SlideShare a Scribd company logo
1 of 68
Download to read offline
IPv6 Addressing
Fundamentals
Nathalie Trenaman
RIPE NCC
Swiss IPv6 Council
28 April 2014
Tuesday, April 29, 2014
2
• RIPE Policies
• What ranges can I get, and where?
• Allocation Process
• How do I use this space?
• IPv6 Addressing Guidelines
• Recommendations
Agenda
Tuesday, April 29, 2014
Ferenc Csorba - 13 March 2014
RIPE NCC
• Located in Amsterdam
• Not for profit organisation
• One of the 5 Regional Internet
Registries
RIPE NCC - who are we? 3
Tuesday, April 29, 2014
4
“On 14 September 2012, the RIPE NCC
ran out of their regular pool of IPv4”
Tuesday, April 29, 2014
Section 1
IPv6 Policies
Tuesday, April 29, 2014
IPv6 Address Basics
6IP Address Distribution
Allocation PA Assignment PI Assignment
IANA
End User
LIR
RIR
/3
/32
/12
/56/48 /48
Tuesday, April 29, 2014
Ferenc Csorba - 13 March 2014
RIPE Policies
•IPv6 Address Allocation &
Assignment Policy
•RIPE-589
•Made by the RIPE Community
•Consensus is the key
7
Tuesday, April 29, 2014
Getting it
8
• To qualify, an organisation must:
• Be an LIR
• Have a plan for making assignments within two years
• Minimum allocation size /32
• Up to a /29 without additional justification
• More if justified by customer numbers
Getting an IPv6 allocation
Tuesday, April 29, 2014
Getting it
9
• Give your customers enough addresses
• up to a /48
• For more addresses send in request form
• alternatively, make a sub-allocation
• Every assignment must be registered in the
RIPE Database
Customer Assignments
Tuesday, April 29, 2014
Getting it
10Comparison IPv4 and IPv6 status
IPv4 IPv6
ALLOCATED PA ALLOCATED-BY-RIR
ASSIGNED PA ASSIGNED
ASSIGNED PA AGGREGATED-BY-LIR
SUB-ALLOCATED PA ALLOCATED-BY-LIR
ASSIGNED PI ASSIGNED PI
Tuesday, April 29, 2014
Getting it
11
• Status is ASSIGNED
• Minimum assignment size is a/64
• For more than a /48, send a request form
Using ASSIGNED
ALLOCATED-BY-RIR
ASSIGNED /44
Tuesday, April 29, 2014
Getting it
12
• Can be used to group customers
• broadband, for example
• “assignment size” = assignment of each customer
Using AGGREGATED-BY-LIR
ALLOCATED-BY-RIR
AGGREGATED-BY-LIR
assignment-size: 56
/34
/56 /56/56/56/56
Tuesday, April 29, 2014
Getting it
13
inet6num:        2001:db8:1000::/36
netname:         Brightlife
descr:      Broadband services
country:          NL
admin-c:         BN649-RIPE
tech-c:          BN649-RIPE
status:          AGGREGATED-BY-LIR
assignment-size: 48
mnt-by:          BRIGHTLIFE-MNT
notify:          noc@example.net
changed:        noc@example.net 20130218
source:         RIPE
AGGREGATED-BY-LIR in the RIPE DB
Tuesday, April 29, 2014
Getting it
14
• Can be used for customers who expect large growth
• or for your own infrastructure
Using ALLOCATED-BY-LIR
ALLOCATED-BY-RIR
ALLOCATED-BY-LIR
AGGREGATED-BY-LIR
assignment-size: 48
/40
/36
Tuesday, April 29, 2014
Getting it
15Overview
ALLOCATED-BY-RIR
ALLOCATED-BY-LIR
/48 /48/48/48/48
AGGREGATED-BY-LIR
assignment-size: 48
/40
ASSIGNED
AGGREGATED-BY-LIR
assignment-size: 56
/34/44/36
Tuesday, April 29, 2014
Getting it
16
• To qualify, an organisation must:
• Meet the contractual requirements for provider
independent resources
• LIRs must demonstrate special routing requirements
• Minimum assignment size /48
• PI space can not be used for sub-assignments
• not even 1 IP address
Getting IPv6 PI address space
Tuesday, April 29, 2014
Tips
17IPv6 RIPEness: 10238 LIRs
4 stars
21%
3 stars
14%
2 stars
8%1 star
25%
No IPv6
32%
Tuesday, April 29, 2014
Tips
18IPv6 RIPEness: Switzerland 350 LIRs
4 stars
24%
3 stars
19%
2 stars
8%
1 star
21%
No IPv6
28%
Tuesday, April 29, 2014
?
19
Tuesday, April 29, 2014
Section 2
IPv6 Addressing
Plans
Tuesday, April 29, 2014
Why Create an Addressing Plan?
Benefits of an IPv6 Addressing Plan:
•Mental health during implementation(!)
•Easier implementation of security policies
•Efficient addressing plans are scalable
•More efficient route aggregation
21
Tuesday, April 29, 2014
4 Bit Boundaries
IPv6 offers flexibility with addressing plans
Network addressing can be done on 4 bit
boundaries
22
Tuesday, April 29, 2014
Customers
Customers should get a large block of
addresses
•/48 - Business
•/48 or 56 - Residential
For more than a /48, send a request form
Every assignment must be registered
23
Tuesday, April 29, 2014
Example Situation
Customer has 6 functions:
•Servers
•Office PCs
•Network Engineers PCs
•Guests
•VPN (remote workers)
• Infrastructure (point-to-point and
loopbacks)
24
Tuesday, April 29, 2014
Example Situation
Customer has 3 locations:
•Main building floor 1
•Main building floor 2
•Secondary office
25
Tuesday, April 29, 2014
Example Assignment from LIR
The customer gets 2001:0db8:1a2b::/48
Work on 4 bit boundary
• 6 functions, leaves room for 10 new functions
• 3 locations, leaves room for 13 new locations
• We still have 8 bits!
• Room for 256 networks per function per location
26
Tuesday, April 29, 2014
Example Plan 1
Putting this in the address:
2001:0db8:1a2b:FLXX::/64
•F = function (0=infrastructure, 1=servers,
2=office, 3 =engineers, e=vpn, f=guest)
•L = location (0=main building 1, 1=main
building 2, 2=secondary office
•XX = Number for network of type +location
27
Tuesday, April 29, 2014
Example Plan Usage
28
Tuesday, April 29, 2014
Example Plan Usage
2001:0db8:1a2b:1000::/64
28
Tuesday, April 29, 2014
Example Plan Usage
2001:0db8:1a2b:1000::/64
•Servers in Main building, floor 1, network 0
28
Tuesday, April 29, 2014
Example Plan Usage
2001:0db8:1a2b:1000::/64
•Servers in Main building, floor 1, network 0
2001:0db8:1a2b:1200::/64
28
Tuesday, April 29, 2014
Example Plan Usage
2001:0db8:1a2b:1000::/64
•Servers in Main building, floor 1, network 0
2001:0db8:1a2b:1200::/64
•Servers in Secondary office, network 0
28
Tuesday, April 29, 2014
Example Plan Usage
2001:0db8:1a2b:1000::/64
•Servers in Main building, floor 1, network 0
2001:0db8:1a2b:1200::/64
•Servers in Secondary office, network 0
2001:0db8:1a2b:f009::/64
28
Tuesday, April 29, 2014
Example Plan Usage
2001:0db8:1a2b:1000::/64
•Servers in Main building, floor 1, network 0
2001:0db8:1a2b:1200::/64
•Servers in Secondary office, network 0
2001:0db8:1a2b:f009::/64
•Guest in Main Building, floor 1, network 9
28
Tuesday, April 29, 2014
Example Plan Usage
2001:0db8:1a2b:1000::/64
•Servers in Main building, floor 1, network 0
2001:0db8:1a2b:1200::/64
•Servers in Secondary office, network 0
2001:0db8:1a2b:f009::/64
•Guest in Main Building, floor 1, network 9
28
Tuesday, April 29, 2014
Example Plan Usage
29
Tuesday, April 29, 2014
Example Plan Usage
2001:0db8:1a2b:0000::1/128
29
Tuesday, April 29, 2014
Example Plan Usage
2001:0db8:1a2b:0000::1/128
