• Home
  • Who We Are
    • Strategic Plan
    • Our Vision and Mission
    • Program History
    • Program Governance
      • HPCMP Leadership
      • Executive Steering Group (ESG)
      • HPC Advisory Panel (HPCAP)
      • User Advocacy Group (UAG)
  • Solution Areas
    • Computation Centers
    • Networking
      • Forms and Agreements
        • DREN Service Agreement (DSA)
        • Outreach Service Agreement (OSA)
        • SDREN Connection Approval Process (CAP)
        • Ports and Protocols and Services Management
        • HPC Cybersecurity Service Provider (CSSP) Validation Form
        • SDREN Email SAAR
      • DREN/SDREN Network Capabilities and Technical Overview
        • DREN Performance Work Statement
      • Networking Services
      • Networking Policies
      • Customer Support
      • IPv6 Knowledge Base
        • IPv6 Knowledge Base: General Information
          • IPv6 Knowledge Base Initial Introduction
          • IPv6 Not Needed Here!?!
          • United States (US) IPv6 and IoT Policy, Guidance, and Best Practices
          • Non-United States IPv6 and IoT Policy, Guidance, and Best Practices
          • Overview of Lessons Learned Deploying IPv6
          • IPv6 and IoT Networking Standards
          • IPv6 and IoT Points of Contact
        • IPv6 Knowledge Base: Deployment
          • Before You Begin
          • Overview of Process
          • IPv6 Boiler Plate Acquisitions Language
          • IPv6 Training and Learning
          • IPv6 Transition Mechanisms
          • IPv6 Software
          • IPv6 in the Home and Small Office/Home Office (SOHO)
        • IPv6 Knowledge Base: IP Transport
          • Enabling IPv6 in Apple macOS, OS X and Mac OS X
          • Enabling IPv6 in Cisco Routers and Layer-3 Switches
          • Enabling IPv6 in Extreme Networks Routers and Layer-3 Switches
          • Enabling IPv6 in Juniper Routers and Layer-3 Switches
          • Enabling IPv6 in Microsoft Windows 7 and earlier Versions
          • Enabling IPv6 in Microsoft Windows 8 and later Versions
          • Enabling IPv6 in Nokia Routers and Layer-3 Services Devices
          • Disabling IPv6 in Apple macOS, OS X and Mac OS X
          • Disabling IPv6 in Microsoft Windows 7 and earlier Versions
          • Disabling IPv6 in Microsoft Windows 8 and later Versions
          • IPv6 in Debian and Ubuntu Linux
          • IPv6 in FreeBSD Unix
          • IPv6 in IBM AIX, i, z/OS and z/VM
          • IPv6 in NetBSD Unix
          • IPv6 in OpenBSD Unix
          • IPv6 in Oracle Solaris
          • IPv6 in Red Hat, Mandrake, Fedora and CentOS Linux
          • IPv6 in openSUSE Linux and SUSE Linux Enterprise Server (SLES)
        • IPv6 Knowledge Base: Infrastructure
          • Cloud Computing using IPv6
          • IPv6 and Virtual Private Networks (VPNs)
          • Enabling IPv6 in Microsoft Windows Application Servers
          • DHCP and SLAAC on IPv6 Networks
          • IPv6 and Microsoft IIS Web Server
          • IPv6 and Sendmail
          • IPv6, Samba, and CIFS
          • IPv6 and Apache Web Server
          • IPv6 and Nginx Web Server
          • IPv6 and Postfix SMTP Server
          • IPv6 and PTR Records
          • IPv6 and DNS Hierarchy
          • Enabling IPv6 in DNS Servers
          • Multicast on IPv6 Networks
          • IPv6 and PHP
        • IPv6 Knowledge Base: Network Management
          • Where to Get IPv6 Addresses
          • IPv6 Address Plans
          • Network Management Recommendations
          • Wide-area Network Deployment
          • IPv6 Troubleshooting
        • IPv6 Knowledge Base: Security
          • Ipv6 and IoT Security Best Practices
          • Microsoft Windows Internet Connection Sharing (ICS)
          • Enabling IPv6 in ip6tables and other Linux-based Firewalls
          • IPv6 and Trusted Internet Connection (TIC) Initiative
          • Neighbor Discovery Protocol Attacks
          • Router Configuration Guide for IPv6
          • Firewall Configuration Guide for IPv6
          • IPv6 in Microsoft Windows-based Firewalls
          • IPv6 in Check Point Firewalls
          • Enabling IPv6 in Juniper Security Products and Firewalls
          • Enabling IPv6 in Cisco Security Appliances and Firewalls
          • IPv6 Vulnerability Testing, Penetration Testing, and Vulnerability Remediation
