He is most free from danger, who, even when safe, is on his guard.
Well, this is it. You've completed your IPv6 transition, or at least your first one, and we're about to part ways. You're now running a heterogeneous network where both protocols are equals and IPv6 is no longer like that weird new kid in school. You can now settle back into your daily network maintenance life, at least until the next transition comes along.
The progression of chapters in this last part of the book focus on your network from its transitory state just after your first IPv6 transition completes through the steady state when you're finally feeling comfortable running the network again. This final chapter talks about tracking your network's configuration and traffic with audit and logging tools. The chapter also discusses keeping your configurations up to date based on what you learn about IPv6 and your needs for it as time goes on and you get more used to running an IPv6 network.
The preceding chapter primarily covered access control, which in data-networking terms means the prevention of unauthorized people, systems, or programs from being able to send or receive traffic to or from some portion of your network and its assets. This chapter covers the third "A" in the old security triple-A mnemonic of Authentication, Access Control, and Audit; in other words, Audit.
In data security circles, the terms ...