Operational Problems in IPv6: Fallback and DNS issues
|
|
|
- Alexia Montgomery
- 10 years ago
- Views:
Transcription
1 Operational Problems in : Fallback and DNS issues Tomohiro Fujisaki, Arifumi Matsumoto, Katsuyasu Toyama,Tsuyoshi Toyono and Shirou Niinobe Nippon Telegraph and Telephone Corporation
2 Network problems associated with Today, is widely used Many operating systems and routers support without any additional software. Anyone can use I ll introduce two problems with / fallback problem Described in section 4 at DNS cache server problem Information Sharing Platform Laboratories 2
3 What is -to- fallback? Many current / dual- operating systems start their communication using. If destination has both ipv4 and ipv6 address, end host first tries ipv6. And if it fails, then tries ipv4. Host Host / Internet Web Web server server X X DNS records A and AAAA Host Host Host Host Tries first and if it fails, tries fallback Web Web server server Y Y Web Web server Z server Z A and AAAA Information Sharing Platform Laboratories 3 A
4 / fallback problem Problem is especially significant in TCP-based applications. They initially need to establish communication channels If destination node has multiple IP addresses, application tries them sequentially until TCP communication channel is established. User s view Problem: Fallback sometimes takes a long time. User has to wait until communication is finished until web page is displayed completely. Over 20 seconds click! Information Sharing Platform Laboratories 4
5 Where does fallback problem occur? Host Host v4/v6 User Network v4 Poor connectivity. v4/v6 Internet Using unmanaged transition mechanism Web Web server server Z Z Destination server has AAAA records, but no connectivity No global connectivity (e.g., VPNs and networks using ULA) A and AAAA Information Sharing Platform Laboratories 5
6 Node behavior to network faults Networks should notify to end hosts that there is no route to the destination node, and end hosts should fall back from ipv6 to ipv4 according to the notification. ICMPv6 Type1: Destination Unreachable Host Host v4/v6 v4 v4/v6 Web Web server server Z Z A and AAAA User Network ICMPv6 Internet Information Sharing Platform Laboratories 6
7 Fallback experiment We tested various operating systems fallback behavior under following situations: No errors are reported by the network (1) Timeout of connection Errors are reported by the network (2) ICMP errors Mainly `ICMP destination unreachable message Force to fall back (3) TCP RST not legitimate solution?? Information Sharing Platform Laboratories 7
8 Fallback experimental setup Measuring time required to fall back from to at client PC when: No response from network ICMPv6 destination unreachable returned no route to dest administratively prohibited address unreachable port unreachable TCP RST returned A and AAAA records registered Returning ICMPv6 destination unreachable or TCP reset responding to the TCP connection setup / dual- node with both connectivities Using web browser to check client behavior HTTP server / network Router Client PC Information Sharing Platform Laboratories 8
9 Results of experiments unit: seconds OS Browser No Error Code=0 Code=1 Type=1(Destination Unreachable) Code=2 Code=3 Code=4 Code=5 Code=6 TCP reset Windows Vista Home Basic IE FireFox Windows Vista Enterprise IE FireFox Mac OSX ( L2127) Safari FireFox No fallback FreeBSD (R6.2-#p1) FireFox No fallback Fedora Core 6 (kernel ) FireFox No fallback No fallback 0.01 Time between first TCP SYN packet and TCP SYN packet immediately after fallback occurs. IE Version: Firefox version: Safari version :2.0.4 Code=0: no route to destination [RFC2463] Code=1: communication with destination administratively prohibited [RFC2463] Code=2: beyond scope of source address [RFC4443] Code=3: address unreachable [RFC2463] Code=4: port unreachable [RFC2463] Code=5: source address failed ingress/egress policy [RFC4443] Code=6: reject route to destination [RFC4443] Information Sharing Platform Laboratories 9
10 TCP behavior when ICMP errors are returned When node receives ICMP error packets, TCP behavior is defined in RFC 1122 (for ICMP only). When node receives an ICMP hard error, TCP aborts connection immediately. When node receives ICMP soft error, TCP must not abort connection. Currently, ICMPv6 destinationunreachable error handling is different in each OS. The draft-ietf-tcpm-tcp-soft-errors proposes version of ICMPv6 soft error handling. Information Sharing Platform Laboratories 10
