352 KB | 3 files | PDF
This paper begins a series of IPv6 TIPs to assist network defenders with the security implications of IPv6 deployment.
This paper begins a series of IPv6 TIPs to assist network defenders with the security implications of IPv6 deployment. This document will not duplicate existing published documentation concerning the theoretical aspects of IPv6-based network security, but will focus more on the first steps of a “HowTo” for network defenders.
You will find non-vendor-specific provisioning of IPv6-based network traffic filtering via basic types of traffic blocking suggestions, identification of deprecated addresses, a brief discussion on ICMPv6, tunneling, and additional topics to consider when developing an IPv6 implementation strategy.
Implementing IPv6 introduces a myriad of challenges, including providing security at network borders as well as internal controls. By design, IPv6 enables each host’s direct connection to the Internet with a completely routable address.
The attached zip file includes:
This document offers a foundational understanding of IoT based on the realization that IoT involves sensing, computing, communication, and actuation. ... More >>
This chapter excerpt provides an availability primer and details the reasons why you need to be concerned with high availability. ... More >>
Chapter 1.2 focuses on the fundamentals of complex networks and complex network taxonomy and examples. ... More >>