SlideShare a Scribd company logo
DirectAccess Technical Drilldown Part 1 IPv6 & Transition Technologies John Craddock Infrastructure & Security Architect XTSeminars Ltd Session Code:  SVR401
DirectAccess – Simple? Internet Corporate intranet When a DirectAccess client connects to the Internet it is automatically connected to the corporate Intranet No user action required
A VPN on Steroids Corporate Network Pre log on Patch management, health check and GPOs Always On Network  level computer/user authentication and encryption Automatically connects throughNAT and firewalls VPNs connect the user to the network DirectAccess extends the network to the remote computer and user
No Gain Without Pain Challenge 1 Uses end-to-end IPv6 Requires transition technologies for the Internet and intranet DirectAccess apps must be IPv6 capable Challenge 2 Secure encrypted communications using IPsec End-to-end, end-to-edge Network authentication: computer/user Requires PKI to support for certificates
Simple? May Be Not Internet Corporate intranet Tunnelling technologies for the Internet and Intranet to support IPv6 over IPv4 Internet tunnelling selection based on client location – Internet, NAT, firewall Encryption/authentication of Internet traffic (end-to-edge/end-to-end) PKI required  Client location detection: Internet or corporate intranet
Don’t Give Up Now Part 1 IPv6 Intro Transition Technologies End-to-end connectivity Part 2 IPsec Configuring Direct Access Network location and name resolution policies It all works – just like that!
Demo Environment EX1 DC1 DNS DC, DNS,CA WIN7 NAT1 DA1 Home Corporate intranet Internet IIS for CRLdistribution APP1 WIN7 RT1 WIN7 Branch All servers Windows 2008 R2 WIN7 8
IPv6 IPv6 natively supports many of the extensions that have been added to IPv4 IPSec QoS IPv6 adds An enormous address space (128-bits) 340,282,366,920,938,463,463,374,607,431,768,211,456  possible addresses An efficient routing hierarchy Automatic configuration (DHCP may not be required) New protocol for interaction with neighbouring nodes
Drawbacks Requires a new routing infrastructure to support native IPv6 IPv6 can be used across IPv4 networks using transition technologies, 6to4, ISATAP and Teredo Most IPv6 addresses are not easy (impossible) to memorise! Will require the use of host names for all references Not all applications will be IPv6 compatible
Layer 2 Link layer header IPv6 header Payload Link layer trailer IPv6 packet Link layer frame Layer-2 remains the same No need to replace layer-2 appliances
Address Notation 2009:0adb:0001:56af:0321:000d:98fe:dbfe Leading zeros can be removed 2009:adb:1:56af:321:d:98fe:dbfe The 128 bit number is split into eight 16-bit blocks The value of each 16-bit block is written as four hex digits Each block is separated by a colon
Compressing Zeros 2009:0000:0000:0000:0321:000d:98fe:dbfe 2009::0321:000d:98fe:dbfe 2009:0000:0000:0321:0000:0000:dbfe 2009::0321::dbfe Invalid Contiguous 16-bit blocks containing zeros can be compressed Known as double colon notation Only one set of blocks can be compressed
IPv6 Prefix /48 /64 2009:0adb:0001:56af:0321:000d:98fe:dbfe The IPv6 prefix identifies the number of bits identifying the network IPv6 does not support the IPv4 style subnet mask
IPv6 Addressing Network Identifier Host Identifier 64-bits 64-bits The host component can be derived from the MAC address of the card Computers could be tracked by their MAC as they move between LANs  Windows Server 2008 and Windows 7 use a permanent interface identifier that is randomly generated Can be disabled via: netsh interface ipv6 set global randomizeidentifiers=disabled
Link Local Address Zone IDs eliminate ambiguity when more than one interface is connected to a network  Fe80::HostID2%9 Fe80::HostID3%10 InterfaceID 4 InterfaceID 6 InterfaceID 9 InterfaceID 10 Fe80::HostID1%4 Fe80::HostID4%6 Fe80::<host ID> , automatically assigned and only accessible on local network segment All hosts have a link local address even if they have a global address
Unicast Addresses Unique Local address (Similar to IPv4 private address ranges) FD hex Routing betweenLANs within a site Private routing between sites Site-local addresses prefixed fec0::/10 where depreciated in RFC 3879 Global address (Internet registered) Private routing Public routing
Host Configuration Auto configure link-local address DHCPv6 Manual configuration of otheraddresses possible but unlikely Stateless Stateful Router Solicitation (multicast) DHCP query if router does not reply orrouter instructs host to query DHCP Returns IPv6 configuration DHCP can supply complete configuration orjust additional options
Routing (simplified) Advertise: A ::/64 on link ::/0 next hop A:1 Network B B:1 A:1 Advertise: C::/64 next hop A:2 Network C C:1 A:2 Interface 15 IP address: A: hostID Default gateway
IPv4 IPv6 Transition Technologies IPv6 over IPv4 IPv6 Layer 7Applications Router to router tunnelling Layer 4TCP/UDP IPv6 over IPv4 Layer 3IPv4 Layer 3IPv6 IPv4 IPv6 Layer 2Ethernet etc… IPv4/IPv6 IPv6 Host to router , router to host Dual IP architecture IPv6 over IPv4 IPv4 IPv6 IPv6 Host to host
Tunnelling  IPv4 IPv4 IPv6 IPv6 Tunnel The tunnel end may be a single host or IPv6 network IPv6 Traffic can be tunnelled in IPv4 as  IP  (used by 6to4 and ISATAP) UDP (used by Teredo) HTTPS (used by IPHTTPS)
6to4 Network	 The 6to4 Network is an Internet based public IPv6 network Addresses start with the 2002::/16 prefix IPv6 traffic is tunnelled in IPv4 between 6to4 routers and relays
Native IPv6 network and addressing 6to4 Components 6to4Router 6to4Relay IPv4 Internet Tunnel Native IPv6host  6to4 subnets Tunnel Tunnel 6to4Host/Router 6to4Host/Router 6to4Router Tunnel Tunnel Native IPv6host  6to4 subnets
6to4 Addressing Host configured with a public IPv4 address  6to4 interface automatically enabled and assigned a unique global (public) IPv6 address Interface assigned IPv6 address: 2002:wwxx:yyzz:0:0:0:wwxx:yyzz wwxx:yyzz is the hexadecimal representation of the host’s IPv4 address 144.19.200.2 translates to 9013:c802 Corresponding 6to4 address 2002: 9013:c802:0:0:0:9013:c802
6to4 Host/Router to 6to4 Host IPv4 6to4 tunnel  Use me to get to 2002::/16 on-link IPv4 packet encapsulates IPv6 Send through6to4 tunnel 2002:9013:c802:0:0:0:9013:c802 144.19.200.2 Ping 2002:9b0f:1b08:0:0:0:9b0f:1b08 physical
6to4 Host/Router to Native Host IPv4 Use me to get to default gateway,  next hop 6to4 Relay 6to4 tunnel  Tunnel IPv6 Send through6to4 tunnel 2002:9013:c802:0:0:0:9013:c802 144.19.200.2 Ping fd00:9999:0:1::10 physical
6to4 Configuration (reference) 6to4Host/Router :: Set name of 6to4 relay netsh interface 6to4 set relay corprelay.example.com :: host must be able to resolve FQDN ::Enable 6to4 Interface netsh interface 6to4 set state enabled ::Enable forwarding on 6to4 interface netsh interface ipv6 set interface “6to4 Adapter” forwarding=enabled ::Set fixed IP for DAcorp interface netsh interface ipv6 set address dacorp fd00:9999:0:1::200/64 ::Enable forwarding and advertising on DACorp interface netsh interface ipv6 set interface DACorp forwarding=enabled advertise=enabled ::Add DNS record for relay corprelay.example.com 144.19.0.10 6to4Relay
Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) ISATAP is similar to 6to4 as it tunnels IPv6 within an IPv4 packet Protocol ID 41 ISATAP is used for tunnelling IPv6 across IPv4 intranets
ISATAP Components NativeIPv6 Host ISATAPHost Native IPv6Intranet ISATAP Router IPv4 Intranet Tunnel A::1 ISATAPHost Tunnel Advertise to ISATAP Hosts: A ::/64 on ISATAP interface ::/0 next hop A::1
ISATAP Host Configuration 0:5efe for a private IPv4 address 200:5efe for a public IPv4 address The ISATAP interface address is constructed from a combination of the IPv6 network address and the IPv4 address The 32-bit IPv4 address is be written in dotted decimal notation fd00:9999:0:100:0:5efe:10.40.99.120
ISATAP Host Configuration The host can either be configured with the address of the ISATAP router or it can resolve it via DNS If the host can resolve ISATAP via DNS, it automatically configures its ISATAP tunnel interface The network address of the interface is  published  by the ISATAP router The location of the ISATAP router is published in DNS with the key word ISATAP For eample: isatap.example.com DNS blocks the name isatap via the globalqueryblocklist  This must be cleared