          • IPsec in IPv6 - The Plain Truth
          • Enabling IPv6 in Apple macOS, OS X and Mac OS X-based Firewalls
        • IPv6 Knowledge Base: Applications
          • Application Conversion Introduction
          • Application Conversion Tools
          • IPv6 and Google Chrome
          • IPv6 and Opera
          • IPv6 and Microsoft Edge or Internet Explorer
          • Kerberos IPv6 Status
          • IPv6 and Java Applications
          • IPv6 and Mozilla Firefox
          • IPv6 and Apple Safari
        • IPv6 Knowledge Base: Testing
          • IPv6 Network Testing Results
          • IPv6 Product Testing Results
          • IPv6 Test Techniques
          • Simple Packet Translator (SPT)
        • IPv6 Knowledge Base: IPv6 and IoT Frequently Asked Questions
          • Purpose and Structure of the IPv6 Knowledge Base
          • Additional IPv6 Websites
          • Additional Information about IoT and Smart Cities
          • Available IPv6 Internet Service Providers (ISPs) and Networks
          • Available IPv6 Cell Phones and Wireless Carriers
          • Available IPv6 Social Media Websites and Apps
          • US Federal Government Organizations IPv6 Deployment
          • Other US Organizations and foreign countries IPv6 Deployment
          • Impact of IPv6 on Software Development
          • Available IPv6 Content Delivery Network (CDN) Providers
          • Content and Applications Delivery Over IPv6
          • Free Open-Source Internet of Things (IoT) Software
      • SDN Knowledge Base
        • Software-Defined Overview
        • SDN Policy, Guidance, and Best Practices
        • SDN Lessons Learned, Training, and Testing
        • SDN Points of Contact
        • SDN Knowledge Base: Frequently Asked Questions
          • Structure of the SDN Knowledge Base
          • Additional SDN Websites
          • What is Software-Defined Networking (SDN) and why does it matter?
          • What is Network Functions Virtualization (NFV) and why does it matter?
          • Some Solutions To Rapidly Deploy SDN On Existing Networks
          • SDN and NFV: what's the difference?
          • What do Anything-as-a-Service (XaaS) and similar terms mean?
          • Free Open-Source Software-Defined Networking (SDN) Software
      • DREN Technical Interchange Meetings (TIM) (DoD PKI Required)
      • DREN User Forum Information (DoD PII Required)
      • DREN Technical Advisory Panel (TAP) Information (DoD PKI Required)
      • Hawaii Intranet Consortium (HIC) Information (DoD PKI Required)
    • Software
      • User Productivity Enhancement and Training (PET)
      • Computational Research and Engineering Acquisition Tools and Environments (CREATE)
        • CREATE-AV (Air Vehicles)
        • CREATE-GV (Ground Vehicles)
        • CREATE-RF (Radio Frequency)
        • CREATE-SH (Ships)
        • CREATE Capstone
        • CREATE Sage
        • Contact Us
      • The Data Analysis and Visualization (DAV) Center
    • Resource Management
      • High Priority Projects
      • Portal to the Information Environment (pIE)
      • Service/Agency Approval Authorities (S/AAA)
      • Dedicated Support Partition (DSP) Requests
      • Acquisition and Mission Engineering Projects
    • Security
      • Defensive Cyberspace Operations
      • Cybersecurity Program Management
    • Training
    • Workforce Development
    • Technology Areas
      • Computational Structural Mechanics (CSM)
      • Computational Fluid Dynamics (CFD)
      • Computational Chemistry, Biology, and Materials Science (CCM)
      • Computational Electromagnetics and Acoustics (CEA)
      • Climate/Weather/Ocean Modeling and Simulation (CWO)
      • Signal/Image Processing (SIP)
      • Forces Modeling and Simulation (FMS)
      • Electronics, Networking, and Systems/C4I (ENS)
      • Environmental Quality Modeling and Simulation (EQM)
      • Integrated Modeling and Test Environments (IMT)
      • Space and Astrophysical Sciences (SAS)
      • Data and Decision Analytics (DDA)
  • User Portal
    • For New Users
    • Users Resources
    • Visit Requests
  • Calls
    • FY26 Solicitation for Interest in Submitting DHPI Proposals
    • Call for DoD HPCMP Acquisition Engineering Project Requests
