IPv6 Tutorial RIPE 60

RIPE Meetings
RIPE MeetingsRIPE Meetings
IPv6 for LIRs tutorial
RIPE 60
3 May 2010
IPv4 Allocation Timeline
           IANA Pool             RIR Allocations            Advertised             RIR Pool

                                                                                Today
256

                                       Data                                         Projection
220


192




128




 64




 0
  1999   2000   2001   2002   2003   2004   2005   2006   2007   2008    2009   2010    2011   2012


                                                                                                      2
Reaching the next billion
•   Around 1.6 billion Internet users now
     -   around 25% of all people


•   Mobile phones are becoming Internet devices


•   The Internet of things




                                                  3
The Registry System
IP Address Distribution
                              /3                             IANA




                        /12                                   RIR




          /32                                                 LIR




   /48          /56                   /48                   End User


   Allocation         PA Assignment         PI Assignment

                                                                    5
Registration




               6
Conservation




               7
Aggregation




              8
IPv4?
IPv4 Address Pool             Various




             Other




                                               RIPE NCC




 7%                                               AfriNIC



available

             APNIC

                                        ARIN


                     LACNIC
                                                     10
Hot IPv4 / IPv6 policy topics
•   Allocations from the last /8 (2010-02)
     - new and existing LIRs can receive only one /22
         allocation
     - only if they already have IPv6 space




                                                        11
Just implemented: Run Out Fairly (of IPv4)
•   Gradually reduced allocation / assignment periods
•   Needs for “Entire Period” of up to...
     - 12 months (January 2010)
     - 9 months (July 2010)

     - 6 months (January 2011)

     - 3 months (July 2011)




•   50% has to be used up by half-period


                                                        12
Wait and See?




                13
Network Address Translation = Bad




                                     Internet

                   NAT Router with
                   public IP




                                                14
Network Address Translation = Bad




                                     Internet

                   NAT Router with
                   public IP




                                                14
NAT behind NAT = Worse

                    NAT Router with
                    private IP




                                                        Internet


                                      NAT Router with
                                      public IP




             NAT Router with
             private IP




                                                                   15
Transition techniques
•   Dual stack
•   IP Tunneling: encapsulation
     - manual
     - automatic

         -   6to4: connect to IPv6 using your IPv4 connection
               2002:x.y.z.a::/48
         -   Teredo: through NAT. UDP encapsulation
•   Tunnel Brokers: virtual IPv6 ISPs
•   Protocol Translation

                                                                16
IPv6 Transition




                  17
IPv6 Transition




                  17
IPv6 Transition




                  17
IPv6 Transition




                  17
IPv6 Transition




                  17
IPv6 Transition




                  17
IPv6 Basics
IPv6 Address Basics
•   IPv6 address: 128 bits
     -   32 bits in IPv4
•   Every subnet is a /64
•   Sites assignments between:
     - /64 (1 subnet)
     - /56 (256 subnets)

     - /48 (65,536 subnets)

•   Usual allocation size /32


                                 19
Address Notation
2001:0610:003E:EF11:0000:0000:C100:004D




                                          20
Address Notation
2001:0610:003E:EF11:0000:0000:C100:004D
2001:610:3E:EF11:0:0:C100:4D




                                          20
Address Notation
2001:0610:003E:EF11:0000:0000:C100:004D
2001:610:3E:EF11:0:0:C100:4D

2001:610:3E:EF11::C100:4D




                                          20
Address Notation
2001:0610:003E:EF11:0000:0000:C100:004D
2001:610:3E:EF11:0:0:C100:4D

2001:610:3E:EF11::C100:4D

1   1   1   0   1   1   1   1   0   0   0   1   0   0   0   1




                                                                20
Multiple addresses

Addresses        Range       Scope
Loopback         ::1         machine
Link Local       FE80::/10   link layer
Unique Local     FC00::/7    site
Global Unicast   2000::/3    global
6to4             2002::/16   global
Multicast        FF00::/8    variable




                                          21
IPv6 Stateless Autoconfiguration
•   Neighbor Discovery ICMPv6 messages
•   host asks for network information:
     - IPv6 prefix (link prefix)
                                     48 bits - MAC Address
     - default router address

     - hop limit

     - MTU
                            EUI-64        FF     FE




              Link Prefix                 Interface ID

                64 bits                     64 bits




                                                             22
IPv6 Stateful Autoconfiguration
•   DHCPv6
     - used if no router is found
     - or if Router Advertisement Message

       enables use of DHCP


•   With manual configuration subnet sizes other
     than /64 are possible




                                                  23
“96 More Bits, No Magic”
                - Gaurab Upadhaya




                                    24
Some pain points do exist
•   CPE
•   Firewalls
•   Load balancers



                 “watch this space”




                                      25
Training from scratch is needed
•   IPv4 skills translate well to IPv6 skills
•   Concepts have not changed
     - more addresses
     - slightly different features in some parts



•   Problems are more psychological than technical!




                                                      26
IPv6 routing is tunnel hell
60%




45%




30%




15%




0%
  2004    2005    2006    2007   2008   2009



                                               27
Getting it
Getting an IPv6 allocation
•   To qualify, an organisation must:
     - Be an LIR
     - Have a plan for making assignments within two years



•   Minimum allocation size /32


•   Announce your whole allocation as one prefix
     -   recommended, not mandatory anymore



                                                             29
IPv6 Allocations and Announcements
2000
                               RIPE NCC Allocations
                               Announcements
1750



1500



1250



1000



 750



 500



 250



  0
   2004   2005   2006   2007      2008         2009   2010



                                                             30
IPv6 Allocations and Announcements
2000
                               RIPE NCC Allocations
                               Announcements
1750



1500



1250



1000



 750



 500



 250



  0
   2004   2005   2006   2007      2008         2009   2010



                                                             30
IPv6 Allocations and Announcements
2000
                               RIPE NCC Allocations
                               Announcements
1750



1500



1250



1000



 750



 500



 250



  0
   2004   2005   2006   2007      2008         2009   2010



                                                             30
Percentage of Routed IPv6 Allocations
70




60




50




40
  2004   2005   2006   2007   2008   2009   2010


                                                   31
Percentage of Routed IPv6 Allocations
70




60




50




40
  2004   2005   2006   2007   2008   2009   2010


                                                   31
Customer assignments
•   Give your customers enough addresses
     -   Up to a /48


•   For more addresses, send in request form
     -   Alternatively, make a sub-allocation


•   Register sub-allocations in the RIPE DB
     -   Put Assignments in a database
         accessible by the RIPE NCC


                                                32
What does an IPv6 allocation cost?
•   /32 = 1 scoring unit
•   /31 = 2 scoring units
•   points = ∑(2010-1992)x(scoring unit) =18x1+...

         Category      Points   Fee 2010
         Extra Small   0 - 16   € 1300
         Small         - 111    € 1800
         Medium        - 936    € 2550
         Large         - 7116   € 4100
         Extra Large   > 7116   € 5500



                                                     33
Getting IPv6 PI address space
•   To qualify, an organisation must:
     - Demonstrate it will multihome
     - Meet the contractual requirements

       for provider independent resources

     -   LIRs must demonstrate special routing requirements


•   Minimum assignment size /48



                                                              34
Reverse DNS


2001:610: 3E:EF11::C100:4D




                             35
Reverse DNS


2001: 610:   3E:EF11:   :C100:   4D




                                      36
Reverse DNS


2001:0610:003E:EF11:0000:0000:C100:004D




                                          36
Reverse DNS


2001:0610:003E:EF11:0000:0000:C100:004D

0.1.6.0.1.0.0.2.ip6.arpa




                                          36
Reverse DNS


2001:0610:003E:EF11:0000:0000:C100:004D

0.1.6.0.1.0.0.2.ip6.arpa

d.4.0.0.0.0.1.c.0.0.0.0.0.0.0.0.1.1.f.e.e.
  3.0.0.0.1.6.0.1.0.0.2.ip6.arpa PTR
  yourname.domain.tld


