tailieunhanh - Lecture CCNA security partner - Chapter 6: Securing the Data Plane in IPv6 Environments

This chapter explains the need for IPv6 and presents its fundamental features, as well as enhancements when compared to IPv4. It covers IPv6 addressing scheme, components, and design principles and how routing functions. The chapter then presents potential threats and develops a strategy for IPv6 security. | Securing the Data Plane in IPv6 Environments 1 In this chapter, you learn how to do the following: • Explain the need for IPv6 from the general perspective of the transition to IPv6 from IPv4 • List and describe the fundamental features of IPv6, as well as enhancements when compared to IPv4 • Analyze the IPv6 addressing scheme, components, and design principles and configure IPv6 addressing • Describe the IPv6 routing function • Evaluate how common and specific threats affect IPv6 • Develop and implement a strategy for IPv6 security Contents IPv6 shares some of the same security concerns and considerations as IPv4. Some IPv6-specific vulnerabilities and threats make it unique as it relates to your considerations and strategy to protect IPv6 infrastructures and services. 2 The Need for IPv6 So, What Ever Happened to IPv5? Well, IPv5 never existed. In the late 1970s, a set of protocols were defined to create the Internet Stream Protocol (ST), which was to be used, instead of IP, for . | Securing the Data Plane in IPv6 Environments 1 In this chapter, you learn how to do the following: • Explain the need for IPv6 from the general perspective of the transition to IPv6 from IPv4 • List and describe the fundamental features of IPv6, as well as enhancements when compared to IPv4 • Analyze the IPv6 addressing scheme, components, and design principles and configure IPv6 addressing • Describe the IPv6 routing function • Evaluate how common and specific threats affect IPv6 • Develop and implement a strategy for IPv6 security Contents IPv6 shares some of the same security concerns and considerations as IPv4. Some IPv6-specific vulnerabilities and threats make it unique as it relates to your considerations and strategy to protect IPv6 infrastructures and services. 2 The Need for IPv6 So, What Ever Happened to IPv5? Well, IPv5 never existed. In the late 1970s, a set of protocols were defined to create the Internet Stream Protocol (ST), which was to be used, instead of IP, for streaming. The protocol was never introduced. However, the second iteration of ST (ST-II) used Internet Protocol version 5 to distinguish itself from regular IP. Though ST was never known as IPv5, IETF decided to stay away from this nomenclature to avoid confusion. 3 IPv6 is a powerful enhancement to IPv4. Several features in IPv6 offer functional improvements. What IP developers learned from using IPv4 suggested changes to better suit current and probable network demands: • Larger address space: • Simpler header: • Mobility and security: • Transition richness: IPv6 Features and Enhancements The new IPv6 header is simpler than the IPv4 header, in the following ways: • Half of the previous IPv4 header fields are removed. This enables simpler processing of the packets, enhancing the performance and routing efficiency. • All fields are aligned to 64 bits, which enables direct storage and access in memory by fast lookups. • No checksum occurs at the IP layer, and no recalculation is performed

crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.