ABSTRACT

Introduction Th is chapter starts the discussion on IPv6 security, which continues over the chapters that follow. Th e IPv6 features and capabilities described up to now all play a role in the various areas of security concern, potential vulnerabilities, and mitigation approaches. We begin with a short review of traditional fi rewall-based perimeter security and then begin looking at IPv6.