IPv6 Rogue Router Advertisements: Hijacking Windows and Linux Hosts on Dual-Stack Networks
Most security teams have a coherent IPv4 policy. Firewalls, DHCP snooping, ARP inspection — the usual suspects are configured and audited.
tutorialsecurityintermediatenetwork_and_infra