Managing the Co-existing Network of IPv6 and IPv4 under Various Transition Mechanisms

Size: px
Start display at page:

Download "Managing the Co-existing Network of IPv6 and IPv4 under Various Transition Mechanisms"

Transcription

1 Managing the Co-existing Network of IPv6 and IPv4 under Various Transition Mechanisms I-Ping Hsieh Shang-Juh Kao Department of Computer Science National Chung-Hsing University 250 Kuo-Kuang Rd., Taichung, 402, Taiwan { iphsieh, sjkao }@cs.nchu.edu.tw TEL: #708 FAX: Abstract Even though IPv6 has been developed for more than a decade, IPv4 is still the most commonly adopted network protocol. However, the significant changes in the new version may cause the transition procedure to continue for several years. Currently, three transition mechanisms, Dual Stack, Tunneling, and Translation, are proposed to solve the problems due to the co-existence of IPv6 and IPv4. In many occasions, there could be more than one transition mechanism between network connections. In order to effectively manage the co-existing environment with various transition mechanisms, this paper presents a practical approach to deal with the management of co-existing networks. In this approach, we firstly determine the underlying transitions by gathering and analyzing corresponding IPv6 addresses. Once transitions are discovered, appropriate management facilities are developed and applied accordingly. Keywords: IPv6, co-existing network, network management 1 Introduction It has been more than a decade for the replacement preparation of IPv4 with IPv6. The long duration is due to the significant and essential changes between these two versions. In order to help users and vendors to migrate to IPv6 smoothly, the IETF s ngtrans 1 activity presented several transition operations required either within a host or between hosts. Within a host, equipping the current Internet Protocol with IPv6 software has been widely applied to add a host to IPv6 community. Between two sites, tunneling focus on IPv6-only to IPv6-only communications and translation addresses communications between IPv6-only and IPv4-only nodes. As a consequence, three transition mechanisms[1] have been launched: Dual Stack, Tunneling, and Translation. These transition mechanisms enable IPv6 traffic transferred over existing IP networks. However, the co-existent environment causes management tasks more complicated. Even worse, there could have two or more transition mechanisms which are simultaneously adopted in an existing IP 1

2 network. How to determine which transition mechanism is applied and to effectively manage the co-existing network are the main theme of this paper. Both transition determination and corresponding management functions are reported. During the transition determination phase, gathering and analyzing all IPv6 addresses in managed scope via exchanging a series of ICMPv6[2] messages is applied to distinguish among various transition methods. Regarding of the management task, based on results of transition discovery, appropriate management functions are proposed. In this paper, we present a practical solution for co-existing network management. In Section 2, we review fundamental transition mechanisms and related management tools. An approach to distinguish among various transition mechanisms is presented in Section 3. Also in this section, several co-existent management facilities are reported accordingly. Finally, a conclusion and several future enhancements are given. could be used to distinguish IPv6 from IPv4, as the value 0x86dd and 0x0800 respectively. Under this transition mechanism, management information of both IP versions could be retrieved via IPv4 messages. However, an exceptional restriction is that the management agent or monitoring tool should be able to collect IPv6 traffic, or say that management agent or tool should support IPv6. For instance, NetFlow[3] version 9, a flow monitor developed by Cisco, could collect both IPv6 and IPv4 traffic information of a dual stack host and export them to a back-end NMS via IPv4. 2 Transition Mechanisms and Related Management Tools As mentioned in the previous section, there exist threes transition mechanisms: Dual Stack, Tunneling, and Translation. In this section we will explore these mechanisms and report several related management tools Dual Stack The simplest transition mechanism, dual stack, as illustrated in Figure 2.1, is that a host equipped with both IPv6 and IPv4 protocol stacks. The protocol field of Ethernet header Figure 2.1 Dual Stack Architecture 2.2. Tunneling The second transition mechanism is tunneling. As shown in Figure 2.2, the operational scheme of tunneling treats the whole IPv6 packet as the payload of an IPv4 packet. That is, IPv6 packets are transmitted over IPv4 network. This mechanism allows IPv6 networks to connect with each other using IPv4 traffic.

3 Figure 2.2 IPv6 Tunneling over IPv4 Based on the operation of packet encapsulating, various implementations of tunneling, such as 6to4[4], ISATAP[5], and Teredo[5], were developed. 6to4 is the most popular one. It effectively enables the communication between two IPv6-only networks over existing IPv4 environment. Another popular tunneling implementation could be ISATAP. ISATAP allows an isolated IPv6 host, in fact, a Dual Stack host, to connect to IPv6-only networks. These two methods could be well operated if the IPv4 NAT[7] mechanism is not adopted in between two IPv6 networks. Teredo was developed so that a tunnel can be constructed even when the NAT exists. With tunneling, all management components such as agent, MIB, NMS, and management protocol itself, must cooperate using the elements of IPv6. The latest version of HP OpenView[8], a network management system, provides such solution but it s expensive Translation To connect IPv6-only and IPv4-only networks, translation gateway is applied. As shown in Figure 2.3, translation mechanism works as a gateway to translate between IPv6 and IPv4 packet headers. The SIIT[9] algorithm was developed to build bidirectional translation rules between IPv6 and IPv4 header, as well as between ICMPv6 and ICMPv4 packets. The well-known translator, NAT-PT[10], was implemented based on SIIT. Figure 2.3 Translation Mechanism Figure 2.4 Management via proxy Agent To deal with management tasks across both sides of a translation gateway, in [11], the authors proposed an approach that the translation gateway plays as a proxy agent. Figure 2.4 shows the architecture. Management commands from one side should be translated, if necessary, and forwarded to the target device. The management tool, IPv6 Management Gateway[12], allows, under an existing IPv4 network management platform, a manager to manage the native IPv6 network by translating SNMP, ICMP and TCP protocol messages between IPv4 and IPv6 networks Variations of Transition Mechanisms Of various transition implementations, not only the operational flow but also the address specifications are different. Practically, IPv6 address plays an important role in discovering the implementation of each transition type. In fact, every transition implementation has its own specific address requirement. Table 2.1 lists the differentiation of various common transition

