0% found this document useful (0 votes)
69 views10 pages

Rapport 201104 IPv6 Deployment in Local Area Networks

1) The document describes implementing IPv6 in an existing IPv4 LAN, focusing on configuring end-user devices. There are multiple options for configuring IPv6 addresses and DNS servers, including static, stateless autoconfiguration (SLAAC), and DHCPv6. 2) For IPv6 address configuration, devices can use static configuration, SLAAC to get an address from a network prefix announced by the router, or DHCPv6 to get an address from the DHCPv6 server. DNS servers can be configured statically, through DHCPv6, or via router advertisements containing DNS server addresses. 3) Careful network addressing planning is recommended, such as reserving a /64 prefix per

Uploaded by

Matthew Keating
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
69 views10 pages

Rapport 201104 IPv6 Deployment in Local Area Networks

1) The document describes implementing IPv6 in an existing IPv4 LAN, focusing on configuring end-user devices. There are multiple options for configuring IPv6 addresses and DNS servers, including static, stateless autoconfiguration (SLAAC), and DHCPv6. 2) For IPv6 address configuration, devices can use static configuration, SLAAC to get an address from a network prefix announced by the router, or DHCPv6 to get an address from the DHCPv6 server. DNS servers can be configured statically, through DHCPv6, or via router advertisements containing DNS server addresses. 3) Careful network addressing planning is recommended, such as reserving a /64 prefix per

Uploaded by

Matthew Keating
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

IPv6 Deployment

In Local Area Networks

April 2011
Franois Kooman <[email protected]>

Revision 19

This work is licensed under a Creative Commons Attribution 3.0

n!orted "icense.
2/10

Table of Contents
1. #ntroduction........................................................................................................................................ $ 2. Con%i&uration o% 'evices.................................................................................................................... $ 2.1. #(v$ Con%i&uration...................................................................................................................... $ 2.2. #(v) Con%i&uration...................................................................................................................... $ 3. #(v) Con%i&uration.............................................................................................................................. * 3.1. +tatic Con%i&uration.................................................................................................................... * 3.2. ',namic Con%i&uration usin& +"AAC........................................................................................... * 3.3. ',namic Con%i&uration usin& '-C(v)........................................................................................ * 3.$. #( Addressin& (lan...................................................................................................................... * $. #(v) '.+ Con%i&uration...................................................................................................................... ) $.1. +tatic Con%i&uration.................................................................................................................... ) $.2. ',namic Con%i&uration usin& /'.++.......................................................................................... ) $.3. ',namic Con%i&uration usin& '-C(v)........................................................................................ ) *. /A0 /'.++ or '-C(v)1...................................................................................................................... ) ). .AT)$................................................................................................................................................. 2 2. +ecurin& #(v) .etworks...................................................................................................................... 3 2.1. .ei&hbor 'iscover,.................................................................................................................... 3 2.2. '-C(v)...................................................................................................................................... 4 2.3. +ervers and -osts....................................................................................................................... 4 3. #denti%ication o% hosts......................................................................................................................... 4 3.1. #(v$............................................................................................................................................ 4 3.2. #(v).......................................................................................................................................... 10 4. Conclusion........................................................................................................................................ 10

3/10

Intro!"ction

This document describes im!lementin& #(v) in an e5istin& "A. o% an or&ani6ation. +!eci%icall, in a network with end7user devices with #( connectivit, like deskto!0 notebooks and mobile devices. The &oal o% this document to describe how to set u! a network in%rastructure with both #(v$ and #(v) 8dual stack19 connectivit,. This document will !rimaril, %ocus on !ractical issues: 1. /e;uired modi%ications to the network in%rastructure< 2. +tatus o% #(v) su!!ort in common o!eratin& s,stems %or a variet, o% devices. As a case stud, the "A. o% + /Fnet was taken. This network contains various di%%erent t,!es o% devices which makes it a &ood test case to evaluate their #(v) 8dual stack9 su!!ort. #t is assumed that #(v) connectivit, is alread, available on the router 8at the =A. side9 connectin& to the "A.. This #(v) connectivit, can be obtained throu&h either native #(v) as !rovided b, + /Fnet2 or throu&h some tunnelin& mechanism like )to$ or )in$ i% no native #(v) connectivit, is available ,et.

