The Security section provides a wide variety of information for individuals and organizations interested in benefitting from the experience of others about planning for, configuring, and deploying secure IPv6 devices and networks.
As was the case with security for Internet Protocol version 4 (IPv4), there are no easy or quick solutions, and many security concerns do not have simple answers. The Internet SOCiety (ISOC) provides comprehensive guidance about this subject on its Deploy360 IPv6 Security web page and also answers Frequently Asked Questions (FAQ) about IPv6 security concerns on their Security FAQ web page.
This observation from the Network Working Group of the Internet Engineering Task Force (IETF) in Request For Comments (RFC) 4942, IPv6 Transition/Coexistence Security Considerations is still valid:
“It is important to understand that deployments are unlikely to be replacing IPv4 with IPv6 (in the short term), but rather will be adding IPv6 to be operated in parallel with IPv4 over a considerable period, so that security issues with transition mechanisms and dual stack networks will be of ongoing concern. This extended transition and coexistence period stems primarily from the scale of the current IPv4 network. It is unreasonable to expect that the many millions of IPv4 nodes will be converted overnight. It is more likely that it will take two or three capital equipment replacement cycles (between nine and 15 years) for IPv6 capabilities to spread through the network, and many services will remain available over IPv4 only for a significant period whilst others will be offered either just on IPv6 or on both protocols.”
Ipv6 and IoT Security Best Practices
Microsoft Windows Internet Connection Sharing (ICS)
Enabling IPv6 in ip6tables and other Linux-based Firewalls
IPv6 and Trusted Internet Connection (TIC) Initiative
Neighbor Discovery Protocol Attacks
Router Configuration Guide for IPv6
Firewall Configuration Guide for IPv6
IPv6 in Microsoft Windows-based Firewalls
Enabling IPv6 in Juniper Security Products and Firewalls
Enabling IPv6 in Cisco Security Appliances and Firewalls
IPv6 Vulnerability Testing, Penetration Testing, and Vulnerability Remediation
IPsec in IPv6 - The Plain Truth
Enabling IPv6 in Apple macOS, OS-X and Mac OS X-based Firewalls