4 implementations. Table 2.1 Classifying Several Transition Mechanisms Types Connectivity Transition Address Specification Dual Stack 4-to-4 over 4 6-to-6 over 6 Dual Stack IPv4 address IPv6 address 6to4 6-to-6 over 4 Tunnel 2002:IPv4 address/48 ISATAP 6-to-6 over 4 Tunnel IPv6 Prefix/64+ ::5EFE:IPv4 address/64 Teredo 6-to-6 over 4 Tunnel 3FFE:831F/32 SIIT 6-to-4, 4-to-6 Translation ::FFFF: IPv4 address/96 In reality, more than one transition type s could be involved in a co-existing network. For example, in Figure 2.2, tunneling is used to connect two IPv6-only networks, while both routers are dual-stacked. In such hybrid environment, a NMS must handle management tasks under multiple transition mechanisms. sition type is adopted in a co-existing network. Thus, to gather all IPv6 addresses assigned to all interfaces inside the managed network is the first step for managing a co-existing network. The operational procedure of gathering all IP addresses within managed scope is first to get one legal IPv6 address of managed scope and then to 3 Co-existing Network Management Each of three transition mechanisms mentioned query all IP addresses by exchanging ICMP messages with other interfaces. Ipv6 supports two automatic address configuration mechanisms, Stateless Address Autoconfiguration[13] and Dynamic Host Configuration in the last section may have many imple- mentations. In order to manage a co-existing network, it is necessary to differentiate among various transition mechanisms as well as different implementations of each transition. Consequently, an appropriate management approach for co-existing networks should include two parts. First of all, distinction among detailed transition methods is carried out. Secondly, appropriate management facilities are developed and applied correspondingly. Protocol version 6[14]. Initially, an IPv6 address could be assigned via either configuration. If the managed network does not provide either mechanism or the NMS doesn t appear in the managed network, the manager should manually enter a legal IPv6 address. After obtaining an address, we send ICMPv6 Neighbor Solicitation[15] messages to network to be managed, and then, all active interfaces would respond ICMPv6 Neighbor Advertisement[15] messages. Eventually, all MAC addresses of active interfaces can be obtained. Next, we send 3.1. Determination of Transition Types out Inverse Neighbor Solicitation[16] messages to all alive interfaces, and receive the replied As indicated in Table 2.1, IPv6 address is a valuable information for determining which tran- Inverse Neighbor Advertisement[16] messages. From the reply messages, all IPv6 addresses are

5 expected to be included. And, this is the way we gather all IPv6 addresses within the managed network. Finally, we deliver IPv4 RARP[17] messages to detect any IPv4 capable node inside managed network. Once all addresses are obtained, we are able to determine which types of transitions are utilized in the co-existing network, by the address specification in Table Management Facilities The second part of co-existence network management is to develop appropriate management facilities. The facilities are strongly relied upon the designated transition types over the co-existing network. Three management facilities: topology discovery, detection of IP misusing, and traffic monitoring, which are well-developed in IPv4 networks, are taken as examples to demonstrate the co-existing network management. Network topology plays a critical role for managing a network system efficiently. In [18], the authors proposed an excellent topology discovery algorithm which mainly adopts SNMP to get related MIBs in IPv4 network. Under the translation mechanism, the algorithm could be effectively executed to depict the native IPv6 network topology. IPv6 Management Gateway, an implementation of translation mechanism, could switch related SNMP commands and target MIB objects between heterogeneous IP networks. However, two management components, agent and MIB, should support IPv6 when the network devices are located within the IPv6 network. In order to execute the algorithm in tunneling environment, not only all management components, but also the algorithm itself should support IPv6. Modification of target MIB objects for retrieving exact information should be done to guarantee the correct execution. Under dual stack mechanism, the management protocol remains unchanged since the communication could be constructed via IPv4 messages. To provide a fair network access environment, preventing IP address from misusing and equally distributing network bandwidth are imperatively. In [19], the authors presented an approach to deal with these two problems via SNMP. Along with the utilization of topology discovery algorithm, it is useful and easy to implement under translation gateway. However, modifications are necessary in order to apply to the co-existing network using dual stack or tunneling mechanism. Of these three management facilities, the IPv6 supporting status under various transition mechanisms can be summarized as listed in Table 3.1. In this table, U indicates that the management components are not necessary to support IPv6, while N denotes that the IPv6 support is necessary for management components. Table 3.1 Conditions of Management components under transition mechanisms Agent MIB Protocol Tools Dual Stack N N U N Tunneling N N N N Translation N N U U N: necessary for supporting IPv6 U: unnecessary for supporting IPv6 4 Conclusions Due to the significant differences of both IP versions, fully deployment of IPv6 could take for

6 years. Until then, management of co-existing network remains and is more challenging. More than one transitions could be employed in a network connection, which cause the co-existing management even more difficult. In this paper, we first review various transition mechanisms. Then, we propose a practical solution to manage co-existing networks. In our approach, transition methods deployed in the system is first determined. Both ICMPv6 and ICMPv4 messages are used to gather all IP addresses within the network for the determination of transition mechanisms. Depending upon the discovery, several management facilities are developed to support the co-existing network management. Management facilities including topology discovery, detection of IP misusing, and traffic monitoring are reported. Since the co-existent environment is transient, our network management system should be flexible to cope with whatever changes in the future. Consequently, modular design and robustness are preferred. As mobile devices gaining popular, how to safely provide a network services also imposes another challenge to the management problem. In addition, mobility issue and security concern are getting apparent and important, and must be cooperated with the management system. References [1] R. Gilligan, and E. Nordmark, Transitions Mechanisms for IPv6 Hosts and Routers, RFC2893. [2] A. Conta, and S. Deering, Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification, RFC2463. [3] NetFlow, protocol_family_home.html. [4] B. Carpenter, and K. Moore, Connection of IPv6 Domains via IPv4 Clouds, RFC3056 [5] F. Templin, T. Gleeson, M. Talwar, and D. Thaler, Intra-Site Automatic Tunnel Addressing Protocol (ISATAP), IETF draft, draft-ietf-ngtransisatap-14.txt, work in progress, Aug [6] C. Huitema, Teredo: Tunneling IPv6 over UDP through NATs, IETF draft, draft-huitema-v6ops-teredo-00.txt, work in progress, June [7] P. Srisuresh, and K. Egevang, Traditional IP Network Address Translator (Traditional NAT), RFC3022. [8] HP OpenView, ucts/. [9] E. Nordmark, Stateless IP/ICMP Translation Algorithm (SIIT), RFC2765. [10] G. Tsirtsis, and P. Srisuresh, Network Address Translation - Protocol Translation (NAT-PT), RFC2766. [11] G.M. Keeni,, K. Koide, D. Chakraborty, and N. Shiratori, SNMP in the IPv6 context, Applications and the Internet Workshops, Jan. 2003, pp [12] IPv6 Management Gateway, [13] S. Thomson, and T. Narten, IPv6 Stateless Address Autoconfiguration, RFC2462. [14] R. Droms, Ed., J. Bound, B. Volz, T. Lemon, C. Perkins, and M. Carney, Dynamic Host Configuration Protocol for IPv6 (DHCPv6), RFC3315. [15] T. Narten, E. Nordmark, and W. Simpson,

