IPv6 for CMU discusses IPv6 addressing, header basics, autoconfiguration, and transition from IPv4. It covers why IPv6 is needed due to limited IPv4 addresses, IPv6 address formats and types, stateless and stateful configuration, neighbor discovery, and integration with IPv4 using mapped and compatible addresses.
Internet Protocol version 6 (IPv6) is the latest version of the
Internet Protocol (IP), the communications protocol that
provides an identification and location system for computers
on networks and routes traffic across the Internet.
IPv4 & IPv6 are not designed to be interoperable, complicating
the transition to IPv6. However, several IPv6 transition
mechanisms have been devised to permit communication
between IPv4 and IPv6 hosts.
PLNOG 13: Artur Pająk: Storage w sieciach Ethernet, czyli coś o iSCSI I FCoEPROIDEA
Artur Pająk – IT Product Manager & Solution Architect, Huawei Polska. Jestem absolwentem Politechniki Warszawskie wydziału Elektroniki i Technik Informacyjnych. Przez ostanie 10 lat pracuję jako architek rozwiązań na rynku IT. W głównej mierze (9,5 roku) moje zawodowe życie związane było z firmą Hewlett-Packard gdzie zajmowałem się projektowaniem rozwiązań pamięci masowych. Ostatnie pół roku to współpraca z największym integratorem na polskim rynku, firmą Asseco Poland. Obecnie związany jestem z firmą Huawei Polska gdzie zajmuję się projektowaniem rozwiązań IT dla klientów w Polsce i krajach Europejskich. “
Temat prezentacji: Storage w sieciach Ethernet, czyli coś o iSCSI I FCoE.
Język prezentacji: Polski
Abstrakt: Na prezentacji przedstawiany będzie kierunek i rozwój rozwiązań pamięci masowych udostępniających zasoby poprzez sieć Ethernet (omówienie protokołów iSCSI i FCoE). Konwergentna infrastruktura oparta o rozwiązania Huawei.
Internet Protocol version 6 (IPv6) is the latest version of the
Internet Protocol (IP), the communications protocol that
provides an identification and location system for computers
on networks and routes traffic across the Internet.
IPv4 & IPv6 are not designed to be interoperable, complicating
the transition to IPv6. However, several IPv6 transition
mechanisms have been devised to permit communication
between IPv4 and IPv6 hosts.
PLNOG 13: Artur Pająk: Storage w sieciach Ethernet, czyli coś o iSCSI I FCoEPROIDEA
Artur Pająk – IT Product Manager & Solution Architect, Huawei Polska. Jestem absolwentem Politechniki Warszawskie wydziału Elektroniki i Technik Informacyjnych. Przez ostanie 10 lat pracuję jako architek rozwiązań na rynku IT. W głównej mierze (9,5 roku) moje zawodowe życie związane było z firmą Hewlett-Packard gdzie zajmowałem się projektowaniem rozwiązań pamięci masowych. Ostatnie pół roku to współpraca z największym integratorem na polskim rynku, firmą Asseco Poland. Obecnie związany jestem z firmą Huawei Polska gdzie zajmuję się projektowaniem rozwiązań IT dla klientów w Polsce i krajach Europejskich. “
Temat prezentacji: Storage w sieciach Ethernet, czyli coś o iSCSI I FCoE.
Język prezentacji: Polski
Abstrakt: Na prezentacji przedstawiany będzie kierunek i rozwój rozwiązań pamięci masowych udostępniających zasoby poprzez sieć Ethernet (omówienie protokołów iSCSI i FCoE). Konwergentna infrastruktura oparta o rozwiązania Huawei.
This manual will show you how to prepare an effective IPv6 addressing plan. In making that plan, you will need to make a number of important choices. Please think carefully about these choices to ensure that the addressing plan will meet the requirements of your organisation. The manual will provide suggestions to help you to make the right choices.
BSidesLondon 20Th April 2011 - Arron "finux" Finnon
---------------------------------------------------------------------
The presentations aim is to talk about how simple it is to deploy DNS Tunnelling infrastructure at little or no cost. Also shows how to establish a ssh connection from target to attacker, and act as a taster for peoples further research.
----- for more about @F1nux go to www.finux.co.uk
IPv6 is short for "Internet Protocol Version 6". IPv6 is the "next generation" protocol designed by the IETF to replace the current version Internet Protocol, IP Version 4 ("IPv4").
10 IP VERSION SIX (6) WEEK TEN notes.pptxJoshuaAnnan5
IPV6 addressing solution was announced in the mid 1990s (RFC 2460) and was task in solving IPv4’s shortcomings
NB: Version 5 was already assigned to another developing protocol, this is the reason for the jump from version 4 to 6.