    • Call for Dedicated Support Partition (DSP) Requests
    • CALL for UGM Abstracts
    • Call for FY 2025 DoD Frontier Project Proposals
    • Call for FY 2024 Frontier Project Proposals
    • Call for FY23 DoD HPCMP Institute Proposals
    • Call for 2023 DHPI Proposals
    • Call for FY 2022 DoD Dedicated HPC Project Investment (DHPI) Proposals
    • 2022 Call for Mentor Proposals for the HPC Internship Program (HIP)
    • Call for FY 2022 Frontier Project Proposals
    • 2022 HPCMP Hero Awards Call for Nominations
    • 2024 HPCMP Hero Awards Call for Nominations
    • High Performance Computing Internship Program (HIP) for Summer 2023
    • HPCMP AI and ML Workshop June 2024
  • Success Stories
  1. Home
  2. Solution Areas
  3. Networking
  4. IPv6 Knowledge Base
  5. IPv6 Knowledge Base: Infrastructure
  6. Cloud Computing using IPv6
  7. Uncategorised
  • Computation Centers
  • Networking
    • Forms and Agreements
      • DREN Service Agreement (DSA)
      • Outreach Service Agreement (OSA)
      • SDREN Connection Approval Process (CAP)
      • Ports and Protocols and Services Management
      • HPC Cybersecurity Service Provider (CSSP) Validation Form
      • SDREN Email SAAR
    • DREN/SDREN Network Capabilities and Technical Overview
      • DREN Performance Work Statement
    • Networking Services
    • Networking Policies
    • Customer Support
    • IPv6 Knowledge Base
      • IPv6 Knowledge Base: General Information
        • IPv6 Knowledge Base Initial Introduction
        • IPv6 Not Needed Here!?!
        • United States (US) IPv6 and IoT Policy, Guidance, and Best Practices
        • Non-United States IPv6 and IoT Policy, Guidance, and Best Practices
        • Overview of Lessons Learned Deploying IPv6
        • IPv6 and IoT Networking Standards
        • IPv6 and IoT Points of Contact
      • IPv6 Knowledge Base: Deployment
        • Before You Begin
        • Overview of Process
        • IPv6 Boiler Plate Acquisitions Language
        • IPv6 Training and Learning
        • IPv6 Transition Mechanisms
        • IPv6 Software
        • IPv6 in the Home and Small Office/Home Office (SOHO)
      • IPv6 Knowledge Base: IP Transport
        • Enabling IPv6 in Apple macOS, OS X and Mac OS X
        • Enabling IPv6 in Cisco Routers and Layer-3 Switches
        • Enabling IPv6 in Extreme Networks Routers and Layer-3 Switches
        • Enabling IPv6 in Juniper Routers and Layer-3 Switches
        • Enabling IPv6 in Microsoft Windows 7 and earlier Versions
        • Enabling IPv6 in Microsoft Windows 8 and later Versions
        • Enabling IPv6 in Nokia Routers and Layer-3 Services Devices
        • Disabling IPv6 in Apple macOS, OS X and Mac OS X
        • Disabling IPv6 in Microsoft Windows 7 and earlier Versions
        • Disabling IPv6 in Microsoft Windows 8 and later Versions
        • IPv6 in Debian and Ubuntu Linux
        • IPv6 in FreeBSD Unix
        • IPv6 in IBM AIX, i, z/OS and z/VM
        • IPv6 in NetBSD Unix
        • IPv6 in OpenBSD Unix
        • IPv6 in Oracle Solaris
        • IPv6 in Red Hat, Mandrake, Fedora and CentOS Linux
        • IPv6 in openSUSE Linux and SUSE Linux Enterprise Server (SLES)
      • IPv6 Knowledge Base: Infrastructure
        • Cloud Computing using IPv6
        • IPv6 and Virtual Private Networks (VPNs)
        • Enabling IPv6 in Microsoft Windows Application Servers
        • DHCP and SLAAC on IPv6 Networks
        • IPv6 and Microsoft IIS Web Server
        • IPv6 and Sendmail
        • IPv6, Samba, and CIFS
        • IPv6 and Apache Web Server
        • IPv6 and Nginx Web Server
        • IPv6 and Postfix SMTP Server
        • IPv6 and PTR Records
        • IPv6 and DNS Hierarchy
        • Enabling IPv6 in DNS Servers
        • Multicast on IPv6 Networks
        • IPv6 and PHP
      • IPv6 Knowledge Base: Network Management
        • Where to Get IPv6 Addresses
        • IPv6 Address Plans
        • Network Management Recommendations
        • Wide-area Network Deployment
        • IPv6 Troubleshooting
      • IPv6 Knowledge Base: Security
        • Ipv6 and IoT Security Best Practices
        • Microsoft Windows Internet Connection Sharing (ICS)
        • Enabling IPv6 in ip6tables and other Linux-based Firewalls
        • IPv6 and Trusted Internet Connection (TIC) Initiative