                                             36
Reverse DNS


2001:0610:003E:EF11:0000:0000:C100:004D

0.1.6.0.1.0.0.2.ip6.arpa

d.4.0.0.0.0.1.c.0.0.0.0.0.0.0.0.1.1.f.e.e.
  3.0.0.0.1.6.0.1.0.0.2.ip6.arpa PTR
  yourname.domain.tld
d.4.0.0.0.0.1.c.0.0.0.0.0.0.0.0.1.1.f.e.e.3.0.0.0.1.6.0.1.0.0.2.ip6.arpa PTR yourname.domain.tld

                                                                                                   36
DNS in IPv6
•   DNS is not IP layer dependent
•   A record for IPv4
•   AAAA record for IPv6
•   Don't answer based on incoming protocol
•   Only challenges are for translations
     -   NAT-PT, NAT64, proxies




                                              37
Deploying
Scenario: Do Nothing
•   No problems for next few years
•   Some people won't be able to use your services
•   No extra costs
     -   until you hit the wall
•   High costs for quick implementation
•   Short planning times will mean some things go
      wrong



                                                     39
Scenario: Do It All Now!
•   Hardware may have to be changed
•   High investment in time and resources
•   No direct return
•   High costs for quick implementation
•   Short planning times will mean some things go
      wrong




                                                    40
Scenario: Act Now, Phased Approach
•   Change purchasing procedure (feature parity)
•   Check your current hardware and software
•   Plan every step and test
•   One service at a time
     - face first
     - core

     - customers

•   Prepare to be able to switch off IPv4


                                                   41
Change your face first
•   Web
•   Authoritative DNS
•   Mail servers

•   Outsiders see these services
•   Multiple mature implementations exist




                                            42
Don'ts
•   Don't separate IPv6 features from IPv4


•   Don't do everything in one go


•   Don't appoint an IPv6 specialist
     -   do you have an IPv4 specialist?


•   Don't see IPv6 as a product
     -   the Internet is the product
                                             43
Do
•   Phased approach
•   Change requirements for new hardware
•   Work outside-in, then inside-out
•   Feature parity
•   Dual stack
•   Think about possible future renumbering




                                              44
Business Case
•   IPv4 is no longer equal to “the Internet”
•   Avoiding the issue does not make it go away
•   How much are you willing to spend now to save
     money later?
•   Only IPv6 allows continued IP networking growth
•   What do you want the Internet to be like in 5
     years?


                     “IPv6, act now!”
                                                      45
The End!             Kрай             Y Diwedd
                                       Fí
                  Соңы                               Finis
                                        Liðugt
               Ende    Finvezh                      Kiнець
Konec      Kraj        Ënn     Fund

Lõpp    Beigas     Vége      Son                          Kpaj
                                     An Críoch
        ‫הסוף‬       Endir
Fine                         Sfârşit        Fin      Τέλος
       Einde
                  Конeц                Slut       Slutt
                           Pabaiga
               Amaia       Loppu     Tmiem          Koniec
  Fim
1 of 62

Recommended

IPv6 Deployment In Enterprise Networks by
IPv6 Deployment In Enterprise NetworksIPv6 Deployment In Enterprise Networks
IPv6 Deployment In Enterprise NetworksIvan Pepelnjak
4.1K views12 slides
Multipathed, Multiplexed, Multilateral Transport Protocols - Decoupling trans... by
Multipathed, Multiplexed, Multilateral Transport Protocols - Decoupling trans...Multipathed, Multiplexed, Multilateral Transport Protocols - Decoupling trans...
Multipathed, Multiplexed, Multilateral Transport Protocols - Decoupling trans...APNIC
3.9K views317 slides
Welcome to the APNIC Member Gathering, Mongolia by
Welcome to the APNIC Member Gathering, MongoliaWelcome to the APNIC Member Gathering, Mongolia
Welcome to the APNIC Member Gathering, MongoliaAPNIC
576 views91 slides
IPV6 Deployment for Broadband Internet by Azura Mat Salim by
IPV6  Deployment for Broadband Internet by Azura Mat SalimIPV6  Deployment for Broadband Internet by Azura Mat Salim
IPV6 Deployment for Broadband Internet by Azura Mat SalimMyNOG
1.2K views15 slides
Internet Resource Management Tutorial at SANOG 24 by
Internet Resource Management Tutorial at SANOG 24Internet Resource Management Tutorial at SANOG 24
Internet Resource Management Tutorial at SANOG 24APNIC
2.4K views145 slides
Government by
Government Government
Government APNIC
440 views48 slides

More Related Content

What's hot

Internet Resource Transfer Policy: what can you learn from them? by
Internet Resource Transfer Policy: what can you learn from them?Internet Resource Transfer Policy: what can you learn from them?
Internet Resource Transfer Policy: what can you learn from them?APNIC
1.4K views26 slides
IPv6 Deployment Architecture for Broadband Access Networks by
IPv6 Deployment Architecture for Broadband Access NetworksIPv6 Deployment Architecture for Broadband Access Networks
IPv6 Deployment Architecture for Broadband Access NetworksAPNIC
588 views36 slides
Paul Wilson's presentation at GSMA Mobile World Congress Shanghai by
Paul Wilson's presentation at GSMA Mobile World Congress Shanghai Paul Wilson's presentation at GSMA Mobile World Congress Shanghai
Paul Wilson's presentation at GSMA Mobile World Congress Shanghai APNIC
4.3K views30 slides
IPv6 at Comcast, PTC17 by
IPv6 at Comcast, PTC17IPv6 at Comcast, PTC17
IPv6 at Comcast, PTC17APNIC
465 views8 slides
IPv6, 4G & IoT by
IPv6, 4G & IoTIPv6, 4G & IoT
IPv6, 4G & IoTAPNIC
2K views16 slides
APNIC Update @ ARM, Mongolia by
APNIC Update @ ARM, MongoliaAPNIC Update @ ARM, Mongolia
APNIC Update @ ARM, MongoliaAPNIC
1.3K views29 slides

What's hot(20)

Internet Resource Transfer Policy: what can you learn from them? by APNIC
Internet Resource Transfer Policy: what can you learn from them?Internet Resource Transfer Policy: what can you learn from them?
Internet Resource Transfer Policy: what can you learn from them?
APNIC1.4K views
IPv6 Deployment Architecture for Broadband Access Networks by APNIC
IPv6 Deployment Architecture for Broadband Access NetworksIPv6 Deployment Architecture for Broadband Access Networks
IPv6 Deployment Architecture for Broadband Access Networks
APNIC588 views
Paul Wilson's presentation at GSMA Mobile World Congress Shanghai by APNIC
Paul Wilson's presentation at GSMA Mobile World Congress Shanghai Paul Wilson's presentation at GSMA Mobile World Congress Shanghai
Paul Wilson's presentation at GSMA Mobile World Congress Shanghai
APNIC4.3K views
IPv6 at Comcast, PTC17 by APNIC
IPv6 at Comcast, PTC17IPv6 at Comcast, PTC17
IPv6 at Comcast, PTC17
APNIC465 views
IPv6, 4G & IoT by APNIC
IPv6, 4G & IoTIPv6, 4G & IoT
IPv6, 4G & IoT
APNIC2K views
APNIC Update @ ARM, Mongolia by APNIC
APNIC Update @ ARM, MongoliaAPNIC Update @ ARM, Mongolia
APNIC Update @ ARM, Mongolia
APNIC1.3K views
Asia Pacific Internet Leadership Program by APNIC
Asia Pacific Internet Leadership ProgramAsia Pacific Internet Leadership Program
Asia Pacific Internet Leadership Program
APNIC2.2K views
APNIC Update: btNOG 3 by APNIC
APNIC Update: btNOG 3APNIC Update: btNOG 3
APNIC Update: btNOG 3
APNIC298 views
APNIC Member Services by APNIC
APNIC Member ServicesAPNIC Member Services
APNIC Member Services
APNIC290 views
btNOG 4: IPv6 deployment - where are we now? by APNIC
btNOG 4: IPv6 deployment - where are we now?btNOG 4: IPv6 deployment - where are we now?
btNOG 4: IPv6 deployment - where are we now?
APNIC493 views
CES 2016 Panel: Your Customers Are on the New Internet – Are you? by ARIN
CES 2016 Panel: Your Customers Are on the New Internet – Are you?CES 2016 Panel: Your Customers Are on the New Internet – Are you?
CES 2016 Panel: Your Customers Are on the New Internet – Are you?
ARIN570 views
Apnic IPv6 Deployment by APNIC
Apnic IPv6 DeploymentApnic IPv6 Deployment
Apnic IPv6 Deployment
APNIC1.3K views
Scaling BGP by APNIC
Scaling BGPScaling BGP
Scaling BGP
APNIC1.2K views
DNSSEC Measurement APTLD 71 by Siena Perry
DNSSEC Measurement APTLD 71DNSSEC Measurement APTLD 71
DNSSEC Measurement APTLD 71
Siena Perry108 views
What is APNIC: Infotel 2014 by APNIC
What is APNIC: Infotel 2014What is APNIC: Infotel 2014
What is APNIC: Infotel 2014
APNIC1.6K views
Whois - Addressing the Asia Pacifc by APNIC
Whois - Addressing the Asia PacifcWhois - Addressing the Asia Pacifc
Whois - Addressing the Asia Pacifc
APNIC657 views
Apnic Update - SANOG 30 by APNIC
Apnic Update - SANOG 30Apnic Update - SANOG 30
Apnic Update - SANOG 30
APNIC435 views
IPv6 in Mobile Networks by APNIC
IPv6 in Mobile NetworksIPv6 in Mobile Networks
IPv6 in Mobile Networks
APNIC2.4K views