2
21

Confi#"ration of Devices
IPv$ Confi#"ration

#n #(v$ networks there are two wa,s to con%i&ure an #( address on a device: 1. +tatic con%i&uration< 2. ',namic con%i&uration usin& '-C(3. To con%i&ure '.+ resolvers the same two o!tions are available: 1. +tatic con%i&uration< 2. ',namic con%i&uration usin& '-C(. The %irst o!tion is t,!icall, used %or >%i5ed? elements in the network like routers and servers. The second o!tion is !rimaril, used %or the 8automatic9 con%i&uration o% devices belon&in& to end7users.

22

IPv6 Confi#"ration

#n #(v) networks there is an e5tra wa, to con%i&ure #( addresses: 1. +tatic con%i&uration< 2. ',namic con%i&uration usin& stateless address auto con%i&uration 8+"AAC9< 3. ',namic con%i&uration usin& '-C(v). For '.+ resolvers there are three o!tions as well: 1. +tatic con%i&uration< 2. ',namic con%i&uration usin& /'.++<
1 2 3 =ith dual stack we mean the desi&n o% a network such that #(v) connectivit, is com!letel, inde!endent on #(v$ connectivit, and that both #(v) and #(v$ are %ull, active and can be automaticall, con%i&ured without an, manual intervention o% the user. .ative #(v) can be obtained 8%or no additional %ee9 b, customers o% + /Fnet as !art o% the service >+ /Finternet?. @ore in%ormation about this can be obtained at the instituteAs account mana&er. #n this document '-C( alwa,s means '-C(v$. '-C(v) is alwa,s mentioned e5!licitl,.

$/10

3. ',namic con%i&uration usin& '-C(v). These methods are interchan&eable. #t is %or instance !ossible to use +"AAC %or #( address con%i&uration and '-C(v) %or !rovidin& the '.+ resolvers. #n the ne5t section the di%%erent wa,s o% con%i&urin& #(v) are discussed.

%
%1

IPv6 Confi#"ration
&tatic Confi#"ration

+tatic con%i&uration is t,!icall, used %or >%i5ed? devices in the network like routers and servers. This is no di%%erent %rom the situation in #(v$ networks. The !re%i5 o% a network is b, de%ault /64 in a "A.$. #t is !ossible to use smaller networks0 althou&h that will make it im!ossible to use +"AAC to con%i&ure devices.

%2

Dynamic Confi#"ration "sin# &LAAC

+tateless address auto con%i&uration 8+"AAC9 is documented in /FC $3)2. To ac;uire a &loball, uni;ue #( address the router !la,s an im!ortant role. The router announces a !re%i5 on a network usin& >router advertisements? 8/A9. The end7user host will choose a uni;ue #( address in this !re%i5. For #(v$ networks a !re%i5 could be %or e5am!le 192.168.1.0/24 which contains 23 8B 2*)9 addresses. #n #(v) networks a !re%i5 is usuall, )$ bits %or a 8C9"A.0 %or e5am!le 2001:610:508:109::/64. This !re%i5 contains 2)$ 8B a lot9 o% addresses. For choosin& an address in the #(v) !re%i5 usuall, the @AC address o% the 8network9 inter%ace is used. This is hel!%ul in determinin& an address because the $3 bit @AC address is 8b, de%inition9 &loball, uni;ue. This however can be a !otential !rivac, !roblem as the chosen address will be alwa,s the same 8and leaks at least the vendor identi%ication o% the network device9. For this reason recent versions o% =indows 8Cista and later9 use the #(v) !rivac, e5tensions as documented in /FC $4$1. This !revents the #(v) address %rom bein& alwa,s the same and to not correlate with the @AC address o% the inter%ace. #n @ac D+ E and "inu5 * it is !ossible to activate the !rivac, e5tensions manuall,. @obile devices do not currentl, e5!ose user con%i&urable o!tions to enable the !rivac, e5tension.