        • Neighbor Discovery Protocol Attacks
        • Router Configuration Guide for IPv6
        • Firewall Configuration Guide for IPv6
        • IPv6 in Microsoft Windows-based Firewalls
        • IPv6 in Check Point Firewalls
        • Enabling IPv6 in Juniper Security Products and Firewalls
        • Enabling IPv6 in Cisco Security Appliances and Firewalls
        • IPv6 Vulnerability Testing, Penetration Testing, and Vulnerability Remediation
        • IPsec in IPv6 - The Plain Truth
        • Enabling IPv6 in Apple macOS, OS X and Mac OS X-based Firewalls
      • IPv6 Knowledge Base: Applications
        • Application Conversion Introduction
        • Application Conversion Tools
        • IPv6 and Google Chrome
        • IPv6 and Opera
        • IPv6 and Microsoft Edge or Internet Explorer
        • Kerberos IPv6 Status
        • IPv6 and Java Applications
        • IPv6 and Mozilla Firefox
        • IPv6 and Apple Safari
      • IPv6 Knowledge Base: Testing
        • IPv6 Network Testing Results
        • IPv6 Product Testing Results
        • IPv6 Test Techniques
        • Simple Packet Translator (SPT)
      • IPv6 Knowledge Base: IPv6 and IoT Frequently Asked Questions
        • Purpose and Structure of the IPv6 Knowledge Base
        • Additional IPv6 Websites
        • Additional Information about IoT and Smart Cities
        • Available IPv6 Internet Service Providers (ISPs) and Networks
        • Available IPv6 Cell Phones and Wireless Carriers
        • Available IPv6 Social Media Websites and Apps
        • US Federal Government Organizations IPv6 Deployment
        • Other US Organizations and foreign countries IPv6 Deployment
        • Impact of IPv6 on Software Development
        • Available IPv6 Content Delivery Network (CDN) Providers
        • Content and Applications Delivery Over IPv6
        • Free Open-Source Internet of Things (IoT) Software
    • SDN Knowledge Base
      • Software-Defined Overview
      • SDN Policy, Guidance, and Best Practices
      • SDN Lessons Learned, Training, and Testing
      • SDN Points of Contact
      • SDN Knowledge Base: Frequently Asked Questions
        • Structure of the SDN Knowledge Base
        • Additional SDN Websites
        • What is Software-Defined Networking (SDN) and why does it matter?
        • What is Network Functions Virtualization (NFV) and why does it matter?
        • Some Solutions To Rapidly Deploy SDN On Existing Networks
        • SDN and NFV: what's the difference?
        • What do Anything-as-a-Service (XaaS) and similar terms mean?
        • Free Open-Source Software-Defined Networking (SDN) Software
    • DREN Technical Interchange Meetings (TIM) (DoD PKI Required)
    • DREN User Forum Information (DoD PII Required)
    • DREN Technical Advisory Panel (TAP) Information (DoD PKI Required)
    • Hawaii Intranet Consortium (HIC) Information (DoD PKI Required)
  • Software
    • User Productivity Enhancement and Training (PET)
    • Computational Research and Engineering Acquisition Tools and Environments (CREATE)
      • CREATE-AV (Air Vehicles)
      • CREATE-GV (Ground Vehicles)
      • CREATE-RF (Radio Frequency)
      • CREATE-SH (Ships)
      • CREATE Capstone
      • CREATE Sage
      • Contact Us
    • The Data Analysis and Visualization (DAV) Center
  • Resource Management
    • High Priority Projects
    • Portal to the Information Environment (pIE)
    • Service/Agency Approval Authorities (S/AAA)
    • Dedicated Support Partition (DSP) Requests
    • Acquisition and Mission Engineering Projects
  • Security
    • Defensive Cyberspace Operations
    • Cybersecurity Program Management
  • Training
  • Workforce Development
  • Technology Areas
    • Computational Structural Mechanics (CSM)
    • Computational Fluid Dynamics (CFD)
    • Computational Chemistry, Biology, and Materials Science (CCM)
    • Computational Electromagnetics and Acoustics (CEA)
    • Climate/Weather/Ocean Modeling and Simulation (CWO)
    • Signal/Image Processing (SIP)
    • Forces Modeling and Simulation (FMS)
    • Electronics, Networking, and Systems/C4I (ENS)
    • Environmental Quality Modeling and Simulation (EQM)
    • Integrated Modeling and Test Environments (IMT)
    • Space and Astrophysical Sciences (SAS)
    • Data and Decision Analytics (DDA)

