IPv6 Mitigation Techniques: A Comprehensive Report

Verified

Added on  2025/05/02

|2
|401
|413
AI Summary
Desklib provides solved assignments and past papers on IPv6 mitigation techniques.
Document Page
IPv6 mitigation techniques methods
IPv6 RA Guard
It can be defined as a security system which is developed and integrated into a system to assist
the network administrator in allowing, blocking, or rejecting router advertisements that are not
required or harmful RA messages that arrives at the entry terminal of the network during the
process of the transaction. During its processing, it analyzes the incoming RA’s and then
segregates the ones that are not sent by authorized network systems. When the RA guard is set in
host mode, it blocks all the incoming messages from various routers via the network. RA guard
requires validation of the message to allow the message to pass into the system.
ACLs
ACLs also known as Access-lists can be defined as a set of protocols and rules which are
developed and integrated into a system to filter the traffic present in a network in order to reduce
or margin attacks present in networks. ACLs defined rules are processed in a serial order to
determine a message or data packets to be considered as safe or hazardous. When rules match the
incoming packets, it will be allowed to enter the system and the rest not defined according to the
rules will be prevented to enter the system.
Firewalls
Firewalls can be defined as a system which is developed for the security of the network. Its main
motive is to use its set of protocols and guidelines stated for security rules to control and monitor
all the outgoing and incoming network traffic in the system to determine the ones to be allowed
or blocked in entering the system.
There are various types of firewalls such as,
Proxy firewall, Next-gen. firewall (NGFW), UTM (Unified threat management) firewall, Stateful
Inspection (SI) firewall, and Threat-focused Next gen. Firewall.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
IPS Layer 2 Security
IPS also called as Intrusion Prevention System is a type of threat/security preventing technology
which is used in examining the traffic flow of a network to detect the bugs and vulnerabilities in
the system that tries to enter the system. The layer 2 security is also similar to IPS methods but
processes a bit differently. Layer 2 security searches the incoming network traffic for checking
the presence of abnormalities and normalizing it before its further processing of inspection. This
process is used in detecting well-known attacks of which the signatures of attack is known and
incorporated in the system.
chevron_up_icon
1 out of 2
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]