ISATAP Host to ISATAP Host IPv4 Use me to get to fd00:9999:0:1::/64 On link ISATAP tunnel  Tunnel IPv6 Send throughISATAP tunnel fd00:9999:0:100:0:5efe:10.20.100.55 10.20.100.55 Ping fd00:9999:0:1:0:5efe:10.40.99.120 physical
ISATAP Host to Native IPv6 Host IPv4 Use me to get to ::/0Next hop ISATAP router ISATAP tunnel  Tunnel IPv6 Send throughISATAP tunnel fd00:9999:0:100:0:5efe:10.20.100.55 10.20.100.55 Ping fd00:9999:0:2::100 physical
ISATAP Configuration (reference) ISATAPHost No Client configuration, ISATAP interface automatically configured when clientcan resolve the name ISATAP from DNS ::Enable IPv4 routing netsh interface ipv4 set interface dacorp forwarding=enabled netsh interface ipv4 set interface dabranch forwarding=enabled ::configure IPV6 address, advertising and routing on DACorp interface netsh interface ipv6 set address dacorp fd00:9999:0:1::1/64 netsh interface ipv6 set interface dacorp forwarding=enabled advertise=enabled netsh interface ipv6 set route fd00:9999:0:1::/64 dacorp publish=yes ISATAP Router netsh interface isatap set router 10.40.100.1 netsh interface ipv6 set interface 15 forwarding=enabled advertise=enabled netsh interface ipv6 add route fd00:9999:0:100::/64 15 publish=yes Remove ISATAP block : dnscmd /config /globalqueryblocklistwpad Publish isatap.example.com Alternatively, don’t publish in DNS and configure the host: Netsh interface ipv6  isatap set state router xxy.example.com DNS Server
Supporting IPv4 Only Hosts For connections between IPv6 hosts and hosts that only support IPv4 NAT-PT and DNS-ALG require Improved translation with NAT64 and DNS64 Forefront Unified Access Gateway (UAG) Includes support for NAT64 and DNS64
IPv4 Internet IPv4 private Teredo NAT Device Teredoserver & relay TeredoHost Private IPv4 address Public IPv4 address Private IPv4 address Teredo provides connectivity when the host is behind one or more NATs The NAT will probably not support tunnelling IPv6 within IPv4 (protocol 41) Teredo tunnels IPv6 in UDP
Teredo Components IPv6 Host TeredoHost NAT Device IPv6Intranet Tunnel Teredoserver & relay IPv4 Internet Tunnel NAT Device                         Tunnel TeredoHost Tunnel
IPv4 Outbound Packet translation IPv4 Internet IPv4 private NAT Device Teredoserver & relay TeredoHost P200 P200 port 2000 I99 port 6000 I77 Translation Mapping stored:  P200 port 2000              I99 port 6000
Inbound traffic IPv4 Internet IPv4 private NAT Device Teredoserver & relay TeredoHost P200 P200 port 2000 I99 port 6000 I77 Translation Mapping in table:  P200 port 2000              I99 port 6000
The Challenge	 NAT normally allows inbound traffic as a response to an outbound request To allow any host to initiate communication with a Teredo host the NAT mappings will need to remain valid  Three different types of NAT Cone For mapped external IP and ports, allows inbound packets from any source IP address or port  Restricted Only allows inbound from IP and Port that matched the original outbound destination IP and Port Symmetric  Maps the same internal IP address and port to different external IP addresses and ports depending on the outbound destination address
Initial Negotiation The Teredo host connects to the Teredo server The server performs tests to determine the type of NAT that the host is behind To do this the server needs to be configured with two consecutive  IPv4 addresses The Server provides the address of the host’s Teredo tunnel
Teredo Host Address 2001:0:9013:a:346b:a79:6fe6:37fe IPv4 Internet IPv4 private NAT Device Teredoserver & relay TeredoHost IPv4:144.19.200.1 144.19.0.10 Hex: 9013:c801 192.168.137.26 XOR with ffff
Teredo Configuration (reference) TeredoHost ::Enable client for Teredo netsh interface ipv6 set teredoenterpriseclient teredo.example.com ::To resolve IPv6 DNS HKLMCServicesNSCachearametersddrConfigControl DWORD 0 ::Add DNS entry for Teredo server teredo.example.com 144.19.0.10 ::Add second IP address to Teredo server - used for NAT detection netsh interface ipv4 add address dainternet 144.19.0.11/16 ::enable teredo server netsh interface teredo set state type=server teredo.example.com  servervirtualip=144.19.0.10 ::Enable Teredotunelling interface netsh interface ipv6 set interface 11 forwarding= enabled netsh interface ipv6 set route 2001::/32 11 publish=yes Teredoserver & relay 43
IPHTTPS IPHTTPS can be used if a host behind NAT cannot tunnel using Teredo Firewall blocking port 3544  IPHTTPS encapsulates IPv6 in HTTPS Most firewalls will pass HTTPS Challenges Certificates required Host must have access to the CRL distribution point 44
IPHTTPS Components Web server with CRL X X X IPv6 Host IPHTTPSserver NAT Device IPHTTPSHost IPv6Intranet IPv4 Internet                              Tunnel IPv6 in HTTPS Certificate Router advertises network prefix to the IPHTTPS host URL of CRL distribution point published in certificate
IPHTTPS Configuration (reference) netsh interface httpstunnel add interface client  	https://DA1.example.com:443/IPHTTPS enabled IPHTTPSHost Client must be able to resolve URL and have to the CRL distributionpoint IPHTTPSserver :: Create IP-HTTPS tunnel interface and bind to DAInternet IP netsh interface httpstunnel add interface url= 	"https://DA1.example.com:443/IPHTTPS" type=server state=default ::Enable IP-HTTPS interface to forward and advertise netsh interface ipv6 set interface iphttpsInterface forwarding=enabled 	advertise=enabled ::Advertise prefix on IP-HTTPS interface netsh interface ipv6 add route 2001:feff::/64 iphttpsinterface publish=yes ::Bind certificate to listening port netsh http add sslcertipport=144.19.0.10:443 certhash=	c4d1c97ee770f033dab9091fa7304a6946db4ca6 appid=	{00112233-4455-6677-8899-AABBCCDDEEFF} Certificate
Don’t Like Netsh?
Summary: Internet to Intranet  6to4Host/Router 6to4Relay NAT Device Teredoserver & relay TeredoHost Internet Corporateintranet IPHTTPSserver IPHTTPSHost NAT Device
Summary: IPv6/IPv4 Intranet IPv6 ISATAP Router Native IPv6 IPv6 NAT-PTor NAT64 IPv4 IPv6Pv4 IPv4 IPv6Pv4
Don’t Give Up Now Part 1 IPv6 Intro Transition Technologies End-to-end connectivity Part 2 IPsec Configuring Direct Access Network location and name resolution policies It all works – just like that!
Required Slide Speakers,  TechEd 2009 is not producing  a DVD. Please announce that  attendees can access session  recordings at TechEd Online.  www.microsoft.com/teched Sessions On-Demand & Community www.microsoft.com/learning Microsoft Certification & Training Resources http://microsoft.com/technet Resources for IT Professionals http://microsoft.com/msdn Resources for Developers Resources
Related Content Required Slide Speakers,  please list the Breakout Sessions, TLC Interactive Theaters and Labs that are related to your session. Breakout Sessions: SVR402 DirectAccess Technical Drilldown, Part 2 of 2: Putting It All Together SIA306 Microsoft Forefront Unified Access Gateway: DirectAccess and Beyond SVR315 IPv6 for the Reluctant: What to Know Before You Turn It Off Interactive Theater Sessions: SVR08-IS End-to-End Remote Connectivity with DirectAccess
My Sessions at TechEd Required Slide Speakers,  please list the Breakout Sessions, TLC Interactive Theaters and Labs that are related to your session. Breakout Sessions: SIA319 What's Windows Server 2008 R2 Going to Do for Your Active Directory? SIA402 Recovery of Active Directory Deleted Objects and the Windows Server 2008 R2 Recycle Bin SVR401 DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and Transition Technologies SVR402 DirectAccess Technical Drilldown, Part 2 of 2: Putting It All Together Interactive Theater Sessions: SVR08-IS End-to-End Remote Connectivity with DirectAccess
Required Slide Complete an evaluation on CommNet and enter to win an Xbox 360 Elite!
Required Slide © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation.  Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation.  MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

