Security in IPv6

Date  Duration  Presentation
November 27 60 min PDF

Summary

This webinar will be divided into two complementary parts. The first will cover the theory of the IPv6 protocol and its relationship with security. The second will adopt a more practical approach and will address the use of Container Lab in filtering labs and mitigating operating system vulnerabilities. This will be followed by ~15 minutes for Q&A.

Part 1

Instructor: Henri A. Godoy

Theory / 20 minutes

  • IPv6 header: A comparison with the IPv4 header, highlighting differences and advantages.
  • IPSec and encryption: Considerations on the use of IPSec as an integral part of IPv6 for data protection.
  • Sweeping and scanning in IPv6: How these techniques work in IPv6 and their impact on security.
  • IPv6 network monitoring: Importance of using monitoring tools and methods to ensure network integrity and security.
  • Attack mitigation: Strategies for mitigating attacks involving automatic configuration (RA) and use of IPv6-specific Access Control Lists (ACLs).

Part 2

Instructor: Ernesto Sanchez

Hands on labs / 25 minutes

  • Container Lab: Creating virtualized environments for security practices and filtering in IPv6 networks.

 Case study: Network traffic capture and analysis of IPv6 header fields.

  • Real-time threat monitoring: Implementing an NIDS system based on Suricata-Elasticsearch-Kibana in IPv6 environments.

 Case study: Configuring custom alert rules in IDS Suricata

  • Vulnerability mitigation: Hands-on demonstration of vulnerability mitigation techniques with a focus on IPv6 security. Configuring filters and ACLs on a Nokia SRL Linux device.

Case study: Configuring IPv6 ACLs, filters and logs to mitigate local scanning, common MiTM and DoS attacks.