Viewers also liked

Cisco IPv6 Tutorial by
Cisco IPv6 TutorialCisco IPv6 Tutorial
Cisco IPv6 Tutorialkriz5
30.8K views106 slides
IPv4 to IPv6 by
IPv4 to IPv6IPv4 to IPv6
IPv4 to IPv6mithilak
21K views28 slides
IPV6 Skills and expertise programs by
IPV6 Skills and expertise programsIPV6 Skills and expertise programs
IPV6 Skills and expertise programsIPv6 Conference
699 views11 slides
ITU in Asia Pacific : Cooperation with APNIC on IPv6 Migration [APRICOT 2015] by
ITU  in Asia Pacific : Cooperation with APNIC on IPv6 Migration [APRICOT 2015]ITU  in Asia Pacific : Cooperation with APNIC on IPv6 Migration [APRICOT 2015]
ITU in Asia Pacific : Cooperation with APNIC on IPv6 Migration [APRICOT 2015]APNIC
1.5K views33 slides
National IPv6 Strategies and Migration Plans - ITU Telecom World, Doha 7 Dece... by
National IPv6 Strategies and Migration Plans - ITU Telecom World, Doha 7 Dece...National IPv6 Strategies and Migration Plans - ITU Telecom World, Doha 7 Dece...
National IPv6 Strategies and Migration Plans - ITU Telecom World, Doha 7 Dece...Mohamed El Bashir, Msc., MBA
745 views18 slides
IPv6 Address Format by
IPv6 Address FormatIPv6 Address Format
IPv6 Address FormatNetProtocol Xpert
335 views6 slides

Viewers also liked(20)

Cisco IPv6 Tutorial by kriz5
Cisco IPv6 TutorialCisco IPv6 Tutorial
Cisco IPv6 Tutorial
kriz530.8K views
IPv4 to IPv6 by mithilak
IPv4 to IPv6IPv4 to IPv6
IPv4 to IPv6
mithilak21K views
IPV6 Skills and expertise programs by IPv6 Conference
IPV6 Skills and expertise programsIPV6 Skills and expertise programs
IPV6 Skills and expertise programs
IPv6 Conference699 views
ITU in Asia Pacific : Cooperation with APNIC on IPv6 Migration [APRICOT 2015] by APNIC
ITU  in Asia Pacific : Cooperation with APNIC on IPv6 Migration [APRICOT 2015]ITU  in Asia Pacific : Cooperation with APNIC on IPv6 Migration [APRICOT 2015]
ITU in Asia Pacific : Cooperation with APNIC on IPv6 Migration [APRICOT 2015]
APNIC1.5K views
Cisco presentation2 by ehsan nazer
Cisco presentation2Cisco presentation2
Cisco presentation2
ehsan nazer1.4K views
IPv6 theoryfinalx by Pawan Sharma
IPv6 theoryfinalxIPv6 theoryfinalx
IPv6 theoryfinalx
Pawan Sharma3.3K views
apnic handling-network-abuse by APNIC
apnic handling-network-abuseapnic handling-network-abuse
apnic handling-network-abuse
APNIC1.7K views
Supporting internet growth and evolution by APNIC
Supporting internet growth and evolutionSupporting internet growth and evolution
Supporting internet growth and evolution
APNIC1.8K views
DNSSEC/DANE/TLS Testing in Go6Lab by APNIC
DNSSEC/DANE/TLS Testing in Go6LabDNSSEC/DANE/TLS Testing in Go6Lab
DNSSEC/DANE/TLS Testing in Go6Lab
APNIC582 views
Community Networks: An Alternative Paradigm for Developing Network Infrastruc... by APNIC
Community Networks: An Alternative Paradigm for Developing Network Infrastruc...Community Networks: An Alternative Paradigm for Developing Network Infrastruc...
Community Networks: An Alternative Paradigm for Developing Network Infrastruc...
APNIC754 views
Spoofing and Denial of Service: A risk to the decentralized Internet by APNIC
Spoofing and Denial of Service: A risk to the decentralized InternetSpoofing and Denial of Service: A risk to the decentralized Internet
Spoofing and Denial of Service: A risk to the decentralized Internet
APNIC253 views
Korea IPv6 Measurement by APNIC
Korea IPv6 MeasurementKorea IPv6 Measurement
Korea IPv6 Measurement
APNIC524 views
Case Studies: TakNet by APNIC
Case Studies: TakNetCase Studies: TakNet
Case Studies: TakNet
APNIC440 views
Technical and Business Considerations for DNSSEC Deployment by APNIC
Technical and Business Considerations for DNSSEC DeploymentTechnical and Business Considerations for DNSSEC Deployment
Technical and Business Considerations for DNSSEC Deployment
APNIC369 views
Japan IPv6 Measurement by APNIC
Japan IPv6 MeasurementJapan IPv6 Measurement
Japan IPv6 Measurement
APNIC339 views
APNIC Update - MMNOG 2017 by APNIC
APNIC Update - MMNOG 2017APNIC Update - MMNOG 2017
APNIC Update - MMNOG 2017
APNIC682 views

Similar to IPv6 Tutorial RIPE 60

IPv4 depletion & IPv6 deployment in the RIPE NCC service region by
IPv4 depletion & IPv6 deployment in the RIPE NCC service regionIPv4 depletion & IPv6 deployment in the RIPE NCC service region
IPv4 depletion & IPv6 deployment in the RIPE NCC service regionRIPE NCC
841 views28 slides
Getting IPv6 & Securing your Routing by
Getting IPv6 & Securing your RoutingGetting IPv6 & Securing your Routing
Getting IPv6 & Securing your RoutingRIPE NCC
9.2K views98 slides
2011 TWNIC SP IPv6 Transition by
2011 TWNIC SP IPv6 Transition2011 TWNIC SP IPv6 Transition
2011 TWNIC SP IPv6 TransitionJohnson Liu
2.1K views45 slides
IPv4 and IPv6 - addressing Internet infrastructure by
IPv4 and IPv6 - addressing Internet infrastructureIPv4 and IPv6 - addressing Internet infrastructure
IPv4 and IPv6 - addressing Internet infrastructureRIPE NCC
1.4K views38 slides
Deploying IPv6 in Cisco's Labs by Robert Beckett at gogoNET LIVE! 3 IPv6 Conf... by
Deploying IPv6 in Cisco's Labs by Robert Beckett at gogoNET LIVE! 3 IPv6 Conf...Deploying IPv6 in Cisco's Labs by Robert Beckett at gogoNET LIVE! 3 IPv6 Conf...
Deploying IPv6 in Cisco's Labs by Robert Beckett at gogoNET LIVE! 3 IPv6 Conf...gogo6
1.5K views23 slides

Similar to IPv6 Tutorial RIPE 60(20)