More Related Content

What's hot

Windows Server 2012 Seminar 4 - De mogelijkheden van Direct Access
Windows Server 2012 Seminar 4 - De mogelijkheden van Direct AccessWindows Server 2012 Seminar 4 - De mogelijkheden van Direct Access
Windows Server 2012 Seminar 4 - De mogelijkheden van Direct Access
CompuTrain. De IT opleider.
 
Campus networking
Campus networkingCampus networking
Campus networking
Jisc
 
NAT (network address translation) & PAT (port address translation)
NAT (network address translation) & PAT (port address translation)NAT (network address translation) & PAT (port address translation)
NAT (network address translation) & PAT (port address translation)
Netwax Lab
 
Ccna interview questions
Ccna interview questionsCcna interview questions
Ccna interview questionsSanjay Thakare
 
Nat pat
Nat patNat pat
DHCP Server Guaidlines using CISCO PACKET TRACER
DHCP Server Guaidlines using CISCO PACKET TRACERDHCP Server Guaidlines using CISCO PACKET TRACER
DHCP Server Guaidlines using CISCO PACKET TRACER
COMSATS Institute of Information Technology
 
Silverlight Wireshark Analysis
Silverlight Wireshark AnalysisSilverlight Wireshark Analysis
Silverlight Wireshark Analysis
Yoss Cohen
 
NAT Ccna
NAT CcnaNAT Ccna
NAT Ccna
singhsukdeep
 
Fedv6tf-IPv6-new-friends
Fedv6tf-IPv6-new-friendsFedv6tf-IPv6-new-friends
Fedv6tf-IPv6-new-friends
Tim Martin
 
Transitioning IPv4 to IPv6
Transitioning IPv4 to IPv6Transitioning IPv4 to IPv6
Transitioning IPv4 to IPv6
Jhoni Guerrero
 
AusNOG 2014 - Network Virtualisation: The Killer App for IPv6?
AusNOG 2014 - Network Virtualisation: The Killer App for IPv6?AusNOG 2014 - Network Virtualisation: The Killer App for IPv6?
AusNOG 2014 - Network Virtualisation: The Killer App for IPv6?
Mark Smith
 
NAT Traversal
NAT TraversalNAT Traversal
NAT Traversal
Davide Carboni
 
Cisco IPv6 Tutorial
Cisco IPv6 TutorialCisco IPv6 Tutorial
Cisco IPv6 Tutorial
kriz5
 
unit 2
unit 2unit 2
Fedv6tf-fhs
Fedv6tf-fhsFedv6tf-fhs
Fedv6tf-fhs
Tim Martin
 
Ipo spaces calling document-v1
Ipo spaces calling document-v1Ipo spaces calling document-v1
Ipo spaces calling document-v1
ManmeetShandilya2
 
17.) layer 3 (advanced tcp ip routing)
17.) layer 3 (advanced tcp ip routing)17.) layer 3 (advanced tcp ip routing)
17.) layer 3 (advanced tcp ip routing)
Jeff Green
 

What's hot (20)

IPv6 DHCP
IPv6 DHCPIPv6 DHCP
IPv6 DHCP
 
Windows Server 2012 Seminar 4 - De mogelijkheden van Direct Access
Windows Server 2012 Seminar 4 - De mogelijkheden van Direct AccessWindows Server 2012 Seminar 4 - De mogelijkheden van Direct Access
Windows Server 2012 Seminar 4 - De mogelijkheden van Direct Access
 
NAT_Final
NAT_FinalNAT_Final
NAT_Final
 
Campus networking
Campus networkingCampus networking
Campus networking
 
Vpn(4)
Vpn(4)Vpn(4)
Vpn(4)
 
NAT (network address translation) & PAT (port address translation)
NAT (network address translation) & PAT (port address translation)NAT (network address translation) & PAT (port address translation)
NAT (network address translation) & PAT (port address translation)
 
Ccna interview questions
Ccna interview questionsCcna interview questions
Ccna interview questions
 
Nat pat
Nat patNat pat
Nat pat
 
DHCP Server Guaidlines using CISCO PACKET TRACER
DHCP Server Guaidlines using CISCO PACKET TRACERDHCP Server Guaidlines using CISCO PACKET TRACER
DHCP Server Guaidlines using CISCO PACKET TRACER
 
Silverlight Wireshark Analysis
Silverlight Wireshark AnalysisSilverlight Wireshark Analysis
Silverlight Wireshark Analysis
 
NAT Ccna
NAT CcnaNAT Ccna
NAT Ccna
 
Fedv6tf-IPv6-new-friends
Fedv6tf-IPv6-new-friendsFedv6tf-IPv6-new-friends
Fedv6tf-IPv6-new-friends
 
Transitioning IPv4 to IPv6
Transitioning IPv4 to IPv6Transitioning IPv4 to IPv6
Transitioning IPv4 to IPv6
 
AusNOG 2014 - Network Virtualisation: The Killer App for IPv6?
AusNOG 2014 - Network Virtualisation: The Killer App for IPv6?AusNOG 2014 - Network Virtualisation: The Killer App for IPv6?
AusNOG 2014 - Network Virtualisation: The Killer App for IPv6?
 
