This chapter covers the following subjects:
IPv6 Firewalls: Describes the issues of filtering IPv6 packets at the perimeter
Cisco IOS Router ACLs: Details how to use router ACLs to secure IPv6 networks
Cisco IOS Firewall: Review and demonstration of using CBAC for statefully securing IPv6 traffic
Cisco PIX/ASA/FWSM Firewalls: Using PIX, ASA, and FWSM firewalls to protect IPv6 environments
The security perimeter model is the IT security architecture that most organizations use. The philosophy is to create an impenetrable fortress around the enterprise that prevents all attacks. The perimeter is the first line of defense from external threats. The interior of the perimeter might or might not be fortified, while internal ...