Although both versions function similarly, version 4 and version 6 use different types of packet header formatting and addressing lengths. Meanwhile IPV6 header are more efficient and greatly simplified compared to IPV4 header information . This helps to reduce processing overhead during transmission.
Larger address space:
The main limitations with IPv4 are the imposed address space limitations and eventual complete loss of addressing capability. IPv6 was designed to overcome IPv4’s 32-bit limitations by introducing much larger 128-bit addresses and providing an address pool that is virtually inexhaustible.
Stateless autoconfiguration:
A feature used to issue and generate an IP address without the need for a Dynamic Host Configuration Protocol
(DHCP) server:
• Routers send router advertisements (RAs) to network hosts containing the first half, or first 64 bits, of the 128-bit network address.
• The second half of the address is generated exclusively by the host and is known as the interface identifier. The interface identifier uses its own MAC address, or it may use a randomly generated number.
This allows the host to keep hardware addresses hidden for security reasons and helps an administrator mitigate security risks.
More efficient packet headers: IPv6 uses a simpler header design than IPv4. The enhanced design allows routers to analyze and forward packets faster. Fewer header fields must be read, and header checksums are completely discarded in IPv6. More efficient packet headers improve network performance and save valuable router resources
Changes in multicast operation: Support for multicasting in IPv6 is now mandatory instead of optional, as with IPv4. The multicasting capabilities in IPv6 completely replace the broadcasting functionality found in IPv4. IPv6 replaces broadcasting with an “all-host” multicasting group.
Increased security: Another optional feature found in IPv4, IP Security (IPsec) measures are now considered mandatory and implemented natively in IPv6.
What all this numbers translate into is, flexibility of assigning different functions on the network, without facing address exhaustion. It also allows for an improved network design and troubleshooting efficiency.
The hexadecimal address look like
Components of Computer Networks
In this tutorial, we will cover the components of Computer Networks.
A Computer Network basically comprises multiple computers that are interconnected to each other in order to share information and other resources. Multiple computers are connected either with the help of cables or wireless media.
So basically with the help of a computer network two or more devices are connected in order to share a nearly limitless range of information and services whic
Internet Protocol version 6 (IPv6) is what you are going to discover onwards. Here, you will get format, features and related required information of IPv6 addresses and its related protocols.
Your app lives on the network - networking for web developersWim Godden
Our job might be to build web applications, but we can't build apps that rely on networking if we don't know how these networks and the big network that connects them all (this thing called the Internet) actually work.
I'll walk through the basics of networking, then dive a lot deeper (from TCP/UDP to IPv4/6, source/destination ports, sockets, DNS and even BGP).
Prepare for an eye-opener when you realize how much a typical app relies on all of these (and many more) working flawlessly... and how you can prepare your app for failure in the chain.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
4. With millions of new devices becoming IP aware, the need for increased addressing and plug & play networking is only met with the implementation of IPv6 IP – The Application’s Convergence Layer IP version 6 More to Come Ethernet Optical E-Power Wireless Storage Channel CATV PSDN xDSL
23. Expanded Address Space Hierarchical Addressing & Aggregation 2001:0410:0002:/48 2001:0410:0001:/48 2001:0418:0001:/48 Only announce the /32 prefix Only announce the /32 prefix Configure a default route to ISP ISP 1 2001:0410::/32 Customerno 2 Customerno 3 IPv6 Internet 2001::/16 ISP 2 2001:0418::/32 Customerno 1
24.
25. Expanded Address Space IPv4-Compatible & Mapped IPv6 Address IPv4 Address 0000 0000……………………………0000 IPv4 Compatible IPv6 Addresses IPv4 Address FFFF 0000……………………………0000 IPv4 Mapped IPv6 Address 0:0:0:0:0:0:192.168.30.1 where X=0000 for Compatible , X=FFFF for Mapped ::192.168.30.1(compatible) and ::FFFF:192.168.30.1 (mapped) ::C0AB:1E01 (compatible) and ::FFFF:C0AB:1E01 (mapped) 80 bits 32 bits 16 bits 80 bits 32 bits 16 bits
26.
27.
28.
29. Expanded Address Space Multicast Assigned Addresses (RFC 3306 ) Address Scope Meaning FF01::1 Node-Local All Nodes FF02::1 Link-Local All Nodes FF01::2 Node-Local All Routers FF02::2 Link-Local All Routers FF05::2 Site-Local All Routers FF02::1:FFXX:XXXX Link-Local Solicited-Node
30. IPv4 & IPv6 Header Comparison IPv4 Header IPv6 Header - field ’ s name kept from IPv4 to IPv6 - fields not kept in IPv6 - Name & position changed in IPv6 - New field in IPv6 Legend Version IHL Type of Service Total Length Identification Flags Fragment Offset Time to Live Protocol Header Checksum Source Address Destination Address Options Padding Version Traffic Class Flow Label Payload Length Next Header Hop Limit Source Address Destination Address
31.
32. Neighbor Solicitation & Advertisement Neighbor Solicitation: ICMP type = 135 Src = A Dst = Solicited-node multicast Address Data = link-layer address of A Query = what is your link address? A B Neighbor Advertisement: ICMP type = 136 Src = B Dst = A Data = link-layer address of B A and B can now exchange packets on this link
33.
34.
35. Duplicate Address Detection (DAD) 1.Host A boots up and assigns it self LINK LOCAL ADDRESS (FF80::/10) 2.Host A sends RS (ICMP Type 133) 3.Host A receives RA (ICMP Type 134) with subnet prefix (2001:0410:1/64) Now the Host A wants to assign itself a unique global unicast address 2001:0410:1::34:123A . Before it does that it sends out DAD request to all nodes on the link by doing the following: 4.Host A sends NS (ICMP Type 135) with: Source address (::) Destination address FF02::1:FF 34:123A (solicited-node Mcast address for 2001:0410:1:: 34:123A ) 5.If Host A does not receive a reply back it will assign itself 2001:0410:1:: 34:123A A B
36.
37.
38.
39.
40.
41. IPv6 Address Configuration LAN: 3ffe:b00:c18:1::/64 Ethernet0 MAC address: 0060.3e47.1530 router# show ipv6 interface Ethernet0 Ethernet0 is up, line protocol is up IPv6 is enabled, link-local address is FE80::260:3EFF:FE47:1530 Global unicast address(es): 3FFE:B00:C18:1:260:3EFF:FE47:1530, subnet is 3FFE:B00:C18:1::/64 Joined group address(es): FF02::1:FF47:1530 FF02::1 FF02::2 MTU is 1500 bytes IPv6 unicast-routing interface Ethernet0 ipv6 address 3ffe:b00:c18:1::/64 eui-64
42. Sample Configuration 3640-a 3640-b E0/0 E0/0 3640-a#sh run ipv6 unicast-routing interface Ethernet0/0 ipv6 address 3FFE:ABCD:ABCD:1::/64 eui-64 ipv6 address FEC0::1/64 3640-a#sho int Ethernet0/0 is up, line protocol is up address is 0010.7bc7.3440 3640-a#show ipv6 int Ethernet0/0 is up, line protocol is up IPv6 is enabled, link-local address is FE80::210:7BFF:FEC7:3440 Global unicast address(es): 3FFE:ABCD:ABCD:1:210:7BFF:FEC7:3440, subnet is 3FFE:ABCD:ABCD:1::/64 FEC0::1, subnet is FEC0::/64 3640-b#show run ipv6 unicast-routing interface Ethernet0/0 ipv6 address 3FFE:ABCD:ABCD:1::/64 eui-64 ipv6 address FEC0::2/64 3640-b#show int Ethernet0/0 is up, line protocol is up address is 0010.7bc7.38c0 3640-b#show ipv6 int e0/0 Ethernet0/0 is up, line protocol is up IPv6 is enabled, link-local address is FE80::210:7BFF:FEC7:38C0 Global unicast address(es): 3FFE:ABCD:ABCD:1:210:7BFF:FEC7:38C0, subnet is 3FFE:ABCD:ABCD:1::/64 FEC0::2, subnet is FEC0::/64