NAT Traversal
NAT TraversalNAT Traversal
NAT Traversal
 
Cisco IPv6 Tutorial
Cisco IPv6 TutorialCisco IPv6 Tutorial
Cisco IPv6 Tutorial
 
unit 2
unit 2unit 2
unit 2
 
Fedv6tf-fhs
Fedv6tf-fhsFedv6tf-fhs
Fedv6tf-fhs
 
Ipo spaces calling document-v1
Ipo spaces calling document-v1Ipo spaces calling document-v1
Ipo spaces calling document-v1
 
17.) layer 3 (advanced tcp ip routing)
17.) layer 3 (advanced tcp ip routing)17.) layer 3 (advanced tcp ip routing)
17.) layer 3 (advanced tcp ip routing)
 

Similar to SVR401: DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and transition technologies.

Getting started with IPv6
Getting started with IPv6Getting started with IPv6
Getting started with IPv6
Private
 
Lesson 3: IPv6 Fundamentals
Lesson 3: IPv6 FundamentalsLesson 3: IPv6 Fundamentals
Lesson 3: IPv6 Fundamentals
Mahmmoud Mahdi
 
To setup the simplest IPv6 network you just have to boot up a host o.pdf
To setup the simplest IPv6 network you just have to boot up a host o.pdfTo setup the simplest IPv6 network you just have to boot up a host o.pdf
To setup the simplest IPv6 network you just have to boot up a host o.pdf
aptexx
 
ipv6_cheat_sheet.pdf
ipv6_cheat_sheet.pdfipv6_cheat_sheet.pdf
ipv6_cheat_sheet.pdf
pradeeppotter
 
APNIC Hackathon IPv4 & IPv6 security & threat comparisons
APNIC Hackathon IPv4 & IPv6 security & threat comparisonsAPNIC Hackathon IPv4 & IPv6 security & threat comparisons
APNIC Hackathon IPv4 & IPv6 security & threat comparisons
Siena Perry
 
APNIC Hackathon IPv4 & IPv6 security & threat comparisons
APNIC Hackathon IPv4 & IPv6 security & threat comparisonsAPNIC Hackathon IPv4 & IPv6 security & threat comparisons
APNIC Hackathon IPv4 & IPv6 security & threat comparisons
APNIC
 
Basic of IPv6
Basic of IPv6Basic of IPv6
Basic of IPv6
Jubin Aghara
 
Ipv6 cheat sheet
Ipv6 cheat sheetIpv6 cheat sheet
Ipv6 cheat sheet
Swarup Hait
 
Short Introduction to IPv6
Short Introduction to IPv6Short Introduction to IPv6
Short Introduction to IPv6
Martin Schütte
 
IPv6 Addressing Architecture
IPv6 Addressing ArchitectureIPv6 Addressing Architecture
IPv6 Addressing Architecture
Shreehari Dhat
 
I pv6 for cmu
I pv6 for cmuI pv6 for cmu
I pv6 for cmu
Naranont Atima
 
IPV6 IPv6 Routing Lab By Rob Hamm
IPV6 IPv6 Routing Lab  By Rob HammIPV6 IPv6 Routing Lab  By Rob Hamm
IPV6 IPv6 Routing Lab By Rob Hamm
Information and Communications Technology Council
 
Deploying IPv6 in OpenStack Environments
Deploying IPv6 in OpenStack EnvironmentsDeploying IPv6 in OpenStack Environments
Deploying IPv6 in OpenStack Environments
Shannon McFarland
 

Similar to SVR401: DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and transition technologies. (20)

Getting started with IPv6
Getting started with IPv6Getting started with IPv6
Getting started with IPv6
 
Ipv6 questions
Ipv6 questionsIpv6 questions
Ipv6 questions
 
IPv6
IPv6IPv6
IPv6
 
Lesson 3: IPv6 Fundamentals
Lesson 3: IPv6 FundamentalsLesson 3: IPv6 Fundamentals
Lesson 3: IPv6 Fundamentals
 
To setup the simplest IPv6 network you just have to boot up a host o.pdf
To setup the simplest IPv6 network you just have to boot up a host o.pdfTo setup the simplest IPv6 network you just have to boot up a host o.pdf
To setup the simplest IPv6 network you just have to boot up a host o.pdf
 
ipv6_cheat_sheet.pdf
ipv6_cheat_sheet.pdfipv6_cheat_sheet.pdf
ipv6_cheat_sheet.pdf
 
APNIC Hackathon IPv4 & IPv6 security & threat comparisons
APNIC Hackathon IPv4 & IPv6 security & threat comparisonsAPNIC Hackathon IPv4 & IPv6 security & threat comparisons
APNIC Hackathon IPv4 & IPv6 security & threat comparisons
 
APNIC Hackathon IPv4 & IPv6 security & threat comparisons
APNIC Hackathon IPv4 & IPv6 security & threat comparisonsAPNIC Hackathon IPv4 & IPv6 security & threat comparisons
APNIC Hackathon IPv4 & IPv6 security & threat comparisons
 
Basic of IPv6
Basic of IPv6Basic of IPv6
Basic of IPv6
 
Ipv6 cheat sheet
Ipv6 cheat sheetIpv6 cheat sheet
Ipv6 cheat sheet
 
Ipv6 cheat sheet
Ipv6 cheat sheetIpv6 cheat sheet
Ipv6 cheat sheet
 
Short Introduction to IPv6
Short Introduction to IPv6Short Introduction to IPv6
Short Introduction to IPv6
 
IPv6 Addressing Architecture
IPv6 Addressing ArchitectureIPv6 Addressing Architecture
IPv6 Addressing Architecture
 
Tech f42
Tech f42Tech f42
Tech f42
 
I pv6 for cmu
I pv6 for cmuI pv6 for cmu
I pv6 for cmu
 
IPv6
IPv6IPv6
IPv6
 
IPV6 IPv6 Routing Lab By Rob Hamm
IPV6 IPv6 Routing Lab  By Rob HammIPV6 IPv6 Routing Lab  By Rob Hamm
IPV6 IPv6 Routing Lab By Rob Hamm
 