•loopback address (location doesn’t apply!)
29
Tuesday, April 29, 2014
Example Plan Usage
2001:0db8:1a2b:0000::1/128
•loopback address (location doesn’t apply!)
2001:0db8:1a2b:0102::/64
29
Tuesday, April 29, 2014
Example Plan Usage
2001:0db8:1a2b:0000::1/128
•loopback address (location doesn’t apply!)
2001:0db8:1a2b:0102::/64
•point-to-point link (0 for infrastructure)
29
Tuesday, April 29, 2014
Example Plan Usage
2001:0db8:1a2b:0000::1/128
•loopback address (location doesn’t apply!)
2001:0db8:1a2b:0102::/64
•point-to-point link (0 for infrastructure)
2001:0db8:1a2b:e1ab::/64
29
Tuesday, April 29, 2014
Example Plan Usage
2001:0db8:1a2b:0000::1/128
•loopback address (location doesn’t apply!)
2001:0db8:1a2b:0102::/64
•point-to-point link (0 for infrastructure)
2001:0db8:1a2b:e1ab::/64
•VPN in main office, floor 1, user 171
29
Tuesday, April 29, 2014
Example Plan Usage
2001:0db8:1a2b:0000::1/128
•loopback address (location doesn’t apply!)
2001:0db8:1a2b:0102::/64
•point-to-point link (0 for infrastructure)
2001:0db8:1a2b:e1ab::/64
•VPN in main office, floor 1, user 171
29
Tuesday, April 29, 2014
Example Plan Usage
2001:0db8:1a2b:0000::1/128
•loopback address (location doesn’t apply!)
2001:0db8:1a2b:0102::/64
•point-to-point link (0 for infrastructure)
2001:0db8:1a2b:e1ab::/64
•VPN in main office, floor 1, user 171
29
Tuesday, April 29, 2014
Alternatives
The previous example is just an idea
•Adapt as necessary
2001:0db8:1a2b:FFLX::/64
•256 functions
•16 locations
•16 networks per function per location
30
Tuesday, April 29, 2014
End User Summary
Tips:
•Work on 4-bit boundary
•Group subnets by function
•Group subnets by location
•Make a scalable addressing plan
31
Tuesday, April 29, 2014
ISP Addressing Plan
What should an ISP Addressing Plan contain?
•Address space for internal use
• loopback interfaces
• point-to-point connections
• servers, routers and other infrastructure at PoPs
•Use a /48 per POP
•Address space for customers
32
Tuesday, April 29, 2014
Loopback Interfaces
One /128 per device
• One /64 contains enough space for
18.446.744.073.709.551.616 devices
Take an easy to remember block for
loopbacks
• 2001:0db8:1a2b:0000:0000:0000:0000:0000
33
Tuesday, April 29, 2014
Point-to-Point Interfaces
One /64 per point-to-point connection
•Reserve 1 /64 for the link, but configure a /
127 (RFC6164)
34
Tuesday, April 29, 2014
ISP Guidelines
In common cases:
•One /48 per PoP
•Calculate growth
•Make it scalable
35
Tuesday, April 29, 2014
IPv6 Address Basics
36
• Every subnet should be a /64
• Customer assignments (sites) between:
• /64 (1 subnet)
• /48 (65,536 subnets)
• Minimum allocation size /32
• 65,536 /48s
• 16,777,216 /56s
IPv6 Address Basics
Tuesday, April 29, 2014
IPv6 Address Basics
37IPv6 Subnetting
0000:00002001:0DB8:0000:0000:0000:0000:0000:0000
IPv6 Subnetting
/32 = 65536 /48
/48 = 65536 /64
/52 = 4096 /64
/56 = 256 /64
64 bits interface ID
/60 = 16 /64
/64
Contact Training Services: ts@ripe.net
Follow us on Twitter: www.twitter.com/TrainingRIPENCC
www.ripe.net
Tuesday, April 29, 2014
Tips
38
• Customers have no idea how to handle 65536
subnets!
• Provide them with information
• https://www.ripe.net/lir-services/training/material/
IPv6-for-LIRs-Training-Course/IPv6_addr_plan4.pdf
Customers And Their /48
Tuesday, April 29, 2014
?
39
Tuesday, April 29, 2014
Section 4
Transition Mechanisms
Tuesday, April 29, 2014
Transition Mechanisms
41
• Maintaining connectivity to IPv4 hosts by
sharing IPv4 addresses between clients
• Extending the address space with NAT/CGN/LSN
• Translating between IPv6 and IPv4
• Provide a mechanism to connect to the
emerging IPv6-only networks
• Tunneling IPv6 packets over IPv4-only networks
Transitioning: Solving Two Problems
Tuesday, April 29, 2014
Transition Mechanisms
42
• Manually configured tunnels towards a fixed
tunnel broker like SixXS, Hurricane Electric
or your own system
• Stable and predictable but not easily
deployed to the huge residential markets
• MTU might cause issues
6in4
Tuesday, April 29, 2014
Transition Mechanisms
436in4
PROVIDERCUSTOMER INTERNET
Home User
IPv4 Infrastructure
IPv4
Tunnel Broker IPv6 Internet
Tunnel
Server
Tuesday, April 29, 2014
Transition Mechanisms
44
• 6to4
• “Automatic” tunnel, system can configure itself
• IPv4 address is part of the IPv6 address
• Requires a public IPv4 address
• Uses anycast to reach a nearby server
• Return traffic might choose another server
• Teredo
• Uses UDP to encapsulate packets
• Works across (most) NAT implementations
6to4 and Teredo
Tuesday, April 29, 2014
Transition Mechanisms
456to4 and Teredo
PROVIDERCUSTOMER INTERNET
Home User
IPv4
IPv6 Internet
Anycast
6to4 Tunnel Servers
Infrastructure
IPv4
Tuesday, April 29, 2014
Transition Mechanisms
46
• Quite similar to 6to4
• Encodes the IPv4 address in the IPv6 prefix
• Uses address space assigned to the operator
• The operator has full control over the relay
• Traffic is symmetric across a relay
• Or at least stays in your domain
• Can work with both public and private space
• Needs additional software for signaling
6RD
Tuesday, April 29, 2014
Transition Mechanisms
476RD
PROVIDERCUSTOMER INTERNET
IPv6 Internet
6RD Tunnel Server
IPv4 Internet
Home User
IPv4 Infrastructure
IPv4
Tuesday, April 29, 2014
Transition Mechanisms
48
• Single-stack clients will only have IPv6
• Translator box will strip all headers and
replace them with IPv4
• Requires some DNS “magic”
• Capture responses and replace A with AAAA
• Response is crafted based on target IPv4 address
• Usually implies address sharing on IPv4
NAT64/DNS64
Tuesday, April 29, 2014
Transition Mechanisms
49NAT64/DNS64
PROVIDERCUSTOMER INTERNET
Home User
public IPv6
IPv6 Internet
NAT64 Box
IPv4 Internet
DNS64
Infrastructure
public IPv6
Tuesday, April 29, 2014
Transition Mechanisms
50
• Tunneling IPv4 over IPv6
• Allows clients to use RFC1918 addresses
without doing NAT themselves
• NAT is centrally located at the provider
• Client’s IPv6 address is used to maintain
state and to keep clients apart
• Allows for duplicate IPv4 ranges
DS-lite
Tuesday, April 29, 2014
Transition Mechanisms
51DS-lite
PROVIDERCUSTOMER INTERNET
IPv6 Internet
NAT44 Box
IPv4 Internet
Home User
public IPv6
private IPv4
Infrastructure
IPv6
Infrastructure
IPv4
Tuesday, April 29, 2014
Tips
52
• Websites
• http://www.getipv6.info
• http://www.getipv6.info
• http://datatracker.ietf.org/wg/v6ops/
• http://www.ripe.net/ripe/docs/ripe-554.html
• Mailing lists
• http://lists.cluenet.de/mailman/listinfo/ipv6-ops
• http://www.ripe.net/mailman/listinfo/ipv6-wg
Also useful
Tuesday, April 29, 2014
?
53
nathalie@ripe.net
Tuesday, April 29, 2014

