{"id":2591,"date":"2015-03-10T06:06:30","date_gmt":"2015-03-10T10:06:30","guid":{"rendered":"http:\/\/chrisgrundemann.com\/?p=2591"},"modified":"2021-07-08T11:17:48","modified_gmt":"2021-07-08T15:17:48","slug":"ipv6-security-myth-9-there-arent-any-ipv6-security-resources","status":"publish","type":"post","link":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-9-there-arent-any-ipv6-security-resources\/","title":{"rendered":"IPv6 Security Myth #9: There Aren&#8217;t Any IPv6 Security Resources"},"content":{"rendered":"<p>We are approaching the end of this <a title=\"The IPv6 Security Myths Series\" href=\"http:\/\/chrisgrundemann.com\/index.php\/category\/ipv6\/ipv6-security-myths\/\">10 part series on the most common IPv6 security myths<\/a>. Now it\u2019s time to turn our eyes away from security risks to focus a bit more on security resources. Today\u2019s myth is actually one of the most harmful to those who hold it. If you believe that there is no good information out there, it\u2019s nearly impossible to find that information. So let\u2019s get down to it and dispel our 9th myth. We\u2019ll start by looking at a few of the high level principles and then look at a selection of resources, which contain much more detail.<\/p>\n<p style=\"padding-left: 30px;\"><strong>Myth: There are no IPv6 Security BCPs yet<\/strong><br \/>\n<strong> Reality: There are!<\/strong><\/p>\n<p>Many security standards don\u2019t discuss IPv6 specifically. However, any general guideline related to IP likely applies to both versions \u2013 many security policies are (and should be) higher level. We saw this in Myth\u2019s <a title=\"IPv6 Security Myth #2: IPv6 Has Security Designed In\" href=\"http:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-2-ipv6-security-designed\/\">#2<\/a> and <a title=\"IPv6 Security Myth #7: 96 More Bits, No Magic\" href=\"http:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-7-96-more-bits-no-magic\/\">#7<\/a> to some extent and it\u2019s also evident below, as many of these security practices apply to both IPv6 and IPv4.<\/p>\n<p>Here are a few of the key principles to keep your IPv6 network secure:<\/p>\n<ul>\n<li>Perform IPv6 filtering at the perimeter<\/li>\n<li>Use RFC2827 (BCP38) and RFC3704 (BCP84) ingress filtering throughout the network<\/li>\n<li>Use manual tunnels (with IPsec whenever possible) instead of dynamic tunnels and deny packets for transition techniques not used<\/li>\n<li>Use common access-network security measures (NAC\/802.1X, disable unused switch ports, Ethernet port security, MACSec\/TrustSec)<\/li>\n<li>Strive to achieve equivalent protections for IPv6 as with IPv4<\/li>\n<li>Continue to let vendors know what you expect in terms of IPv6 security features<\/li>\n<\/ul>\n<p style=\"padding-left: 30px;\"><strong>Myth: There are no IPv6 Security Resources available<\/strong><br \/>\n<strong> Reality: There are!<\/strong><\/p>\n<p>The BCPs above are really just the tip of the iceberg when it comes to all the things you need to know to securely deploy IPv6. For a deeper dive on how to actually execute on these high level policies you\u2019ll want to do some more reading. Here are a couple of the best IPv6 security resources I\u2019m aware of. Read them and you\u2019re well on your way to being a true IPv6 security expert!<\/p>\n<ul>\n<li><a href=\"http:\/\/www.amazon.com\/gp\/product\/1587055945\/ref=as_li_ss_tl?ie=UTF8&amp;camp=1789&amp;creative=390957&amp;creativeASIN=1587055945&amp;linkCode=as2&amp;tag=dontpanic0f-20\">IPv6 Security<\/a>, By Scott Hogg and Eric Vyncke, Cisco Press, 2009<\/li>\n<li><a href=\"https:\/\/www.cpni.gov.uk\/documents\/publications\/2011\/2011007-infosec-cpni_viewpoint_security_implications_of_ipv6.pdf?epslanguage=en-gb\">CPNI Viewpoint: Security Implications of IPv6<\/a><\/li>\n<li><a href=\"https:\/\/tools.ietf.org\/html\/draft-ietf-opsec-v6\">Operational Security Considerations for IPv6 Networks<\/a><\/li>\n<li><a href=\"http:\/\/www.ipv6hackers.org\/home\">IPv6 Hackers<\/a> is a forum for IPv6 security researchers and networking pros<\/li>\n<li>Deploy360 has a section specifically on <a href=\"http:\/\/www.internetsociety.org\/deploy360\/ipv6\/security\/\">IPv6 Security<\/a><\/li>\n<li>Search engines are your friends! There\u2019s lots more info out there!<\/li>\n<\/ul>\n<p>What are your favorite IPv6 security resources? Leave a comment!