Secu3: IPv6 Security

The days of version 4 (IPv4) of the internet protocol will soon be numbered. Many areas are therefore already using version 6 (IPv6) of the internet protocol. Current operating systems often automatically support this protocol without the need for interaction on the part of the user. This situation harbors a danger in that security gaps may occur here. IT officers are often unaware of these security gaps because they do not know about them. Nevertheless, data traffic should be secured with IPv6 in the same way as with IPv4.


Brief introduction to IPv6

  • Introduction to the address schemes and help protocols

Firewalls and IPv6

  • Involuntary gaps in the security system through IPv6

Weaknesses in the internal network

  • Denial-of-service (DoS) attacks
  • Man-in-the-middle attacks
  • Routing attacks

Weaknesses in security mechanisms

  • Bypassing through fragmentation

(Remote) host discovery

Security measures

  • Secure neighbor discovery

Technical requirements

Basic knowledge of IPv4


One day