The Security section provides a wide variety of information for individuals and organizations interested in benefitting from the experience of others about planning for, configuring, and deploying secure IPv6 devices and networks.

As was the case with security for Internet Protocol version 4 (IPv4), there are no easy or quick solutions, and many security concerns do not have simple answers. The Internet SOCiety (ISOC) provides comprehensive guidance about this subject on its Deploy360 IPv6 Security web page and also answers Frequently Asked Questions (FAQ) about IPv6 security concerns on their Security FAQ web page. 

This observation from the Network Working Group of the Internet Engineering Task Force (IETF) in Request For Comments (RFC) 4942IPv6 Transition/Coexistence Security Considerations is still valid:

“It is important to understand that deployments are unlikely to be replacing IPv4 with IPv6 (in the short term), but rather will be adding IPv6 to be operated in parallel with IPv4 over a considerable period, so that security issues with transition mechanisms and dual stack networks will be of ongoing concern. This extended transition and coexistence period stems primarily from the scale of the current IPv4 network. It is unreasonable to expect that the many millions of IPv4 nodes will be converted overnight. It is more likely that it will take two or three capital equipment replacement cycles (between nine and 15 years) for IPv6 capabilities to spread through the network, and many services will remain available over IPv4 only for a significant period whilst others will be offered either just on IPv6 or on both protocols.”

Ipv6 and IoT Security Best Practices

Microsoft Windows Internet Connection Sharing (ICS)

Enabling IPv6 in ip6tables and other Linux-based Firewalls

IPv6 and Trusted Internet Connection (TIC) Initiative

Neighbor Discovery Protocol Attacks

Router Configuration Guide for IPv6

Firewall Configuration Guide for IPv6

IPv6 in Microsoft Windows-based Firewalls

IPv6 in Check Point Firewalls

Enabling IPv6 in Juniper Security Products and Firewalls

Enabling IPv6 in Cisco Security Appliances and Firewalls

IPv6 Vulnerability Testing, Penetration Testing, and Vulnerability Remediation

IPsec in IPv6 - The Plain Truth

Enabling IPv6 in Apple macOS, OS-X and Mac OS X-based Firewalls