7 Neighbor Discovery for IP Version 6 (IPv6), RFC2461 [16] A. Conta, Extensions to IPv6 Neighbor Discovery for Inverse Discovery Specification, RFC3122 [17] R. Finlayson, T. Mann, J.C. Mogul, and M. Theimer, Reverse Address Resolution Protocol, RFC903. [18] Fu-Min Chang, Lai-Ming Shiue, and Shang-Juh Kao, "A Practical Approach for Network Topology Discovery", The 8th World Multi-Conference on Systemics, Cybernetics and Informatics, Orlando, Florida, USA, July 18-21, [19] I-Ping Hsieh, Lai-Ming Shiue, and Shang-Juh Kao, "Implementation of a Department Local Area Network Management System", 33rd International Conference on Computer and Industrial Engineering, Jeju, Korea, March 25-27, 2004.

IPv4 and IPv6 Integration. Formation IPv6 Workshop Location, Date

IPv4 and IPv6 Integration. Formation IPv6 Workshop Location, Date IPv4 and IPv6 Integration Formation IPv6 Workshop Location, Date Agenda Introduction Approaches to deploying IPv6 Standalone (IPv6-only) or alongside IPv4 Phased deployment plans Considerations for IPv4

More information

IPv6 Fundamentals: A Straightforward Approach

IPv6 Fundamentals: A Straightforward Approach IPv6 Fundamentals: A Straightforward Approach to Understanding IPv6 Rick Graziani Cisco Press 800 East 96th Street Indianapolis, IN 46240 IPv6 Fundamentals Contents Introduction xvi Part I: Background

More information

Moonv6 Test Suite DRAFT

Moonv6 Test Suite DRAFT Moonv6 Test Suite DHCP Interoperability Test Suite DRAFT Technical Document Revision 0.1 IPv6 Consortium 121 Technology Drive, Suite 2 InterOperability Laboratory Durham, NH 03824-3525 Research Computing

More information

Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX

Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX Martin Elich 1,3, Matěj Grégr 1,2 and Pavel Čeleda1,3 1 CESNET, z.s.p.o., Prague, Czech Republic 2 Brno University of Technology,

More information

ProCurve Networking IPv6 The Next Generation of Networking

ProCurve Networking IPv6 The Next Generation of Networking ProCurve Networking The Next Generation of Networking Introduction... 2 Benefits from... 2 The Protocol... 3 Technology Features and Benefits... 4 Larger number of addresses... 4 End-to-end connectivity...

More information

Deploying IPv6 Service Across Local IPv4 Access Networks

Deploying IPv6 Service Across Local IPv4 Access Networks Deploying IPv6 Service Across Local IPv4 Access Networks ALA HAMARSHEH 1, MARNIX GOOSSENS 1, RAFE ALASEM 2 1 Vrije Universiteit Brussel Department of Electronics and Informatics ETRO Building K, Office

More information

Dedication Preface 1. The Age of IPv6 1.1 INTRODUCTION 1.2 PROTOCOL STACK 1.3 CONCLUSIONS 2. Protocol Architecture 2.1 INTRODUCTION 2.

Dedication Preface 1. The Age of IPv6 1.1 INTRODUCTION 1.2 PROTOCOL STACK 1.3 CONCLUSIONS 2. Protocol Architecture 2.1 INTRODUCTION 2. Dedication Preface 1. The Age of IPv6 1.1 INTRODUCTION 1.2 PROTOCOL STACK 1.3 CONCLUSIONS 2. Protocol Architecture 2.1 INTRODUCTION 2.2 COMPARISONS OF IP HEADER FORMATS 2.3 EXTENSION HEADERS 2.3.1 Options

More information

IPv4/IPv6 Transition Mechanisms. Luka Koršič, Matjaž Straus Istenič

IPv4/IPv6 Transition Mechanisms. Luka Koršič, Matjaž Straus Istenič IPv4/IPv6 Transition Mechanisms Luka Koršič, Matjaž Straus Istenič IPv4/IPv6 Migration Both versions exist today simultaneously Dual-stack IPv4 and IPv6 protocol stack Address translation NAT44, LSN, NAT64

More information

CIRA s experience in deploying IPv6

CIRA s experience in deploying IPv6 CIRA s experience in deploying IPv6 Canadian Internet Registration Authority (CIRA) Jacques Latour Director, Information Technology Ottawa, April 29, 2011 1 About CIRA The Registry that operates the Country

More information

Neighbour Discovery in IPv6

Neighbour Discovery in IPv6 Neighbour Discovery in IPv6 Andrew Hines Topic No: 17 Email: hines@zitmail.uni-paderborn.de Organiser: Christian Schindelhauer University of Paderborn Immatriculation No: 6225220 August 4, 2004 1 Abstract

More information

REDUCING PACKET OVERHEAD IN MOBILE IPV6

REDUCING PACKET OVERHEAD IN MOBILE IPV6 REDUCING PACKET OVERHEAD IN MOBILE IPV6 ABSTRACT Hooshiar Zolfagharnasab 1 1 Department of Computer Engineering, University of Isfahan, Isfahan, Iran hoppico@eng.ui.ac.ir hozo19@gmail.com Common Mobile