IPv4 depletion & IPv6 deployment in the RIPE NCC service region by RIPE NCC
IPv4 depletion & IPv6 deployment in the RIPE NCC service regionIPv4 depletion & IPv6 deployment in the RIPE NCC service region
IPv4 depletion & IPv6 deployment in the RIPE NCC service region
RIPE NCC841 views
Getting IPv6 & Securing your Routing by RIPE NCC
Getting IPv6 & Securing your RoutingGetting IPv6 & Securing your Routing
Getting IPv6 & Securing your Routing
RIPE NCC9.2K views
2011 TWNIC SP IPv6 Transition by Johnson Liu
2011 TWNIC SP IPv6 Transition2011 TWNIC SP IPv6 Transition
2011 TWNIC SP IPv6 Transition
Johnson Liu2.1K views
IPv4 and IPv6 - addressing Internet infrastructure by RIPE NCC
IPv4 and IPv6 - addressing Internet infrastructureIPv4 and IPv6 - addressing Internet infrastructure
IPv4 and IPv6 - addressing Internet infrastructure
RIPE NCC1.4K views
Deploying IPv6 in Cisco's Labs by Robert Beckett at gogoNET LIVE! 3 IPv6 Conf... by gogo6
Deploying IPv6 in Cisco's Labs by Robert Beckett at gogoNET LIVE! 3 IPv6 Conf...Deploying IPv6 in Cisco's Labs by Robert Beckett at gogoNET LIVE! 3 IPv6 Conf...
Deploying IPv6 in Cisco's Labs by Robert Beckett at gogoNET LIVE! 3 IPv6 Conf...
gogo61.5K views
IPv4 Depletion & IPv6 Deployment by RIPE NCC
IPv4 Depletion & IPv6 DeploymentIPv4 Depletion & IPv6 Deployment
IPv4 Depletion & IPv6 Deployment
RIPE NCC778 views
Indonesia IPv6 Update - APAN Hanoi 2010 by Affan Basalamah
Indonesia IPv6 Update - APAN Hanoi 2010Indonesia IPv6 Update - APAN Hanoi 2010
Indonesia IPv6 Update - APAN Hanoi 2010
Affan Basalamah893 views
I pv6 tutorial by Fred Bovy
I pv6 tutorialI pv6 tutorial
I pv6 tutorial
Fred Bovy1.1K views
Update: IP addresses AS numbers and related things... by RIPE NCC
Update: IP addresses AS numbers and related things...Update: IP addresses AS numbers and related things...
Update: IP addresses AS numbers and related things...
RIPE NCC408 views
4. IPv6 Security - Workshop mit Live Demo - Marco Senn Fortinet by Digicomp Academy AG
4. IPv6 Security - Workshop mit Live Demo - Marco Senn Fortinet4. IPv6 Security - Workshop mit Live Demo - Marco Senn Fortinet
4. IPv6 Security - Workshop mit Live Demo - Marco Senn Fortinet
Your Slice of the IPv6 Cake by RIPE NCC
Your Slice of the IPv6 CakeYour Slice of the IPv6 Cake
Your Slice of the IPv6 Cake
RIPE NCC1.1K views
IPv6 Deployment: Why and Why not? by apnic_slides
IPv6 Deployment: Why and Why not?IPv6 Deployment: Why and Why not?
IPv6 Deployment: Why and Why not?
apnic_slides846 views
Moving Towards IPv6 by RIPE NCC
Moving Towards IPv6Moving Towards IPv6
Moving Towards IPv6
RIPE NCC419 views
The State of 3G/GPRS IPv6 Deployment by John Loughney
The State of 3G/GPRS IPv6 DeploymentThe State of 3G/GPRS IPv6 Deployment
The State of 3G/GPRS IPv6 Deployment
John Loughney1K views
IPv6 in Depth <<Kinda>> by RIPE NCC
IPv6 in Depth <<Kinda>>IPv6 in Depth <<Kinda>>
IPv6 in Depth <<Kinda>>
RIPE NCC203 views
50 billion connected wireless devices... IPv6, anyone?: Fredrik Garneij, Syst... by IPv6no
50 billion connected wireless devices... IPv6, anyone?: Fredrik Garneij, Syst...50 billion connected wireless devices... IPv6, anyone?: Fredrik Garneij, Syst...
50 billion connected wireless devices... IPv6, anyone?: Fredrik Garneij, Syst...
IPv6no691 views

More from RIPE Meetings

ITU IPv6 Group Report by
ITU IPv6 Group ReportITU IPv6 Group Report
ITU IPv6 Group ReportRIPE Meetings
461 views7 slides
NRO Update by
NRO UpdateNRO Update
NRO UpdateRIPE Meetings
625 views10 slides
RIPE 60 Meeting Technical Report by
RIPE 60 Meeting Technical ReportRIPE 60 Meeting Technical Report
RIPE 60 Meeting Technical ReportRIPE Meetings
624 views40 slides
RIPE NCC ENUM Update by
RIPE NCC ENUM UpdateRIPE NCC ENUM Update
RIPE NCC ENUM UpdateRIPE Meetings
421 views8 slides
32-bit ASN for DNS Services by
32-bit ASN for DNS Services32-bit ASN for DNS Services
32-bit ASN for DNS ServicesRIPE Meetings
662 views14 slides
RIPE NCC DNSMON Service by
RIPE NCC DNSMON ServiceRIPE NCC DNSMON Service
RIPE NCC DNSMON ServiceRIPE Meetings
1.1K views11 slides

More from RIPE Meetings(20)

RIPE 60 Meeting Technical Report by RIPE Meetings
RIPE 60 Meeting Technical ReportRIPE 60 Meeting Technical Report
RIPE 60 Meeting Technical Report
RIPE Meetings624 views
32-bit ASN for DNS Services by RIPE Meetings
32-bit ASN for DNS Services32-bit ASN for DNS Services
32-bit ASN for DNS Services
RIPE Meetings662 views
RIPE NCC DNSMON Service by RIPE Meetings
RIPE NCC DNSMON ServiceRIPE NCC DNSMON Service
RIPE NCC DNSMON Service
RIPE Meetings1.1K views
Measurement Network Update by RIPE Meetings
Measurement Network UpdateMeasurement Network Update
Measurement Network Update
RIPE Meetings604 views
RIPE NCC Government / LEA Interactions Update by RIPE Meetings
RIPE NCC Government / LEA Interactions UpdateRIPE NCC Government / LEA Interactions Update
RIPE NCC Government / LEA Interactions Update
RIPE Meetings339 views
Measuring IPv6 at Web Clients and Caching Resolvers by RIPE Meetings
Measuring IPv6 at Web Clients and Caching ResolversMeasuring IPv6 at Web Clients and Caching Resolvers
Measuring IPv6 at Web Clients and Caching Resolvers
RIPE Meetings356 views
Authorship of RIPE Policy Documents by RIPE Meetings
Authorship of RIPE Policy DocumentsAuthorship of RIPE Policy Documents
Authorship of RIPE Policy Documents
RIPE Meetings304 views
RIPE NCC Internet Governance Update by RIPE Meetings
RIPE NCC Internet Governance UpdateRIPE NCC Internet Governance Update
RIPE NCC Internet Governance Update
RIPE Meetings303 views
Draft RIPE Community Statement on IPv6 by RIPE Meetings
 Draft RIPE Community Statement on IPv6 Draft RIPE Community Statement on IPv6
Draft RIPE Community Statement on IPv6
RIPE Meetings488 views
Update from the RIPE NCC by RIPE Meetings
Update from the RIPE NCCUpdate from the RIPE NCC
Update from the RIPE NCC
RIPE Meetings371 views
Introduction to IPv4 and IPv6 PI Discussion by RIPE Meetings
 Introduction to IPv4 and IPv6 PI Discussion Introduction to IPv4 and IPv6 PI Discussion
Introduction to IPv4 and IPv6 PI Discussion
RIPE Meetings1.1K views
Small but Interesting Things by RIPE Meetings
Small but Interesting ThingsSmall but Interesting Things
Small but Interesting Things
RIPE Meetings350 views