11 Summary of / fallback problem In -and- enabled network, quality of each network affects the user s nodes. If quality (e.g. reachability) of the network is clearly bad, administrators should control communication by: Changing protocol preference using RFC3484 mechanism Returning TCP RST to minimize fallback time Information Sharing Platform Laboratories 11
12 DNS cache server issue: Increase in Number of DNS AAAA Queries This topic was presented by T. Toyono at 2006 OARC Member Workshop /agenda/
13 Focus on User-Cache DNS queries, not on Cache-Authoritative queries increase in number of queries between users and cache servers caused by 1. support Number of AAAA queries same as that of A queries 2. Domain name completion Domain name completion by operating system (API), and by applications 3. These Combinations Sequence of queries Today s focus Query Query User OS User (resolver) OS User (resolver) OSs (resolvers) -transport Cache Servers Authoritative Name Servers Authoritative Name Servers Authoritative Name Servers Information Sharing Platform Response Laboratories 13 Response
14 (1) -enabled OS increases DNS queries
15 1. and OS Resolver -enabled OSs ask for both A and AAAA resource records A query = name resolution AAAA query = name resolution Sends both A and AAAA queries for every name resolution Currently, almost no application specifies DNS Query Type ; therefore, OS sends both Information Sharing Platform Laboratories 15
16 (2) Domain name completion increases DNS queries
17 2. Domain Name Completion When a name resolution fails, both OS and APP automatically resolve the domains with prefix/suffix completion e.g., when name resolution of host failed host.com host.org host.net... OS using these domains to complete: FreeBSD: specified by search domain in /etc/resolv.conf and distributed via DHCP Windows: configured in control panel and distributed via DHCP Applications: Mozilla: retries name resolution for a domain by adding www. domain prefix IE6: using MSN search, then adds a domain suffix ".com" ".net" ".org" and ".edu" Information Sharing Platform Laboratories 17
18 (3) Combination of (1) and (2)
19 Combination in FreeBSD Sequence Sends A query first, then AAAA query Domain Completion Tries domain completions for every set of A+AAAA address Sends AAAA queries even if it doesn t have an address (Ex) User Query: noexist-example.com A noexist-example.com If address is resolved, AAAA noexist-example.com A noexist-example.com.com stop here. AAAA noexist-example.com.com A noexist-example.com.net AAAA noexist-example.com.net... Information Sharing Platform Laboratories 19
20 Combination in Linux Tries AAAA queries for all domain completions, then A queries with domain completions address Sends AAAA queries even if it doesn t have an address (Ex) User Query: noexist-example.com AAAA noexist-example.com AAAA noexist-example.com.com AAAA noexist-example.com.net Even if domain has A noexist-example.com addresses, A noexist-example.com.com first, AAAA queries are A noexist-example.com.net... sent. Information Sharing Platform Laboratories 20
21 Combination in Windows Vista (before β2 Build5270) Tries AAAA queries for all domain completions, then tries A queries with domain completions Same as Linux (kernel ) behavior address Sends AAAA queries even if it doesn t have an address (Ex) User Query: noexist-example.com AAAA noexist-example.com AAAA noexist-example.com.com AAAA noexist-example.com.net Even if domain has A noexist-example.com addresses, A noexist-example.com.com first, AAAA queries are A noexist-example.com.net... sent. Information Sharing Platform Laboratories 21
22 Windows Vista (β2 Build5270)+IE7.0(at the time) OS domain completion IE tried MSN search IE added.com and OS domain completion IE added.net and OS domain completion IE added.org and OS domain completion IE added.edu and OS domain completion Information Sharing Platform Laboratories IE tried MSN search again 22
23 Our alert report and MS response NANOG36 (2006/2) We reported this behaviors (Vista β) and alerted increase in number of DNS queries NANOG38 (2006/10) Abolade Internet Protocols team The NetIO Stack in Windows Vista: Functionality and Deployment NTT Labs: NANOG36 report with preliminary analysis based on Windows Vista In his slides: Deployments of new behavior are best undertaken as joint efforts between host software vendors and public network operators Reference: NANOG36 Clear and Present Increase of AAAA Queries NANOG38 The NetIO Stack in Windows Vista: Functionality and Deployment Information Sharing Platform Laboratories 23