More information

IPv6 Fundamentals Ch t ap 1 er I : ntroducti ti t on I o P IPv6 Copyright Cisco Academy Yannis Xydas

IPv6 Fundamentals Ch t ap 1 er I : ntroducti ti t on I o P IPv6 Copyright Cisco Academy Yannis Xydas IPv6 Fundamentals Chapter 1: Introduction ti to IPv6 Copyright Cisco Academy Yannis Xydas The Network Today The Internet of today is much different that it was 30, 15 or 5 years ago. 2 Technology Tomorrow

More information

IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region

IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express

More information

IETF IPv6 Request for Comments (RFCs) Updated 2008-12-01

IETF IPv6 Request for Comments (RFCs) Updated 2008-12-01 IETF IPv6 Request for Comments (RFCs) Updated 2008-12-01 RFC Title 5380 Hierarchical Mobile IPv6 (HMIPv6) Mobility Management 5350 IANA Considerations for the IPv4 and IPv6 Router Alert Options 5340 OSPF

More information

Firewalls und IPv6 worauf Sie achten müssen!

Firewalls und IPv6 worauf Sie achten müssen! Firewalls und IPv6 worauf Sie achten müssen! Pascal Raemy CTO Asecus AG pascal.raemy@asecus.ch Asecus AG Asecus AG Security (Firewall, Web-Gateway, Mail-Gateway) Application Delivery (F5 Neworks with BIGIP)

More information

Global Mobile IPv6 Addressing using Transition Mechanisms

Global Mobile IPv6 Addressing using Transition Mechanisms Edgard Jamhour, Simone Storoz Graduate Program in Applied Computer Science, Pontifical Catholic University of Paraná, Brazil. jamhour@ppgia.pucpr.br simones@ppgia.pucpr.br maziero@ppgia.pucpr.br Abstract

More information

IPv4 and IPv6: Connecting NAT-PT to Network Address Pool

IPv4 and IPv6: Connecting NAT-PT to Network Address Pool Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(5):547-553 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Intercommunication Strategy about IPv4/IPv6 coexistence

More information

Personal Firewall Default Rules and Components

Personal Firewall Default Rules and Components Personal Firewall Default Rules and Components The Barracuda Personal Firewall comes with a default access ruleset. The following tables aim to give you a compact overview of the default rules and their

More information

DNS Extensions to Support Location Management in IP Networks

DNS Extensions to Support Location Management in IP Networks DNS Extensions to Support Location Management in IP Networks Alexandros Kaloxylos, Stathes Hadjiefthymiades, Lazaros Merakos Communication Networks Laboratory, Department of Informatics, University of

More information

19531 - Telematics. 9th Tutorial - IP Model, IPv6, Routing

19531 - Telematics. 9th Tutorial - IP Model, IPv6, Routing 19531 - Telematics 9th Tutorial - IP Model, IPv6, Routing Bastian Blywis Department of Mathematics and Computer Science Institute of Computer Science 06. January, 2011 Institute of Computer Science Telematics

More information

Practical IPv6 Monitoring on Campus

Practical IPv6 Monitoring on Campus Practical IPv6 Monitoring on Campus Best Practice Document Produced by the CESNET-led Working Group on Network Monitoring (CESNET BPD 132) Authors: Matěj Grégr, Petr Matoušek, Tomáš Podermański, Miroslav

More information

Interconnecting IPv6 Domains Using Tunnels

Interconnecting IPv6 Domains Using Tunnels Interconnecting Domains Using Tunnels Version History Version Number Date Notes 1 30 July 2002 This document was created. 2 19 May 2003 Updated the related documents section. This document describes how

More information

Campus IPv6 connection Campus IPv6 deployment

Campus IPv6 connection Campus IPv6 deployment Campus IPv6 connection Campus IPv6 deployment Campus Address allocation, Topology Issues János Mohácsi NIIF/HUNGARNET Copy Rights This slide set is the ownership of the 6DISS project via its partners The

More information

Securing IPv6. What Students Will Learn:

Securing IPv6. What Students Will Learn: Securing IPv6 When it comes to IPv6, one of the more contentious issues is IT security. Uninformed analysts, anit-v6 pundits, and security ne're-do-wells have created a mythos that IPv6 is inherently less

More information

IPv6 Deployment Strategies

IPv6 Deployment Strategies Version History Version Number Date Notes 1 10/15/2001 This document was created. 2 11/13/2001 Update to the explanation of NAT along tunnel paths. 3 03/08/2002 Update to the Related Documents section.

More information

IMPLEMENTATION OF IPv6

IMPLEMENTATION OF IPv6 THESIS Ganesh Sharma IMPLEMENTATION OF IPv6 DEGREE PROGRAMME IN INFORMATION TECHNOLOGY ROVANIEMI UNIVERSITY OF APPLIED SCIENCES SCHOOL OF TECHNOLOGY Degree Programme in Information Technology Thesis IMPLEMENTATION

More information

IPv6 Transition and Security Threat Report. Emin Çalışkan

IPv6 Transition and Security Threat Report. Emin Çalışkan IPv6 Transition and Security Threat Report Emin Çalışkan Tallinn 2014 This publication is a product of the NATO Cooperative Cyber Defence Centre of Excellence (the Centre). It does not necessarily reflect

More information

IPv6 Fundamentals, Design, and Deployment

IPv6 Fundamentals, Design, and Deployment IPv6 Fundamentals, Design, and Deployment Course IP6FD v3.0; 5 Days, Instructor-led Course Description The IPv6 Fundamentals, Design, and Deployment (IP6FD) v3.0 course is an instructor-led course that

More information

Mobility on IPv6 Networks

Mobility on IPv6 Networks Mobility on IPv6 Networks Pedro M. Ruiz Project Manager Agora Systems S.A. Global IPv6 Summit Madrid 13-15 March 2002 Pedro M. Ruiz (c) Agora Systems S.A, 2002 1 Outline Motivation MIPv6 architecture MIPv6

More information

IPv6/IPv4 Translation for SIP Applications- Socket-Layer Translator and SIPv6 Translator

IPv6/IPv4 Translation for SIP Applications- Socket-Layer Translator and SIPv6 Translator IPv6/IPv4 Translation for SIP Applications- Socket-Layer Translator and SIPv6 Translator Whai-En Chen Research Assistant Professor Department of Computer Science and Information Engineering National Chiao