Recently uploaded

"Package management in monorepos", Zoltan Kochan by
"Package management in monorepos", Zoltan Kochan"Package management in monorepos", Zoltan Kochan
"Package management in monorepos", Zoltan KochanFwdays
34 views18 slides
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De... by
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...Moses Kemibaro
35 views38 slides
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue by
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueElevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueShapeBlue
224 views7 slides
NTGapps NTG LowCode Platform by
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform Mustafa Kuğu
437 views30 slides
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... by
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...ShapeBlue
199 views20 slides
LLMs in Production: Tooling, Process, and Team Structure by
LLMs in Production: Tooling, Process, and Team StructureLLMs in Production: Tooling, Process, and Team Structure
LLMs in Production: Tooling, Process, and Team StructureAggregage
57 views77 slides

Recently uploaded(20)

"Package management in monorepos", Zoltan Kochan by Fwdays
"Package management in monorepos", Zoltan Kochan"Package management in monorepos", Zoltan Kochan
"Package management in monorepos", Zoltan Kochan
Fwdays34 views
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De... by Moses Kemibaro
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...
Moses Kemibaro35 views
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue by ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueElevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
ShapeBlue224 views
NTGapps NTG LowCode Platform by Mustafa Kuğu
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform
Mustafa Kuğu437 views
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... by ShapeBlue
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
ShapeBlue199 views
LLMs in Production: Tooling, Process, and Team Structure by Aggregage
LLMs in Production: Tooling, Process, and Team StructureLLMs in Production: Tooling, Process, and Team Structure
LLMs in Production: Tooling, Process, and Team Structure
Aggregage57 views
Business Analyst Series 2023 - Week 4 Session 7 by DianaGray10
Business Analyst Series 2023 -  Week 4 Session 7Business Analyst Series 2023 -  Week 4 Session 7
Business Analyst Series 2023 - Week 4 Session 7
DianaGray10146 views
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ... by ShapeBlue
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
ShapeBlue171 views
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ... by ShapeBlue
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
ShapeBlue120 views
"Surviving highload with Node.js", Andrii Shumada by Fwdays
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada
Fwdays58 views
"Running students' code in isolation. The hard way", Yurii Holiuk by Fwdays
"Running students' code in isolation. The hard way", Yurii Holiuk "Running students' code in isolation. The hard way", Yurii Holiuk
"Running students' code in isolation. The hard way", Yurii Holiuk
Fwdays36 views
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue by ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlueCloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
ShapeBlue139 views
The Role of Patterns in the Era of Large Language Models by Yunyao Li
The Role of Patterns in the Era of Large Language ModelsThe Role of Patterns in the Era of Large Language Models
The Role of Patterns in the Era of Large Language Models
Yunyao Li91 views
Initiating and Advancing Your Strategic GIS Governance Strategy by Safe Software
Initiating and Advancing Your Strategic GIS Governance StrategyInitiating and Advancing Your Strategic GIS Governance Strategy
Initiating and Advancing Your Strategic GIS Governance Strategy
Safe Software184 views
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha... by ShapeBlue
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
ShapeBlue183 views
The Power of Heat Decarbonisation Plans in the Built Environment by IES VE
The Power of Heat Decarbonisation Plans in the Built EnvironmentThe Power of Heat Decarbonisation Plans in the Built Environment
The Power of Heat Decarbonisation Plans in the Built Environment
IES VE84 views
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online by ShapeBlue
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineKVM Security Groups Under the Hood - Wido den Hollander - Your.Online
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online
ShapeBlue225 views

