IT283_Tina Harvey_Unit 10 Assignment.docx

The data for dos attacks inside and outside the

Info icon This preview shows pages 3–5. Sign up to view the full content.

much harder to trace back. The data for DoS attacks inside and outside the tunnels both show variations from any expected systems benchmark data. TRT (transport relay translators) are vulnerable because they are not able to implement IPSec. 5. In a one page essay explain IPv6 deployment requirements that relate to security. How would you implement IPSec, reduce profiling, etc.? Outline your plan.
Image of page 3

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

IPV4 AND IPV6 4 Now that we’re out of IPv4 allocations, it’s time to get serious about adopting the next generation of Internet Protocol, IPv6. Understanding IPv6 security issues, threats, and defenses is how a number of factors such as a lack of training and limited IPv6 support in security devices, may affect the security of IPv6 network deployments. This will also explain the potential effects of these factors. Aside from the security properties of the IPv6 protocol suite itself the IPsec is a mandatory component for IPv6. The IPsec security model is required to be supported for all IPv6 implementations in near future. Technical and non- technical issues greatly influence the security of emerging IPv6 deployments. Although deploying IPv6 involves a number of security challenges for the IT managers, many of these can be handled in the same way as they have been done for IPv4 (Pawlik, 2012). Most security incidents are due to human error. IPv6 deployment will take some serious consideration. Firstly, I would decide on an addressing schema. For instance, using /64 would take a long time to scan each host on the network for vulnerabilities whiles using /118 would only take minutes. Secondly, I would chose infrastructure hardware wisely. Many vendors state they are IPv6 capable but only support the basic functions. I would chose gateway routers that implement VTI (virtual tunnel interface) to basic functions. I would chose gateway routers that implement VTI (virtual tunnel interface) to provide site-to-site IPv6 IPSec encryption. Stateless addressing can help reduce profiling by
Image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.
  • Fall '15
  • Networking, brief essay, virtual tunnel interface

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern