This document discusses considerations for internet service providers transitioning to IPv6. It covers common network architectural patterns like core/backbone, last mile, and border networks. It also discusses transition approaches like dual-stack and tunneling. The document outlines a multi-phase transition plan including obtaining IPv6 address space, setting up a testbed, enabling IPv6 routing and services, and addressing security considerations during the rollout.
Einbrüche, Viren, Trojaner, machen auch unter IPv6 nicht Halt. Als Marktführer im Bereich Unified-Threat-Management (UTM) entwickelt Fortinet umfassende Sicherheitslösungen zur Bekämpfung solcher Bedrohungen - für IPv4 und IPv6 Netzwerke. Der Workshop orientierte Vortrag zeigt die Notwendigkeit von umfassenden Security Lösungen bei der Migration zu IPv6 auf.
Einbrüche, Viren, Trojaner, machen auch unter IPv6 nicht Halt. Als Marktführer im Bereich Unified-Threat-Management (UTM) entwickelt Fortinet umfassende Sicherheitslösungen zur Bekämpfung solcher Bedrohungen - für IPv4 und IPv6 Netzwerke. Der Workshop orientierte Vortrag zeigt die Notwendigkeit von umfassenden Security Lösungen bei der Migration zu IPv6 auf.
Keynote given at DRCN2018, shows that innovation is back in the transport and network layer with a description of Multipath TCP, QUIC and IPv6 Segment Routing.
Ed Warnicke's talk at Open Networking Summit.
All Open Source Networking project depend on having access to a Universal Dataplane that is:
Able to they deployment models: Bare Metal/Embedded/Cloud/Containers/NFVi/VNFs
High performance
Feature Rich
Open with Broad Community support/participation
FD.io provides all of this and more. Come learn more about FD.io and how you can begin using it.
Slides supporting the "Computer Networking: Principles, Protocols and Practice" ebook. The slides can be freely reused to teach an undergraduate computer networking class using the open-source ebook.
Presentation at Networkshop46.
Over the past 12 months, Jisc has been through an extensive design and procurement exercise aimed at overhauling the way in which access connectivity solutions are delivered to customers, with the objectives of achieving greater reliability, greater flexibility, and greater value for money.
Hear from the Jisc team involved in the design and procurement of the new access arrangements, and the suppliers Jisc is partnering with to deliver the solutions. They talk about the technology involved, the benefits to Janet connected organisations, and the 5 year deployment and ‘transformation’ plan.
Speakers:
Rob Evans, chief network architect, Jisc
James Blessing, deputy director of network architecture, Jisc
Keynote given at DRCN2018, shows that innovation is back in the transport and network layer with a description of Multipath TCP, QUIC and IPv6 Segment Routing.
Ed Warnicke's talk at Open Networking Summit.
All Open Source Networking project depend on having access to a Universal Dataplane that is:
Able to they deployment models: Bare Metal/Embedded/Cloud/Containers/NFVi/VNFs
High performance
Feature Rich
Open with Broad Community support/participation
FD.io provides all of this and more. Come learn more about FD.io and how you can begin using it.
Slides supporting the "Computer Networking: Principles, Protocols and Practice" ebook. The slides can be freely reused to teach an undergraduate computer networking class using the open-source ebook.
Presentation at Networkshop46.
Over the past 12 months, Jisc has been through an extensive design and procurement exercise aimed at overhauling the way in which access connectivity solutions are delivered to customers, with the objectives of achieving greater reliability, greater flexibility, and greater value for money.
Hear from the Jisc team involved in the design and procurement of the new access arrangements, and the suppliers Jisc is partnering with to deliver the solutions. They talk about the technology involved, the benefits to Janet connected organisations, and the 5 year deployment and ‘transformation’ plan.
Speakers:
Rob Evans, chief network architect, Jisc
James Blessing, deputy director of network architecture, Jisc
May 13, 2013, Swiss IPv6 Council Member Event.
The Impact of IPv6 to Net Politics
CGN Killer IPv6
- Why CGN isn't a good concept for the future, but IPv6 is.
Internet Routing Protocols: Fundamental Concepts of Distance-Vector and Link-...Vishal Sharma, Ph.D.
An easy to follow basic presentation designed to explain the core operating principles of link-state and distance-vector routing protocols, which form the basis of OSPF/IS-IS and BGP routing protocols for the Internet, respectively. Adapted and summarized from Christian Huitema's "Routing in the Internet," bringing some of his examples "to life" as it were.
This talk/presentation is useful for...
IETF IPv6 Activities Report by Cathy Aronson at ARIN 36. Presentation and webcast archive available at: https://www.arin.net/participate/meetings/reports/ARIN_36/ppm.html
Is it time to panic? Are we completely out of IP addresses? Do I have to learn to speak hexadecimal? What is IPv6 and should you care? In this session, we'll attempt to answer these questions and more and we're likely to have more questions than answers. IPv6 is the newest version of the IP/Internet Protocol (currently referred to as IPv4) and was created primarily to address the shortage of IP addresses across the world. However, there's a lot more going on with IPv6 than just addressing changes. This session will address just what the campus has done and still needs to do and what you need to worry about as IPv6 comes closer to your front door.
GTRI's CTO, Scott Hogg, presented at NANOG (North American Network Operators Group) on the topic of deploying IPv6, including pitfalls to be aware of, addressing challenges, routing, dual-protocol applications, troubleshooting and training.
Presented by Scott Hogg, CTO GTRI, at NANOG On The Road 5, Orlando, FL, February 24, 2015.
Packet Analysis - Course Technology Computing Conference
Presenter: Lisa Bock - Pennsylvania College of Technology
Most network administrators are well-versed in hardware, applications, operating systems, and network analysis tools. However, many are not trained in analyzing network traffic. Network administrators should be able to identify normal network traffic in order to determine unusual or suspicious activity. Network packet analysis is important in order to troubleshoot congestion issues, create firewall and intrusion detection system rules, and perform incident and threat detection. This hands-on presentation will review fundamental concepts necessary to analyze network traffic, beginning with an overview of network analysis, then a review the TCP/IP protocol suite and LAN operations. Participants will examine packet captures and understand the field values of the protocols and as to what is considered normal behavior, and then examine captures that show exploits, network reconnaissance, and signatures of common network attacks. The program will use Wireshark, a network protocol analyzer for Unix and Windows, to study network packets, look at basic features such as display and capture filters, and examine common protocols such as TCP, HTTP, DNS, and FTP. Time permitting, the presentation will provide suggestions on how to troubleshoot performance problems, conduct a network baseline, and how to follow a TCP or UDP stream and see HTTP artifacts. Participants should have a basic knowledge of computer networking and an interest in the subject.
As with any new technology, IPv6 requires a learning curve for network managers and IT administration and operations personnel. This presentation covers many of the current best practices for approaching and progressing with an IPv6 deployment.
El agotamiento de IPv4 nos pone una gran presión a la hora de poder brindar servicio de Internet, crecer la base de usuarios y continuar evolucionando nuestras redes.
Esta presentacion introduce algunas ideas generales de como gestionar esta escasez y como aprovechar el actual nivel de despliegue de IPv6 para ello.
El stack tradicional de protocolos de Internet, el conformado por TCP e IP evoluciona para atender los requisitos de la Internet de los proximos 20 años.
Esta presentación describe las tecnologías de RPKI y validación de origen (ROV) e incluye algunas estadísticas de su despliegue en América Latina y el Caribe
En esta presentación hacemos un repaso por el estado actual y evolución de algunos de los protocolos fundamentales de Internet como ser la resolución de nombres (DNS), enrutamiento (BGP) y capa de red (IPv4 / IPv6)
This presentation is a tutorial intro to DANE (DNS Authentication of Named Entities). It describes the root problem, a possible solution using DANE, and briefly shows how you can starting using DANE and TLSA records yourself.
Repaso de dos tecnicas de monitoreo de red, en particular SNMP (Simple Network Management Protocol) y Netflow, con foco en monitoreo de trafico y estado de sesiones BGP en sitios de peering.
Introduccion a RPKI (Resource Public Key Infraestructure) y su aplicación como mecanismo para validar el sistema autonomo de origen de los anuncios BGP.
Esta presentación me llevó a un campo menos familiar: como explicar conceptos de seguridad de la información, ofreciendo al mismo tiempo consejos prácticos y útiles a los profesionales de la traducción.
Los ataques de denegación de servicio utilizando servidores DNS son la más reciente modalidad en uso para realizar ataques de gran volumen.
En esta presentacion se discuten algunas aproximaciones novedosas para proteger la infraestructura de Internet de este tipo de acciones.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
4. Transi)oning
to
IPv6
• Different
aspects
– Human
/
Organiza)onal
• Awareness
of
the
problem
• Training
• Organiza)onal
adequa)on
– Sales
– Provisioning
procedures
– Technical
• Obtaining
your
IPv6
prefix
• Equipment
needs
• Network
management
5. Ini)al
Steps
• You
will
need
to
develop
a
plan
and
a
schedule
• Get
familiar
with
the
“new”
protocol
– No
need
for
formal
training
(at
least
yet)
• Know
your
network
– Have
a
clear
picture
of
what
your
network
is
running
• How
am
I
rou)ng
traffic
?
• Which
transport
/
backhaul
/
last
mile
technologies
do
we
use
?
– Assess
your
equipment
(brands,
OS
versions)
6. Developing
a
Plan
• Address
different
aspects
– Do
we
need
formal
training
?
Do
we
have
in-‐
house
know-‐how
?
• Consider
not
only
hard
core
engineering
but
sales
and
support
staff
as
well
– Do
we
need
equipment
and/or
so_ware
upgrades
?
– Do
our
transit
/
peering
sessions
support
IPv6
?
• Most
do,
but
you
have
to
ask
for
it
7. Phase
1:
Planning
• (Source:
6Deploy
Training
Slides)
• Add
IPv6
capability
requirements
to
future
tenders
– Ensure
you
have
capability
to
deploy
• Obtain
IPv6
address
space
from
your
ISP/NREN
(LIR)
or
from
your
RIR
if
you’re
a
ISP
– Typically
a
/48
size
prefix
(from
the
LIR)
– And
a
/32
size
prefix
(from
the
RIR)
• Arrange
IPv6
training
• Encourage
in-‐house
experiments
by
systems
staff
– e.g.
using
Tunnel
Broker
services
• Review
IPv6
security
issues
– IPv6
is
o_en
enabled
by
default
-‐
your
users
may
be
using
IPv6
without
your
knowledge…
8. Phase
2:
Testbed
/
Trials
• (Source:
6Deploy
Training
Slides)
• Deploy
IPv6
capable
router,
with
cau)ous
ACLs
applied
• Establish
connec)vity
(probably
a
tunnel)
to
your
ISP
• Set
up
an
internal
link
with
host(s),
on
a
/64
– Can
be
isolated
from
regular
IPv4
network
(e.g.
a
dual-‐
stack
DMZ
running
IPv4
and
IPv6
together)
• Enable
IPv6
on
the
host
systems,
add
DNS
entries
if
appropriate
• And
in
parallel
– Survey
systems
and
applica)ons
for
IPv6
capabili)es
– Formulate
an
IPv6
site
addressing
plan
– Document
IPv6
policies
(e.g.
address
assignment
methods)
9. Phase
3:
Produc)on
Rollout
• (Source
6Deploy
Training
Slides)
• Plan
ini)al
deployment
areas,
e.g.
your
exis)ng
IPv4
DMZ
or
WLAN
may
be
good
first
steps
– Prudent
to
enable
IPv6
on
the
wire
first,
then
services
• Enable
external
IPv6
connec)vity
and
ACLs/filters
• Enable
IPv6
rou)ng
‘on
the
wire’
on
selected
internal
links
• Deploy
IPv6
support
in
management/monitoring
tools
• Then
enable
the
services
and
adver)se
via
DNS:
– Enable
IPv6
in
selected
services
(e.g.
web,
SMTP)
– Add
IPv6
addresses
to
DNS,
enable
IPv6
DNS
transport
• Remember
IPv6
security:
– e.g.
include
IPv6
transport
in
all
penetra)on
tests
10. Transi)on
Approaches
• Dual-‐Stack
– Servers
and
routers
speak
both
protocols
• “Island”
Interconnec)on
(tunneling)
– IPv6
“islands”
interconnected
using
tunnels
• Can
be
the
other
way
around,
too
• Transla)on
methods
– Protocol
transla)on
(rewri)ng
IP
headers)
– TCP
relays
/
Web
Proxies
11. Dual-‐Stack
• We
say
a
device
is
“dual-‐stacked”
when
its
so_ware
runs
both
network
protocols
Applica)on
Layer
TCP
/
UDP
IPv4
IPv6
12. Dual-‐Stack
• How
does
the
device
“know”
which
path
to
use
?