IPv6 Tutorial RIPE 60

Editor's Notes

  1. IP Tunneling: 1. encapsulation of IPv6 packet into IPv4 packet at tunnel entry point 2. decapsulation at tunnel exit point 3. tunnel management. Automatic tunneling: Technique where the routing infrastructure automatically determines the tunnel endpoints. The IPv4 address of the 6to4 router is embedded in the IPv6 address of the host. So if you send an IPv6 packet to the IPv6 destination host across the IPv4 network the tunnel end point IPv4 address can be read from the destination IPv6 address. ---------------- 6to4: x.y.z.a above in the slide stands for the IPv4 address of the 6to4router IPv6host=====6to4router------IPV4Internet------6to4router=====IPv6host === = ipv6 connection ----- = ipv4 connection When a node in the 6to5 network wants to communicate with a node in another 6to4 network no tunnel configuration is necessary. The tunnel entry point takes the IPv4 address of the tunnel exit point from the IPv6 address of the destination. Note that the IPv6 hosts (nodes) in the ascii art above are a special case of IPv6 hosts, they carry the IPv4 adress of their 6to4 router (x.y.z.a) within their IPv6 address. To communicate with an &quot;real&quot; IPv6 node in a remote IPv6 network you need a 6to4 relay router. (Manually configured). It announces the 6to4 prefix of 2002::/16 into the native IPv6 network. --------------------- Teredo is designed to make IPv6 ava ilable to hosts through one or more layers of NAT by tunneling packets over UDP. (Encapsulating IPv6 packet in a UDPpacket) 6to4 requires public addresses. Not possible with NAT. 6to4 works with NAT only if the 6to4 router is on the same box as NAT. ------------------
  2. Step 1: A group of AS&apos;es Step 2: An IPv4 Network Step 3: One AS decides to do IPv6 because they feel it&apos;s a good idea for them. Step 4: Two of his peers decide that it&apos;s a good idea too. They can do native IPv6. Step 5: Two other AS&apos;s set up IPv6 too. They need tunnelling over IPv4 to establish a connectionn. Step 6: Once the AS&apos;s that the tunnel runs through also decide to do IPv6, the tunnels are no longer needed. So over time, you will see less and less tunnelling. Step 7: The ultimate goal -- everyone runs a dual stack IPv4 / IPv6 network.
  3. Step 1: A group of AS&apos;es Step 2: An IPv4 Network Step 3: One AS decides to do IPv6 because they feel it&apos;s a good idea for them. Step 4: Two of his peers decide that it&apos;s a good idea too. They can do native IPv6. Step 5: Two other AS&apos;s set up IPv6 too. They need tunnelling over IPv4 to establish a connectionn. Step 6: Once the AS&apos;s that the tunnel runs through also decide to do IPv6, the tunnels are no longer needed. So over time, you will see less and less tunnelling. Step 7: The ultimate goal -- everyone runs a dual stack IPv4 / IPv6 network.
  4. Step 1: A group of AS&apos;es Step 2: An IPv4 Network Step 3: One AS decides to do IPv6 because they feel it&apos;s a good idea for them. Step 4: Two of his peers decide that it&apos;s a good idea too. They can do native IPv6. Step 5: Two other AS&apos;s set up IPv6 too. They need tunnelling over IPv4 to establish a connectionn. Step 6: Once the AS&apos;s that the tunnel runs through also decide to do IPv6, the tunnels are no longer needed. So over time, you will see less and less tunnelling. Step 7: The ultimate goal -- everyone runs a dual stack IPv4 / IPv6 network.
  5. Step 1: A group of AS&apos;es Step 2: An IPv4 Network Step 3: One AS decides to do IPv6 because they feel it&apos;s a good idea for them. Step 4: Two of his peers decide that it&apos;s a good idea too. They can do native IPv6. Step 5: Two other AS&apos;s set up IPv6 too. They need tunnelling over IPv4 to establish a connectionn. Step 6: Once the AS&apos;s that the tunnel runs through also decide to do IPv6, the tunnels are no longer needed. So over time, you will see less and less tunnelling. Step 7: The ultimate goal -- everyone runs a dual stack IPv4 / IPv6 network.
  6. Step 1: A group of AS&apos;es Step 2: An IPv4 Network Step 3: One AS decides to do IPv6 because they feel it&apos;s a good idea for them. Step 4: Two of his peers decide that it&apos;s a good idea too. They can do native IPv6. Step 5: Two other AS&apos;s set up IPv6 too. They need tunnelling over IPv4 to establish a connectionn. Step 6: Once the AS&apos;s that the tunnel runs through also decide to do IPv6, the tunnels are no longer needed. So over time, you will see less and less tunnelling. Step 7: The ultimate goal -- everyone runs a dual stack IPv4 / IPv6 network.
  7. Step 1: A group of AS&apos;es Step 2: An IPv4 Network Step 3: One AS decides to do IPv6 because they feel it&apos;s a good idea for them. Step 4: Two of his peers decide that it&apos;s a good idea too. They can do native IPv6. Step 5: Two other AS&apos;s set up IPv6 too. They need tunnelling over IPv4 to establish a connectionn. Step 6: Once the AS&apos;s that the tunnel runs through also decide to do IPv6, the tunnels are no longer needed. So over time, you will see less and less tunnelling. Step 7: The ultimate goal -- everyone runs a dual stack IPv4 / IPv6 network.
  8. Step 1: A group of AS&apos;es Step 2: An IPv4 Network Step 3: One AS decides to do IPv6 because they feel it&apos;s a good idea for them. Step 4: Two of his peers decide that it&apos;s a good idea too. They can do native IPv6. Step 5: Two other AS&apos;s set up IPv6 too. They need tunnelling over IPv4 to establish a connectionn. Step 6: Once the AS&apos;s that the tunnel runs through also decide to do IPv6, the tunnels are no longer needed. So over time, you will see less and less tunnelling. Step 7: The ultimate goal -- everyone runs a dual stack IPv4 / IPv6 network.
  9. Step 1: A group of AS&apos;es Step 2: An IPv4 Network Step 3: One AS decides to do IPv6 because they feel it&apos;s a good idea for them. Step 4: Two of his peers decide that it&apos;s a good idea too. They can do native IPv6. Step 5: Two other AS&apos;s set up IPv6 too. They need tunnelling over IPv4 to establish a connectionn. Step 6: Once the AS&apos;s that the tunnel runs through also decide to do IPv6, the tunnels are no longer needed. So over time, you will see less and less tunnelling. Step 7: The ultimate goal -- everyone runs a dual stack IPv4 / IPv6 network.
  10. Step 1: A group of AS&apos;es Step 2: An IPv4 Network Step 3: One AS decides to do IPv6 because they feel it&apos;s a good idea for them. Step 4: Two of his peers decide that it&apos;s a good idea too. They can do native IPv6. Step 5: Two other AS&apos;s set up IPv6 too. They need tunnelling over IPv4 to establish a connectionn. Step 6: Once the AS&apos;s that the tunnel runs through also decide to do IPv6, the tunnels are no longer needed. So over time, you will see less and less tunnelling. Step 7: The ultimate goal -- everyone runs a dual stack IPv4 / IPv6 network.
  11. Step 1: A group of AS&apos;es Step 2: An IPv4 Network Step 3: One AS decides to do IPv6 because they feel it&apos;s a good idea for them. Step 4: Two of his peers decide that it&apos;s a good idea too. They can do native IPv6. Step 5: Two other AS&apos;s set up IPv6 too. They need tunnelling over IPv4 to establish a connectionn. Step 6: Once the AS&apos;s that the tunnel runs through also decide to do IPv6, the tunnels are no longer needed. So over time, you will see less and less tunnelling. Step 7: The ultimate goal -- everyone runs a dual stack IPv4 / IPv6 network.
  12. Step 1: A group of AS&apos;es Step 2: An IPv4 Network Step 3: One AS decides to do IPv6 because they feel it&apos;s a good idea for them. Step 4: Two of his peers decide that it&apos;s a good idea too. They can do native IPv6. Step 5: Two other AS&apos;s set up IPv6 too. They need tunnelling over IPv4 to establish a connectionn. Step 6: Once the AS&apos;s that the tunnel runs through also decide to do IPv6, the tunnels are no longer needed. So over time, you will see less and less tunnelling. Step 7: The ultimate goal -- everyone runs a dual stack IPv4 / IPv6 network.
  13. Step 1: A group of AS&apos;es Step 2: An IPv4 Network Step 3: One AS decides to do IPv6 because they feel it&apos;s a good idea for them. Step 4: Two of his peers decide that it&apos;s a good idea too. They can do native IPv6. Step 5: Two other AS&apos;s set up IPv6 too. They need tunnelling over IPv4 to establish a connectionn. Step 6: Once the AS&apos;s that the tunnel runs through also decide to do IPv6, the tunnels are no longer needed. So over time, you will see less and less tunnelling. Step 7: The ultimate goal -- everyone runs a dual stack IPv4 / IPv6 network.
  14. Step 1: A group of AS&apos;es Step 2: An IPv4 Network Step 3: One AS decides to do IPv6 because they feel it&apos;s a good idea for them. Step 4: Two of his peers decide that it&apos;s a good idea too. They can do native IPv6. Step 5: Two other AS&apos;s set up IPv6 too. They need tunnelling over IPv4 to establish a connectionn. Step 6: Once the AS&apos;s that the tunnel runs through also decide to do IPv6, the tunnels are no longer needed. So over time, you will see less and less tunnelling. Step 7: The ultimate goal -- everyone runs a dual stack IPv4 / IPv6 network.
  15. Step 1: A group of AS&apos;es Step 2: An IPv4 Network Step 3: One AS decides to do IPv6 because they feel it&apos;s a good idea for them. Step 4: Two of his peers decide that it&apos;s a good idea too. They can do native IPv6. Step 5: Two other AS&apos;s set up IPv6 too. They need tunnelling over IPv4 to establish a connectionn. Step 6: Once the AS&apos;s that the tunnel runs through also decide to do IPv6, the tunnels are no longer needed. So over time, you will see less and less tunnelling. Step 7: The ultimate goal -- everyone runs a dual stack IPv4 / IPv6 network.
  16. Step 1: A group of AS&apos;es Step 2: An IPv4 Network Step 3: One AS decides to do IPv6 because they feel it&apos;s a good idea for them. Step 4: Two of his peers decide that it&apos;s a good idea too. They can do native IPv6. Step 5: Two other AS&apos;s set up IPv6 too. They need tunnelling over IPv4 to establish a connectionn. Step 6: Once the AS&apos;s that the tunnel runs through also decide to do IPv6, the tunnels are no longer needed. So over time, you will see less and less tunnelling. Step 7: The ultimate goal -- everyone runs a dual stack IPv4 / IPv6 network.
  17. Step 1: A group of AS&apos;es Step 2: An IPv4 Network Step 3: One AS decides to do IPv6 because they feel it&apos;s a good idea for them. Step 4: Two of his peers decide that it&apos;s a good idea too. They can do native IPv6. Step 5: Two other AS&apos;s set up IPv6 too. They need tunnelling over IPv4 to establish a connectionn. Step 6: Once the AS&apos;s that the tunnel runs through also decide to do IPv6, the tunnels are no longer needed. So over time, you will see less and less tunnelling. Step 7: The ultimate goal -- everyone runs a dual stack IPv4 / IPv6 network.
  18. Step 1: A group of AS&apos;es Step 2: An IPv4 Network Step 3: One AS decides to do IPv6 because they feel it&apos;s a good idea for them. Step 4: Two of his peers decide that it&apos;s a good idea too. They can do native IPv6. Step 5: Two other AS&apos;s set up IPv6 too. They need tunnelling over IPv4 to establish a connectionn. Step 6: Once the AS&apos;s that the tunnel runs through also decide to do IPv6, the tunnels are no longer needed. So over time, you will see less and less tunnelling. Step 7: The ultimate goal -- everyone runs a dual stack IPv4 / IPv6 network.
  19. Step 1: A group of AS&apos;es Step 2: An IPv4 Network Step 3: One AS decides to do IPv6 because they feel it&apos;s a good idea for them. Step 4: Two of his peers decide that it&apos;s a good idea too. They can do native IPv6. Step 5: Two other AS&apos;s set up IPv6 too. They need tunnelling over IPv4 to establish a connectionn. Step 6: Once the AS&apos;s that the tunnel runs through also decide to do IPv6, the tunnels are no longer needed. So over time, you will see less and less tunnelling. Step 7: The ultimate goal -- everyone runs a dual stack IPv4 / IPv6 network.
  20. Class wise: put on board, discuss downsides, how much can be reclaimed, how much time that buys
  21. Global Unicast corresponds to public IPv4 addresses. Link local corresponds to private addresses, only visible in the local segment Unique Local Addresses are routable only within a set of cooperating sites. The addresses include a 40 bit pseudorandom number in the routing prefix in order to minimise risk of conflict if sites merge or if packets are sent by mistake to the internet. Local usage but still global in scope. See also special address ranges defined for tunneling on earlier slide. See info about multicast in a later slide. -------------------------------- Anycast addresses: same address range as global unicast addresses. Each participating interface must be configured to have an anycast address. Within the region where interfaces with the same anycast address are located, each host must have a separate entry in the routing table. This means that global anycast addresses are practically unworkable as they would mean every member of the anycast group would be entered into routing tables across the whole Internet. When using anycast addresses as destination, sender has no control over which of the participating interfaces the packet will be delivered to. That is taken on the level of the routing protocol. (eg BGP) Anycast addresses assigned to IPv6 routers only. Anycast format: -lowest 7 bits: Anycast (group) ID r-est of the interface ID filled up with 1s (lower 64 bits if EUI-64 format) subnet ID (64 highest bits if EUI-64 format) just like any other global unicast address -------------------------------------------------------- Some addresses types start with the binary prefix 0000 0000 : unspecified address (all 0s) loopback address ::1 (all zeroes except the last bit=1) IPv4 addresses with IPV4 addresses embedded (see tunneling) Solicited-node multicast address: For every unicast and anycast address that is configured for a node, that node must also join a corresponding solicited-node multicast address. Why? See below (***). If you know the IP address of the destination, you need to know MAC address in order to be able to send a packet there. True for both IPv4 and IPv6. (In the IPv4 world to get the MAC address of the destination, the source send out a broadcast with an ARP request into the subnet.) *** In the IPv6 world the MAC address of an interface is found by sending a Neighbor Solicitation message (ICMPv6) to the solicited-node multicast address corresponding to the unicast address of your destination The solicited node multicast address has the format: FF02:0:0:0:0:1:FF00::/104 + the lowest 24 bits of the unicast or anycast address --------------------------------- Af the node is a router then it must be configured with these addresses in addition to those in the list in the slide above : subnet-router anycast address for the interfaces it for which it is configured as a router all-routers multicast addresses etc etc
  22. Solicited-node multicast address: For every unicast and anycast address that is configured for a node, that node must also join a corresponding solicited-node multicast address. Why? See below (***). If you know the IP address of the destination, you need to know MAC address in order to be able to send a packet there. True for both IPv4 and IPv6. (In the IPv4 world to get the MAC address of the destination, the source send out a broadcast with an ARP request into the subnet.) *** In the IPv6 world the MAC address of an interface is found by sending a Neighbor Solicitation message (ICMPv6) to the solicited-node multicast address corresponding to the unicast address of your destination The solicited node multicast address has the format: FF02:0:0:0:0:1:FF00::/104 + the lowest 24 bits of the unicast or anycast address --------------------------------- Af the node is a router then it must be configured with these addresses in addition to those in the list in the slide above : subnet-router anycast address for the interfaces it for which it is configured as a router all-routers multicast addresses etc etc
  23. Global Unicast corresponds to public IPv4 addresses. Link local corresponds to private addresses, only visible in the local segment Unique Local Addresses are routable only within a set of cooperating sites. The addresses include a 40 bit pseudorandom number in the routing prefix in order to minimise risk of conflict if sites merge or if packets are sent by mistake to the internet. Local usage but still global in scope. See also special address ranges defined for tunneling on earlier slide. See info about multicast in a later slide. -------------------------------- Anycast addresses: same address range as global unicast addresses. Each participating interface must be configured to have an anycast address. Within the region where interfaces with the same anycast address are located, each host must have a separate entry in the routing table. This means that global anycast addresses are practically unworkable as they would mean every member of the anycast group would be entered into routing tables across the whole Internet. When using anycast addresses as destination, sender has no control over which of the participating interfaces the packet will be delivered to. That is taken on the level of the routing protocol. (eg BGP) Anycast addresses assigned to IPv6 routers only. Anycast format: -lowest 7 bits: Anycast (group) ID r-est of the interface ID filled up with 1s (lower 64 bits if EUI-64 format) subnet ID (64 highest bits if EUI-64 format) just like any other global unicast address -------------------------------------------------------- Some addresses types start with the binary prefix 0000 0000 : unspecified address (all 0s) loopback address ::1 (all zeroes except the last bit=1) IPv4 addresses with IPV4 addresses embedded (see tunneling)
  24. Global routing prefix assigned by IANA&gt;RIR&gt;LIR to site subnets are usually /64 (standard), but be anything between sizes /49 and /64 is technically possible. Especially if you want to have a hierarchy of subnets like Russian dolls. Interface ID must be unique within a subnet, of course.
  25. Compared to IPv4 packets. IPv6 packets are processed much less along the way from source to destination. Routers have to check anc calculate less things. The IP MTU (Maximum Transmission Unit) the largest size of IP packet which may be transferred using a specific data link. It is the property of the link. Path MTU is minimum of all the MTUs along the path. The bottleneck. Fragmentation is only implemented on source and destination, not on the routers along the way. (Unlike IPv4) Because of this the source has to find out the path MTU all along the way (of all the links, hops and connections) before sending a packet to the destination. This is done by: - assuming thathe path MTU is the MTU of the first link. - if there is a lower MTU somewhere along the path to the destination the source will receive an ICMPv6 error message with information about the size of the MTU there. Then the source can adjust the size of the packets it will send down this path. If the source doesn&apos;t use path MTU discovery, then it should not send out packets larger than 1280 bytes the minimum permitted and guaranteed IPv6 MTU The defalt MTU that all links have to be able to handle in IPv6 (1280 bytes) is larger than the default MTU of IPv4 (576 bytes).
  26. IPv6 Header Fields: Version (4 bits): 6 in binary meaning IPv6 Traffic class (8 bits): packet priority Flow Label (20 bits): QoS to give real-time applications special service. Currently not used Payload length(16 bits): size of packet data (payload) in bytes. Next header (8 bits): specifies next encapsulated protocol Hop Limit (8 bits): After each hop this counter is decreased by one. When it reaches 0 the packet is discarded. Like TTL in IPv4.
  27. IPv6 Header Fields: Version (4 bits): 6 in binary meaning IPv6 Traffic class (8 bits): packet priority Flow Label (20 bits): QoS to give real-time applications special service. Currently not used Payload length(16 bits): size of packet data (payload) in bytes. Next header (8 bits): specifies next encapsulated protocol Hop Limit (8 bits): After each hop this counter is decreased by one. When it reaches 0 the packet is discarded. Like TTL in IPv4.
  28. The Next Header field enables modular extension of the IPv6 Header. It shows what header type follows the IPv6 Header. In the simplest case (no extra optional headers) the next header field contains the number for TCP (=6) or UDP (=17). Otherwise Next Header will contain the number of an inserted extra optional header. The optional header&amp;#x2019;s Next Header field will then point to the TCP header. You can insert more than one optional headers but they always have to come in the same order (see next slide) Note that TCP Header or the data (payload) doesn&amp;#x2019;t have a next header field. The next header field is only part of IPv6 protocol.