24 Combination in Windows Vista Status in Vista DNS sends A query first, follows up with AAAA only to servers that have some info, then stops Vista doesn t send AAAA queries if the only global addresses We appreciate this change by Microsoft! Reference: NANOG38 The NetIO Stack in Windows Vista: Functionality and Deployment Information Sharing Platform Laboratories 24
25 Windows Vista + IE NX-Domain Sends A query first, and answer is NX- Domain, stops sending AAAA query Doesn t try domain name completions User query none.nttv6.net (NX) Recieves NX Domain, so doesn t send AAAA query Information Sharing Platform Laboratories 25
26 Windows Vista (RC2 Build5744) + IE No Answer sends A query first, and answer is No Answer, then sends AAAA query Doesn t try domain name completions Application displays Not found: nttv6.net page User query nttv6.net (NoAnswer) OS send A > AAAA queries pair Information Sharing Platform Laboratories 26
27 Results FreeBSD Linux MacOS X Vista (β) Vista A & AAAA A first AAAA first A first AAAA first A first query sequence order When does domain name completion occur? After A+AAAA All AAAA completion first, then A After A+AAAA All AAAA completion first, then A No completion Send AAAA queries Yes Yes No Yes No even if no addresses assigned Linux sends AAAA queries first Linux sends all suffix completions of AAAA first, then A FreeBSD, Linux and old Vista send AAAA queries even if don t have reachability Now, if Vista doesn t have address, they don t send AAAA queries Information Sharing Platform Laboratories 27
28 Network environment factors
29 Network environment factors for query increase Number of end users who have addresses Some OSs send AAAA queries even if they don t have reachability Such as FreeBSD, Linux Others factors If the answer was NX-Domain Has A Resource Record, but doesn t have AAAA Resource Record Domain suffix distribution to users by DHCP Information Sharing Platform Laboratories 29
30 Number of end users who have addresses environment in Japan Many ISPs already provide connectivity services to end users e.g., NTT, Yahoo, IIJ, KDDI, and nifty, for example (The market share of these large ISPs is about 60-70% of all broadband users) ISPs use for their streaming services and IPphone services, for example. Global addresses are assigned to end hosts Vista will send AAAA queries Information Sharing Platform Laboratories 30
31 Share of large ISP s DNS cache queries, from users (2006/10 one day total) AAAA 4% CNAME 0% NS 0% PTR 20% MX 10% SOA SRV ANY other 1% 1% 1% 2% A 61% A PTR NS CNAME AAAA MX SOA SRV ANY other Information Sharing Platform Laboratories 31
32 Expected increase in number of user queries Number of queries If a number of -enabled end users increases, a number of AAAA queries will increase A AAAA MX A AAAA MX A other TXT SRV ANY A6 AAAA CNAME SOA NS PTR MX A Before Netsky (2004/2) Now (2006) after OSs Information Sharing Platform Laboratories 32
33 Conclusion If a number of -enabled end users increases, a number of AAAA queries will increase The number of query increase depends on -enabled OSs and Applications implementation Some OSs send AAAA queries even if hasn t reachability As for Vista, the impact was minimized We have to prepare increase in number of DNS queries Cache servers should be prepared for those increases Large ISPs Cache servers (that use load balancing) would be better off preparing for those increases Preparing authoritative servers for increases would be better Is current search order of resolvers & applications appropriate? Should transport DNS be used? Information Sharing Platform Laboratories 33
34 Thank you.
Clear and Present Danger Increase in Number of DNS AAAA Queries
Clear and Present Danger Increase in Number of DNS AAAA Queries NTT Information Sharing Platform Labs Tsuyoshi Toyono, Keisuke Ishibashi, and Katsuyasu Toyama {toyono, isibasi, toyama}@nttv6.net 1 Outline
Motivation. Domain Name System (DNS) Flat Namespace. Hierarchical Namespace
Motivation Domain Name System (DNS) IP addresses hard to remember Meaningful names easier to use Assign names to IP addresses Name resolution map names to IP addresses when needed Namespace set of all
DNS. Computer networks - Administration 1DV202. fredag 30 mars 12
DNS Computer networks - Administration 1DV202 DNS History Who needs DNS? The DNS namespace How DNS works The DNS database The BIND software Server and client configuration The history of DNS RFC 882 and
How do I get to www.randomsite.com?
Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local
Use Domain Name System and IP Version 6
Use Domain Name System and IP Version 6 What You Will Learn The introduction of IP Version 6 (IPv6) into an enterprise environment requires some changes both in the provisioned Domain Name System (DNS)
DNS ActiveX Control for Microsoft Windows. Copyright Magneto Software All rights reserved
DNS ActiveX Control for Microsoft Windows Copyright Magneto Software All rights reserved 1 DNS Overview... 3 1.1 Introduction... 3 1.2 Usage... 3 1.3 Property... 4 1.4 Event... 4 1.5 Method... 4 1.6 Error
Domain Name System 2015-04-28 17:49:44 UTC. 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement
Domain Name System 2015-04-28 17:49:44 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Domain Name System... 4 Domain Name System... 5 How DNS Works
Domain Name System (DNS) Fundamentals
Domain Name System (DNS) Fundamentals Mike Jager Network Startup Resource Center [email protected] These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International
Installing and Setting up Microsoft DNS Server
Training Installing and Setting up Microsoft DNS Server Introduction Versions Used Windows Server 2003 Setup Used i. Server Name = martini ii. Credentials: User = Administrator, Password = password iii.
Application-layer protocols
Application layer Goals: Conceptual aspects of network application protocols Client server paradigm Service models Learn about protocols by examining popular application-level protocols HTTP DNS Application-layer
Copyright 2012 http://itfreetraining.com
In order to find resources on the network, computers need a system to look up the location of resources. This video looks at the DNS records that contain information about resources and services on the
IPv6 Support in the DNS. Workshop Name Workshop Location, Date
IPv6 Support in the DNS Workshop Name Workshop Location, Date Agenda How important is the DNS? DNS Resource Lookup DNS Extensions for IPv6 Lookups in an IPv6-aware DNS Tree About Required IPv6 Glue in
DNS Resolving using nslookup
DNS Resolving using nslookup Oliver Hohlfeld & Andre Schröder January 8, 2007 Abstract This report belongs to a talk given at the networking course (Institue Eurecom, France) in January 2007. It is based
The Use of DNS Resource Records
International Journal of Advances in Electrical and Electronics Engineering 230 Available online at www.ijaeee.com & www.sestindia.org/volume-ijaeee/ ISSN: 2319-1112 Simar Preet Singh Systems Engineer,
How to Add Domains and DNS Records
How to Add Domains and DNS Records Configure the Barracuda NextGen X-Series Firewall to be the authoritative DNS server for your domains or subdomains to take advantage of Split DNS or dead link detection.
Networking Domain Name System
System i Networking Domain Name System Version 5 Release 4 System i Networking Domain Name System Version 5 Release 4 Note Before using this information and the product it supports, read the information
netkit lab dns Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group Version Author(s)
Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group netkit lab dns Version Author(s) E-mail Web Description 2.2 G. Di Battista, M. Patrignani, M.
- Domain Name System -
1 Name Resolution - Domain Name System - Name resolution systems provide the translation between alphanumeric names and numerical addresses, alleviating the need for users and administrators to memorize
Application Protocols in the TCP/IP Reference Model
Application Protocols in the TCP/IP Reference Model File Transfer E-Mail Network Management WWW Virtual Terminal Name Service File Transfer HTTP FTP Telnet SMTP DNS SNMP TFTP Internet protocols TCP UDP
Lab 2. CS-335a. Fall 2012 Computer Science Department. Manolis Surligas [email protected]
Lab 2 CS-335a Fall 2012 Computer Science Department Manolis Surligas [email protected] 1 Summary At this lab we will cover: Basics of Transport Layer (TCP, UDP) Broadcast ARP DNS More Wireshark filters
Application. Transport. Network. Data Link. Physical. Network Layers. Goal
Layers Goal Understand how application processes set up a connection and exchange messages. Understand how addresses are determined 1 2 Data Exchange Between Processes TCP Connection-Setup Between Processes
LAN TCP/IP and DHCP Setup
CHAPTER 2 LAN TCP/IP and DHCP Setup 2.1 Introduction In this chapter, we will explain in more detail the LAN TCP/IP and DHCP Setup. 2.2 LAN IP Network Configuration In the Vigor 2900 router, there are
Application Protocols in the TCP/IP Reference Model. Application Protocols in the TCP/IP Reference Model. DNS - Concept. DNS - Domain Name System
Application Protocols in the TCP/IP Reference Model Application Protocols in the TCP/IP Reference Model File Transfer E-Mail Network Management Protocols of the application layer are common communication