IPv6_Quick_Start_Guide
IPv6_Quick_Start_GuideIPv6_Quick_Start_Guide
IPv6_Quick_Start_Guide
 
Deploying IPv6 in OpenStack Environments
Deploying IPv6 in OpenStack EnvironmentsDeploying IPv6 in OpenStack Environments
Deploying IPv6 in OpenStack Environments
 
IPv6
IPv6IPv6
IPv6
 

More from Louis Göhl

Citrix vision and product highlights november 2011
Citrix vision and product highlights november 2011Citrix vision and product highlights november 2011
Citrix vision and product highlights november 2011
Louis Göhl
 
Citrix vision & strategy overview november 2011
Citrix vision & strategy overview november 2011Citrix vision & strategy overview november 2011
Citrix vision & strategy overview november 2011
Louis Göhl
 
VMware vSphere 4.1 deep dive - part 2
VMware vSphere 4.1 deep dive - part 2VMware vSphere 4.1 deep dive - part 2
VMware vSphere 4.1 deep dive - part 2
Louis Göhl
 
VMware vSphere 4.1 deep dive - part 1
VMware vSphere 4.1 deep dive - part 1VMware vSphere 4.1 deep dive - part 1
VMware vSphere 4.1 deep dive - part 1
Louis Göhl
 
Storage and hyper v - the choices you can make and the things you need to kno...
Storage and hyper v - the choices you can make and the things you need to kno...Storage and hyper v - the choices you can make and the things you need to kno...
Storage and hyper v - the choices you can make and the things you need to kno...Louis Göhl
 
Security best practices for hyper v and server virtualisation [svr307]
Security best practices for hyper v and server virtualisation [svr307]Security best practices for hyper v and server virtualisation [svr307]
Security best practices for hyper v and server virtualisation [svr307]Louis Göhl
 
Hyper v and live migration on cisco unified computing system - virtualized on...
Hyper v and live migration on cisco unified computing system - virtualized on...Hyper v and live migration on cisco unified computing system - virtualized on...
Hyper v and live migration on cisco unified computing system - virtualized on...
Louis Göhl
 
HP Bladesystem Overview September 2009
HP Bladesystem Overview September 2009HP Bladesystem Overview September 2009
HP Bladesystem Overview September 2009Louis Göhl
 
UNC309 - Getting the Most out of Microsoft Exchange Server 2010: Performance ...
UNC309 - Getting the Most out of Microsoft Exchange Server 2010: Performance ...UNC309 - Getting the Most out of Microsoft Exchange Server 2010: Performance ...
UNC309 - Getting the Most out of Microsoft Exchange Server 2010: Performance ...
Louis Göhl
 
SVR208 Gaining Higher Availability with Windows Server 2008 R2 Failover Clust...
SVR208 Gaining Higher Availability with Windows Server 2008 R2 Failover Clust...SVR208 Gaining Higher Availability with Windows Server 2008 R2 Failover Clust...
SVR208 Gaining Higher Availability with Windows Server 2008 R2 Failover Clust...
Louis Göhl
 
SVR205 Introduction to Hyper-V and Windows Server 2008 R2 with Microsoft Syst...
SVR205 Introduction to Hyper-V and Windows Server 2008 R2 with Microsoft Syst...SVR205 Introduction to Hyper-V and Windows Server 2008 R2 with Microsoft Syst...
SVR205 Introduction to Hyper-V and Windows Server 2008 R2 with Microsoft Syst...
Louis Göhl
 
SIA319 What's Windows Server 2008 R2 Going to Do for Your Active Directory?
SIA319 What's Windows Server 2008 R2 Going to Do for Your Active Directory?SIA319 What's Windows Server 2008 R2 Going to Do for Your Active Directory?
SIA319 What's Windows Server 2008 R2 Going to Do for Your Active Directory?
Louis Göhl
 
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
Louis Göhl
 
MGT310 Reduce Support Costs and Improve Business Alignment with Microsoft Sys...
MGT310 Reduce Support Costs and Improve Business Alignment with Microsoft Sys...MGT310 Reduce Support Costs and Improve Business Alignment with Microsoft Sys...
MGT310 Reduce Support Costs and Improve Business Alignment with Microsoft Sys...
Louis Göhl
 
MGT300 Using Microsoft System Center to Manage beyond the Trusted Domain
MGT300 Using Microsoft System Center to Manage beyond the Trusted DomainMGT300 Using Microsoft System Center to Manage beyond the Trusted Domain
MGT300 Using Microsoft System Center to Manage beyond the Trusted Domain
Louis Göhl
 
MGT220 - Virtualisation 360: Microsoft Virtualisation Strategy, Products, and...
MGT220 - Virtualisation 360: Microsoft Virtualisation Strategy, Products, and...MGT220 - Virtualisation 360: Microsoft Virtualisation Strategy, Products, and...
MGT220 - Virtualisation 360: Microsoft Virtualisation Strategy, Products, and...
Louis Göhl
 
CLI319 Microsoft Desktop Optimization Pack: Planning the Deployment of Micros...
CLI319 Microsoft Desktop Optimization Pack: Planning the Deployment of Micros...CLI319 Microsoft Desktop Optimization Pack: Planning the Deployment of Micros...
CLI319 Microsoft Desktop Optimization Pack: Planning the Deployment of Micros...
Louis Göhl
 
Windows Virtual Enterprise Centralized Desktop
Windows Virtual Enterprise Centralized DesktopWindows Virtual Enterprise Centralized Desktop
Windows Virtual Enterprise Centralized Desktop
Louis Göhl
 
Optimized Desktop, Mdop And Windows 7
Optimized Desktop, Mdop And Windows 7Optimized Desktop, Mdop And Windows 7
Optimized Desktop, Mdop And Windows 7
Louis Göhl
 

More from Louis Göhl (19)

Citrix vision and product highlights november 2011
Citrix vision and product highlights november 2011Citrix vision and product highlights november 2011
Citrix vision and product highlights november 2011
 
Citrix vision & strategy overview november 2011
Citrix vision & strategy overview november 2011Citrix vision & strategy overview november 2011
Citrix vision & strategy overview november 2011
 
VMware vSphere 4.1 deep dive - part 2
VMware vSphere 4.1 deep dive - part 2VMware vSphere 4.1 deep dive - part 2
VMware vSphere 4.1 deep dive - part 2
 
VMware vSphere 4.1 deep dive - part 1
VMware vSphere 4.1 deep dive - part 1VMware vSphere 4.1 deep dive - part 1
VMware vSphere 4.1 deep dive - part 1
 
Storage and hyper v - the choices you can make and the things you need to kno...
Storage and hyper v - the choices you can make and the things you need to kno...Storage and hyper v - the choices you can make and the things you need to kno...
Storage and hyper v - the choices you can make and the things you need to kno...
 
Security best practices for hyper v and server virtualisation [svr307]
Security best practices for hyper v and server virtualisation [svr307]Security best practices for hyper v and server virtualisation [svr307]
Security best practices for hyper v and server virtualisation [svr307]
 
Hyper v and live migration on cisco unified computing system - virtualized on...
Hyper v and live migration on cisco unified computing system - virtualized on...Hyper v and live migration on cisco unified computing system - virtualized on...
Hyper v and live migration on cisco unified computing system - virtualized on...
 