More Related Content

What's hot

EAP TLS, the Rolls-Royce of extensible authentication protocol (EAP) methods ...
EAP TLS, the Rolls-Royce of extensible authentication protocol (EAP) methods ...EAP TLS, the Rolls-Royce of extensible authentication protocol (EAP) methods ...
EAP TLS, the Rolls-Royce of extensible authentication protocol (EAP) methods ...Jisc
 
The Use of IPv6 in IoT
The Use of IPv6 in IoTThe Use of IPv6 in IoT
The Use of IPv6 in IoTOliver Müller
 
AusNOG 2011 - Residential IPv6 CPE - What Not to Do and Other Observations
AusNOG 2011 - Residential IPv6 CPE - What Not to Do and Other ObservationsAusNOG 2011 - Residential IPv6 CPE - What Not to Do and Other Observations
AusNOG 2011 - Residential IPv6 CPE - What Not to Do and Other ObservationsMark Smith
 
OpenStack Neutron IPv6 Lessons
OpenStack Neutron IPv6 LessonsOpenStack Neutron IPv6 Lessons
OpenStack Neutron IPv6 LessonsAkihiro Motoki
 
The IPv6 Snort Plugin (at Troopers 14 IPv6 Security Summit)
The IPv6 Snort Plugin (at Troopers 14 IPv6 Security Summit)The IPv6 Snort Plugin (at Troopers 14 IPv6 Security Summit)
The IPv6 Snort Plugin (at Troopers 14 IPv6 Security Summit)Martin Schütte
 
AusNOG 2014 - Network Virtualisation: The Killer App for IPv6?
AusNOG 2014 - Network Virtualisation: The Killer App for IPv6?AusNOG 2014 - Network Virtualisation: The Killer App for IPv6?
AusNOG 2014 - Network Virtualisation: The Killer App for IPv6?Mark Smith
 
Henrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspectiveHenrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspectiveIKT-Norge
 
Agile Networking with OpenStack
Agile Networking with OpenStack Agile Networking with OpenStack
Agile Networking with OpenStack openstackcisco
 
Ron Broersma dren-stavanger-22 nov2011
Ron Broersma dren-stavanger-22 nov2011Ron Broersma dren-stavanger-22 nov2011
Ron Broersma dren-stavanger-22 nov2011IPv6no
 
Eric Vyncke - IPv6 security in general
Eric Vyncke - IPv6 security in generalEric Vyncke - IPv6 security in general
Eric Vyncke - IPv6 security in generalIKT-Norge
 
Software Stacks to enable SDN and NFV
Software Stacks to enable SDN and NFVSoftware Stacks to enable SDN and NFV
Software Stacks to enable SDN and NFVYoshihiro Nakajima
 
Eric Vyncke - Layer-2 security, ipv6 norway
Eric Vyncke - Layer-2 security, ipv6 norwayEric Vyncke - Layer-2 security, ipv6 norway
Eric Vyncke - Layer-2 security, ipv6 norwayIKT-Norge
 
Successfully Deploying IPv6
Successfully Deploying IPv6Successfully Deploying IPv6
Successfully Deploying IPv6Zivaro Inc
 
Implementing an IPv6 Enabled Environment for a Public Cloud Tenant
Implementing an IPv6 Enabled Environment for a Public Cloud TenantImplementing an IPv6 Enabled Environment for a Public Cloud Tenant
Implementing an IPv6 Enabled Environment for a Public Cloud TenantShixiong Shang
 
IPV6 Network Simulation Projects Research Guidance
IPV6 Network Simulation Projects Research GuidanceIPV6 Network Simulation Projects Research Guidance
IPV6 Network Simulation Projects Research GuidancePhdtopiccom
 
Roadmap to Next Generation IP Networks: A Review of the Fundamentals
Roadmap to Next Generation IP Networks: A Review of the FundamentalsRoadmap to Next Generation IP Networks: A Review of the Fundamentals
Roadmap to Next Generation IP Networks: A Review of the FundamentalsNetwork Utility Force
 
Deploying IPv6 in OpenStack Environments
Deploying IPv6 in OpenStack EnvironmentsDeploying IPv6 in OpenStack Environments
Deploying IPv6 in OpenStack EnvironmentsShannon McFarland
 
DPDK Summit 2015 - Sprint - Arun Rajagopal
DPDK Summit 2015 - Sprint - Arun RajagopalDPDK Summit 2015 - Sprint - Arun Rajagopal
DPDK Summit 2015 - Sprint - Arun RajagopalJim St. Leger
 
Understanding i pv6 2
Understanding i pv6 2Understanding i pv6 2
Understanding i pv6 2srmanjuskp
 
Sipforum SIP & IPv6 discussion slides
Sipforum SIP & IPv6 discussion slidesSipforum SIP & IPv6 discussion slides
Sipforum SIP & IPv6 discussion slidesOlle E Johansson
 

What's hot (20)

EAP TLS, the Rolls-Royce of extensible authentication protocol (EAP) methods ...
EAP TLS, the Rolls-Royce of extensible authentication protocol (EAP) methods ...EAP TLS, the Rolls-Royce of extensible authentication protocol (EAP) methods ...
EAP TLS, the Rolls-Royce of extensible authentication protocol (EAP) methods ...
 
The Use of IPv6 in IoT
The Use of IPv6 in IoTThe Use of IPv6 in IoT
The Use of IPv6 in IoT
 
AusNOG 2011 - Residential IPv6 CPE - What Not to Do and Other Observations
AusNOG 2011 - Residential IPv6 CPE - What Not to Do and Other ObservationsAusNOG 2011 - Residential IPv6 CPE - What Not to Do and Other Observations
AusNOG 2011 - Residential IPv6 CPE - What Not to Do and Other Observations
 
OpenStack Neutron IPv6 Lessons
OpenStack Neutron IPv6 LessonsOpenStack Neutron IPv6 Lessons
OpenStack Neutron IPv6 Lessons
 
The IPv6 Snort Plugin (at Troopers 14 IPv6 Security Summit)
The IPv6 Snort Plugin (at Troopers 14 IPv6 Security Summit)The IPv6 Snort Plugin (at Troopers 14 IPv6 Security Summit)
The IPv6 Snort Plugin (at Troopers 14 IPv6 Security Summit)
 
AusNOG 2014 - Network Virtualisation: The Killer App for IPv6?
AusNOG 2014 - Network Virtualisation: The Killer App for IPv6?AusNOG 2014 - Network Virtualisation: The Killer App for IPv6?
AusNOG 2014 - Network Virtualisation: The Killer App for IPv6?
 
Henrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspectiveHenrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspective
 
Agile Networking with OpenStack
Agile Networking with OpenStack Agile Networking with OpenStack
Agile Networking with OpenStack
 
Ron Broersma dren-stavanger-22 nov2011
Ron Broersma dren-stavanger-22 nov2011Ron Broersma dren-stavanger-22 nov2011
Ron Broersma dren-stavanger-22 nov2011
 
Eric Vyncke - IPv6 security in general
Eric Vyncke - IPv6 security in generalEric Vyncke - IPv6 security in general
Eric Vyncke - IPv6 security in general
 
Software Stacks to enable SDN and NFV
Software Stacks to enable SDN and NFVSoftware Stacks to enable SDN and NFV
Software Stacks to enable SDN and NFV
 
Eric Vyncke - Layer-2 security, ipv6 norway
Eric Vyncke - Layer-2 security, ipv6 norwayEric Vyncke - Layer-2 security, ipv6 norway
Eric Vyncke - Layer-2 security, ipv6 norway
 
Successfully Deploying IPv6
Successfully Deploying IPv6Successfully Deploying IPv6
Successfully Deploying IPv6
 
Implementing an IPv6 Enabled Environment for a Public Cloud Tenant
Implementing an IPv6 Enabled Environment for a Public Cloud TenantImplementing an IPv6 Enabled Environment for a Public Cloud Tenant
Implementing an IPv6 Enabled Environment for a Public Cloud Tenant
 
IPV6 Network Simulation Projects Research Guidance
IPV6 Network Simulation Projects Research GuidanceIPV6 Network Simulation Projects Research Guidance
IPV6 Network Simulation Projects Research Guidance
 
Roadmap to Next Generation IP Networks: A Review of the Fundamentals
Roadmap to Next Generation IP Networks: A Review of the FundamentalsRoadmap to Next Generation IP Networks: A Review of the Fundamentals
Roadmap to Next Generation IP Networks: A Review of the Fundamentals
 
Deploying IPv6 in OpenStack Environments
Deploying IPv6 in OpenStack EnvironmentsDeploying IPv6 in OpenStack Environments
Deploying IPv6 in OpenStack Environments
 
DPDK Summit 2015 - Sprint - Arun Rajagopal
DPDK Summit 2015 - Sprint - Arun RajagopalDPDK Summit 2015 - Sprint - Arun Rajagopal
DPDK Summit 2015 - Sprint - Arun Rajagopal
 
Understanding i pv6 2
Understanding i pv6 2Understanding i pv6 2
Understanding i pv6 2
 
Sipforum SIP & IPv6 discussion slides
Sipforum SIP & IPv6 discussion slidesSipforum SIP & IPv6 discussion slides
Sipforum SIP & IPv6 discussion slides
 

Viewers also liked

Intro Swiss IPv6 Council Event, 24. März 2014
Intro Swiss IPv6 Council Event, 24. März 2014Intro Swiss IPv6 Council Event, 24. März 2014
Intro Swiss IPv6 Council Event, 24. März 2014Swiss IPv6 Council
 
IPv6 Integration im Datacenter - wie komplex ist es wirklich?
IPv6 Integration im Datacenter - wie komplex ist es wirklich?IPv6 Integration im Datacenter - wie komplex ist es wirklich?
IPv6 Integration im Datacenter - wie komplex ist es wirklich?Swiss IPv6 Council
 
IPv6 bei PostFinance AG - Erste Erkenntnisse aus der Vorstudie
IPv6 bei PostFinance AG - Erste Erkenntnisse aus der VorstudieIPv6 bei PostFinance AG - Erste Erkenntnisse aus der Vorstudie
IPv6 bei PostFinance AG - Erste Erkenntnisse aus der VorstudieSwiss IPv6 Council
 
IPv6 Deployment In Enterprise Networks
IPv6 Deployment In Enterprise NetworksIPv6 Deployment In Enterprise Networks
IPv6 Deployment In Enterprise NetworksIvan Pepelnjak
 
IPv4 to IPv6
IPv4 to IPv6IPv4 to IPv6
IPv4 to IPv6mithilak
 

Viewers also liked (6)

Intro Swiss IPv6 Council Event, 24. März 2014
Intro Swiss IPv6 Council Event, 24. März 2014Intro Swiss IPv6 Council Event, 24. März 2014
Intro Swiss IPv6 Council Event, 24. März 2014
 
IPv6 Integration im Datacenter - wie komplex ist es wirklich?
IPv6 Integration im Datacenter - wie komplex ist es wirklich?IPv6 Integration im Datacenter - wie komplex ist es wirklich?
IPv6 Integration im Datacenter - wie komplex ist es wirklich?
 