How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On
Transport and Security Specification 15 July 2015 Version: 5.9 Contents Overview 3 Standard network requirements 3 Source and Destination Ports 3 Configuring the Connection Wizard 4 Private Bloomberg Network
Inbound Load Balance. User Manual
Inbound Load Balance User Manual 1 Inbound Load Balance Qno Firewall/Router not only supports efficient Outbound Load Balance, but Inbound Load Balance. It distributes inbound traffic equally to every
Introduction to Network Operating Systems
As mentioned earlier, different layers of the protocol stack use different kinds of addresses. We can now see that the Transport Layer (TCP) uses port addresses to route data to the correct process, the
IPv6 support in the DNS
IPv6 support in the DNS How important is the DNS? Getting the IP address of the remote endpoint is necessary for every communication between TCP/IP applications Humans are unable to memorize millions of
IPv6 Tunneling Over IPV4
www.ijcsi.org 599 IPv6 Tunneling Over IPV4 A.Sankara Narayanan 1, M.Syed Khaja Mohideen 2, M.Chithik Raja 3 Department of Information Technology Salalah College of Technology Sultanate of Oman ABSTRACT
Non-authoritative answer: home.web.cern.ch canonical name = drupalprod.cern.ch. Name: drupalprod.cern.ch Address: 137.138.76.28
1. Run nslookup to obtain the IP address of a Web server in Europe. frigate:desktop drb$ nslookup home.web.cern.ch Server: 130.215.32.18 Address: 130.215.32.18#53 Non-authoritative answer: home.web.cern.ch
DNS Conformance Test Specification For Client
DNS Conformance Test Specification For Client Revision 1.0 Yokogawa Electric Corporation References This test specification focus on following DNS related RFCs. RFC 1034 DOMAIN NAMES - CONCEPTS AND FACILITIES
Network Layers. CSC358 - Introduction to Computer Networks
Network Layers Goal Understand how application processes set up a connection and exchange messages. Understand how addresses are determined Data Exchange Between Application Processes TCP Connection-Setup
Networking Domain Name System
System i Networking Domain Name System Version 6 Release 1 System i Networking Domain Name System Version 6 Release 1 Note Before using this information and the product it supports, read the information
Introduction to DNS CHAPTER 5. In This Chapter
297 CHAPTER 5 Introduction to DNS Domain Name System (DNS) enables you to use hierarchical, friendly names to easily locate computers and other resources on an IP network. The following sections describe
DNS & IPv6. Agenda 4/14/2009. MENOG4, 8-9 April 2009. Raed Al-Fayez SaudiNIC CITC [email protected], www.nic.net.sa. DNS & IPv6.
DNS & IPv6 MENOG4, 8-9 April 2009 Raed Al-Fayez SaudiNIC CITC [email protected], www.nic.net.sa Agenda DNS & IPv6 Introduction What s next? SaudiNIC & IPv6 About SaudiNIC How a cctld Registry supports
DNS Basics. DNS Basics
DNS Basics 1 A quick introduction to the Domain Name System (DNS). Shows the basic purpose of DNS, hierarchy of domain names, and an example of how the DNS protocol is used. There are many details of DNS
Lecture 2 CS 3311. An example of a middleware service: DNS Domain Name System
Lecture 2 CS 3311 An example of a middleware service: DNS Domain Name System The problem Networked computers have names and IP addresses. Applications use names; IP uses for routing purposes IP addresses.
DNS. Computer Networks. Seminar 12
DNS Computer Networks Seminar 12 DNS Introduction (Domain Name System) Naming system used in Internet Translate domain names to IP addresses and back Communication works on UDP (port 53), large requests/responses
what s in a name? taking a deeper look at the domain name system mike boylan penn state mac admins conference
what s in a name? taking a deeper look at the domain name system mike boylan penn state mac admins conference whoami work for robert morris university, pittsburgh, pa primarily mac and voip admin @mboylan
TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline
OSI Seven Layer Model & Seminar Outline TCP/IP Fundamentals This seminar will present TCP/IP communications starting from Layer 2 up to Layer 4 (TCP/IP applications cover Layers 5-7) IP Addresses Data
Domain Name System (DNS) Session-1: Fundamentals. Ayitey Bulley [email protected]
Domain Name System (DNS) Session-1: Fundamentals Ayitey Bulley [email protected] Computers use IP addresses. Why do we need names? Names are easier for people to remember Computers may be moved between
Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
Configuration Notes 0215
Mediatrix Digital and Analog VoIP Gateways DNS SRV Configuration for a Redundant Server Solution (SIP) Introduction... 2 Deployment Scenario... 2 DNS SRV (RFC 2782)... 3 Microsoft Server Configuration...
