IPv6 Messages Allowed on Transparent Firewall | Exam 400-251

IPv6 Messages Allowed on Transparent Firewall

Prev Question Next Question

Question

Which four IPv6 messages should be allowed to transit a transparent firewall? (Choose four.)

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D. E. F.

CDEF.

In IPv6, there are several types of messages that are used for various purposes, such as router discovery, address autoconfiguration, and neighbor discovery. A transparent firewall is a type of firewall that does not modify the contents of the packets that pass through it, but only checks them for security policy compliance. To determine which IPv6 messages should be allowed to transit a transparent firewall, we need to understand the purpose of each message and its potential security implications.

A. Router Solicitation (RS) with hop limit = 1: RS is an IPv6 message that a host sends to a local router to request its configuration parameters, such as its link-local address and the prefix of the subnet it belongs to. An RS message with a hop limit of 1 is limited to the local link and should not be forwarded beyond the first hop. Allowing RS messages to pass through a transparent firewall is generally safe, as they are used for legitimate purposes and do not pose a significant security risk.

B. Router Advertisement (RA) with hop limit = 1: RA is an IPv6 message that a router sends periodically or in response to an RS message to advertise its configuration parameters to the hosts on the local link. An RA message with a hop limit of 1 is also limited to the local link and should not be forwarded beyond the first hop. Allowing RA messages to pass through a transparent firewall is generally safe, as they are used for legitimate purposes and do not pose a significant security risk.

C. Neighbor Solicitation (NS) with hop limit = 255: NS is an IPv6 message that a host sends to its neighbors to resolve the link-layer address of a specific IPv6 address, or to check if a neighbor is still reachable. An NS message with a hop limit of 255 can be forwarded beyond the local link and can potentially be used for reconnaissance or denial-of-service attacks. However, NS messages are also necessary for neighbor discovery and address resolution, so blocking them completely can disrupt network communication. Allowing NS messages with a hop limit of 255 to pass through a transparent firewall is a trade-off between security and functionality.

D. Neighbor Advertisement (NA) with hop limit = 255: NA is an IPv6 message that a host sends to its neighbors to announce its own link-layer address or to confirm the reachability of a neighbor. An NA message with a hop limit of 255 can also be forwarded beyond the local link and can potentially be used for reconnaissance or denial-of-service attacks. However, NA messages are also necessary for neighbor discovery and address resolution, so blocking them completely can disrupt network communication. Allowing NA messages with a hop limit of 255 to pass through a transparent firewall is a trade-off between security and functionality.

E. Listener Query with link-local source address: A Listener Query message is used in IPv6 multicast to solicit reports from receivers that are interested in a specific multicast group. It is sent by a multicast router to a link-local multicast address, and the source address of the message is set to the link-local address of the router's interface. Allowing Listener Query messages with a link-local source address to pass through a transparent firewall is generally safe, as they are used for legitimate multicast communication and do not pose a significant security risk.

F. Listener Report with link-local source address: A Listener Report message is sent by a receiver to a multicast router to indicate that it is interested in receiving traffic for a specific multicast group. It is sent to the link-local address of the multicast router's interface, and the source address of the message is set to the link-local address of the receiver's interface. Allowing Listener Report messages with a link-local source address to pass through a transparent firewall is generally safe, as they are used for legitimate multicast communication and do not pose a