IPv6 Transition
IPv6 TransitionIPv6 Transition
IPv6 Transition
 
IPv6 bei PostFinance AG - Erste Erkenntnisse aus der Vorstudie
IPv6 bei PostFinance AG - Erste Erkenntnisse aus der VorstudieIPv6 bei PostFinance AG - Erste Erkenntnisse aus der Vorstudie
IPv6 bei PostFinance AG - Erste Erkenntnisse aus der Vorstudie
 
IPv6 Deployment In Enterprise Networks
IPv6 Deployment In Enterprise NetworksIPv6 Deployment In Enterprise Networks
IPv6 Deployment In Enterprise Networks
 
IPv4 to IPv6
IPv4 to IPv6IPv4 to IPv6
IPv4 to IPv6
 

Similar to IPv6 Addressing Fundamentals Guide

IPv6 Deployment: Why and Why not? - HostingCon 2013
IPv6 Deployment: Why and Why not? - HostingCon 2013IPv6 Deployment: Why and Why not? - HostingCon 2013
IPv6 Deployment: Why and Why not? - HostingCon 2013APNIC
 
PLNOG 7: Ferenc Csorba - What’s new at the RIPE NCC?
PLNOG 7: Ferenc Csorba - What’s new at the RIPE NCC?PLNOG 7: Ferenc Csorba - What’s new at the RIPE NCC?
PLNOG 7: Ferenc Csorba - What’s new at the RIPE NCC?PROIDEA
 
IPv6 Address Planning
IPv6 Address PlanningIPv6 Address Planning
IPv6 Address Planningsmarthosein
 
Where are we now: IPv6 deployment update - Brunei National IPv6 Day Conference
Where are we now: IPv6 deployment update - Brunei National IPv6 Day ConferenceWhere are we now: IPv6 deployment update - Brunei National IPv6 Day Conference
Where are we now: IPv6 deployment update - Brunei National IPv6 Day ConferenceAPNIC
 
Implementing IP V4
Implementing IP V4Implementing IP V4
Implementing IP V4Napoleon NV
 
IPv6_Unified_2011-07-12-.ppt
IPv6_Unified_2011-07-12-.pptIPv6_Unified_2011-07-12-.ppt
IPv6_Unified_2011-07-12-.pptBruno638059
 
IPv6 Deployment: Why and Why not?
IPv6 Deployment: Why and Why not?IPv6 Deployment: Why and Why not?
IPv6 Deployment: Why and Why not?apnic_slides
 
PLNOG 6: Sandra Brás - What’s hot at the RIPE NCC
PLNOG 6: Sandra Brás -  What’s hot at the RIPE NCCPLNOG 6: Sandra Brás -  What’s hot at the RIPE NCC
PLNOG 6: Sandra Brás - What’s hot at the RIPE NCCPROIDEA
 
Panel with IPv6 CE Vendors
Panel with IPv6 CE VendorsPanel with IPv6 CE Vendors
Panel with IPv6 CE VendorsAPNIC
 
APNIC Regional Update: PacINET 2014
APNIC Regional Update: PacINET 2014APNIC Regional Update: PacINET 2014
APNIC Regional Update: PacINET 2014APNIC
 
IP Multicasting - An Overview
IP Multicasting - An OverviewIP Multicasting - An Overview
IP Multicasting - An Overviewh_marvin
 
Tech 2 Tech IPv6 presentation
Tech 2 Tech IPv6 presentationTech 2 Tech IPv6 presentation
Tech 2 Tech IPv6 presentationJisc
 
What LTE Parameters need to be Dimensioned and Optimized
What LTE Parameters need to be Dimensioned and OptimizedWhat LTE Parameters need to be Dimensioned and Optimized
What LTE Parameters need to be Dimensioned and OptimizedHoracio Guillen
 
IPv6 Deployment Planning Tutorial, by Philip Smith [APNIC 38]
IPv6 Deployment Planning Tutorial, by Philip Smith [APNIC 38]IPv6 Deployment Planning Tutorial, by Philip Smith [APNIC 38]
IPv6 Deployment Planning Tutorial, by Philip Smith [APNIC 38]APNIC
 
APNIC Update
APNIC Update APNIC Update
APNIC Update APNIC
 
Experience of Implementing IPTV in an ISP Network by Thong Hawk Yen
Experience of Implementing IPTV in an ISP Network by Thong Hawk YenExperience of Implementing IPTV in an ISP Network by Thong Hawk Yen
Experience of Implementing IPTV in an ISP Network by Thong Hawk YenMyNOG
 
Robert Raszuk - Technologies for IPv4/IPv6 coexistance
Robert Raszuk - Technologies for IPv4/IPv6 coexistanceRobert Raszuk - Technologies for IPv4/IPv6 coexistance
Robert Raszuk - Technologies for IPv4/IPv6 coexistancePROIDEA
 

Similar to IPv6 Addressing Fundamentals Guide (20)

IPv6 Deployment: Why and Why not? - HostingCon 2013
IPv6 Deployment: Why and Why not? - HostingCon 2013IPv6 Deployment: Why and Why not? - HostingCon 2013
IPv6 Deployment: Why and Why not? - HostingCon 2013
 
PLNOG 7: Ferenc Csorba - What’s new at the RIPE NCC?
PLNOG 7: Ferenc Csorba - What’s new at the RIPE NCC?PLNOG 7: Ferenc Csorba - What’s new at the RIPE NCC?
PLNOG 7: Ferenc Csorba - What’s new at the RIPE NCC?
 
IPv6 Address Planning
IPv6 Address PlanningIPv6 Address Planning
IPv6 Address Planning
 
IPv6 Address Planning
IPv6 Address PlanningIPv6 Address Planning
IPv6 Address Planning
 
Where are we now: IPv6 deployment update - Brunei National IPv6 Day Conference
Where are we now: IPv6 deployment update - Brunei National IPv6 Day ConferenceWhere are we now: IPv6 deployment update - Brunei National IPv6 Day Conference
Where are we now: IPv6 deployment update - Brunei National IPv6 Day Conference
 
Implementing IP V4
Implementing IP V4Implementing IP V4
Implementing IP V4
 
IPv6_Unified_2011-07-12-.ppt
IPv6_Unified_2011-07-12-.pptIPv6_Unified_2011-07-12-.ppt
IPv6_Unified_2011-07-12-.ppt
 
IPv6 Deployment: Why and Why not?
IPv6 Deployment: Why and Why not?IPv6 Deployment: Why and Why not?
IPv6 Deployment: Why and Why not?
 
PLNOG 6: Sandra Brás - What’s hot at the RIPE NCC
PLNOG 6: Sandra Brás -  What’s hot at the RIPE NCCPLNOG 6: Sandra Brás -  What’s hot at the RIPE NCC
PLNOG 6: Sandra Brás - What’s hot at the RIPE NCC
 
Panel with IPv6 CE Vendors
Panel with IPv6 CE VendorsPanel with IPv6 CE Vendors
Panel with IPv6 CE Vendors
 
APNIC Regional Update: PacINET 2014
APNIC Regional Update: PacINET 2014APNIC Regional Update: PacINET 2014
APNIC Regional Update: PacINET 2014
 
IP Multicasting - An Overview
IP Multicasting - An OverviewIP Multicasting - An Overview
IP Multicasting - An Overview
 
Tech 2 Tech IPv6 presentation
Tech 2 Tech IPv6 presentationTech 2 Tech IPv6 presentation
Tech 2 Tech IPv6 presentation
 
MTCNA
MTCNAMTCNA
MTCNA
 
What LTE Parameters need to be Dimensioned and Optimized
What LTE Parameters need to be Dimensioned and OptimizedWhat LTE Parameters need to be Dimensioned and Optimized
What LTE Parameters need to be Dimensioned and Optimized
 