Configuring your network settings to use Google Public DNS
Configuring your network settings to use Google Public DNS When you use Google Public DNS, you are changing your DNS "switchboard" operator from your ISP to Google Public DNS. In most cases, the IP addresses
Chapter 4 Firewall Protection and Content Filtering
Chapter 4 Firewall Protection and Content Filtering This chapter describes how to use the content filtering features of the ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN to protect your network.
Troubleshooting Tools
Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Notes n The commands/programs
DNS and E-mail Interface User Guide
DNS and E-mail Interface User Guide Document Revision 04 // 2012 www.twcbc.com back back to TOC to TOC Header Text and Info Table of Contents 1. Introduction 3 2. Accessing the Application 4 3. Working
Lesson 13: DNS Security. Javier Osuna [email protected] GMV Head of Security and Process Consulting Division
Lesson 13: DNS Security Javier Osuna [email protected] GMV Head of Security and Process Consulting Division Introduction to DNS The DNS enables people to use and surf the Internet, allowing the translation
Chapter 3 Restricting Access From Your Network
Chapter 3 Restricting Access From Your Network This chapter describes how to use the content filtering and reporting features of the RangeMax Dual Band Wireless-N Router WNDR3300 to protect your network.
WARP 3.0 Table of Contents
WARP 3.0 Table of Contents Overview................................................. 1 Chapter 1: Initial Setup Quick Install Instructions......................................4 Chapter 2: Interfaces LAN.....................................................6
Global Server Load Balancing (GSLB) Concepts
Global Server Load Balancing (GSLB) Concepts Section Section Objectives GSLB Overview GSLB Configuration Options GSLB Components Server Mode Configuration 2 Global Server Load Balancing (GSLB) Key ACOS
IPv6-only hosts in a dual stack environnment
IPv6-only hosts in a dual stack environnment using Free Software Frédéric Gargula, Grégoire Huet Background on IPv4 and IPv6 usage IPv4 addresses depletion doesn't need to be reminded No straight way exists
Chapter 2 Connecting the FVX538 to the Internet
Chapter 2 Connecting the FVX538 to the Internet Typically, six steps are required to complete the basic connection of your firewall. Setting up VPN tunnels are covered in Chapter 5, Virtual Private Networking.
Enterprise Architecture Office Resource Document Design Note - Domain Name System (DNS)
Date: 8/27/2012 Enterprise Architecture Office Resource Document Design Note - Domain Name System (DNS) Table of Contents 1 Overview...2 1.1 Other Resources...2 1.1.1 State of Minnesota Standards and Guidelines...2
Parallels Plesk Panel User Guide
Parallels Plesk Panel User Guide Page 1 of 31 Parallels Plesk Panel User Guide Table of contents Parallels Plesk Panel User Guide... 2 Table of contents... 2 Introduction... 3 Before you begin... 3 Logging
Basic IPv6 WAN and LAN Configuration
Basic IPv6 WAN and LAN Configuration This quick start guide provides basic IPv6 WAN and LAN configuration information for the ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N. For complete IPv6 configuration
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
How To Guide Edge Network Appliance How To Guide:
How To Guide Edge Network Appliance How To Guide: ActiveDNS v 4.01 Edge Network Appliance How To Guide: ActiveDNS 2007 XRoads Networks 17165 Von Karman, Suite 112 888-9-XROADS v 4.01 updated 09/11/07 Table
CS3250 Distributed Systems
CS3250 Distributed Systems Lecture 4 More on Network Addresses Domain Name System DNS Human beings (apart from network administrators and hackers) rarely use IP addresses even in their human-readable dotted
IPv4 and IPv6 Integration. Formation IPv6 Workshop Location, Date
IPv4 and IPv6 Integration Formation IPv6 Workshop Location, Date Agenda Introduction Approaches to deploying IPv6 Standalone (IPv6-only) or alongside IPv4 Phased deployment plans Considerations for IPv4
Security of IPv6 and DNSSEC for penetration testers
Security of IPv6 and DNSSEC for penetration testers Vesselin Hadjitodorov Master education System and Network Engineering June 30, 2011 Agenda Introduction DNSSEC security IPv6 security Conclusion Questions
DNS. The Root Name Servers. DNS Hierarchy. Computer System Security and Management SMD139. Root name server. .se name server. .
