Basic Theory Analysis of IPv6 Security Mechanism

Source: Internet
Author: User
Tags secure vpn

IPv6, as the foundation of next-generation networks, is widely recognized with its distinctive technical advantages. IPv6 not only solves the problem of IPv4 address depletion, but also improves the IPv6 Security Mechanism compared with IPv4. However, at the same time, IPv6 has higher requirements on hardware performance.

1. IPv6 Protocol Security

In terms of Protocol Security, IPv6 Security mechanisms fully support authentication headers AH) authentication and encapsulation of Security effective load ESP) Information Security encapsulation extension headers. AH authentication supports hmac_md5_96 and hmac_sha_000096 encryption algorithms. ESP encapsulation supports three algorithms: DES_CBC, 3DES_CBC, and Null.

2. IPv6 Network Security

(1) end-to-end security assurance. Packets are encapsulated by IPSec on both hosts. The intermediate router implements transparent transmission of IPv6 packets with an IPSec extension header to achieve end-to-end security.

(2) confidentiality of internal networks. When the internal host communicates with other hosts on the Internet, the configured IPSec gateway can be used to ensure the security of the internal network. Because IPSec, as the IPv6 extension header, cannot be parsed by the Intermediate router but can only be parsed by the destination node, the IPSec gateway can be implemented through the IPSec tunnel, you can also use the Routing Header provided in the IPv6 extension header and the hop-by-hop option header combined with the application layer gateway technology. The latter is more flexible in implementation, which is conducive to providing comprehensive internal network security, but complicated.

(3) build a secure VPN through a security tunnel. The VPN is implemented through the IPSec tunnel of IPv6. Establishes an IPSec Security Tunnel between routers to form a secure VPN. The IPSec Gateway Router is actually the destination and starting point of the IPSec tunnel. To meet the forwarding performance requirements, the router needs a dedicated encryption board.

(4) Implement Network Security through nested tunnel. Multiple security protection measures can be achieved through tunneling nesting. When a host with IPSec configured is connected to a router with IPSee gateway configured through a secure tunnel and the router is used as the end point of the external tunnel, nested Internal Security tunnels constitute security isolation for internal networks.

3. Other IPv6 Security Mechanisms

IPSec guarantees the validity, consistency, and integrity of network data and information content. However, the security threats of data networks are multidimensional, they are distributed in the physical layer, data link layer, network layer, transmission layer, and application layer.

For security risks of the physical layer, you can configure redundant devices, redundant lines, safe power supply, ensure the electromagnetic compatibility environment, and enhance security management. For security risks at or above the physical layer, the following measures can be taken: use security access control protocols such as AAA, TACACS +, and RADIUS to control users' access permissions to the network to prevent attacks at the application layer; bind the MAC address and IP address, limit the number of MAC addresses used on each port, set the traffic threshold for each port broadcast packet, use the port and VLAN-based ACL, and establish a secure user tunnel to prevent layer-2 attacks. network attacks; the security of L3 networks is enhanced by filtering routes, encrypting and authenticating route information, controlling targeted multicast, improving route convergence speed, and reducing the impact of route oscillation. The complete support of routers and switches for IPSec ensures the validity, consistency and integrity of network data and information content, and provides many solutions for network security.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.