IPv6 Deployment Planning Tutorial, by Philip Smith [APNIC 38]
IPv6 Deployment Planning Tutorial, by Philip Smith [APNIC 38]IPv6 Deployment Planning Tutorial, by Philip Smith [APNIC 38]
IPv6 Deployment Planning Tutorial, by Philip Smith [APNIC 38]
 
APNIC Update
APNIC Update APNIC Update
APNIC Update
 
Kinber ipv6-education-healthcare
Kinber ipv6-education-healthcareKinber ipv6-education-healthcare
Kinber ipv6-education-healthcare
 
Experience of Implementing IPTV in an ISP Network by Thong Hawk Yen
Experience of Implementing IPTV in an ISP Network by Thong Hawk YenExperience of Implementing IPTV in an ISP Network by Thong Hawk Yen
Experience of Implementing IPTV in an ISP Network by Thong Hawk Yen
 
Robert Raszuk - Technologies for IPv4/IPv6 coexistance
Robert Raszuk - Technologies for IPv4/IPv6 coexistanceRobert Raszuk - Technologies for IPv4/IPv6 coexistance
Robert Raszuk - Technologies for IPv4/IPv6 coexistance
 

More from Swiss IPv6 Council

Dual-Stack IPv6 Monitoring bei AWK - Member Anlass Swiss IPv6 Council Nov 2013
Dual-Stack IPv6 Monitoring bei AWK - Member Anlass Swiss IPv6 Council Nov 2013Dual-Stack IPv6 Monitoring bei AWK - Member Anlass Swiss IPv6 Council Nov 2013
Dual-Stack IPv6 Monitoring bei AWK - Member Anlass Swiss IPv6 Council Nov 2013Swiss IPv6 Council
 
IPv6 bei der Post - Step by Step zu IPv6
IPv6 bei der Post - Step by Step zu IPv6IPv6 bei der Post - Step by Step zu IPv6
IPv6 bei der Post - Step by Step zu IPv6Swiss IPv6 Council
 
SIG IPv6 Provider "IPv6 Ready"
SIG IPv6 Provider "IPv6 Ready"SIG IPv6 Provider "IPv6 Ready"
SIG IPv6 Provider "IPv6 Ready"Swiss IPv6 Council
 
Dos And Donts Of IPv6 Transition
Dos And Donts Of IPv6 TransitionDos And Donts Of IPv6 Transition
Dos And Donts Of IPv6 TransitionSwiss IPv6 Council
 
Members geneva dos and donts of transition silvia hagen
Members geneva   dos and donts of transition silvia hagen Members geneva   dos and donts of transition silvia hagen
Members geneva dos and donts of transition silvia hagen Swiss IPv6 Council
 
IPv6 solutions for an easy implementation
IPv6 solutions for an easy implementationIPv6 solutions for an easy implementation
IPv6 solutions for an easy implementationSwiss IPv6 Council
 
IPv6 Security - Myths and Reality
IPv6 Security - Myths and RealityIPv6 Security - Myths and Reality
IPv6 Security - Myths and RealitySwiss IPv6 Council
 
IPv6 Adoption --- Acceleration
IPv6 Adoption --- AccelerationIPv6 Adoption --- Acceleration
IPv6 Adoption --- AccelerationSwiss IPv6 Council
 
Network Neutrality - What's At Stake
Network Neutrality - What's At StakeNetwork Neutrality - What's At Stake
Network Neutrality - What's At StakeSwiss IPv6 Council
 

More from Swiss IPv6 Council (11)

Dual-Stack IPv6 Monitoring bei AWK - Member Anlass Swiss IPv6 Council Nov 2013
Dual-Stack IPv6 Monitoring bei AWK - Member Anlass Swiss IPv6 Council Nov 2013Dual-Stack IPv6 Monitoring bei AWK - Member Anlass Swiss IPv6 Council Nov 2013
Dual-Stack IPv6 Monitoring bei AWK - Member Anlass Swiss IPv6 Council Nov 2013
 
IPv6 bei der Post - Step by Step zu IPv6
IPv6 bei der Post - Step by Step zu IPv6IPv6 bei der Post - Step by Step zu IPv6
IPv6 bei der Post - Step by Step zu IPv6
 
SIG IPv6 Provider "IPv6 Ready"
SIG IPv6 Provider "IPv6 Ready"SIG IPv6 Provider "IPv6 Ready"
SIG IPv6 Provider "IPv6 Ready"
 
Dos And Donts Of IPv6 Transition
Dos And Donts Of IPv6 TransitionDos And Donts Of IPv6 Transition
Dos And Donts Of IPv6 Transition
 
Members geneva dos and donts of transition silvia hagen
Members geneva   dos and donts of transition silvia hagen Members geneva   dos and donts of transition silvia hagen
Members geneva dos and donts of transition silvia hagen
 
IPv6 solutions for an easy implementation
IPv6 solutions for an easy implementationIPv6 solutions for an easy implementation
IPv6 solutions for an easy implementation
 
IPv6 Security - Myths and Reality
IPv6 Security - Myths and RealityIPv6 Security - Myths and Reality
IPv6 Security - Myths and Reality
 
IPv6 Adoption --- Acceleration
IPv6 Adoption --- AccelerationIPv6 Adoption --- Acceleration
IPv6 Adoption --- Acceleration
 
Network Neutrality - What's At Stake
Network Neutrality - What's At StakeNetwork Neutrality - What's At Stake
Network Neutrality - What's At Stake
 
LISP Update
LISP UpdateLISP Update
LISP Update
 
IPv6 Enterprise Planning
IPv6 Enterprise PlanningIPv6 Enterprise Planning
IPv6 Enterprise Planning
 

Recently uploaded

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Recently uploaded (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