HP Bladesystem Overview September 2009
HP Bladesystem Overview September 2009HP Bladesystem Overview September 2009
HP Bladesystem Overview September 2009
 
UNC309 - Getting the Most out of Microsoft Exchange Server 2010: Performance ...
UNC309 - Getting the Most out of Microsoft Exchange Server 2010: Performance ...UNC309 - Getting the Most out of Microsoft Exchange Server 2010: Performance ...
UNC309 - Getting the Most out of Microsoft Exchange Server 2010: Performance ...
 
SVR208 Gaining Higher Availability with Windows Server 2008 R2 Failover Clust...
SVR208 Gaining Higher Availability with Windows Server 2008 R2 Failover Clust...SVR208 Gaining Higher Availability with Windows Server 2008 R2 Failover Clust...
SVR208 Gaining Higher Availability with Windows Server 2008 R2 Failover Clust...
 
SVR205 Introduction to Hyper-V and Windows Server 2008 R2 with Microsoft Syst...
SVR205 Introduction to Hyper-V and Windows Server 2008 R2 with Microsoft Syst...SVR205 Introduction to Hyper-V and Windows Server 2008 R2 with Microsoft Syst...
SVR205 Introduction to Hyper-V and Windows Server 2008 R2 with Microsoft Syst...
 
SIA319 What's Windows Server 2008 R2 Going to Do for Your Active Directory?
SIA319 What's Windows Server 2008 R2 Going to Do for Your Active Directory?SIA319 What's Windows Server 2008 R2 Going to Do for Your Active Directory?
SIA319 What's Windows Server 2008 R2 Going to Do for Your Active Directory?
 
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
 
MGT310 Reduce Support Costs and Improve Business Alignment with Microsoft Sys...
MGT310 Reduce Support Costs and Improve Business Alignment with Microsoft Sys...MGT310 Reduce Support Costs and Improve Business Alignment with Microsoft Sys...
MGT310 Reduce Support Costs and Improve Business Alignment with Microsoft Sys...
 
MGT300 Using Microsoft System Center to Manage beyond the Trusted Domain
MGT300 Using Microsoft System Center to Manage beyond the Trusted DomainMGT300 Using Microsoft System Center to Manage beyond the Trusted Domain
MGT300 Using Microsoft System Center to Manage beyond the Trusted Domain
 
MGT220 - Virtualisation 360: Microsoft Virtualisation Strategy, Products, and...
MGT220 - Virtualisation 360: Microsoft Virtualisation Strategy, Products, and...MGT220 - Virtualisation 360: Microsoft Virtualisation Strategy, Products, and...
MGT220 - Virtualisation 360: Microsoft Virtualisation Strategy, Products, and...
 
CLI319 Microsoft Desktop Optimization Pack: Planning the Deployment of Micros...
CLI319 Microsoft Desktop Optimization Pack: Planning the Deployment of Micros...CLI319 Microsoft Desktop Optimization Pack: Planning the Deployment of Micros...
CLI319 Microsoft Desktop Optimization Pack: Planning the Deployment of Micros...
 
Windows Virtual Enterprise Centralized Desktop
Windows Virtual Enterprise Centralized DesktopWindows Virtual Enterprise Centralized Desktop
Windows Virtual Enterprise Centralized Desktop
 
Optimized Desktop, Mdop And Windows 7
Optimized Desktop, Mdop And Windows 7Optimized Desktop, Mdop And Windows 7
Optimized Desktop, Mdop And Windows 7
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 

SVR401: DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and transition technologies.

