This bulletin summarizes the information presented in NIST Special Publication (SP) 800-119, Guidelines for the Secure Deployment of IPv6. Written by Sheila Frankel of NIST, Richard Graveman of RFG Security, John Pearce of Booz Allen Hamilton and Mark Rooks of L-1 Identity Solutions (formerly of Booz Allen Hamilton), the guide analyzes the expanded services and capabilities that are provided by a new network protocol, IPv6. SP 800-119 examines the differences between IPv6 and the older network protocol IPv4, which IPv6 will replace. The bulletin includes information about the need to replace IPv4 in networked systems, the major features of IPv6, the security issues to be addressed in the deployment of IPv6, and NIST s recommendations for the secure deployment of IPv6. The bulletin provides information about resources that are available to support organizations in their deployment of IPv6.
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-119, Guidelines for the Secure Deployment of IPv6. Written by Sheila Frankel of NIST, Richard Graveman of RFG Security, John Pearce of Booz Allen Hamilton and Mark Rooks of L-1 Identity Solutions (formerly of...
See full abstract
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-119, Guidelines for the Secure Deployment of IPv6. Written by Sheila Frankel of NIST, Richard Graveman of RFG Security, John Pearce of Booz Allen Hamilton and Mark Rooks of L-1 Identity Solutions (formerly of Booz Allen Hamilton), the guide analyzes the expanded services and capabilities that are provided by a new network protocol, IPv6. SP 800-119 examines the differences between IPv6 and the older network protocol IPv4, which IPv6 will replace. The bulletin includes information about the need to replace IPv4 in networked systems, the major features of IPv6, the security issues to be addressed in the deployment of IPv6, and NIST s recommendations for the secure deployment of IPv6. The bulletin provides information about resources that are available to support organizations in their deployment of IPv6.
Hide full abstract
Keywords
Federal Information Processing Standards (FIPS); Federal Information Security Management Act (FISMA); information security; information systems security; Internet; Internet Engineering Task Force (IETF); Internet Protocol (IP); IP headers; IPv4; IPv6; interoperability; network addresses; network connectivity; packet processing; routers; security threats; security management; system vulnerabilities