The IPv6 protocol suite was designed to accommodate the present and future growth of the Internet, by providing a much larger address space than that of its IPv4 counterpart, and is expected to be the successor of the original IPv4 protocol suite. The imminent exhaustion of the IPv4 address space has resulted in the deployment of IPv6 in a number of production environments, with many other organizations planning to deploy IPv6 in the short or near term. There are a number of factors that make the IPv6 protocol suite interesting from a security standpoint. Firstly, being a new technology, technical personnel has much less confidence with the IPv6 protocols than with their IPv4 counterpart, and thus it is more likely that the security implications of the protocols be overlooked when the protocols are deployed. Secondly, IPv6 implementations are much less mature than their IPv4 counterparts, and thus it is very likely that a number of vulnerabilities will be discovered in them before their robustness matches that of the existing IPv4 implementations. Thirdly, security products such as firewalls and NIDS’s (Network Intrusion Detection Systems) usually have less support for the IPv6 protocols than for their IPv4 counterparts. Fourthly, the security implications of IPv6 transition/co-existence technologies on existing IPv4 networks are usually overlooked, potentially enabling attackers to leverage these technologies to circumvent IPv4 security measures in unexpected ways. The imminent global deployment of IPv6 has created a global need for security professionals with expertise in the field of IPv6 security, such that the aforementioned security issues can be mitigated. While there exist a number of courses and trainings about IPv6 security, they either limit themselves to a high-level overview of IPv6 security, and/or fail to cover a number of key IPv6 technologies (such as transition/co-existence mechanisms) that are vital in all real IPv6 deployment scenarios. ## Learning Objectives This course will provide the attendee with an in-depth training on IPv6 security, such that the attendee is able to evaluate and mitigate the security implications of IPv6 in production environments. The attendee will be given an in-depth explanation of each topic covered in this course, and will learn how each feature can be exploited for malicious purposes. Subsequently, the attendee will be presented with a number of alternatives to mitigate each of the identified vulnerabilities. This course will employ both existing and previously-unreleased tools to evaluate the security of IPv6 networks, and to provide live demos of many IPv6 vulnerabilities. Additionally, the attendee will be given the chance to experiment with these tools in a network laboratory (with the assistance of the trainer), such that the concepts and techniques learned during this course are reinforced with hands-on exercises. ## Who Should Attend Network Engineers, Network Administrators, Security Administrators, Penetration Testers, and Security Professionals in general. ## Participants Are Required To Participants are required to have a good understanding of the IPv4 protocol suite (IPv4, ICMP, etc.) and of related components (routers, firewalls, etc.). Additionally, the attendee is expected to knowledge about basic IPv4 troubleshooting tools, such as: ping, traceroute, and network protocol analyzers (e.g., tcpdump) ## What to bring Attendees willing to perform the hands-on exercises are expected to bring a laptop, and an empty memory stick (of at least 4 GB). The minimum requirements for the laptop are: Intel Core Duo, 1.66 GHz. 1GB of RAM. CD/DVD drive. Ethernet and WI-FI network interface cards. ## Course Length 2 days ## Topics covered by this course • Introduction to IPv6 • IPv6 Addressing Architecture • IPv6 Header Fields • IPv6 Extension Headers • IPv6 Options • IPsec • Internet Control Message Protocol version 6 (ICMPv6) • Neighbor Discovery for IPv6 • Multicast Listener Discovery • Stateless Address Auto-configuration (SLAAC) • Dynamic Host Configuration Protocol version 6 (DHCPv6) • DNS support for IPv6 • IPv6 firewalls • Transition/co-existence technologies (6to4, Teredo, ISATAP, etc.) • Network reconnaissance in IPv6 • Security Implications of IPv6 on IPv4-only networks • IPv6 deployment considerations