%%

Dynamic Confi#"ration "sin# D'CPv6

#n this case '-C(v) is used as documented in /FC 331*. This means that0 like in the #(v$ situation0 the '-C(v) server &ives an address to an end7user host %rom a !redetermined ran&e. #n the /A o% the router the %la& > Managed address configuration? should be set so the host knows that '-C(v) is used %or the address con%i&uration 8see /FC 2$)19. #t should be noted that it is not !ossible to announce the #( address o% the router8s9 usin& '-C(v) as is !ossible in the case o% '-C(0 but it alwa,s has to be announced usin& /A.

%$

IP A!!ressin# Plan

To care%ull, desi&n network addressin& on a site0 i% %or instance this site obtained a !re%i5 o% si6e /$30 + /Fnet wrote another document called >(re!arin& an #(v) Addressin& (lan? ). #n this document methods are !ro!osed o% e%%icientl, and meanin&%ull, desi&nin& a addressin& !lan %or a site.
$ * ) The recommended minimal !re%i5 is /)$ is %or a network 8see /FC $2419. For a site 8%or instance an or&ani6ation9 a de%ault o% /$3 is allocated 821) /)$ networks9. =ith "inu5 we actuall, mean F. /"inu5. This includes the "inu5 kernel and user s!ace a!!lications that are !art o% a "inu5 distribution like /ed -at Gnter!rise "inu5 or 'ebian. This document can be obtained %rom the + /Fnet website at htt!://www.sur%net.nl/'ocuments/handleidin&H#(v)Hnummer!lanHG..!d%.

*/10

$
$1

IPv6 DN& Confi#"ration


&tatic Confi#"ration

+tatic con%i&uration is t,!icall, used %or >%i5ed? devices in the network like routers and servers. This is no di%%erent %rom the situation in #(v$ networks.

$2

Dynamic Confi#"ration "sin# (DN&&

/ecursive '.+ +erver 8/'.++9 as documented in /FC )10) >#(v) /outer Advertisement D!tions %or '.+ Con%i&uration? is a method to announce addresses o% '.+ resolvers and search domains to end7user hosts. The addresses o% the resolvers are added to the router advertisements.

$%

Dynamic Confi#"ration "sin# D'CPv6

#n this case '-C(v) is used as documented in /FC 331*. "ike with '-C(0 with '-C(v) the '.+ resolver8s9 and !ossibl, other in%ormation can be announced. #n the /A the %la& > Other stateful configuration? should be set0 so the host knows that it should use its '-C(v) client to obtain this in%ormation 8see /FC 2$)19.

(A* (DN&& or D'CPv6+

=ith these di%%erent wa,s to 8automaticall,9 con%i&ure #( addresses and '.+ resolvers the ;uestion remains which one should be chosen. 'i%%erent o!eratin& s,stems and 8mobile9 devices su!!ort a di%%erent 8not necessaril, overla!!in&9 number o% methods. +o it will be >mi5 and match? to su!!ort all 8or at least as much as !ossible9 o!eratin& s,stems.

,peratin# &ystem -ersion &LAAC (DN&& D'CPv6 Privacy 0an"al1 D"al2stack ./tension @icroso%t =indows3 A!!le @ac D+ E A!!le iD+
10 11