Computer System Security and Management SMD139 Lecture 5: Domain Name System Peter A. Jonsson DNS Translation of Hostnames to IP addresses Hierarchical distributed database DNS Hierarchy The Root Name
Virtual Private Networks
Virtual Private Networks Jonathan Reed [email protected] MIT IS&T VPN Release Team Overview Basic Networking Terms General Concepts How the VPN works Why it s useful What to watch out for Q&A Networking 101
Looking for Trouble: ICMP and IP Statistics to Watch
Looking for Trouble: ICMP and IP Statistics to Watch Laura Chappell, Senior Protocol Analyst Protocol Analysis Institute [[email protected]] www.packet-level.com www.podbooks.com HTCIA Member,
Internet-Praktikum I Lab 3: DNS
Kommunikationsnetze Internet-Praktikum I Lab 3: DNS Mark Schmidt, Andreas Stockmayer Sommersemester 2015 kn.inf.uni-tuebingen.de Motivation for the DNS Problem IP addresses hard to remember for humans
Domain Name System (DNS)
Lab Objectives Domain Name System (DNS) Acquiring skills related to the Domain Name System (DNS) functions Practical studying of DNS protocol in the process of its functioning Background Information DNS
Internet Guide. Prepared for 55 John Street
Internet Guide Prepared for 55 John Street I. Internet Service How do I connect to the Internet? WiFi (Wireless Connectivity) is available throughout the building. In order to connect, you will need a
Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, 2015. Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik
Network Security Chapter 3 Cornelius Diekmann Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik Version: October 21, 2015 IN2101, WS 15/16, Network Security 1 Security Policies and
Glossary of Technical Terms Related to IPv6
AAAA Record An AAAA record stores a 128-bit Internet Protocol version 6 (IPv6) address, which does not fit the standard A record format. For example, 2007:0db6:85a3:0000:0000:6a2e:0371:7234 is a valid
ECE 4321 Computer Networks. Network Programming
ECE 4321 Computer Networks Network Programming Name Space System.Net Domain Name System (DNS) To resolve computer naming Host database is split up and distributed among multiple systems on the Internet
DNS Domain Name System
Domain Name System DNS Domain Name System The domain name system is usually used to translate a host name into an IP address Domain names comprise a hierarchy so that names are unique, yet easy to remember.
Section 1 Overview... 4. Section 2 Home... 5
ecogent User Guide 2012 Cogent Communications, Inc. All rights reserved. Every effort has been made to ensure that the information in this User Guide is accurate. Information in this document is subject
Actiontec GT784WN Router
Table of Contents General Information...1 Verify Computer Settings...1 Router Installation...3 Configuring Your Router...3 Configuring Your Computer...7 Configuring Your Email...9 General Information Router
IPv6 for AT&T Broadband
IPv6 for AT&T Broadband Chris Chase, AT&T Labs Sept 15, 2011 AT&T Broadband ~15 million subscribers Legacy DSL, PPP subscribers, ATM aggregation Not many CPE IPv6 capable Customer owned, unmanaged CPE
Description: Objective: Attending students will learn:
Course: Introduction to Cyber Security Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,495.00 Description: In 2014 the world has continued to watch as breach after breach results in millions of
Lecture 2-ter. 2. A communication example Managing a HTTP v1.0 connection. G.Bianchi, G.Neglia, V.Mancuso
Lecture 2-ter. 2 A communication example Managing a HTTP v1.0 connection Managing a HTTP request User digits URL and press return (or clicks ). What happens (HTTP 1.0): 1. Browser opens a TCP transport
Static Business Class HSI Basic Installation NETGEAR 7550
Static Business Class HSI Basic Installation Table of Contents Multiple LAN Support... 3 Full BHSI Install Summary... 7 Physical Connections... 8 Auto Configuration... 9 Auto Configuration... 9 Gateway
Appendix D: Configuring Firewalls and Network Address Translation
Appendix D: Configuring Firewalls and Network Address Translation The configuration information in this appendix will help the network administrator plan and configure the network architecture for Everserve.