43. Sample Configuration (cont.) 3640-a 3640-b E0/0 E0/0 3640-a#ping ipv6 3FFE:ABCD:ABCD:1:210:7BFF:FEC7:38C0 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 3FFE:ABCD:ABCD:1:210:7BFF:FEC7:38C0, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/4 ms 3640-a#ping FEC0::2 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to FEC0::2, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/4 ms 3640-b#show run ipv6 unicast-routing interface Ethernet0/0 ipv6 address 3FFE:ABCD:ABCD:1::/64 eui-64 ipv6 address FEC0::2/64 3640-b#show int Ethernet0/0 is up, line protocol is up address is 0010.7bc7.38c0 3640-b#show ipv6 int e0/0 Ethernet0/0 is up, line protocol is up IPv6 is enabled, link-local address is FE80::210:7BFF:FEC7:38C0 Global unicast address(es): 3FFE:ABCD:ABCD:1:210:7BFF:FEC7:38C0, subnet is 3FFE:ABCD:ABCD:1::/64 FEC0::2, subnet is FEC0::/64
52. Cisco IOS IPv6 show commands router #ping 3 FFE : B 00: C 18:1:260:3 EFF : FE 47:1530 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 3 FFE : B 00: C 18:1:260:3 EFF : FE 47:1530, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms IPv6 ICMP echo request to the default router: router #show ipv6 neighbors IPv6 Address Age Link-layer Addr State Interface FE80:: 260:3 EFF : FE 47:1530 26 0060.3e47.1530 REACH Ethernet0 3 FFE : B 00: C 18:1:260:3 EFF : FE 47:1530 0 0060.3e47.1530 REACH Ethernet0 Display the neighbor discovery cache on the router:
57. IPv6 Routing Table Router_1#show ipv6 route IPv6 Routing Table - 8 entries Codes: C - Connected, L - Local, S - Static, R - RIP, B - BGP U - Per-user Static route I1 - ISIS L1, I2 - ISIS L2, IA - ISIS interarea O - OSPF intra, OI - OSPF inter, OE1 - OSPF ext 1, OE2 - OSPF ext 2 R 2001:410:1921:6801::/64 [120/3] via FE80::202:7EFF:FE37:1CFF, POS4/0 C 2001:420:1921:6801::/64 [0/0] via ::, POS4/0 L 2001:420:1921:6801:230:96FF:FE07:F000/128 [0/0] via ::, POS4/0 R 3FFE:B00:C18:1::/64 [120/2] via FE80::202:7EFF:FE37:1CFF, POS4/0 C 3FFE:1100:0:CC00::/64 [0/0] via ::, Loopback3 L 3FFE:1100:0:CC00::1/128 [0/0] via ::, Loopback3 L FE80::/10 [0/0] via ::, Null0 L FF00::/8 [0/0] via ::, Null0
85. Automatic Address Assignment of Host & Router ISATAP host A receives the ISATAP prefix 3ffe:b00:ffff:2::/64 from ISATAP Router 1 When ISATAP host A wants to send IPv6 packets to 3ffe:b00:ffff:2 ::5efe:ce7b:1fc8, ISATAP host A encapsulates IPv6 packets in IPv4. The IPv4 packets of the IPv6 encapsulated packets use IPv4 source and destination address. IPv6 Network IPv4 Network ISATAP Router 1 E0 206.123.20.100 fe80::5efe:ce7b:1464 3ffe:b00:ffff:2 ::5efe:ce7b:1464 ISATAP Tunnel ISATAP Host A 206.123.31.200 fe80::5efe:ce7b:1fc8 3ffe:b00:ffff:2 ::5efe:ce7b:1fc8
86. Automatic Configuring ISATAP ISATAP-router1# ! interface Ethernet0 ip address 206.123.31.200 255.255.255.0 ! interface Tunnel0 ipv6 address 3ffe:b00:ffff:2::/64 eui-64 no ipv6 nd suppress-ra tunnel source Ethernet 0 tunnel mode ipv6ip isatap The tunnel source command must point to an interface with an IPv4 address configured Configure the ISATAP IPv6 address, and prefixes to be advertised just as you would with a native IPv6 interface The IPv6 address has to be configured as an EUI-64 address since the last 32 bits in the interface identifier is used as the IPv4 destination address IPv6 Network IPv4 Network ISATAP Router 1 E0 206.123.20.100 fe80::5efe:ce7b:1464 3ffe:b00:ffff:2 ::5efe:ce7b:1464 ISATAP Tunnel ISATAP Host A 206.123.31.200 fe80::5efe:ce7b:1fc8 3ffe:b00:ffff:2 ::5efe:ce7b:1fc8
87.
88.
89. NAT-PT Packet Flow NAT-PT 172.16.1.1 2001:0420:1987:0:2E0:B0FF:FE6A:412C PREFIX is a 96-bit field that allows routing back to the NAT-PT device IPv4 Interface IPv4 Host IPv6 Host IPv6 Interface Src: 2001:0420:1987:0:2E0:B0FF:FE6A:412C Dst: PREFIX::1 1 2 Src: 172.17.1.1 Dst: 172.16.1.1 3 Src: 172.16.1.1 Dst: 172.17.1.1 Src: PREFIX::1 Dst: 2001:0420:1987:0:2E0:B0FF:FE6A:412C 4