Security Consideration Source-Spoofing Host make use of a network service by source-spoofing? prefix-delegation or routing for the delegated prefix has to be secured. DHCPv6 Authentication or Packet-filter at PE router Faked PE-router Attacker can install a faked PE-router to override services? PE-CPE link has to be secured. Layer2-Authentication