Security in IPv6
Date | Duration | Presentation |
---|---|---|
November 27 | 60 min |
Summary
This webinar will be divided into two complementary parts. The first will cover the theory of the IPv6 protocol and its relationship with security. The second will adopt a more practical approach and will address the use of Container Lab in filtering labs and mitigating operating system vulnerabilities. This will be followed by ~15 minutes for Q&A.
Part 1
Instructor: Henri A. Godoy
Theory / 20 minutes
- IPv6 header: A comparison with the IPv4 header, highlighting differences and advantages.
- IPSec and encryption: Considerations on the use of IPSec as an integral part of IPv6 for data protection.
- Sweeping and scanning in IPv6: How these techniques work in IPv6 and their impact on security.
- IPv6 network monitoring: Importance of using monitoring tools and methods to ensure network integrity and security.
- Attack mitigation: Strategies for mitigating attacks involving automatic configuration (RA) and use of IPv6-specific Access Control Lists (ACLs).
Part 2
Instructor: Ernesto Sanchez
Hands on labs / 25 minutes
- Container Lab: Creating virtualized environments for security practices and filtering in IPv6 networks.
Case study: Network traffic capture and analysis of IPv6 header fields.
- Real-time threat monitoring: Implementing an NIDS system based on Suricata-Elasticsearch-Kibana in IPv6 environments.
Case study: Configuring custom alert rules in IDS Suricata
- Vulnerability mitigation: Hands-on demonstration of vulnerability mitigation techniques with a focus on IPv6 security. Configuring filters and ACLs on a Nokia SRL Linux device.
Case study: Configuring IPv6 ACLs, filters and logs to mitigate local scanning, common MiTM and DoS attacks.