IPv6 Addressing Fundamentals Guide

  • 1. IPv6 Addressing Fundamentals Nathalie Trenaman RIPE NCC Swiss IPv6 Council 28 April 2014 Tuesday, April 29, 2014
  • 2. 2 • RIPE Policies • What ranges can I get, and where? • Allocation Process • How do I use this space? • IPv6 Addressing Guidelines • Recommendations Agenda Tuesday, April 29, 2014
  • 3. Ferenc Csorba - 13 March 2014 RIPE NCC • Located in Amsterdam • Not for profit organisation • One of the 5 Regional Internet Registries RIPE NCC - who are we? 3 Tuesday, April 29, 2014
  • 4. 4 “On 14 September 2012, the RIPE NCC ran out of their regular pool of IPv4” Tuesday, April 29, 2014
  • 6. IPv6 Address Basics 6IP Address Distribution Allocation PA Assignment PI Assignment IANA End User LIR RIR /3 /32 /12 /56/48 /48 Tuesday, April 29, 2014
  • 7. Ferenc Csorba - 13 March 2014 RIPE Policies •IPv6 Address Allocation & Assignment Policy •RIPE-589 •Made by the RIPE Community •Consensus is the key 7 Tuesday, April 29, 2014
  • 8. Getting it 8 • To qualify, an organisation must: • Be an LIR • Have a plan for making assignments within two years • Minimum allocation size /32 • Up to a /29 without additional justification • More if justified by customer numbers Getting an IPv6 allocation Tuesday, April 29, 2014
  • 9. Getting it 9 • Give your customers enough addresses • up to a /48 • For more addresses send in request form • alternatively, make a sub-allocation • Every assignment must be registered in the RIPE Database Customer Assignments Tuesday, April 29, 2014
  • 10. Getting it 10Comparison IPv4 and IPv6 status IPv4 IPv6 ALLOCATED PA ALLOCATED-BY-RIR ASSIGNED PA ASSIGNED ASSIGNED PA AGGREGATED-BY-LIR SUB-ALLOCATED PA ALLOCATED-BY-LIR ASSIGNED PI ASSIGNED PI Tuesday, April 29, 2014
  • 11. Getting it 11 • Status is ASSIGNED • Minimum assignment size is a/64 • For more than a /48, send a request form Using ASSIGNED ALLOCATED-BY-RIR ASSIGNED /44 Tuesday, April 29, 2014
  • 12. Getting it 12 • Can be used to group customers • broadband, for example • “assignment size” = assignment of each customer Using AGGREGATED-BY-LIR ALLOCATED-BY-RIR AGGREGATED-BY-LIR assignment-size: 56 /34 /56 /56/56/56/56 Tuesday, April 29, 2014
  • 13. Getting it 13 inet6num:        2001:db8:1000::/36 netname:         Brightlife descr:      Broadband services country:          NL admin-c:         BN649-RIPE tech-c:          BN649-RIPE status:          AGGREGATED-BY-LIR assignment-size: 48 mnt-by:          BRIGHTLIFE-MNT notify:          noc@example.net changed:        noc@example.net 20130218 source:         RIPE AGGREGATED-BY-LIR in the RIPE DB Tuesday, April 29, 2014
  • 14. Getting it 14 • Can be used for customers who expect large growth • or for your own infrastructure Using ALLOCATED-BY-LIR ALLOCATED-BY-RIR ALLOCATED-BY-LIR AGGREGATED-BY-LIR assignment-size: 48 /40 /36 Tuesday, April 29, 2014
  • 15. Getting it 15Overview ALLOCATED-BY-RIR ALLOCATED-BY-LIR /48 /48/48/48/48 AGGREGATED-BY-LIR assignment-size: 48 /40 ASSIGNED AGGREGATED-BY-LIR assignment-size: 56 /34/44/36 Tuesday, April 29, 2014
  • 16. Getting it 16 • To qualify, an organisation must: • Meet the contractual requirements for provider independent resources • LIRs must demonstrate special routing requirements • Minimum assignment size /48 • PI space can not be used for sub-assignments • not even 1 IP address Getting IPv6 PI address space Tuesday, April 29, 2014
  • 17. Tips 17IPv6 RIPEness: 10238 LIRs 4 stars 21% 3 stars 14% 2 stars 8%1 star 25% No IPv6 32% Tuesday, April 29, 2014
  • 18. Tips 18IPv6 RIPEness: Switzerland 350 LIRs 4 stars 24% 3 stars 19% 2 stars 8% 1 star 21% No IPv6 28% Tuesday, April 29, 2014
  • 21. Why Create an Addressing Plan? Benefits of an IPv6 Addressing Plan: •Mental health during implementation(!) •Easier implementation of security policies •Efficient addressing plans are scalable •More efficient route aggregation 21 Tuesday, April 29, 2014
  • 22. 4 Bit Boundaries IPv6 offers flexibility with addressing plans Network addressing can be done on 4 bit boundaries 22 Tuesday, April 29, 2014
  • 23. Customers Customers should get a large block of addresses •/48 - Business •/48 or 56 - Residential For more than a /48, send a request form Every assignment must be registered 23 Tuesday, April 29, 2014
  • 24. Example Situation Customer has 6 functions: •Servers •Office PCs •Network Engineers PCs •Guests •VPN (remote workers) • Infrastructure (point-to-point and loopbacks) 24 Tuesday, April 29, 2014
  • 25. Example Situation Customer has 3 locations: •Main building floor 1 •Main building floor 2 •Secondary office 25 Tuesday, April 29, 2014
  • 26. Example Assignment from LIR The customer gets 2001:0db8:1a2b::/48 Work on 4 bit boundary • 6 functions, leaves room for 10 new functions • 3 locations, leaves room for 13 new locations • We still have 8 bits! • Room for 256 networks per function per location 26 Tuesday, April 29, 2014
  • 27. Example Plan 1 Putting this in the address: 2001:0db8:1a2b:FLXX::/64 •F = function (0=infrastructure, 1=servers, 2=office, 3 =engineers, e=vpn, f=guest) •L = location (0=main building 1, 1=main building 2, 2=secondary office •XX = Number for network of type +location 27 Tuesday, April 29, 2014
  • 30. Example Plan Usage 2001:0db8:1a2b:1000::/64 •Servers in Main building, floor 1, network 0 28 Tuesday, April 29, 2014
  • 31. Example Plan Usage 2001:0db8:1a2b:1000::/64 •Servers in Main building, floor 1, network 0 2001:0db8:1a2b:1200::/64 28 Tuesday, April 29, 2014
  • 32. Example Plan Usage 2001:0db8:1a2b:1000::/64 •Servers in Main building, floor 1, network 0 2001:0db8:1a2b:1200::/64 •Servers in Secondary office, network 0 28 Tuesday, April 29, 2014
  • 33. Example Plan Usage 2001:0db8:1a2b:1000::/64 •Servers in Main building, floor 1, network 0 2001:0db8:1a2b:1200::/64 •Servers in Secondary office, network 0 2001:0db8:1a2b:f009::/64 28 Tuesday, April 29, 2014
  • 34. Example Plan Usage 2001:0db8:1a2b:1000::/64 •Servers in Main building, floor 1, network 0 2001:0db8:1a2b:1200::/64 •Servers in Secondary office, network 0 2001:0db8:1a2b:f009::/64 •Guest in Main Building, floor 1, network 9 28 Tuesday, April 29, 2014
  • 35. Example Plan Usage 2001:0db8:1a2b:1000::/64 •Servers in Main building, floor 1, network 0 2001:0db8:1a2b:1200::/64 •Servers in Secondary office, network 0 2001:0db8:1a2b:f009::/64 •Guest in Main Building, floor 1, network 9 28 Tuesday, April 29, 2014
  • 38. Example Plan Usage 2001:0db8:1a2b:0000::1/128 •loopback address (location doesn’t apply!) 29 Tuesday, April 29, 2014