  • 1.
  • 2. DirectAccess Technical Drilldown Part 1 IPv6 & Transition Technologies John Craddock Infrastructure & Security Architect XTSeminars Ltd Session Code: SVR401
  • 3. DirectAccess – Simple? Internet Corporate intranet When a DirectAccess client connects to the Internet it is automatically connected to the corporate Intranet No user action required
  • 4. A VPN on Steroids Corporate Network Pre log on Patch management, health check and GPOs Always On Network level computer/user authentication and encryption Automatically connects throughNAT and firewalls VPNs connect the user to the network DirectAccess extends the network to the remote computer and user
  • 5. No Gain Without Pain Challenge 1 Uses end-to-end IPv6 Requires transition technologies for the Internet and intranet DirectAccess apps must be IPv6 capable Challenge 2 Secure encrypted communications using IPsec End-to-end, end-to-edge Network authentication: computer/user Requires PKI to support for certificates
  • 6. Simple? May Be Not Internet Corporate intranet Tunnelling technologies for the Internet and Intranet to support IPv6 over IPv4 Internet tunnelling selection based on client location – Internet, NAT, firewall Encryption/authentication of Internet traffic (end-to-edge/end-to-end) PKI required Client location detection: Internet or corporate intranet
  • 7. Don’t Give Up Now Part 1 IPv6 Intro Transition Technologies End-to-end connectivity Part 2 IPsec Configuring Direct Access Network location and name resolution policies It all works – just like that!
  • 8. Demo Environment EX1 DC1 DNS DC, DNS,CA WIN7 NAT1 DA1 Home Corporate intranet Internet IIS for CRLdistribution APP1 WIN7 RT1 WIN7 Branch All servers Windows 2008 R2 WIN7 8
  • 9. IPv6 IPv6 natively supports many of the extensions that have been added to IPv4 IPSec QoS IPv6 adds An enormous address space (128-bits) 340,282,366,920,938,463,463,374,607,431,768,211,456 possible addresses An efficient routing hierarchy Automatic configuration (DHCP may not be required) New protocol for interaction with neighbouring nodes
  • 10. Drawbacks Requires a new routing infrastructure to support native IPv6 IPv6 can be used across IPv4 networks using transition technologies, 6to4, ISATAP and Teredo Most IPv6 addresses are not easy (impossible) to memorise! Will require the use of host names for all references Not all applications will be IPv6 compatible
  • 11. Layer 2 Link layer header IPv6 header Payload Link layer trailer IPv6 packet Link layer frame Layer-2 remains the same No need to replace layer-2 appliances
  • 12. Address Notation 2009:0adb:0001:56af:0321:000d:98fe:dbfe Leading zeros can be removed 2009:adb:1:56af:321:d:98fe:dbfe The 128 bit number is split into eight 16-bit blocks The value of each 16-bit block is written as four hex digits Each block is separated by a colon
  • 13. Compressing Zeros 2009:0000:0000:0000:0321:000d:98fe:dbfe 2009::0321:000d:98fe:dbfe 2009:0000:0000:0321:0000:0000:dbfe 2009::0321::dbfe Invalid Contiguous 16-bit blocks containing zeros can be compressed Known as double colon notation Only one set of blocks can be compressed
  • 14. IPv6 Prefix /48 /64 2009:0adb:0001:56af:0321:000d:98fe:dbfe The IPv6 prefix identifies the number of bits identifying the network IPv6 does not support the IPv4 style subnet mask
  • 15. IPv6 Addressing Network Identifier Host Identifier 64-bits 64-bits The host component can be derived from the MAC address of the card Computers could be tracked by their MAC as they move between LANs Windows Server 2008 and Windows 7 use a permanent interface identifier that is randomly generated Can be disabled via: netsh interface ipv6 set global randomizeidentifiers=disabled
  • 16. Link Local Address Zone IDs eliminate ambiguity when more than one interface is connected to a network Fe80::HostID2%9 Fe80::HostID3%10 InterfaceID 4 InterfaceID 6 InterfaceID 9 InterfaceID 10 Fe80::HostID1%4 Fe80::HostID4%6 Fe80::<host ID> , automatically assigned and only accessible on local network segment All hosts have a link local address even if they have a global address
  • 17. Unicast Addresses Unique Local address (Similar to IPv4 private address ranges) FD hex Routing betweenLANs within a site Private routing between sites Site-local addresses prefixed fec0::/10 where depreciated in RFC 3879 Global address (Internet registered) Private routing Public routing
  • 18. Host Configuration Auto configure link-local address DHCPv6 Manual configuration of otheraddresses possible but unlikely Stateless Stateful Router Solicitation (multicast) DHCP query if router does not reply orrouter instructs host to query DHCP Returns IPv6 configuration DHCP can supply complete configuration orjust additional options
  • 19. Routing (simplified) Advertise: A ::/64 on link ::/0 next hop A:1 Network B B:1 A:1 Advertise: C::/64 next hop A:2 Network C C:1 A:2 Interface 15 IP address: A: hostID Default gateway
  • 20. IPv4 IPv6 Transition Technologies IPv6 over IPv4 IPv6 Layer 7Applications Router to router tunnelling Layer 4TCP/UDP IPv6 over IPv4 Layer 3IPv4 Layer 3IPv6 IPv4 IPv6 Layer 2Ethernet etc… IPv4/IPv6 IPv6 Host to router , router to host Dual IP architecture IPv6 over IPv4 IPv4 IPv6 IPv6 Host to host
  • 21. Tunnelling IPv4 IPv4 IPv6 IPv6 Tunnel The tunnel end may be a single host or IPv6 network IPv6 Traffic can be tunnelled in IPv4 as IP (used by 6to4 and ISATAP) UDP (used by Teredo) HTTPS (used by IPHTTPS)
  • 22. 6to4 Network The 6to4 Network is an Internet based public IPv6 network Addresses start with the 2002::/16 prefix IPv6 traffic is tunnelled in IPv4 between 6to4 routers and relays
  • 23. Native IPv6 network and addressing 6to4 Components 6to4Router 6to4Relay IPv4 Internet Tunnel Native IPv6host 6to4 subnets Tunnel Tunnel 6to4Host/Router 6to4Host/Router 6to4Router Tunnel Tunnel Native IPv6host 6to4 subnets
  • 24. 6to4 Addressing Host configured with a public IPv4 address 6to4 interface automatically enabled and assigned a unique global (public) IPv6 address Interface assigned IPv6 address: 2002:wwxx:yyzz:0:0:0:wwxx:yyzz wwxx:yyzz is the hexadecimal representation of the host’s IPv4 address 144.19.200.2 translates to 9013:c802 Corresponding 6to4 address 2002: 9013:c802:0:0:0:9013:c802
  • 25. 6to4 Host/Router to 6to4 Host IPv4 6to4 tunnel Use me to get to 2002::/16 on-link IPv4 packet encapsulates IPv6 Send through6to4 tunnel 2002:9013:c802:0:0:0:9013:c802 144.19.200.2 Ping 2002:9b0f:1b08:0:0:0:9b0f:1b08 physical
  • 26. 6to4 Host/Router to Native Host IPv4 Use me to get to default gateway, next hop 6to4 Relay 6to4 tunnel Tunnel IPv6 Send through6to4 tunnel 2002:9013:c802:0:0:0:9013:c802 144.19.200.2 Ping fd00:9999:0:1::10 physical
  • 27. 6to4 Configuration (reference) 6to4Host/Router :: Set name of 6to4 relay netsh interface 6to4 set relay corprelay.example.com :: host must be able to resolve FQDN ::Enable 6to4 Interface netsh interface 6to4 set state enabled ::Enable forwarding on 6to4 interface netsh interface ipv6 set interface “6to4 Adapter” forwarding=enabled ::Set fixed IP for DAcorp interface netsh interface ipv6 set address dacorp fd00:9999:0:1::200/64 ::Enable forwarding and advertising on DACorp interface netsh interface ipv6 set interface DACorp forwarding=enabled advertise=enabled ::Add DNS record for relay corprelay.example.com 144.19.0.10 6to4Relay
  • 28. Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) ISATAP is similar to 6to4 as it tunnels IPv6 within an IPv4 packet Protocol ID 41 ISATAP is used for tunnelling IPv6 across IPv4 intranets
  • 29. ISATAP Components NativeIPv6 Host ISATAPHost Native IPv6Intranet ISATAP Router IPv4 Intranet Tunnel A::1 ISATAPHost Tunnel Advertise to ISATAP Hosts: A ::/64 on ISATAP interface ::/0 next hop A::1
  • 30. ISATAP Host Configuration 0:5efe for a private IPv4 address 200:5efe for a public IPv4 address The ISATAP interface address is constructed from a combination of the IPv6 network address and the IPv4 address The 32-bit IPv4 address is be written in dotted decimal notation fd00:9999:0:100:0:5efe:10.40.99.120