IPsec in IPv6 - The Plain Truth

For a long time, an “IPv6 is more secure” myth persisted because the IPv6 protocol required that Internet Protocol Security (IPsec) be implemented. Or at least it did, until Request for Comments (RFC) 6434 was adopted in 2011. (Since obsoleted in 2019 by RFC 8504.) Deploying and maintaining IPsec can be difficult for many reasons. This article describes some persistent misconceptions about IPv6 security. This publication from the National Security Administration (NSA) provides multiple configuration examples to facilitate the correct use of IPsec. This presentation describes a deployment of IPv6 multicast in conjunction with IPsec.

“Security” should not be used as a strong reason to consider deploying IPv6. More information on IPsec is available in this article and this later article from Salient CRGT (previously Command Information, Inc., now part of GovernmentCIO LLC). Since the Salient CRGT articles on this topic were published, this article from Nephos6 commented on the ramifications of what would become RFC6434.

IPv6 Vulnerability Testing, Penetration Testing, and Vulnerability Remediation

Introduction

Vulnerability testing (also known as vulnerability assessment or scanning) is the inspection of one or more network services, resources or daemons on a network to check for the presence of known potential security vulnerabilities. Penetration testing is the determination that potential security vulnerabilities are (or are not) present in one or more network services, resources or daemons on a network by attempting to actually exploit them. Vulnerability Remediation is the implementation of measures that will remove known security vulnerabilities or that will minimize their impact when an attempt to exploit them occurs. This article explains the differences between vulnerability testing and penetration testing.

A vulnerability scanning tool is used to conduct vulnerability tests. As this article explains, a vulnerability scanning tool is only one of a wide variety of different penetration testing tools that may be used during a penetration test, along with a wide variety of testing techniques and methods. There are major differences between vulnerability scanning and penetration testing, as any company that offers penetration testing services will be quick to point out. A Google search of the web for “vulnerability assessment vs penetration testing” will find many articles describing those differences.

Vulnerability Testing

Vulnerability scanning tools are, for the most part, the same between Internet Protocol version 4 (IPv4) and IPv6, and many support both protocol families. There are many open source and commercial vulnerability scanning tools. There are also many articles available on the web reviewing and recommending such tools. This Open Web Applications Security Project (OWASP) article is only one among many listings of such tools.

Such tools generally detect and then inspect services or daemons that are listening on a specific network address, on any address in the address space of a network, or within a defined subset of the address space for a network, and then report the existence of any potential security vulnerabilities discovered during the inspection. Daemons are mostly IP version agnostic, so detection and vulnerability assessment is the same for IPv4 and IPv6. For a more in-depth discussion of the differences between vulnerability scanning in IPv4 versus IPv6, see this article.

The main differences between IPv4 and IPv6 are in the ability to detect services and daemons. It is rather easy to search a /24 IPv4 subnet. There are only 254 possible addresses. The smallest of IPv6 subnets are usually /64s (18 quintillion addresses!). You obviously cannot scan an entire /64 in a reasonable manner provided the addresses of the services and daemons listening on that subnet are securely assigned. Stateless Address Autoconfiguration (SLAAC) or Dynamic Host Configuration Protocol version 6 (DHCPv6) assigned addresses where the DHCPv6 server assigns randomized values are examples of secure assignment methods. Examples of insecure assignment methods include manually assigning addresses sequentially over a small range or embedding the IPv4 address of each service or daemon together with a static prefix/suffix in the IPv6 address of that service or daemon. 

An attacker must then rely on active discovery of services and daemons on a network by exploiting Internet Control Message Protocol version 6 (ICMPv6) vulnerabilities or by passively monitoring the network. The same goes for IPv4 as well, although on a greatly reduced scale. Some say that there is a bright side to this: it is also harder for attackers to find services and daemons on an IPv6 network. But remember, attackers only have to find one vulnerable service or daemon, we have to protect them all!

Penetration Testing

While there is no one “right” way to conduct a comprehensive penetration test, there are many ways to conduct a penetration test which produces inconclusive or incomplete test results. Some of the open source communities and noncommercial groups that have developed guidelines describing comprehensive penetration testing processes include:

1. Penetration Testing Executive Standard (PTES) v1.0, 2014
(The PTES is a detailed, comprehensive document. An overview of the PTES is available in this article, which also mentions the next 3 guidelines.)
2. Penetration Testing Framework, 2014 
3. Information Systems Security Assessment Framework, 2020 (An overview of the ISSAF is available in this article.)
4. Open Source Security Testing Methodology Manual (OSSTMM), 2010
5. PenTesters Framework (PTF) v2.0, 2018 (an evolutionary descendant of the PTES in item 1 above)

Discussions in these guidelines often do not distinguish between IPv6 and IPv4. Many of the specific testing techniques and methods described in these guidelines are internet protocol agnostic, applying to both IPv6 and IPv4. Others need to be modified due to differences between the protocols, which means some tests will need to be performed twice, once for each protocol. The Impact of IPv6 on Penetration Testing, 2012, and Testing the security of IPv6 implementations, 2014, are papers that discuss the need for those modifications.

When conducting specific penetration tests, however, the internet protocol being used must always be considered. Various commercial, government and academic organizations have tested a variety of tools to evaluate their support for IPv6 and reported their findings. A few of these reports are identified below. A single database or website that consolidates the findings does not exist.

  1. Results for web applications and server testing are given in this: Master Thesis: Penetration Testing over IPv6, Jun, 2012.
  2. The results of another analysis of penetration testing tools is described here.
  3. Search the University of Amsterdam System and Network Engineering OS3 Archive of Master's Theses from 2003-2004 to 2021 (https://www.os3.nl/archive/research_projects) for testing topics, such as “Security of IPv6 and DNSSEC for penetration testers, 2010-2011” (an expanded version was subsequently published in book form, ISBN-13: 978-3848422814). (Those Master's Theses are grouped by academic year).
  4. Search the System Administration Networking and Security (SANS) Institute white papers topics such as IPv6, for example "A Complete Guide on IPv6 Attack and Defense”. [Use the scroll bar on the left side of the search window to scroll through the white papers.]

Vulnerability Remediation

The Cybersecurity Infrastructure Security Agency (CISA) published Binding Operational Directive 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities, Nov, 2021, providing guidance on how to remediate vulnerabilities identified in the Known Exploited Vulnerability (KEV) Catalog. At the same time, the CISA also issued Reducing the Significant Risk of Known Exploited Vulnerabilities, a web friendly version of that directive prescribing timelines for remediating the risks identified therein.