More information

IPv6 Transition Work in the IETF

IPv6 Transition Work in the IETF IPv6 Transition Work in the IETF Ralph Droms, Internet Area Director Thanks to Jari Arkko, Fred Baker and many others for contributions to these slides 1 IPv6 Transition Work in the IETF Outline of Presentation

More information

Moonv6 Test Suite. IPv6 Firewall Functionality and Interoperablility Test Suite. Technical Document. Revision 0.6

Moonv6 Test Suite. IPv6 Firewall Functionality and Interoperablility Test Suite. Technical Document. Revision 0.6 Moonv6 Test Suite IPv6 Firewall Functionality and Interoperablility Test Suite Technical Document Revision 0.6 IPv6 Consortium 121 Technology Drive, Suite 2 InterOperability Laboratory Durham, NH 03824-3525

More information

Moonv6 Test Suite. IPv6 Firewall Network Level Interoperability Test Suite. Technical Document. Revision 1.0

Moonv6 Test Suite. IPv6 Firewall Network Level Interoperability Test Suite. Technical Document. Revision 1.0 Moonv6 Test Suite IPv6 Firewall Network Level Interoperability Test Suite Technical Document Revision 1.0 IPv6 Consortium 121 Technology Drive, Suite 2 InterOperability Laboratory Durham, NH 03824-3525

More information

Mobility Management in DECT/IPv6 Networks

Mobility Management in DECT/IPv6 Networks Mobility Management in DECT/IPv6 Networks Sarantis Paskalis 1, Georgios Lampropoulos 1, and Georgios Stefanou 1 Department of Informatics and Telecommunications University of Athens, Greece Abstract. The

More information

Implementation of a Department Local Area Network Management System

Implementation of a Department Local Area Network Management System Implementation of a Department Local Area Network Management System I-Ping Hsieh Lai-Ming Shiue Shang-Juh Kao Department of Computer Science Department of Applied Mathematics Department of Computer Science

More information

Use Domain Name System and IP Version 6

Use Domain Name System and IP Version 6 Use Domain Name System and IP Version 6 What You Will Learn The introduction of IP Version 6 (IPv6) into an enterprise environment requires some changes both in the provisioned Domain Name System (DNS)

More information

Presentation_ID. 2001, Cisco Systems, Inc. All rights reserved.

Presentation_ID. 2001, Cisco Systems, Inc. All rights reserved. Presentation_ID 2001, Cisco Systems, Inc. All rights reserved. 1 IPv6 Security Considerations Patrick Grossetete pgrosset@cisco.com Dennis Vogel dvogel@cisco.com 2 Agenda Native security in IPv6 IPv6 challenges

More information

IPv6 Trace Analysis using Wireshark Nalini Elkins, CEO Inside Products, Inc. Nalini.elkins@insidethestack.com

IPv6 Trace Analysis using Wireshark Nalini Elkins, CEO Inside Products, Inc. Nalini.elkins@insidethestack.com 1 IPv6 Trace Analysis using Wireshark Nalini Elkins, CEO Inside Products, Inc. Nalini.elkins@insidethestack.com Agenda What has not changed between IPv4 and IPv6 traces What has changed between IPv4 and

More information

How To Connect Ipv4 To Ipv6 On A Ipv2 (Ipv4) On A Network With A Pnet 2.5 (Ipvin4) Or Ipv3 (Ip V6) On An Ipv5

How To Connect Ipv4 To Ipv6 On A Ipv2 (Ipv4) On A Network With A Pnet 2.5 (Ipvin4) Or Ipv3 (Ip V6) On An Ipv5 The case for IPv6-only data centres...and how to pull it off in today's IPv4-dominated world Tore Anderson Redpill Linpro AS RIPE64, Ljubljana, April 2012 IPv6 deployment approaches 0) Traditional IPv4-only

More information

IPv4/IPv6 Translation Technology

IPv4/IPv6 Translation Technology / Translation Technology V Masaki Nakajima V Nobumasu Kobayashi (Manuscript received December 24, 2003) The ubiquitous network society in which anyone can connect to the Internet and enjoy services anytime,

More information

TR-296 IPv6 Transition Mechanisms Test Plan

TR-296 IPv6 Transition Mechanisms Test Plan Technical Report TR-296 IPv6 Transition Mechanisms Test Plan Issue:1 Issue Date: November 2013 The Broadband Forum. All rights reserved. Notice The Broadband Forum is a non-profit corporation organized

More information

Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX

Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX Martin Elich 1, Matěj Grégr 2 and Pavel Čeleda1 1 CESNET, z.s.p.o., Zikova 4, 160 00 Prague, Czech Republic martin.elich@gmail.com,

More information

IPv6 Hardening Guide for Windows Servers

IPv6 Hardening Guide for Windows Servers IPv6 Hardening Guide for Windows Servers How to Securely Configure Windows Servers to Prevent IPv6-related Attacks Version: 1.0 Date: 22/12/2014 Classification: Public Author(s): Antonios Atlasis TABLE

More information

An Overview of IPv6 CHAPTER

An Overview of IPv6 CHAPTER 56982_CH02I 12/12/97 3:29 PM Page 23 2 CHAPTER 2 An Overview of IPv6 This second chapter is meant to provide a general overview of the IPv6 protocol and of the way network layer protocols operate. These

More information

Updates to Understanding IPv6

Updates to Understanding IPv6 Updates to Understanding IPv6 Microsoft Corporation Published: September 2003 Updated: February 2006 Abstract This white paper contains updates for changes in Internet Protocol version 6 (IPv6) standards

More information

About the Technical Reviewers

About the Technical Reviewers About the Author p. xiii About the Technical Reviewers p. xv Acknowledgments p. xvii Introduction p. xix IPv6 p. 1 IPv6-Why? p. 1 IPv6 Benefits p. 2 More Address Space p. 2 Innovation p. 3 Stateless Autoconfiguration

More information

Step-by-Step Guide for Setting Up IPv6 in a Test Lab

Step-by-Step Guide for Setting Up IPv6 in a Test Lab Step-by-Step Guide for Setting Up IPv6 in a Test Lab Microsoft Corporation Published: July, 2006 Author: Microsoft Corporation Abstract This guide describes how to configure Internet Protocol version 6