I've applied for a goipv6 account and received my password via email but I cannot log into my account. What should I do?
goipv6 FAQ goipv6 Account I've applied for a goipv6 account and received my password via email but I cannot log into my account. What should I do? I would like to change my current password. What should
How to set up the Integrated DNS Server for Inbound Load Balancing
How to set up the Integrated DNS Server for Introduction Getting Started Peplink Balance has a built-in DNS server for inbound link load balancing. You can delegate a domain s NS/SOA records, e.g. www.mycompany.com,
The Domain Name System (DNS)
The Domain Name System (DNS) Columbus, OH 43210 [email protected] http://www.cis.ohio-state.edu/~jain/ 24-1 Overview Naming hierarchy hierarchy Name resolution Other information in name servers 24-2
Akamai CDN, IPv6 and DNS security. Christian Kaufmann Akamai Technologies DENOG 5 14 th November 2013
Akamai CDN, IPv6 and DNS security Christian Kaufmann Akamai Technologies DENOG 5 14 th November 2013 Agenda Akamai Introduction Who s Akamai? Intelligent Platform & Traffic Snapshot Basic Technology Akamai
Distributed Systems. 09. Naming. Paul Krzyzanowski. Rutgers University. Fall 2015
Distributed Systems 09. Naming Paul Krzyzanowski Rutgers University Fall 2015 October 7, 2015 2014-2015 Paul Krzyzanowski 1 Naming things Naming: map names to objects Helps with using, sharing, and communicating
Discovering IPv6 with Wireshark. presented by Rolf Leutert
Discovering IPv6 with Wireshark presented by Rolf Leutert Instructor: Rolf Leutert, Network Expert & Trainer Leutert NetServices Troubleshooting & Trainings Zürich-Airport, Switzerland Sniffer certified
Chapter 4 Restricting Access From Your Network
Chapter 4 Restricting Access From Your Network This chapter describes how to use the content filtering and reporting features of the RangeMax NEXT Wireless Router WNR834B to protect your network. You can
Initial Access and Basic IPv4 Internet Configuration
Initial Access and Basic IPv4 Internet Configuration This quick start guide provides initial and basic Internet (WAN) configuration information for the ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
This Lecture. The Internet and Sockets. The Start 1969. If everyone just sends a small packet of data, they can all use the line at the same.
This Lecture The Internet and Sockets Computer Security Tom Chothia How the Internet works. Some History TCP/IP Some useful network tools: Nmap, WireShark Some common attacks: The attacker controls the
IP addressing. Interface: Connection between host, router and physical link. IP address: 32-bit identifier for host, router interface
IP addressing IP address: 32-bit identifier for host, router interface Interface: Connection between host, router and physical link routers typically have multiple interfaces host may have multiple interfaces
Lab - Observing DNS Resolution
Objectives Part 1: Observe the DNS Conversion of a URL to an IP Address Part 2: Observe DNS Lookup Using the Nslookup Command on a Web Site Part 3: Observe DNS Lookup Using the Nslookup Command on Mail
Tunnel Client FAQ. Table of Contents. Version 0v5, November 2014 Revised: Kate Lance Author: Karl Auer
Tunnel Client FAQ Version 0v5, November 2014 Revised: Kate Lance Author: Karl Auer Table of Contents A. Tunnelling 1 How does tunnelling work? 2 What operating systems are supported? 3 Where can I get
DNS : Domain Name System
1/30 DNS : Domain Name System Surasak Sanguanpong [email protected] http://www...ac.th/~nguan Last updated: May 24, 1999 Outline 2/30 DNS basic name space name resolution process protocol configurations Why
Local DNS Attack Lab. 1 Lab Overview. 2 Lab Environment. SEED Labs Local DNS Attack Lab 1
SEED Labs Local DNS Attack Lab 1 Local DNS Attack Lab Copyright c 2006 Wenliang Du, Syracuse University. The development of this document was partially funded by the National Science Foundation s Course,
AusCERT Remote Monitoring Service (ARMS) User Guide for AusCERT Members
AusCERT Remote Monitoring Service (ARMS) User Guide for AusCERT Members Last updated: 27/06/2014 Contents 1 Introduction... 2 1.1 What is ARMS?... 2 1.2 Glossary Terms... 2 2 Setting up your ARMS configuration