  • 39. Example Plan Usage 2001:0db8:1a2b:0000::1/128 •loopback address (location doesn’t apply!) 2001:0db8:1a2b:0102::/64 29 Tuesday, April 29, 2014
  • 40. Example Plan Usage 2001:0db8:1a2b:0000::1/128 •loopback address (location doesn’t apply!) 2001:0db8:1a2b:0102::/64 •point-to-point link (0 for infrastructure) 29 Tuesday, April 29, 2014
  • 41. Example Plan Usage 2001:0db8:1a2b:0000::1/128 •loopback address (location doesn’t apply!) 2001:0db8:1a2b:0102::/64 •point-to-point link (0 for infrastructure) 2001:0db8:1a2b:e1ab::/64 29 Tuesday, April 29, 2014
  • 42. Example Plan Usage 2001:0db8:1a2b:0000::1/128 •loopback address (location doesn’t apply!) 2001:0db8:1a2b:0102::/64 •point-to-point link (0 for infrastructure) 2001:0db8:1a2b:e1ab::/64 •VPN in main office, floor 1, user 171 29 Tuesday, April 29, 2014
  • 43. Example Plan Usage 2001:0db8:1a2b:0000::1/128 •loopback address (location doesn’t apply!) 2001:0db8:1a2b:0102::/64 •point-to-point link (0 for infrastructure) 2001:0db8:1a2b:e1ab::/64 •VPN in main office, floor 1, user 171 29 Tuesday, April 29, 2014
  • 44. Example Plan Usage 2001:0db8:1a2b:0000::1/128 •loopback address (location doesn’t apply!) 2001:0db8:1a2b:0102::/64 •point-to-point link (0 for infrastructure) 2001:0db8:1a2b:e1ab::/64 •VPN in main office, floor 1, user 171 29 Tuesday, April 29, 2014
  • 45. Alternatives The previous example is just an idea •Adapt as necessary 2001:0db8:1a2b:FFLX::/64 •256 functions •16 locations •16 networks per function per location 30 Tuesday, April 29, 2014
  • 46. End User Summary Tips: •Work on 4-bit boundary •Group subnets by function •Group subnets by location •Make a scalable addressing plan 31 Tuesday, April 29, 2014
  • 47. ISP Addressing Plan What should an ISP Addressing Plan contain? •Address space for internal use • loopback interfaces • point-to-point connections • servers, routers and other infrastructure at PoPs •Use a /48 per POP •Address space for customers 32 Tuesday, April 29, 2014
  • 48. Loopback Interfaces One /128 per device • One /64 contains enough space for 18.446.744.073.709.551.616 devices Take an easy to remember block for loopbacks • 2001:0db8:1a2b:0000:0000:0000:0000:0000 33 Tuesday, April 29, 2014
  • 49. Point-to-Point Interfaces One /64 per point-to-point connection •Reserve 1 /64 for the link, but configure a / 127 (RFC6164) 34 Tuesday, April 29, 2014
  • 50. ISP Guidelines In common cases: •One /48 per PoP •Calculate growth •Make it scalable 35 Tuesday, April 29, 2014
  • 51. IPv6 Address Basics 36 • Every subnet should be a /64 • Customer assignments (sites) between: • /64 (1 subnet) • /48 (65,536 subnets) • Minimum allocation size /32 • 65,536 /48s • 16,777,216 /56s IPv6 Address Basics Tuesday, April 29, 2014
  • 52. IPv6 Address Basics 37IPv6 Subnetting 0000:00002001:0DB8:0000:0000:0000:0000:0000:0000 IPv6 Subnetting /32 = 65536 /48 /48 = 65536 /64 /52 = 4096 /64 /56 = 256 /64 64 bits interface ID /60 = 16 /64 /64 Contact Training Services: ts@ripe.net Follow us on Twitter: www.twitter.com/TrainingRIPENCC www.ripe.net Tuesday, April 29, 2014
  • 53. Tips 38 • Customers have no idea how to handle 65536 subnets! • Provide them with information • https://www.ripe.net/lir-services/training/material/ IPv6-for-LIRs-Training-Course/IPv6_addr_plan4.pdf Customers And Their /48 Tuesday, April 29, 2014
  • 56. Transition Mechanisms 41 • Maintaining connectivity to IPv4 hosts by sharing IPv4 addresses between clients • Extending the address space with NAT/CGN/LSN • Translating between IPv6 and IPv4 • Provide a mechanism to connect to the emerging IPv6-only networks • Tunneling IPv6 packets over IPv4-only networks Transitioning: Solving Two Problems Tuesday, April 29, 2014
  • 57. Transition Mechanisms 42 • Manually configured tunnels towards a fixed tunnel broker like SixXS, Hurricane Electric or your own system • Stable and predictable but not easily deployed to the huge residential markets • MTU might cause issues 6in4 Tuesday, April 29, 2014
  • 58. Transition Mechanisms 436in4 PROVIDERCUSTOMER INTERNET Home User IPv4 Infrastructure IPv4 Tunnel Broker IPv6 Internet Tunnel Server Tuesday, April 29, 2014
  • 59. Transition Mechanisms 44 • 6to4 • “Automatic” tunnel, system can configure itself • IPv4 address is part of the IPv6 address • Requires a public IPv4 address • Uses anycast to reach a nearby server • Return traffic might choose another server • Teredo • Uses UDP to encapsulate packets • Works across (most) NAT implementations 6to4 and Teredo Tuesday, April 29, 2014
  • 60. Transition Mechanisms 456to4 and Teredo PROVIDERCUSTOMER INTERNET Home User IPv4 IPv6 Internet Anycast 6to4 Tunnel Servers Infrastructure IPv4 Tuesday, April 29, 2014
  • 61. Transition Mechanisms 46 • Quite similar to 6to4 • Encodes the IPv4 address in the IPv6 prefix • Uses address space assigned to the operator • The operator has full control over the relay • Traffic is symmetric across a relay • Or at least stays in your domain • Can work with both public and private space • Needs additional software for signaling 6RD Tuesday, April 29, 2014
  • 62. Transition Mechanisms 476RD PROVIDERCUSTOMER INTERNET IPv6 Internet 6RD Tunnel Server IPv4 Internet Home User IPv4 Infrastructure IPv4 Tuesday, April 29, 2014
  • 63. Transition Mechanisms 48 • Single-stack clients will only have IPv6 • Translator box will strip all headers and replace them with IPv4 • Requires some DNS “magic” • Capture responses and replace A with AAAA • Response is crafted based on target IPv4 address • Usually implies address sharing on IPv4 NAT64/DNS64 Tuesday, April 29, 2014
  • 64. Transition Mechanisms 49NAT64/DNS64 PROVIDERCUSTOMER INTERNET Home User public IPv6 IPv6 Internet NAT64 Box IPv4 Internet DNS64 Infrastructure public IPv6 Tuesday, April 29, 2014
  • 65. Transition Mechanisms 50 • Tunneling IPv4 over IPv6 • Allows clients to use RFC1918 addresses without doing NAT themselves • NAT is centrally located at the provider • Client’s IPv6 address is used to maintain state and to keep clients apart • Allows for duplicate IPv4 ranges DS-lite Tuesday, April 29, 2014
  • 66. Transition Mechanisms 51DS-lite PROVIDERCUSTOMER INTERNET IPv6 Internet NAT44 Box IPv4 Internet Home User public IPv6 private IPv4 Infrastructure IPv6 Infrastructure IPv4 Tuesday, April 29, 2014
  • 67. Tips 52 • Websites • http://www.getipv6.info • http://www.getipv6.info • http://datatracker.ietf.org/wg/v6ops/ • http://www.ripe.net/ripe/docs/ripe-554.html • Mailing lists • http://lists.cluenet.de/mailman/listinfo/ipv6-ops • http://www.ripe.net/mailman/listinfo/ipv6-wg Also useful Tuesday, April 29, 2014