Chapter 16. Maintaining Eternal Vigilance

 

He is most free from danger, who, even when safe, is on his guard.

 
 --Publilius Syrus

Well, this is it. You've completed your IPv6 transition, or at least your first one, and we're about to part ways. You're now running a heterogeneous network where both protocols are equals and IPv6 is no longer like that weird new kid in school. You can now settle back into your daily network maintenance life, at least until the next transition comes along.

What You'll Learn

The progression of chapters in this last part of the book focus on your network from its transitory state just after your first IPv6 transition completes through the steady state when you're finally feeling comfortable running the network again. This final chapter talks about tracking your network's configuration and traffic with audit and logging tools. The chapter also discusses keeping your configurations up to date based on what you learn about IPv6 and your needs for it as time goes on and you get more used to running an IPv6 network.

Logging What You Can't Control

The preceding chapter primarily covered access control, which in data-networking terms means the prevention of unauthorized people, systems, or programs from being able to send or receive traffic to or from some portion of your network and its assets. This chapter covers the third "A" in the old security triple-A mnemonic of Authentication, Access Control, and Audit; in other words, Audit.

In data security circles, the terms ...

Get IPv6 Mandates: Choosing a Transition Strategy, Preparing Transition Plans, and Executing the Migration of a Network to IPv6 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.