Microsoft Windows Internet Connection Sharing (ICS)

Microsoft Windows supports something called Internet Connection Sharing (ICS), which allows several computers to share one Internet connection without using a hardware router. In the home networking environment of the past, ICS was sometimes used as an economical way to connect several computers to the Internet. Microsoft supported ICS in Windows Vista and Windows XP, and still supports it in Windows 7 and 8/8.1/10/11 (although it is disabled by default).

However, when used in conjunction with Internet Protocol version 6 (IPv6) ICS causes severe configuration problems and creates strong security concerns. Almost all commercial, enterprise, and academic networks strongly recommend against the use of ICS. They will/should try to detect and deny access to any computer which has ICS enabled when it attempts to connect to their network. The various "Enabling IPv6 in Microsoft Windows ..." articles in the IP Transport section describe how to check the status of ICS on a system and disable it if enabled. Windows 10 (versions 1709 and prior only) contained a further evolution of ICS called Wi-Fi sense which should also be disabled if present, as described in the Enabling IPv6 in Microsoft Windows 8 and later Versions article.

When a Windows computer with ICS enabled is connected to a network, it sends out unauthorized Router Advertisement (RA) packets. Such packets are called "Rogue RAs", and are described in more detail in Definition and Prevention of rogue Router Advertisements in the DHCP and SLAAC on IPv6 Networks article in the Infrastructure section.

 

 

Enabling IPv6 in Cisco Security Appliances and Firewalls

The following documents explain the steps involved in enabling IPv6 on selected Cisco security appliances and firewalls. There are several families of such products, and this article does not attempt to cover them all.

IPv6 on Cisco ASA firewall describes the basic steps in enabling IPv6 on specified interfaces of a Cisco ASA firewall. (Scroll down to view the article.)

A general guide to Cisco firewall configuration is given by this Security Configuration Guide: Zone-Based Policy Firewall.

A complete reference with numerous examples and detailed explanation of the ASA and PIX firewall configuration options is available here on the Cisco website. A complete reference with numerous examples and detailed explanation of the IOS-based firewall configuration options is available here on the Cisco website. An IPv6-specific Frequently Asked Questions (FAQ) file is maintained by Cisco. Cisco maintains a Small Business Support Community for its equipment.

Enabling IPv6 in Juniper Security Products and Firewalls

The following documents discuss and describe the steps involved in enabling IPv6 on Juniper security products and firewalls running Junos OS.

A general guide to Juniper firewall configurations is given by this Firewalls Policy Overview and a more detailed guide is available in this CLI User Guide for Junos OS.

For more comprehensive documentation on the various versions of Junos OS and specific security products, go to the Junos OS Tech Library web page. That page has a section listing the different SRX Series security products. Juniper also maintains an in-depth Knowledge Base specific to configuration and deployment of its equipment, although it is not specific to IPv6.

  1. IPv6 in Check Point Firewalls
  2. Enabling IPv6 in ip6tables and other Linux-based Firewalls
  3. Enabling IPv6 in Apple macOS, OS X and Mac OS X-based Firewalls
  4. IPv6 in Microsoft Windows-based Firewalls
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13

 

2026 DoD High Performance Computing Modernization Program. HPCMP Privacy and Security Notice. DoD FOIA. DoD Web Policy.
Questions or comments please email HPCMP@HPC.mil. Web related issues please email WEBHELP@HPC.mil.
This Department of Defense computer is subject to monitoring at all times. Unauthorized access is prohibited by Public Law 99-474 (The Computer Fraud And Abuse Act of 1986)

Site Map
Information Quality
No Fear Act Data
Open GOV
Plain Writing Act
Privacy Program
Strategic APR
FOIA
Guidance & Policies
Privacy Policy USA.gov
     |      Contact Us

High Performance Computing Modernization Program Office

3909 Halls Ferry Rd
Vicksburg, MS 39180-6199

Phone: 601-634-4204 / 703-812-8205
Email: HPCMP@hpc.mil

For Web Issues please email webhelp@hpc.mil or call 703-812-4401

For DREN support, see the web page in this link.