  • 31. ISATAP Host Configuration The host can either be configured with the address of the ISATAP router or it can resolve it via DNS If the host can resolve ISATAP via DNS, it automatically configures its ISATAP tunnel interface The network address of the interface is published by the ISATAP router The location of the ISATAP router is published in DNS with the key word ISATAP For eample: isatap.example.com DNS blocks the name isatap via the globalqueryblocklist This must be cleared
  • 32. ISATAP Host to ISATAP Host IPv4 Use me to get to fd00:9999:0:1::/64 On link ISATAP tunnel Tunnel IPv6 Send throughISATAP tunnel fd00:9999:0:100:0:5efe:10.20.100.55 10.20.100.55 Ping fd00:9999:0:1:0:5efe:10.40.99.120 physical
  • 33. ISATAP Host to Native IPv6 Host IPv4 Use me to get to ::/0Next hop ISATAP router ISATAP tunnel Tunnel IPv6 Send throughISATAP tunnel fd00:9999:0:100:0:5efe:10.20.100.55 10.20.100.55 Ping fd00:9999:0:2::100 physical
  • 34. ISATAP Configuration (reference) ISATAPHost No Client configuration, ISATAP interface automatically configured when clientcan resolve the name ISATAP from DNS ::Enable IPv4 routing netsh interface ipv4 set interface dacorp forwarding=enabled netsh interface ipv4 set interface dabranch forwarding=enabled ::configure IPV6 address, advertising and routing on DACorp interface netsh interface ipv6 set address dacorp fd00:9999:0:1::1/64 netsh interface ipv6 set interface dacorp forwarding=enabled advertise=enabled netsh interface ipv6 set route fd00:9999:0:1::/64 dacorp publish=yes ISATAP Router netsh interface isatap set router 10.40.100.1 netsh interface ipv6 set interface 15 forwarding=enabled advertise=enabled netsh interface ipv6 add route fd00:9999:0:100::/64 15 publish=yes Remove ISATAP block : dnscmd /config /globalqueryblocklistwpad Publish isatap.example.com Alternatively, don’t publish in DNS and configure the host: Netsh interface ipv6 isatap set state router xxy.example.com DNS Server
  • 35. Supporting IPv4 Only Hosts For connections between IPv6 hosts and hosts that only support IPv4 NAT-PT and DNS-ALG require Improved translation with NAT64 and DNS64 Forefront Unified Access Gateway (UAG) Includes support for NAT64 and DNS64
  • 36. IPv4 Internet IPv4 private Teredo NAT Device Teredoserver & relay TeredoHost Private IPv4 address Public IPv4 address Private IPv4 address Teredo provides connectivity when the host is behind one or more NATs The NAT will probably not support tunnelling IPv6 within IPv4 (protocol 41) Teredo tunnels IPv6 in UDP
  • 37. Teredo Components IPv6 Host TeredoHost NAT Device IPv6Intranet Tunnel Teredoserver & relay IPv4 Internet Tunnel NAT Device Tunnel TeredoHost Tunnel
  • 38. IPv4 Outbound Packet translation IPv4 Internet IPv4 private NAT Device Teredoserver & relay TeredoHost P200 P200 port 2000 I99 port 6000 I77 Translation Mapping stored: P200 port 2000 I99 port 6000
  • 39. Inbound traffic IPv4 Internet IPv4 private NAT Device Teredoserver & relay TeredoHost P200 P200 port 2000 I99 port 6000 I77 Translation Mapping in table: P200 port 2000 I99 port 6000
  • 40. The Challenge NAT normally allows inbound traffic as a response to an outbound request To allow any host to initiate communication with a Teredo host the NAT mappings will need to remain valid Three different types of NAT Cone For mapped external IP and ports, allows inbound packets from any source IP address or port Restricted Only allows inbound from IP and Port that matched the original outbound destination IP and Port Symmetric Maps the same internal IP address and port to different external IP addresses and ports depending on the outbound destination address
  • 41. Initial Negotiation The Teredo host connects to the Teredo server The server performs tests to determine the type of NAT that the host is behind To do this the server needs to be configured with two consecutive IPv4 addresses The Server provides the address of the host’s Teredo tunnel
  • 42. Teredo Host Address 2001:0:9013:a:346b:a79:6fe6:37fe IPv4 Internet IPv4 private NAT Device Teredoserver & relay TeredoHost IPv4:144.19.200.1 144.19.0.10 Hex: 9013:c801 192.168.137.26 XOR with ffff
  • 43. Teredo Configuration (reference) TeredoHost ::Enable client for Teredo netsh interface ipv6 set teredoenterpriseclient teredo.example.com ::To resolve IPv6 DNS HKLMCServicesNSCachearametersddrConfigControl DWORD 0 ::Add DNS entry for Teredo server teredo.example.com 144.19.0.10 ::Add second IP address to Teredo server - used for NAT detection netsh interface ipv4 add address dainternet 144.19.0.11/16 ::enable teredo server netsh interface teredo set state type=server teredo.example.com servervirtualip=144.19.0.10 ::Enable Teredotunelling interface netsh interface ipv6 set interface 11 forwarding= enabled netsh interface ipv6 set route 2001::/32 11 publish=yes Teredoserver & relay 43
  • 44. IPHTTPS IPHTTPS can be used if a host behind NAT cannot tunnel using Teredo Firewall blocking port 3544 IPHTTPS encapsulates IPv6 in HTTPS Most firewalls will pass HTTPS Challenges Certificates required Host must have access to the CRL distribution point 44
  • 45. IPHTTPS Components Web server with CRL X X X IPv6 Host IPHTTPSserver NAT Device IPHTTPSHost IPv6Intranet IPv4 Internet Tunnel IPv6 in HTTPS Certificate Router advertises network prefix to the IPHTTPS host URL of CRL distribution point published in certificate
  • 46. IPHTTPS Configuration (reference) netsh interface httpstunnel add interface client https://DA1.example.com:443/IPHTTPS enabled IPHTTPSHost Client must be able to resolve URL and have to the CRL distributionpoint IPHTTPSserver :: Create IP-HTTPS tunnel interface and bind to DAInternet IP netsh interface httpstunnel add interface url= "https://DA1.example.com:443/IPHTTPS" type=server state=default ::Enable IP-HTTPS interface to forward and advertise netsh interface ipv6 set interface iphttpsInterface forwarding=enabled advertise=enabled ::Advertise prefix on IP-HTTPS interface netsh interface ipv6 add route 2001:feff::/64 iphttpsinterface publish=yes ::Bind certificate to listening port netsh http add sslcertipport=144.19.0.10:443 certhash= c4d1c97ee770f033dab9091fa7304a6946db4ca6 appid= {00112233-4455-6677-8899-AABBCCDDEEFF} Certificate
  • 48. Summary: Internet to Intranet 6to4Host/Router 6to4Relay NAT Device Teredoserver & relay TeredoHost Internet Corporateintranet IPHTTPSserver IPHTTPSHost NAT Device
  • 49. Summary: IPv6/IPv4 Intranet IPv6 ISATAP Router Native IPv6 IPv6 NAT-PTor NAT64 IPv4 IPv6Pv4 IPv4 IPv6Pv4
  • 50. Don’t Give Up Now Part 1 IPv6 Intro Transition Technologies End-to-end connectivity Part 2 IPsec Configuring Direct Access Network location and name resolution policies It all works – just like that!
  • 51. Required Slide Speakers, TechEd 2009 is not producing a DVD. Please announce that attendees can access session recordings at TechEd Online. www.microsoft.com/teched Sessions On-Demand & Community www.microsoft.com/learning Microsoft Certification & Training Resources http://microsoft.com/technet Resources for IT Professionals http://microsoft.com/msdn Resources for Developers Resources
  • 52. Related Content Required Slide Speakers, please list the Breakout Sessions, TLC Interactive Theaters and Labs that are related to your session. Breakout Sessions: SVR402 DirectAccess Technical Drilldown, Part 2 of 2: Putting It All Together SIA306 Microsoft Forefront Unified Access Gateway: DirectAccess and Beyond SVR315 IPv6 for the Reluctant: What to Know Before You Turn It Off Interactive Theater Sessions: SVR08-IS End-to-End Remote Connectivity with DirectAccess
  • 53. My Sessions at TechEd Required Slide Speakers, please list the Breakout Sessions, TLC Interactive Theaters and Labs that are related to your session. Breakout Sessions: SIA319 What's Windows Server 2008 R2 Going to Do for Your Active Directory? SIA402 Recovery of Active Directory Deleted Objects and the Windows Server 2008 R2 Recycle Bin SVR401 DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and Transition Technologies SVR402 DirectAccess Technical Drilldown, Part 2 of 2: Putting It All Together Interactive Theater Sessions: SVR08-IS End-to-End Remote Connectivity with DirectAccess
  • 54. Required Slide Complete an evaluation on CommNet and enter to win an Xbox 360 Elite!
  • 55.
  • 56. Required Slide © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.