The
key
is
in
the
DNS:
– Use
appropriate
A
/
AAAA
records
to
signal
clients
which
path
to
use
in
order
to
get
to
a
given
service
• Both
paths
can
be
present
-‐>
“Happy
Eyeballs”
• Issues
– Hosts
with
broken
IPv6
connec)vity
– Performance
/
failover
13. Transi)oning
the
Core
• Usually
the
easiest
part
• Devices
– Chances
are
your
core
equipment
already
supports
IPv6
• Issues
– Numbering
plan
• Now
is
the
)me
for
obtaining
your
IPv6
prefix
!
– Plan
your
rou)ng
protocol
• iBGP
/
OSPF
v2
/
OSPF
v3
gotchas
– Traffic
monitoring
• Nemlow
14. IPv6
Numbering
Plans
• Numbering
plans
for
IPv6
are
based
on
a
different
mindset
• Remember
– One
subnet
/
VLAN
gets
a
/64
• No
need
to
manage
scarcity
anymore
– Host
count
per
subnet
(as
we
did
in
IPv4)
is
now
meaningless
– Subnet
count
is
what
maoers
• Allow
for
growth
15. Transi)oning
the
Border
• Devices
– Mostly
same
as
the
core
• Transit
/
Peering
– You
need
to
ask
(some)mes
forcefully)
for
IPv6
transit
• The
good
news
is
that
most
Tier
1
&
Tier
2
carriers
do
support
IPv6
• BGP
issues
– One
session
or
two
?
• Two
sessions
seems
to
be
the
norm
16. Transi)oning
the
Border
• BGP
issues:
– One
session
or
two
?
• BGP
can
transport
NLRI
data
for
IPv4
and
IPv6
regardless
of
the
session’s
protocol
– It
impacts
nex-‐hop
calcula)ons,
but
it’s
easily
solvable
– ACLs
• Other
issues:
– Traffic
monitoring
• SNMP
/
NetFlow
– ACLs
• Mar)ans
/
bogons
17. Transi)oning
the
Last
Mile
• Different
access
scenarios
– Datacenter
• Including
hos)ng
/
coloca)on
services
– WAN
users
• Corporate
• Residen)al
– Last
mile
technologies
• DSL
• Wireless
/
Mobile
• FTTH
/
PON
18. Transi)oning
the
Datacenter
• Devices
– Routers
/
switches
and
servers
usually
do
not
present
a
problem
– Firewalls,
your
mileage
may
vary
• Usually
support
is
good
enough
• Odd
pimalls
here
and
there
• Rou)ng
/
WAN:
same
as
border
/
core
• Recommenda)on
is
to
start
by
layers,
going
from
the
outside
to
the
inside
– See
hop://tools.iem.org/html/dra_-‐lopez-‐v6ops-‐dc-‐
ipv6-‐04
19. Corporate
Users
• Usually
more
sophis)cated
• May
have
in-‐house
technical
exper)se
• May
even
request
IPv6!
• Higher-‐end
CPE,
more
likely
to
support
IPv6
• Numbering
– Remember:
one
VLAN
==
one
/64
– How
many
VLANs
per
customer
?
• /48
~
65536
VLANs
20. Residen)al
Customers
• CPEs
– Cut-‐throat
race
to
the
booom
on
cost
– Usually
feature-‐limited
• Even
for
IPv4
• CPE
installed
base
is
definitely
a
roadblock
• Recommenda)on
– Add
IPv6
support
as
a
requirement
for
future
CPE
purchases
– Deploy
alterna)ves
for
older
CPEs
• 6RD
• Users
not
sophis)cated,
need
to
factor
in
possible
support
calls
21. Residen)al
Customers
• Numbering
– Remember:
one
VLAN
==
one
/64
– How
many
VLANs
per
customer
?
• /48
~
65536
VLANs
• /56
~
256
VLANs
• /60
~
16
VLANs
• DHCP
Prefix
Delega)on
22. Other
Networks
• Enterprise
/
Corporate
– Usually
use
proxies
and
other
layers
of
security
devices
– Two
different
problems,
to
be
addressed
separately
• IPv6
access
to
the
Internet
for
internal
users
• IPv6-‐enabling
company
services
• University
Campus
– Usually
heavily
wireless-‐based
23. References
• RFC
6180:
“Guidelines
for
transi)on
mechanism
usage
during
IPv6
deployment”
– hop://tools.iem.org/html/rfc6180
• “IPv6
Opera)onal
Considera)ons
for
Datacenters”
– hop://tools.iem.org/html/dra_-‐lopez-‐v6ops-‐dc-‐
ipv6-‐04