  29. This is the fixed order of the optional headers in the IPv6 packet, if more that one is used. Hop by Hop Options: options that have to be examined by all devices on the path Routing Header: methods to specify a route for the packet( used with Mobile IPv6) Fragment Header : contains parameters for packet fragmentation Authentication Headercontains information to verify authenticity of most parts of the packet (IPsec) Encapsulate Security Payloadcontains information to encrypt and authenticate the packet (IPsec) Destination Options:options that have to be examined only by the destination
  30. Multicast address: identifier for a group of hosts(nodes) A host can belong to several multicast groups. When a packet is sent to a multicast address it is sent to all members of that multicast group Multicast cannot be used as source address of a packet Broadcast implemented as part of Multicast in IPv6 ------------------------ Individual bits explained (not so important, just for reference) First 8 bits identifies the address as a multicast address (FF) `next 4 bits are flags 1st bit =0 reserved for future use 2nd bit: whether Rendezvous point embedded in this multicast address (0=no,1=yes). Rendezvous point=point of distribution for a specific multicast stream in a multicast network. rfc3956 3rd bit whether this multicast address embeds prefix info (0=no,1=yes) rfc3306 4th bit: indicates whether address permanently assigned. if=1 then temporary. iI=0 then permanent (=well known,permanently defined address) Values for the Scope field: 0 Reserved 1Interface-local scope 2 Link-local scope (within local segment) 3reserved 4admin-local scope 5site-local scope 6,7 unassigned 8organisation local scope 9,A,B,C,DUNASSIGNED Eglobal scope Freserved ------- Examples of well known multicast addresses: interface-local scope: FF01:0:0:0:0:0:0:1all-nodes address FF01:0:0:0:0:0:0:2all-routers address link-local scope FF02:0:0:0:0:0:0:1all-nodes address (THIS IS THE IPv6 version of what is known as Broadcast message in IPv4) FF02:0:0:0:0:0:0:2all-routers address FF02:0:0:0:0:0:1:2all DHCP agents site-local scope FF05:0:0:0:0:0:0:2all-routers address FF05:0:0:0:0:0:1:3all DHCP servers -----------------------------------
  31. A mechanism for an IPv6 host to generate an address (from its MAC address) without need of an external DHCP server. The Global Unicast address of the host constructed automatically from = Link address (address prefix of the network received from local router via a Router Announcement (RA, an ICMPv6 message) + Interface Identifier (EUI-64 address calculated from the MAC address) The Interface ID is the is calculated by: 1)inserting these 2bytes: FFFE between the 4th and the 5th byte of the MAC address, 2) and then flipping the 2nd bit of the 6th byte: if it&amp;#x2019;s 0 setting it to 1. This will always be the case since that bit is a 0 in MAC addresses. ---- ICMPv6 (Internet Control Message Protocol v6) is part of IPv6 protocol It is much more powerful and extensive than ICMPv4. (Amongst other functions it takes over the job that ARP did in IPV6) Neighbor Discovery protocol consist of 5 ICMPv6 messages: Router Solicitation (RS) / Router Advertisement (RA) messages Neighbor Solicitation/ Neighbor Advertisement ICMP Redirect message -------- The example here is a Global Unicast Address, but other types of addresses can also be configure using &quot;Stateless Autoconfiguration&quot; -------- Only routers have to be manually configured.
  32. Stateless Autoconfiguration: IPv6 host address can be uniquely identified. If this is a concern IPv6 Privacy Extensions to Stateless Autoconf address can be used . The Privacy Extension periodically generates a (pseudo) random interface ID (ie host portion of the address) ------ How? Pseudo random: stores history of each previous generated address uses MD5 hashing to generate new address checks if result conflicts with reserved addresses or already assigned addresses
  33. If no router is found, the host cannot receive the network information it needs in order to &amp;#x2018;statefully autoconfigure&amp;#x2019; itself .(Because no Router Announcement messages)
  34. protection services offered by IPSec include: - Encryption of user data for privacy. - Authentication of the integrity of a message to ensure that it is not changed en route. - Protection against certain types of security attacks, such as replay attacks. - The ability for devices to negotiate the security algorithms and keys required to meet their security needs. - Two security modes, tunnel and transport, to meet different network needs. IPsec provides security s at the IP layer for other TCP/IP protocols and applications to use. IPSec provides the tools that devices on a TCP/IP network can use to communicate securely. When two devices want to communicate securely, they set up a secure path between themselves that can cross many insecure areas. FTo achieve this they must cary out the following tasks: -they must agree on the security protocols to use, so that they can understand each other. -they must agree on a the kind of encryption algorithm to encrypt data. -they must exchange keys to encode and decode data ---- To do all this these 2 core protocols are used to do the actual encoding/decoding: (they are incorporated in IPv6 notice the 2 Optional Extension Headers with the same name) CORE COMPONENTS 1) IPsec Authentication Header (AH) authentication of originator of message, authentication of integrity of data(ie not changed en route), protection against replay attacks NO confidentiality and privacy. data not encrypted 2) Encapsulating Security Payload (ESP) confidentiality and privacy . data encrypted in addition to the same functions as AH SUPPORT COMPONENTS -Encryption/Hashing Algorithms: MD5 or SHA-1 -Security Policies and Associations and Management Methods -Key Exchange Framework and Mechanism --- MODES 1)Transport mode: only data processed and protected. IP header not. IP header -- IPsec Headers (AH/ESP) -- Payload Data 1)Tunnel mode: IP header and data processed and protected. new IP header added in front. new IP header -- IPsec Headers (AH/ESP) -- Old IP Header -- Payload Data ----------- Two DB set up on every device participating in IPsec: 1)Security Policies DB: storing Security Policies, rules describing how to process different packet received by the device (process by IPsec or not?If yes, how exactly?) 2)Security Associations DB: storing SEcurity Associations that describe the particular connection to other devices (ie between all combinations of different devices. Individual contracts between specific devices.
  35. RPSLng -- new generation -- is described in the RFC 4012: http://tools.ietf.org/html/rfc4012 Examples of aut-num objects: as1853 (ACOnet) &amp; AS8596 (Hotze). About routing: filtering recommendations for BGP routing by Gert Doering (v6) http://www.space.net/~gert/RIPE/ipv6-filters.html IPv6 Team Cumry Bogons: Packet &amp; Route Filter Recommendations for xSP: http://www.cymru.com/Bogons/v6top.html De-aggregation guidelines (in progress!) http://www.ripe.net/ripe/maillists/archives/routing-wg/2009/msg00120.html Global v6 routing table size: http://bgp.potaroo.net/v6/as2.0/ Ghost Route Hunter project by SixXS: http://www.sixxs.net/tools/grh/peering/ &quot;This tool allows you to see easily which prefixes you are missing in your network and where you might want to improve IPv6 Transit. It also provide the community with a look into the quality of your network and ability to have a shot of debugging when something looks wrong. &quot; &amp; Ghost Route Hunter : IPv6 DFP visibility These pages show the visibility of Default Free Prefixes (DFP&apos;s) as delegated by the RIR&apos;s. http://www.sixxs.net/tools/grh/dfp/
  36. to show that there really isn&apos;t that much to it, do, from terminal: dig ns ripe.net this should show the names of the nameservers, along with some A and AAAA records, so you can show nothing much is different
  37. - Registering routes and filtering based on it will prevent accidental leaks and route hijacking
  38. A &amp;#x201C;resource certificate&amp;#x201D; is an electronic document which proves that its holder has been officially assigned or allocated a particular resource. Currently, this association is only reflected in an RIR Database, like the RIPE Database.
  39. A &amp;#x201C;resource certificate&amp;#x201D; is an electronic document which proves that its holder has been officially assigned or allocated a particular resource. Currently, this association is only reflected in an RIR Database, like the RIPE Database.
  40. Mention the caveat: - All information contained is certified as correct at the time of issuing the certificate
  41. A digital certificate contains: - The public key provided by the resource holder when the certificate was issued - Resources covered by the certificate - Digital identification of the issuing registry (either the RIPE NCC or an LIR)
  42. - Resource Certification uses Public Key Infrastructure (PKI) principles. This is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. Proof of holdership formally: - An authoritative statement of an allocation&apos;s registration in the RIPE NCC&apos;s resource registry Possible applications: - Secure routing - Certificates can be used to create Route Origination Authorisations (ROAs), which may be used to increase the security the routing system - Resource transfers - Resource certification may be used to help establish trust and legitimacy in transfer transactions
  43. The vault is the Certificate Authority, &amp;#x201C;an entity that issues digital certificates for use by other parties&amp;#x201D;, in this case the RIRs issuing certificates over Internet Resources
  44. There is no convenient and automatic way to make sure that a certain Autonomous System (AS) is authorised to announce or originate a specific prefix. More specifically, there is no way to confirm that the prefix is really in use, and the legitimate holder of the prefix authorises a specific AS to announce that&amp;#xA0;prefix. By using a ROA, Certification will allow for prefix holder checking to be automated in a dependable, transparent and standardized way. A ROA states: 1. Allow this AS Number to originate 2. IP prefixes as mentioned here 3. because legitimate HOLDER of IP resources said so
  45. This is what it means in real life
  46. This is what it means in real life
  47. This is what it means in real life
  48. This is what it means in real life
  49. - In the LIR Portal, you can log in as Admin, and enable certification for users of their choice - After that, the user can log in and access the Certification system