IPv6 Is Not Inherently Secure
A persistent myth is that IPv6 is more secure than IPv4 because it was designed with IPsec in mind. While IPv6 does mandate IPsec support (though not its use), it introduces its own set of security challenges. Networks that deploy IPv6 without a matching security strategy face real risks — especially if IPv6 is running unintentionally alongside IPv4.
Threat #1: Rogue Router Advertisements (RA)
IPv6 uses Neighbor Discovery Protocol (NDP) and Router Advertisement (RA) messages to configure hosts automatically. Any device on a network segment can send RA messages, potentially redirecting all traffic through an attacker's machine.
Mitigation: Enable RA Guard on managed switches and wireless controllers. This feature blocks RA messages from ports that are not designated router uplinks. Most enterprise-grade switches support RA Guard per IEEE 802.1Q port policy.
Threat #2: NDP Spoofing (IPv6 ARP Equivalent)
In IPv4, ARP poisoning is a well-known attack. IPv6 replaces ARP with NDP, but the same class of spoofing attacks exists. An attacker can forge Neighbor Advertisement (NA) messages to associate their MAC address with a legitimate IPv6 address.
Mitigation: Deploy Dynamic ND Inspection (sometimes called ND Snooping) on switches. This builds a binding table of valid IPv6-to-MAC-to-port mappings and drops spoofed NA messages.