More information

ITL BULLETIN FOR JANUARY 2011

ITL BULLETIN FOR JANUARY 2011 ITL BULLETIN FOR JANUARY 2011 INTERNET PROTOCOL VERSION 6 (IPv6): NIST GUIDELINES HELP ORGANIZATIONS MANAGE THE SECURE DEPLOYMENT OF THE NEW NETWORK PROTOCOL Shirley Radack, Editor Computer Security Division

More information

IPv6@ARIN. Matt Ryanczak Network Operations Manager

IPv6@ARIN. Matt Ryanczak Network Operations Manager IPv6@ARIN Matt Ryanczak Network Operations Manager 1990 1995 2004 2009 IPv6 Timeline IETF starts thinking about successors to IPv4. RFC1817 CIDR and Classful Routing RFC 1883 Draft IPv6 Spec RFC 3775 IPv6

More information

IPv6 Associated Protocols

IPv6 Associated Protocols IPv6 Associated Protocols 1 New Protocols (1) New features are specified in IPv6 Protocol -RFC 2460 DS Neighbor Discovery (NDP) -RFC 4861 DS Auto-configuration : Stateless Address Auto-configuration -RFC

More information

464XLAT in mobile networks

464XLAT in mobile networks STRATEGIC WHITE PAPER IPv6 migration strategies for mobile networks To cope with the increasing demand for IP addresses, most mobile network operators (MNOs) have deployed Carrier Grade Network Address

More information

Tomás P. de Miguel DIT-UPM. dit UPM

Tomás P. de Miguel DIT-UPM. dit UPM Tomás P. de Miguel DIT- 15 12 Internet Mobile Market Phone.com 15 12 in Millions 9 6 3 9 6 3 0 1996 1997 1998 1999 2000 2001 0 Wireless Internet E-mail subscribers 2 (January 2001) Mobility The ability

More information

IPv6 @ Cisco. Patrick Grossetete Cisco Systems Cisco IOS IPv6 Product Manager pgrosset@cisco.com

IPv6 @ Cisco. Patrick Grossetete Cisco Systems Cisco IOS IPv6 Product Manager pgrosset@cisco.com IPv6 @ Cisco Patrick Grossetete Cisco Systems Cisco IOS IPv6 Product Manager pgrosset@cisco.com 2001, Cisco Systems, Inc. All rights reserved. 1 Agenda IPv6 Business Case IPv6 Protocols & Standards Integration

More information

Discovering IPv6 with Wireshark. presented by Rolf Leutert

Discovering IPv6 with Wireshark. presented by Rolf Leutert Discovering IPv6 with Wireshark presented by Rolf Leutert Instructor: Rolf Leutert, Network Expert & Trainer Leutert NetServices Troubleshooting & Trainings Zürich-Airport, Switzerland Sniffer certified

More information

IP Gateways. Gdansk University of Technology Mariusz Stankiewicz 24th March 2011

IP Gateways. Gdansk University of Technology Mariusz Stankiewicz 24th March 2011 IP Gateways Gdansk University of Technology Mariusz Stankiewicz 24th March 2011 A Gateway A gateway different meanings default router a device that connects two or more domains/networks/network types a

More information

IPv6 Integration in Federal Government: Adopt a Phased Approach for Minimal Disruption and Earlier Benefits

IPv6 Integration in Federal Government: Adopt a Phased Approach for Minimal Disruption and Earlier Benefits IPv6 Integration in Federal Government: Adopt a Phased Approach for Minimal Disruption and Earlier Benefits Abstract U.S. federal government agencies are required to integrate IPv6 into their network infrastructures,

More information

Ensuring a Smooth Transition to Internet Protocol Version 6 (IPv6)

Ensuring a Smooth Transition to Internet Protocol Version 6 (IPv6) WHITE PAPER www.brocade.com APPLICATION DELIVERY Ensuring a Smooth Transition to Internet Protocol Version 6 (IPv6) As IPv4 addresses dwindle, companies face the reality of a dual-protocol world The transition

More information

THE ADOPTION OF IPv6 *

THE ADOPTION OF IPv6 * THE ADOPTION OF IPv6 * STUDENT PAPER Brian Childress Southwest Texas State University BC56075@swt.edu Bryan Cathey Southwest Texas State University BC1033@swt.edu Sara Dixon Southwest Texas State University

More information

IPv6 Basics Share Anaheim Session 14497

IPv6 Basics Share Anaheim Session 14497 IPv6 Basics Share Anaheim Session 14497 Laura Knapp WW Business Consultant Laurak@aesclever.com ipv6hawaii@outlook.com 03/07/2014 Applied Expert Systems, Inc. 2014 1 What is IPv6 Updated version of the

More information

Introduction to IP v6

Introduction to IP v6 IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation

More information

Whitepaper IPv6. OpenScape UC Suite IPv6 Transition Strategy

Whitepaper IPv6. OpenScape UC Suite IPv6 Transition Strategy Whitepaper IPv6 OpenScape UC Suite IPv6 Transition Strategy Table of Contents 1. Executive Summary 3 2. Introduction 4 3. Technical Basics 5 3.1. IPv4 IPv6 Translation 6 3.2. IP-in-IP Tunneling 7 4. Selecting

More information

Load Balancing. Final Network Exam LSNAT. Sommaire. How works a "traditional" NAT? Un article de Le wiki des TPs RSM.

Load Balancing. Final Network Exam LSNAT. Sommaire. How works a traditional NAT? Un article de Le wiki des TPs RSM. Load Balancing Un article de Le wiki des TPs RSM. PC Final Network Exam Sommaire 1 LSNAT 1.1 Deployement of LSNAT in a globally unique address space (LS-NAT) 1.2 Operation of LSNAT in conjunction with

More information

NAT and Firewall Traversal with STUN / TURN / ICE

NAT and Firewall Traversal with STUN / TURN / ICE NAT and Firewall Traversal with STUN / TURN / ICE Simon Perreault Viagénie {mailto sip}:simon.perreault@viagenie.ca http://www.viagenie.ca Credentials Consultant in IP networking and VoIP at Viagénie.

