Essentials, 2nd Ed" (IE2E) in September 2006, "Running IPv6" (RI) in January 2006, and "IPv6 Network Administration" (INA) in August 2005. All three were five-star books, but they lacked the sort of attention to security that I hoped would be covered one day. IPv6 Security by Scott Hogg and Eric Vyncke is the book for which we have been waiting. Although some of the early "philosophical" security discussions (what's a threat, where are they) are lacking, the overwhelming amount of thorough and actionable content makes this book a winner.

IPv6 Security reminded me of Cisco Router Firewall Security (CRFS) by Richard Deal, which I also liked a lot. CRFS was Cisco-specific and helped readers squeeze all the network-level security features they could from their routers. IPv6 Security is similar, but even better because readers receive guidance for Windows, FreeBSD, Fedora, and even Solaris, in addition to Cisco gear. One note on FreeBSD, however: p 42 says "FreeBSD systems are susceptible to RH0 attacks," although FreeBSD issued a fix in April 2007 with Security Advisory FreeBSD-SA-07:03.ipv6.

In addition to offering configuration guidance for a variety of products, IPv6 Security used Scapy6 to demonstrate various IPv6 traffic types. I liked this approach, although a brief appendix explaining Scapy usage would have been appreciated. The book also covered material I had not seen elsewhere, like shim6 for multihoming. I would have liked some examples of IPv6 NetFlow output, as hinted at in Ch 11. Using SCTP with IPv6, also mentioned in the book, would have been helpful and innovative too.

My main issue with IPv6 Security (and it is minor, given this is a five star review) is the inappropriate use of the word "threat" early in the book, and the unnecessary focus on "insider abuse." On p xix the authors say IPv6 is a "threat," and they say threats "exist" in IPv6. IPv6 implementations may introduce vulnerabilities and exposures, but not "threats." On p 8 the authors cite the 2007 CSI/FBI study by saying "59% of all survey respondents suffered from insider abuse of network access." They use that "statistic" to justify saying "the percentage of internal attack sources is likely to be even higher today... The key issue is that most organizations do not spend 50 percent of their security budget on mitigating inside threats." This has nothing to do with IPv6. If it is related to IPv6, reading page 2 of the 2007 CSI/FBI shows that 59% figure means "Insider abuse of network access or e-mail (such as trafficking in pornography or pirated software)". That's hardly the "attack source" the reader should associate with security for IPv4 or IPv6 networks.

Overall, I strongly recommend reading IPv6 Security. There's no other book on the market with the depth of actionable defensive information available.

2 of 2 people found the following review helpful.
IPv6 Security
By D. Molfetas
This reference explains how to secure an IPv6 network across the major boundaries and potential targets for breaches: LAN, WAN, firewall-perimeter, VPN, and locking down the router. Many of these guidelines are also relevant to an IPv4 infrastructure and this book is a resource for both network and information security specialists who construct and maintain production environments. IPv6 Security encompasses two sets of concepts: the Self Defending Network's Collaboration, Integration, and Adaptability and InfoSec's Confidentiality, Integrity and Availability.

Some noteworthy citations for ensuring security include configuring a WAN BGP session with a Message Digest 5 (MD5) algorithm password and using Secure Neighbor Discovery (SEND) for safeguarding IPv6 layer two addresses. As IPv6 uses named access control lists instead of numbered ACLs, the book explores both access control entries (ACE) and the IPv6 IOS commands in detail. Security is also examined for the IPv6 routing protocols, which include EIGRPv6, RIPng, and OSPFv3. Endpoint and server safeguards are also discussed since BSD, Vista and Windows Server 2008 have IPv6 support incorporated in the operating systems. Since adopting a protection policy is one segment of a secure network, utilities such as Multi-Router Traffic Grapher (MRTG) and CiscoWorks LAN Management Solution are examined for capturing data traffic statistics. Setting a baseline and measuring performance are necessary steps for detecting when a security violation has occurred.

IPv6 Security is a must-read resource for those actively engaged in both IPv6 and security implementation. As IPv6 is in its beginning stages and is incorporated into dual-stack architectures with IPv4, there is much to learn. Since information security should always be a consideration, this book offers many examples to consider for protecting the integrity of both the network and data. From a scale of 1-5, this book receives a 5 ranking and I look forward to reading the next book from the authors.

See all 6 customer reviews...

IPv6 Security, by Scott Hogg, Eric Vyncke PDF
IPv6 Security, by Scott Hogg, Eric Vyncke EPub
IPv6 Security, by Scott Hogg, Eric Vyncke Doc
IPv6 Security, by Scott Hogg, Eric Vyncke iBooks
IPv6 Security, by Scott Hogg, Eric Vyncke rtf
IPv6 Security, by Scott Hogg, Eric Vyncke Mobipocket
IPv6 Security, by Scott Hogg, Eric Vyncke Kindle

[A826.Ebook] PDF Download IPv6 Security, by Scott Hogg, Eric Vyncke Doc

[A826.Ebook] PDF Download IPv6 Security, by Scott Hogg, Eric Vyncke Doc

[A826.Ebook] PDF Download IPv6 Security, by Scott Hogg, Eric Vyncke Doc
[A826.Ebook] PDF Download IPv6 Security, by Scott Hogg, Eric Vyncke Doc

Tidak ada komentar:

Posting Komentar