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We are approaching the end of this 10 part series <a href=\"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-9-there-arent-any-ipv6-security-resources\/\"> &#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":2390,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[9,11,12,24,27],"tags":[323,358,360,368,750,770,465,474,500,556,613,769],"class_list":["post-2591","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet","category-ipv6","category-ipv6-security-myths","category-security","category-technology","tag-information","tag-ipv4","tag-ipv6","tag-ipv6-security","tag-ipv6-security-myths","tag-ipv6-security-resources","tag-network","tag-networking","tag-operational","tag-practice","tag-scott-hogg","tag-security-resources"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IPv6 Security Myth #9: There Aren&#039;t Any IPv6 Security Resources ~ Chris Grundemann<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-9-there-arent-any-ipv6-security-resources\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IPv6 Security Myth #9: There Aren&#039;t Any IPv6 Security Resources ~ Chris Grundemann\" \/>\n<meta property=\"og:description\" content=\"We are approaching the end of this 10 part series ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-9-there-arent-any-ipv6-security-resources\/\" \/>\n<meta property=\"og:site_name\" content=\"Chris Grundemann\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/chris.grundemann\" \/>\n<meta property=\"article:published_time\" content=\"2015-03-10T10:06:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-08T15:17:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2015\/01\/IPv6SecurityMyths.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"654\" \/>\n\t<meta property=\"og:image:height\" content=\"255\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"~Chris\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/ChrisGrundemann\" \/>\n<meta name=\"twitter:site\" content=\"@ChrisGrundemann\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"~Chris\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2015\\\/ipv6-security-myth-9-there-arent-any-ipv6-security-resources\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2015\\\/ipv6-security-myth-9-there-arent-any-ipv6-security-resources\\\/\"},\"author\":{\"name\":\"~Chris\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#\\\/schema\\\/person\\\/16a6af2797267c7d91f29876d5a0870f\"},\"headline\":\"IPv6 Security Myth #9: There Aren&#8217;t Any IPv6 Security Resources\",\"datePublished\":\"2015-03-10T10:06:30+00:00\",\"dateModified\":\"2021-07-08T15:17:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2015\\\/ipv6-security-myth-9-there-arent-any-ipv6-security-resources\\\/\"},\"wordCount\":429,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2015\\\/ipv6-security-myth-9-there-arent-any-ipv6-security-resources\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/chrisgrundemann.com\\\/wp-content\\\/uploads\\\/2015\\\/01\\\/IPv6SecurityMyths.jpg\",\"keywords\":[\"information\",\"IPv4\",\"IPv6\",\"IPv6 security\",\"IPv6 Security Myths\",\"IPv6 Security Resources\",\"network\",\"networking\",\"Operational\",\"practice\",\"Scott Hogg\",\"security resources\"],\"articleSection\":[\"Internet\",\"IPv6\",\"IPv6 Security Myths\",\"Security\",\"Technology\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2015\\\/ipv6-security-myth-9-there-arent-any-ipv6-security-resources\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2015\\\/ipv6-security-myth-9-there-arent-any-ipv6-security-resources\\\/\",\"url\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2015\\\/ipv6-security-myth-9-there-arent-any-ipv6-security-resources\\\/\",\"name\":\"IPv6 Security Myth #9: There Aren't Any IPv6 Security Resources ~ Chris Grundemann\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2015\\\/ipv6-security-myth-9-there-arent-any-ipv6-security-resources\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2015\\\/ipv6-security-myth-9-there-arent-any-ipv6-security-resources\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/chrisgrundemann.com\\\/wp-content\\\/uploads\\\/2015\\\/01\\\/IPv6SecurityMyths.jpg\",\"datePublished\":\"2015-03-10T10:06:30+00:00\",\"dateModified\":\"2021-07-08T15:17:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2015\\\/ipv6-security-myth-9-there-arent-any-ipv6-security-resources\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2015\\\/ipv6-security-myth-9-there-arent-any-ipv6-security-resources\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2015\\\/ipv6-security-myth-9-there-arent-any-ipv6-security-resources\\\/#primaryimage\",\"url\":\"https:\\\/\\\/chrisgrundemann.com\\\/wp-content\\\/uploads\\\/2015\\\/01\\\/IPv6SecurityMyths.jpg\",\"contentUrl\":\"https:\\\/\\\/chrisgrundemann.com\\\/wp-content\\\/uploads\\\/2015\\\/01\\\/IPv6SecurityMyths.jpg\",\"width\":654,\"height\":255,\"caption\":\"Security in an IPv6 World\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2015\\\/ipv6-security-myth-9-there-arent-any-ipv6-security-resources\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/chrisgrundemann.