This chapter covers the following subjects:
Comparing IPv4 and IPv6 Security: Describes similarities and differences between securing IPv4 and IPv6 networks
Changing Security Perimeter: Describes how IPv6 can change security architecture models
Creating an IPv6 Security Policy: Details how to create a practical IPv6 corporate security policy
On the Horizon: Describes what to expect in the future with IPv6 security
Consolidated List of Recommendations: Summarizes all the recommendations made in the previous chapters
This book has presented many deeply technical concepts on IPv6 weaknesses and described how they can be strengthened. This chapter wraps up the discussion on IPv6 security. The chapter reviews the similarities ...