SECURITY IMPLICATIONS OF IPv6 IT-security Morten Jørgensen2. Semester Network
OverviewWhat is IPv6 and the AdvantagesKey security concerns  What should be doneComparison of IPv4 and IPv6 security Security implications of NAT-free network IPv6 support in network devices and applicationsQuistions
What is IPv6 and the AdvantagesThe Internet Protocol version 4 (IPv4) is the core technology employed in the internet to transfer information from one system to another. To overcome the exhaustion of IPv4 addresses, the Internet Protocol version 6 (IPv6) was developed, with addresses to allow the foreseeable future growth of the internet.The main advantage of IPv6 is that it provides much more address space
Key security concerns IPv6 implementations are much less mature than their IPv4 counterparts making it likely that a number of vulnerabilities will be discovered and mitigated before their robustness matches that of the existing IPv4 implementations. Security products such as firewalls and Network Intrusion Detection Systems have less support for the IPv6 protocols than for their IPv4 counterparts. A number of transition/co-existence technologies have been developed to aid in the deployment of IPv6 and the co-existence of IPv6 with the IPv4 protocol. These technologies will increase complexity which may introduce new attack vectors in existing networks. Technical personnel have less confidence with the IPv6 protocols than with their IPv4 counterparts. This creates an increased likelihood that security implications are overlooked when the protocols are deployed.
What should be doneComplete a risk assessment on how IPv6 and related technologies (such as transition/co-existence technologies) may affect the security of existing IPv4 networks.Develop a transition plan; IPv6 affects every network and there is no ‘do nothing’ option.Ensure that relevant staff, e.g. network engineers and security administrators, are confident with IPv6 and related technologies before they are required to deploy and operate IPv6 in production networks.Work with equipment and application suppliers to improve the robustness of their implementations, such that the robustness of IPv6 implementations roughly matches that of typical IPv4 implementations.
Comparison of IPv4 and IPv6 securityIPv6 protocol suite comprises a number of supporting protocols that are, in general, more complex than IPv4 The purpose of host configuration, IPv6 provides not only DHCPv6 (the equivalent of DHCP for IPv4), but also a mechanism for StateLess Address Auto-Configuration (SLAAC) that introduces a number of attack vectors which were not present in IPv4.
Security implications of NAT-free network Network Address Translators (NAT) provide a number of benefits in a network such as reduced host exposure, host privacy/ masquerading and topology hiding. As IPv6 allows the assignment of at least one ‘public’ address to each device connected to the internet, it is generally claimed or assumed that IPv6 network architectures will not accommodate NAT devices.
IPv6 support in network devices and applications A concern when planning to deploy IPv6 should be the level of IPv6 support (if any) in each of the different network devices. There is ongoing work at the IETF2 to specify a number of desired features for different IPv6 network devices. It is generally the case that there is more support for security features in IPv4 products than in IPv6 products, either in terms of variety of products, variety of features, or performance. Many applications currently do not support IPv6, or have only recently been updated to incorporate support for IPv6.
Questions

More Related Content

PDF
Cisco, Sourcefire and Lancope - Better Together
PPTX
Cisco Connect 2018 Indonesia - Building a secure data center
PDF
10 fn s05
PPTX
Survey on IPv6 security issues
PDF
Using Your Network as a Sensor for Enhanced Visibility and Security
PDF
Cisco Connect Halifax 2018 Accelerating incident response in organizations...
PPTX
Cisco connect winnipeg 2018 we make it simple
PDF
Cisco Connect Halifax 2018 Anatomy of attack
Cisco, Sourcefire and Lancope - Better Together
Cisco Connect 2018 Indonesia - Building a secure data center
10 fn s05
Survey on IPv6 security issues
Using Your Network as a Sensor for Enhanced Visibility and Security
Cisco Connect Halifax 2018 Accelerating incident response in organizations...
Cisco connect winnipeg 2018 we make it simple
Cisco Connect Halifax 2018 Anatomy of attack