More information

Industry Automation White Paper Januar 2013 IPv6 in automation technology

Industry Automation White Paper Januar 2013 IPv6 in automation technology Table of contents: 1 Why another White Paper IPv6?... 3 2 IPv6 for automation technology... 3 3 Basics of IPv6... 3 3.1 Turning point/initial situation... 3 3.2 Standardization... 4 3.2.1 IPv6 address

More information

Transition to IPv6 for Managed Service Providers: Meet Customer Requirements for IP Addressing

Transition to IPv6 for Managed Service Providers: Meet Customer Requirements for IP Addressing White Paper Transition to IPv6 for Managed Service Providers: Meet Customer Requirements for IP Addressing What You Will Learn With the exhaustion of IPv4 addresses, businesses and government agencies

More information

DirectAccess in Windows 7 and Windows Server 2008 R2. Aydin Aslaner Senior Support Escalation Engineer Microsoft MEA Networking Team

DirectAccess in Windows 7 and Windows Server 2008 R2. Aydin Aslaner Senior Support Escalation Engineer Microsoft MEA Networking Team DirectAccess in Windows 7 and Windows Server 2008 R2 Aydin Aslaner Senior Support Escalation Engineer Microsoft MEA Networking Team 0 Introduction to DirectAccess Increasingly, people envision a world

More information

IPv4/IPv6 Transition Using DNS64/NAT64: Deployment Issues

IPv4/IPv6 Transition Using DNS64/NAT64: Deployment Issues IPv4/IPv6 Transition Using DNS64/NAT64: Deployment Issues Enis Hodzic BH Telecom.d.o.o Sarajevo, Bosnia & Herzegovina enis.hodzic@bhtelecom.ba Sasa Mrdovic Faculty of Electrical Engineering University

More information

Charter Text Network Design and Configuration

Charter Text Network Design and Configuration MIF Charter update proposal MIF WG Charter update proposal summary http://www.ietf.org/mail-archive/web/mif/current/msg02125.html Specific deliverables listed MPVD architecture document Requirement for

More information

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) 100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.

More information

Network Address Translation (NAT) Good Practice Guideline

Network Address Translation (NAT) Good Practice Guideline Programme NPFIT Document Record ID Key Sub-Prog / Project Infrastructure Security NPFIT-FNT-TO-IG-GPG-0011.06 Prog. Director Chris Wilber Status Approved Owner James Wood Version 2.0 Author Mike Farrell

More information

IPV6 DEPLOYMENT GUIDELINES FOR. ARRIS Group, Inc.

IPV6 DEPLOYMENT GUIDELINES FOR. ARRIS Group, Inc. IPV6 DEPLOYMENT GUIDELINES FOR CABLE OPERATORS Patricio i S. Latini i ARRIS Group, Inc. Current IPv4 Situationti IANA has already assigned the last IPv4 Blocks to the RIRs. RIRs address exhaustion may

More information

Securing the Transition Mechanisms

Securing the Transition Mechanisms Securing the Transition Mechanisms CRC/ITU/APNIC IPv6 Security Workshop 29 th June 1 st July 2015 Ulaanbaatar Last updated 13 July 2014 1 Where did we leave off? p We ve just covered the current strategies

More information

The flow back tracing and DDoS defense mechanism of the TWAREN defender cloud

The flow back tracing and DDoS defense mechanism of the TWAREN defender cloud Proceedings of the APAN Network Research Workshop 2013 The flow back tracing and DDoS defense mechanism of the TWAREN defender cloud Ming-Chang Liang 1, *, Meng-Jang Lin 2, Li-Chi Ku 3, Tsung-Han Lu 4,

More information

Implementation and Evaluation of Protocols Translating Methods for IPv4 to IPv6 Transition

Implementation and Evaluation of Protocols Translating Methods for IPv4 to IPv6 Transition Implementation and Evaluation of Protocols Translating Methods for IPv4 to IPv6 Transition Cristian Pérez Monte, María Inés Robles, Gustavo Mercado, Carlos Taffernaberry, Marcela Orbiscay, Sebastián Tobar,

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

Types of IPv4 addresses in Internet

Types of IPv4 addresses in Internet Types of IPv4 addresses in Internet PA (Provider Aggregatable): Blocks of addresses that may be sub-assigned to other ISPs or to other companies that also may leased the addresses to their customers May

More information

Scalable Extraction, Aggregation, and Response to Network Intelligence

Scalable Extraction, Aggregation, and Response to Network Intelligence Scalable Extraction, Aggregation, and Response to Network Intelligence Agenda Explain the two major limitations of using Netflow for Network Monitoring Scalability and Visibility How to resolve these issues

More information

Monitoring Mobile Flows in Emerging IPv6 Access Networks Concepts and First Prototype

Monitoring Mobile Flows in Emerging IPv6 Access Networks Concepts and First Prototype Monitoring Mobile Flows in Emerging IPv6 Access Networks Concepts and First Prototype Pedro Marques 1,2, Helder Castro 1,2, and Manuel Ricardo 1,2 1. FEUP - Fac. Eng. Univ. Porto, Rua Dr. Roberto Frias,

More information

WHITE PAPER SERIES Transition to IPv6

WHITE PAPER SERIES Transition to IPv6 WHITE PAPER SERIES Transition to IPv6 INDEX Executive Summary Page 3 Till today-a Brief History of Internet Protocol (IP) Page 4 Challenges with IPv4 Page 5 Options for Business Continuity Page 6 The New

More information

Cisco Which VPN Solution is Right for You?