2 10.).* $.2.1 2.2 10.0$.1 1$ 1*.5

Ies Ies Ies Ies Ies Ies Ies

.o .o .o .o Ies Ies .o
13 4

Ies .o Ies .o .o Ies Ies

Ies Ies .o .o Ies Ies .o

3es 3es No No 3es 3es 3es

3es No 3es No No 3es1$ 3es

Foo&le Android "inu5 8 buntu9 "inu5 8Fedora9 Cisco #D+

12

2 3 4 10 11 12 13 1$

This means whether or not it is !ossible to con%i&ure the o!eratin& s,stem manuall, %or dual stack connectivit,. =hen #(v$ is disabled manuall, in the network con%i&uration a bu& occurs with which the #(v) address o% the 8automaticall, via '-C(v)9 con%i&ured '.+ resolver corru!ts. +ee htt!://www.tunnelbroker.net/%orums/inde5.!h!1 to!icB323.0 %or more in%ormation. +u!!ort %or /'.++ will su!!osedl, be available in @ac D+ E 10.20 "ion. +ee htt!://seclists.or&/nano&/2011/Feb/1423. Tests with an i(hone 3F+ and iD+ $.2.1 on an #(v) onl, access !oint show that the i(hone is able to work without an, #(v$ con%i&uration. -owever0 sometimes !roblems occurred durin& browsin& the web in which sometimes a messa&e is dis!la,ed that the server could not be %ound. A !a&e re%resh made it work a&ain. #ssue with #(v) su!!ort in Foo&le Android: htt!://code.&oo&le.com/!/android/issues/detail1idB3334. This is 8still9 not resolved in Android 2.3 8Fin&erbread9. +u!!ort o% /'.++ and '-C(v) is e5!ected in buntu 11.0$ 8available at the end o% A!ril 20119. /e;uires the installation o% the !acka&e >rdnssd?. The de%ault %irewall blocks '-C(v) res!onses 8+ee: htt!s://bu&6illa.redhat.com/showHbu&.c&i1idB)*)33$ and htt!://www.redhat.com/archives/anaconda7devel7list/20107.ovember/ms&00122.html9. Furthermore0 the #(v) connection should be set to >Automatc? in .etwork@ana&er to enable the automatic con%i&uration o% '.+ resolver addresses usin& either /'.++ or '-C(v).

)/10

/outer advertisements are alwa,s re;uired %or ever, o!eratin& s,stem. /'.++ is su!!orted b, onl, a %ew o!eratin& s,stems as is '-C(v)0 but then a di%%erent set. This table shows that '-C(v) is reall, re;uired %or now 1*. /'.++ has limited use as onl, Fedora 8and buntu a%ter installation o% an o!tional so%tware !acka&e9 su!!ort it. -owever0 /'.++ ma, become more im!ortant in the %uture as it will make '-C(v) obsolete and will be needed %or @ac D+ E 10.2. Furthermore0 it will be o% &reat value a%ter switchin& to secure nei&hbor discover, 8see section 2.19. #t is noteworth, that it is currentl, im!ossible in @ac D+ E0 Foo&le Android and buntu to con%i&ure '.+ resolvers automaticall, or con%i&ure #(v) addresses usin& a '-C(v) server. These s,stems are able to connect to #(v) services0 but the, will alwa,s re;uire the #(v$ '.+ server that was obtained usin& '-C( 8or #(v) '.+ resolver that was con%i&ured manuall,9 %or the resolvin&.

NAT6$

"ookin& ahead towards a situation with an #(v) onl, "A. it is almost certainl, re;uired to maintain connectivit, to the #(v$ !art o% the #nternet. This will be !ossible0 %or instance0 usin& a .AT)$/'.+)$ &atewa,. This is a successor to the obsolete .AT7(T solution as documented in /FC 22)). The idea behind .AT)$ is that a '.+)$ server creates a >virtual? AAAA record %or host names i% there currentl, is no AAAA record %or that host. The virtual AAAA record !oints to a &atewa, machine in which the last 32 bits o% the #( address encode the #(v$ address o% the host. + /Fnet has an e5!erimental .AT)$7&atewa, at #( address 2001:610:2001::6101). J, usin& this address as a '.+ resolver 8either in the '-C(v)0 /.'++ con%i&uration or manuall, s!eci%ied9 the .AT)$ &atewa, will be used %or tar&ets that do not su!!ort #(v). Jelow an e5am!le o% two tar&et hosts is shown. #n the case o% www.surfdiensten.nl there is no AAAA record available and one is added b, the '.+)$ server. #n the case o% www.surfnet.nl there alread, is a AAAA record so it is not modi%ied b, the '.+)$ server.
$ host www.surfdiensten.nl www.surfdiensten.nl as address 194.1!1.5".6 $ host www.surfdiensten.nl 2001:610:2001::610 #sin$ domain ser%er: &ame: 2001:610:2001::610 'ddress: 2001:610:2001::610(5" 'liases: www.surfdiensten.nl www.surfdiensten.nl as address 194.1!1.5".6 as )*%6 address 2001:610:2001:610::c2a+:"506