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IPv6\",\"item\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/category\\\/ipv6\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IPv6 Security Myths\",\"item\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/category\\\/ipv6\\\/ipv6-security-myths\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"IPv6 Security Myth #9: There Aren&#8217;t Any IPv6 Security Resources\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#website\",\"url\":\"https:\\\/\\\/chrisgrundemann.com\\\/\",\"name\":\"Chris Grundemann\",\"description\":\"Use technology, marketing, and strategy to take your growing business to the next level.\",\"publisher\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/chrisgrundemann.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#organization\",\"name\":\"Grundemann Technology Solutions\",\"url\":\"https:\\\/\\\/chrisgrundemann.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/chrisgrundemann.com\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/cropped-GTS-Logo.png\",\"contentUrl\":\"https:\\\/\\\/chrisgrundemann.com\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/cropped-GTS-Logo.png\",\"width\":512,\"height\":512,\"caption\":\"Grundemann Technology Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/ChrisGrundemann\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/grundemann\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/cgrundemann\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCJ3Pk4AAVMBG4KCzxYAtExA\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#\\\/schema\\\/person\\\/16a6af2797267c7d91f29876d5a0870f\",\"name\":\"~Chris\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cbff57968626714c5bdb525f740f898c0d1e506a63c350b6a3341e57337e7fc7?s=96&d=mm&r=pg\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cbff57968626714c5bdb525f740f898c0d1e506a63c350b6a3341e57337e7fc7?s=96&d=mm&r=pg\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cbff57968626714c5bdb525f740f898c0d1e506a63c350b6a3341e57337e7fc7?s=96&d=mm&r=pg\",\"caption\":\"~Chris\"},\"description\":\"Creative|Technologist. Curious. Boisterous. Autotelic Autodidact. Heretic. Hacker. Rider of Boards. Writer of Words. ...Traveler of Time...\",\"sameAs\":[\"https:\\\/\\\/chrisgrundemann.com\",\"https:\\\/\\\/www.facebook.com\\\/chris.grundemann\",\"http:\\\/\\\/instagram.com\\\/chrisgrundemann\",\"www.linkedin.com\\\/in\\\/cgrundemann\",\"https:\\\/\\\/x.com\\\/https:\\\/\\\/twitter.com\\\/ChrisGrundemann\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCJ3Pk4AAVMBG4KCzxYAtExA\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IPv6 Security Myth #9: There Aren't Any IPv6 Security Resources ~ Chris Grundemann","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-9-there-arent-any-ipv6-security-resources\/","og_locale":"en_US","og_type":"article","og_title":"IPv6 Security Myth #9: There Aren't Any IPv6 Security Resources ~ Chris Grundemann","og_description":"We are approaching the end of this 10 part series ...","og_url":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-9-there-arent-any-ipv6-security-resources\/","og_site_name":"Chris Grundemann","article_author":"https:\/\/www.facebook.com\/chris.grundemann","article_published_time":"2015-03-10T10:06:30+00:00","article_modified_time":"2021-07-08T15:17:48+00:00","og_image":[{"width":654,"height":255,"url":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2015\/01\/IPv6SecurityMyths.jpg","type":"image\/jpeg"}],"author":"~Chris","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/ChrisGrundemann","twitter_site":"@ChrisGrundemann","twitter_misc":{"Written by":"~Chris","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-9-there-arent-any-ipv6-security-resources\/#article","isPartOf":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-9-there-arent-any-ipv6-security-resources\/"},"author":{"name":"~Chris","@id":"https:\/\/chrisgrundemann.com\/#\/schema\/person\/16a6af2797267c7d91f29876d5a0870f"},"headline":"IPv6 Security Myth #9: There Aren&#8217;t Any IPv6 Security Resources","datePublished":"2015-03-10T10:06:30+00:00","dateModified":"2021-07-08T15:17:48+00:00","mainEntityOfPage":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-9-there-arent-any-ipv6-security-resources\/"},"wordCount":429,"commentCount":0,"publisher":{"@id":"https:\/\/chrisgrundemann.com\/#organization"},"image":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-9-there-arent-any-ipv6-security-resources\/#primaryimage"},"thumbnailUrl":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2015\/01\/IPv6SecurityMyths.jpg","keywords":["information","IPv4","IPv6","IPv6 security","IPv6 Security Myths","IPv6 Security Resources","network","networking","Operational","practice","Scott Hogg","security resources"],"articleSection":["Internet","IPv6","IPv6 Security Myths","Security","Technology"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-9-there-arent-any-ipv6-security-resources\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-9-there-arent-any-ipv6-security-resources\/","url":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-9-there-arent-any-ipv6-security-resources\/","name":"IPv6 Security Myth #9: There Aren't Any IPv6 Security Resources ~ Chris Grundemann","isPartOf":{"@id":"https:\/\/chrisgrundemann.