Cisco Which VPN Solution is Right for You? Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2

More information

IPv6 Security. Scott Hogg, CCIE No. 5133 Eric Vyncke. Cisco Press. Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA

IPv6 Security. Scott Hogg, CCIE No. 5133 Eric Vyncke. Cisco Press. Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA IPv6 Security Scott Hogg, CCIE No. 5133 Eric Vyncke Cisco Press Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA Contents Introduction xix Chapter 1 Introduction to IPv6 Security 3 Reintroduction

More information

IPv6 Opportunity and challenge

IPv6 Opportunity and challenge Juniper Networks Solution from enterprise to service provider Jean-Marc Uzé juze@juniper.net 10 May 2004 1 Opportunity and challenge More devices demanding more addresses 3G Mobile IP multimedia specifies

More information

Proactive DAD: An L2-assisted Fast Address Acquisition. Strategy for Mobile IPv6 Networks

Proactive DAD: An L2-assisted Fast Address Acquisition. Strategy for Mobile IPv6 Networks Proactive DAD: An L2-assisted Fast Address Acquisition Strategy for Mobile IPv6 Networks Chien-Chao Tseng Department of Computer Science and Information Engineering National Chiao-Tung University Hsinchu,

More information

Getting started with IPv6 on Linux

Getting started with IPv6 on Linux Getting started with IPv6 on Linux Jake Edge LWN.net jake@lwn.net LinuxCon North America 19 August 2011 History and Motivation IPng project July 1994 IPv6 - RFC 2460 December 1998 IPv5 - Internet Stream

More information

IPv6 Security Best Practices. Eric Vyncke evyncke@cisco.com Distinguished System Engineer

IPv6 Security Best Practices. Eric Vyncke evyncke@cisco.com Distinguished System Engineer IPv6 Best Practices Eric Vyncke evyncke@cisco.com Distinguished System Engineer security 2007 Cisco Systems, Inc. All rights reserved. Cisco CPub 1 Agenda Shared Issues by IPv4 and IPv6 Specific Issues

More information

Interconnecting Cisco Network Devices 1 Course, Class Outline

Interconnecting Cisco Network Devices 1 Course, Class Outline www.etidaho.com (208) 327-0768 Interconnecting Cisco Network Devices 1 Course, Class Outline 5 Days Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructorled training course

More information

Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław Computer Networks Lecture 3: IP Protocol Marcin Bieńkowski Institute of Computer Science University of Wrocław Computer networks (II UWr) Lecture 3 1 / 24 In previous lectures We learned about layer 1

More information

IPv6 Hash-Based Addresses for Simple Network Deployment

IPv6 Hash-Based Addresses for Simple Network Deployment IPv6 Hash-Based Addresses for Simple Network Deployment Renzo Davoli Computer Science and Engineering Department University of Bologna Bologna, Italy Email: renzo@cs.unibo.it Abstract The configuration

More information

Case Study - IPv6 Building automation solution introduction into an IPv4 Network Service Provider infrastructure

Case Study - IPv6 Building automation solution introduction into an IPv4 Network Service Provider infrastructure Case Study - IPv6 Building automation solution introduction into an IPv4 Network Service Provider infrastructure Nikolay Milovanov 1, Ivan Bogomilov 2 Abstract - The article presents a case study describing

More information

WHITE PAPER. Best Practices for Deploying IPv6 over Broadband Access

WHITE PAPER. Best Practices for Deploying IPv6 over Broadband Access WHITE PAPER Best Practices for Deploying IPv6 over Broadband Access www.ixiacom.com 915-0123-01 Rev. C, December 2013 2 Table of Contents Udi cusciamenis minctorpos... 4 Toreptur aut dolo cone verum aute

More information

Internet Engineering Task Force (IETF) France Telecom R&D S. Madanapalli iram Technologies November 2010

Internet Engineering Task Force (IETF) France Telecom R&D S. Madanapalli iram Technologies November 2010 Internet Engineering Task Force (IETF) Request for Comments: 6106 Obsoletes: 5006 Category: Standards Track ISSN: 2070-1721 J. Jeong Brocade/ETRI S. Park SAMSUNG Electronics L. Beloeil France Telecom R&D

More information

www.mindteck.com 6LoWPAN Technical Overview

www.mindteck.com 6LoWPAN Technical Overview www.mindteck.com 6LoWPAN Technical Overview 6LoWPAN : Slide Index Introduction Acronyms Stack Architecture Stack Layers Applications IETF documents References Confidential Mindteck 2009 2 6LoWPAN - Introduction

More information

Review: Lecture 1 - Internet History

Review: Lecture 1 - Internet History Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration

More information

How To Manage Ipv6 Networks On A Network With Ipvv6 (Ipv6) On A Pc Or Ipv4 (Ip6) (Ip V6) Or Ip V6 ( Ipv5) ( Ip V5

How To Manage Ipv6 Networks On A Network With Ipvv6 (Ipv6) On A Pc Or Ipv4 (Ip6) (Ip V6) Or Ip V6 ( Ipv5) ( Ip V5 IPv6 networks management Simon.Muyal@renater.fr Contribs Bernard Tuy, Renater Simon Muyal, Renater Ralf Wolter, Cisco Patrick Grossetête, Cisco Munechika Sumikawa, Hitachi Patrick Paul, 6WIND Simon Muyal

More information

"Charting the Course...

Charting the Course... Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content

More information

Deploying IPv6, Now. Christian Huitema. Architect Windows Networking & Communications Microsoft Corporation

Deploying IPv6, Now. Christian Huitema. Architect Windows Networking & Communications Microsoft Corporation Deploying IPv6, Now Christian Huitema Architect Windows Networking & Communications Microsoft Corporation Agenda The Opportunity Key Problems The Promise of IPv6 What is Microsoft doing Call to Action

More information

Basic IPv6 WAN and LAN Configuration

Basic IPv6 WAN and LAN Configuration Basic IPv6 WAN and LAN Configuration This quick start guide provides basic IPv6 WAN and LAN configuration information for the ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N. For complete IPv6 configuration

More information

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe

More information

Migrating to IPv6 Opportunity or threat for network security?

Migrating to IPv6 Opportunity or threat for network security? Migrating to IPv6 Opportunity or threat for network security? Executive summary Contents 02 Executive summary 03 1. Introduction 03 2. IPv6 security check 03 2.1 Addresses 04 2.2 NAT free operation 05

More information

Internetworking Between ZigBee/802.15.4 and IPv6/802.3 Network

Internetworking Between ZigBee/802.15.4 and IPv6/802.3 Network Internetworking Between ZigBee/802.15.4 and IPv6/802.3 Network Reen-Cheng Wang Department of Computer Science and Information Engineering, National Dong Hwa University 1, Sec. 2, Da Hsueh Rd., Shoufeng,

More information