What's hot (19)

PPTX
Cisco Connect 2018 Indonesia - Delivering intent for data center networking
PPTX
[Cisco Connect 2018 - Vietnam] Eric rennie sw cisco_connect
PDF
Cisco connect winnipeg 2018 accelerating incident response in organizations...
PDF
The Network as a Sensor, Cisco and Lancope
PDF
Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
PDF
Novosco Zero day protection webinar
PDF
Cisco Connect Halifax 2018 Cisco Spark hybrid services architectural design
PPT
Blug Talk
PDF
Cisco Connect Toronto 2017 - Anatomy-of-attack
PDF
Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco secur...
PDF
Accelerating Digital Leadership
PDF
Cisco Connect Halifax 2018 Putting firepower into the next generation firewall
PDF
Cisco Connect Toronto 2017 - Introducing the Network Intuitive
PPT
Infrastructure2.0 Model Proposal 1 19 10
PPTX
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
PPTX
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIs
PDF
Solving the Visibility Gap for Effective Security
PDF
TechWiseTV Workshop: Programmable ASICs
PDF
Talk2 esc2 muscl-wifi_v1_2b
Cisco Connect 2018 Indonesia - Delivering intent for data center networking
[Cisco Connect 2018 - Vietnam] Eric rennie sw cisco_connect
Cisco connect winnipeg 2018 accelerating incident response in organizations...
The Network as a Sensor, Cisco and Lancope
Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
Novosco Zero day protection webinar
Cisco Connect Halifax 2018 Cisco Spark hybrid services architectural design
Blug Talk
Cisco Connect Toronto 2017 - Anatomy-of-attack
Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco secur...
Accelerating Digital Leadership
Cisco Connect Halifax 2018 Putting firepower into the next generation firewall
Cisco Connect Toronto 2017 - Introducing the Network Intuitive
Infrastructure2.0 Model Proposal 1 19 10
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIs
Solving the Visibility Gap for Effective Security
TechWiseTV Workshop: Programmable ASICs
Talk2 esc2 muscl-wifi_v1_2b
Ad

Similar to It security (20)

DOCX
I pv6
PDF
Presd1 09
PDF
Look at ipv6 security advantages over ipv4
PDF
Non symbolic base64 an effective representation of ipv6 address
PDF
10 fn s05
PPT
Ipv4 vs Ipv6 comparison
PDF
Ipv Technical White Paper Wp111504
PDF
Ipv6 Technical White Paper Wp111504
PDF
Da3210751081
PPT
Enterprise Preparation for IPv6
PPT
Understanding i pv6 2
PDF
Whitepaper what enterprises should do about i pv6 in 2011 cisco_eric.vyncke
PDF
Deploying IPv6 Technology
PDF
C017623133
PDF
Iccns2008 Cp15
PDF
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
PPT
IPv6 for the Enterprise
PPT
Adressing IPv6 strategy
PDF
PPTX
I pv6
Presd1 09
Look at ipv6 security advantages over ipv4
Non symbolic base64 an effective representation of ipv6 address
10 fn s05
Ipv4 vs Ipv6 comparison
Ipv Technical White Paper Wp111504
Ipv6 Technical White Paper Wp111504
Da3210751081
Enterprise Preparation for IPv6
Understanding i pv6 2
Whitepaper what enterprises should do about i pv6 in 2011 cisco_eric.vyncke
Deploying IPv6 Technology
C017623133
Iccns2008 Cp15
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
IPv6 for the Enterprise
Adressing IPv6 strategy
Ad

Recently uploaded (20)

PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PPTX
Modernising the Digital Integration Hub
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PDF
A review of recent deep learning applications in wood surface defect identifi...
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PPT
What is a Computer? Input Devices /output devices
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
Abstractive summarization using multilingual text-to-text transfer transforme...
A proposed approach for plagiarism detection in Myanmar Unicode text
sustainability-14-14877-v2.pddhzftheheeeee
Modernising the Digital Integration Hub
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
A review of recent deep learning applications in wood surface defect identifi...
Chapter 5: Probability Theory and Statistics
Convolutional neural network based encoder-decoder for efficient real-time ob...
A comparative study of natural language inference in Swahili using monolingua...
Hindi spoken digit analysis for native and non-native speakers
Credit Without Borders: AI and Financial Inclusion in Bangladesh
A contest of sentiment analysis: k-nearest neighbor versus neural network
Getting started with AI Agents and Multi-Agent Systems
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
What is a Computer? Input Devices /output devices
Module 1.ppt Iot fundamentals and Architecture
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Abstractive summarization using multilingual text-to-text transfer transforme...

It security

  • 1. SECURITY IMPLICATIONS OF IPv6 IT-security Morten Jørgensen2. Semester Network
  • 2. OverviewWhat is IPv6 and the AdvantagesKey security concerns What should be doneComparison of IPv4 and IPv6 security Security implications of NAT-free network IPv6 support in network devices and applicationsQuistions
  • 3. What is IPv6 and the AdvantagesThe Internet Protocol version 4 (IPv4) is the core technology employed in the internet to transfer information from one system to another. To overcome the exhaustion of IPv4 addresses, the Internet Protocol version 6 (IPv6) was developed, with addresses to allow the foreseeable future growth of the internet.The main advantage of IPv6 is that it provides much more address space
  • 4. Key security concerns IPv6 implementations are much less mature than their IPv4 counterparts making it likely that a number of vulnerabilities will be discovered and mitigated before their robustness matches that of the existing IPv4 implementations. Security products such as firewalls and Network Intrusion Detection Systems have less support for the IPv6 protocols than for their IPv4 counterparts. A number of transition/co-existence technologies have been developed to aid in the deployment of IPv6 and the co-existence of IPv6 with the IPv4 protocol. These technologies will increase complexity which may introduce new attack vectors in existing networks. Technical personnel have less confidence with the IPv6 protocols than with their IPv4 counterparts. This creates an increased likelihood that security implications are overlooked when the protocols are deployed.
  • 5. What should be doneComplete a risk assessment on how IPv6 and related technologies (such as transition/co-existence technologies) may affect the security of existing IPv4 networks.Develop a transition plan; IPv6 affects every network and there is no ‘do nothing’ option.Ensure that relevant staff, e.g. network engineers and security administrators, are confident with IPv6 and related technologies before they are required to deploy and operate IPv6 in production networks.Work with equipment and application suppliers to improve the robustness of their implementations, such that the robustness of IPv6 implementations roughly matches that of typical IPv4 implementations.
  • 6. Comparison of IPv4 and IPv6 securityIPv6 protocol suite comprises a number of supporting protocols that are, in general, more complex than IPv4 The purpose of host configuration, IPv6 provides not only DHCPv6 (the equivalent of DHCP for IPv4), but also a mechanism for StateLess Address Auto-Configuration (SLAAC) that introduces a number of attack vectors which were not present in IPv4.
  • 7. Security implications of NAT-free network Network Address Translators (NAT) provide a number of benefits in a network such as reduced host exposure, host privacy/ masquerading and topology hiding. As IPv6 allows the assignment of at least one ‘public’ address to each device connected to the internet, it is generally claimed or assumed that IPv6 network architectures will not accommodate NAT devices.
  • 8. IPv6 support in network devices and applications A concern when planning to deploy IPv6 should be the level of IPv6 support (if any) in each of the different network devices. There is ongoing work at the IETF2 to specify a number of desired features for different IPv6 network devices. It is generally the case that there is more support for security features in IPv4 products than in IPv6 products, either in terms of variety of products, variety of features, or performance. Many applications currently do not support IPv6, or have only recently been updated to incorporate support for IPv6.