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-9-there-arent-any-ipv6-security-resources\/#primaryimage"},"image":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-9-there-arent-any-ipv6-security-resources\/#primaryimage"},"thumbnailUrl":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2015\/01\/IPv6SecurityMyths.jpg","datePublished":"2015-03-10T10:06:30+00:00","dateModified":"2021-07-08T15:17:48+00:00","breadcrumb":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-9-there-arent-any-ipv6-security-resources\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-9-there-arent-any-ipv6-security-resources\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-9-there-arent-any-ipv6-security-resources\/#primaryimage","url":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2015\/01\/IPv6SecurityMyths.jpg","contentUrl":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2015\/01\/IPv6SecurityMyths.jpg","width":654,"height":255,"caption":"Security in an IPv6 World"},{"@type":"BreadcrumbList","@id":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-9-there-arent-any-ipv6-security-resources\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/chrisgrundemann.com\/"},{"@type":"ListItem","position":2,"name":"IPv6","item":"https:\/\/chrisgrundemann.com\/index.php\/category\/ipv6\/"},{"@type":"ListItem","position":3,"name":"IPv6 Security Myths","item":"https:\/\/chrisgrundemann.com\/index.php\/category\/ipv6\/ipv6-security-myths\/"},{"@type":"ListItem","position":4,"name":"IPv6 Security Myth #9: There Aren&#8217;t Any IPv6 Security Resources"}]},{"@type":"WebSite","@id":"https:\/\/chrisgrundemann.com\/#website","url":"https:\/\/chrisgrundemann.com\/","name":"Chris Grundemann","description":"Use technology, marketing, and strategy to take your growing business to the next level.","publisher":{"@id":"https:\/\/chrisgrundemann.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/chrisgrundemann.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/chrisgrundemann.com\/#organization","name":"Grundemann Technology Solutions","url":"https:\/\/chrisgrundemann.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/chrisgrundemann.com\/#\/schema\/logo\/image\/","url":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2020\/10\/cropped-GTS-Logo.png","contentUrl":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2020\/10\/cropped-GTS-Logo.png","width":512,"height":512,"caption":"Grundemann Technology Solutions"},"image":{"@id":"https:\/\/chrisgrundemann.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/ChrisGrundemann","https:\/\/www.linkedin.com\/company\/grundemann","https:\/\/www.linkedin.com\/in\/cgrundemann\/","https:\/\/www.youtube.com\/channel\/UCJ3Pk4AAVMBG4KCzxYAtExA"]},{"@type":"Person","@id":"https:\/\/chrisgrundemann.com\/#\/schema\/person\/16a6af2797267c7d91f29876d5a0870f","name":"~Chris","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/cbff57968626714c5bdb525f740f898c0d1e506a63c350b6a3341e57337e7fc7?s=96&d=mm&r=pg","url":"https:\/\/secure.gravatar.com\/avatar\/cbff57968626714c5bdb525f740f898c0d1e506a63c350b6a3341e57337e7fc7?s=96&d=mm&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cbff57968626714c5bdb525f740f898c0d1e506a63c350b6a3341e57337e7fc7?s=96&d=mm&r=pg","caption":"~Chris"},"description":"Creative|Technologist. Curious. Boisterous. Autotelic Autodidact. Heretic. Hacker. Rider of Boards. Writer of Words. ...Traveler of Time...","sameAs":["https:\/\/chrisgrundemann.com","https:\/\/www.facebook.com\/chris.grundemann","http:\/\/instagram.com\/chrisgrundemann","www.linkedin.com\/in\/cgrundemann","https:\/\/x.com\/https:\/\/twitter.com\/ChrisGrundemann","https:\/\/www.youtube.com\/channel\/UCJ3Pk4AAVMBG4KCzxYAtExA"]}]}},"jetpack_featured_media_url":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2015\/01\/IPv6SecurityMyths.jpg","jetpack_shortlink":"https:\/\/wp.me\/ps8ie-FN","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/posts\/2591","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/comments?post=2591"}],"version-history":[{"count":0,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/posts\/2591\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/media\/2390"}],"wp:attachment":[{"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/media?parent=2591"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/categories?post=2591"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/tags?post=2591"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}