At the end of this chapter, you should be able to do the following:
Describe how to prevent unauthorized hosts from obtaining automatic Internet Protocol version 6 (IPv6) configuration.
Describe how to provide protection for IPv6 packets.
Describe how to protect IPv6 hosts from address and port scanning attacks.
Describe how to control what traffic is exchanged with the Internet.
Before deploying IPv6 you should be aware of the following aspects of security for IPv6 traffic:
The following sections ...