Implementation of network security in IPv6 network
Top 20
Saved in:
Main Authors: | , |
---|---|
Format: | |
Language: | English |
Published: |
2014
|
Online Access: | http://localhost/xmlui/handle/123456789/6465 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.unikl.ir-6465 |
---|---|
record_format |
eprints |
spelling |
my.unikl.ir-64652014-05-02T10:11:00Z Implementation of network security in IPv6 network Abdul Fattah bin Rushdan Bachelor of Engineering Technology in Data Communications Top 20 The advent of IPv6 as a replacement of IPv4 has spurred new challenges in intelligent network security research. This document describes the study of implementing network security (Cisco Access Control List) for IPv6 in a small network by including other security implementation. Network security is important since in any network, will it be wired or wireless; there will be threats. Some people take network security lightly, without considering the fear that any information could be accessed by unauthorized personal. Network access tools and methods have been evolved. Nowadays, networks hackers, methods and tools has improved tremendously, hacker no longer require to have high level of knowledge, people who previously would not have participated in computer crime are now able to do so. ACL is short for Access Control List. As the name suggest, it is used for access control. ACL can filter network traffic (permit or deny a source to enter a certain destination). Note that, ACL might also be used for purposes other than to filter IP traffic, for example, defining traffic to Network Address Translate (NAT) or encrypt, or filtering non-IP protocols such as AppleTalk or IPX. A discussion of these functions is outside of the scope of this study. ACL are a command that is executed in the layer 3 devices (which uses IP). This project consist of a small network with network security protocols implemented and by using Wireshark (version 1.8.6 which is the current stable release) as a network protocol analyzer which will capture and interactively browse the traffic running on a computer network. The goal of this project is to implement network security in IPv6 network to ensure privacy and avoid theft information. 2014-05-02T10:11:00Z 2014-05-02T10:11:00Z 2014-05-02 http://localhost/xmlui/handle/123456789/6465 en |
institution |
Universiti Kuala Lumpur |
building |
UniKL Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Kuala Lumpur |
content_source |
UniKL Institutional Repository |
url_provider |
http://ir.unikl.edu.my/ |
language |
English |
description |
Top 20 |
format |
|
author |
Abdul Fattah bin Rushdan Bachelor of Engineering Technology in Data Communications |
spellingShingle |
Abdul Fattah bin Rushdan Bachelor of Engineering Technology in Data Communications Implementation of network security in IPv6 network |
author_facet |
Abdul Fattah bin Rushdan Bachelor of Engineering Technology in Data Communications |
author_sort |
Abdul Fattah bin Rushdan |
title |
Implementation of network security in IPv6 network |
title_short |
Implementation of network security in IPv6 network |
title_full |
Implementation of network security in IPv6 network |
title_fullStr |
Implementation of network security in IPv6 network |
title_full_unstemmed |
Implementation of network security in IPv6 network |
title_sort |
implementation of network security in ipv6 network |
publishDate |
2014 |
url |
http://localhost/xmlui/handle/123456789/6465 |
_version_ |
1644484811012702208 |
score |
13.214268 |