$ host www.surfnet.nl www.surfnet.nl as address 194.1!1.26.20" www.surfnet.nl as )*%6 address 2001:610:1:80e1:194:1!1:26:20" $ host www.surfnet.nl 2001:610:2001::610 #sin$ domain ser%er: &ame: 2001:610:2001::610 'ddress: 2001:610:2001::610(5" 'liases: www.surfnet.nl www.surfnet.nl as address 194.1!1.26.20" as )*%6 address 2001:610:1:80e1:194:1!1:26:20"

1* As intermediate solution +"AAC could be used %or #(v) address con%i&uration and '-C( %or the 8#(v$9 '.+ resolvers. +,stems then will be able to communicate with #(v) hosts0 but it cannot be considered %ull, dual stack. 1) This e5!erimental .AT)$ &atewa, is onl, accessible %rom the + /Fnet network.

2/10

The .AT)$ &atewa, will take care o% translatin& between #(v) and #(v$. An im!lementation is available %or "inu5 and D!enJ+' and can be %ound in the Gcd,sis !roKect 12. #t should be noted that a .AT)$ &atewa, has !roblems with some so%tware0 in !articular so%tware that !asses #(v$ addresses as data inside the !a,load o% the #( !ackets. +ome e5am!les o% this are (2( so%tware0 +#( tele!hon,0 +k,!e and online &ames. An #GTF document about #(v) onl, e5!eriences has some more in%ormation on this 13.

&ec"rin# IPv6 Networks

Lust like with #(v$ networks0 on #(v) networks there can be both local attacks 8b, local users9 or remote 8!erimeter9 attacks. #n this section onl, local networks are considered as the situation %or securin& the !erimeter is similar to that o% #(v$ networks and out o% the sco!e in this document. Common attacks on #(v$ "A. networks are A/( cache !oisonin& attacks and ro&ue '-C( servers. For #(v) the situation is somewhat more com!le5.

11

Nei#4bor Discovery

#n #(v) networks A/( is re!laced b, nei&hbor discover, 8.'9. There are di%%erent kinds o% .' !ackets0 %or e5am!le: router advertisements 8/A9 and du!licate address detection 8'A'9. =hile desi&nin& #(v) the insecure "A. was not considered0 no attacks were e5!ected on the local >trusted? network. +ee %or more in%ormation section 11 >+ecurit, Considerations> o% /FC $3)1 and also /FC 32*) >#(v) .ei&hbor 'iscover, 8.'9 Trust @odels and Threats>. The most im!ortant attack is !robabl, a @#T@ attack 14 to redirect tra%%ic. This can be done usin& ro&ue router advertisements as described in >#(v) /outer Advertisement Fuard? 20 and >/o&ue #(v) /outer Advertisement (roblem +tatement? 21. The conclusion and solution accordin& to this /FC: >=hile a number o% the miti&ations described above have their a!!eal0 the sim!lest solutions !robabl, lie in switch7based AC"s and /A7Fuard st,le a!!roaches. =here mana&ed switches are not available0 use o% the /outer (re%erence o!tion and 8more so in mana&ed deskto! environments9 host %irewalls ma, be a!!ro!riate. #n the lon&er term wider e5!erience o% +e.' will be bene%icial0 while the use o% /A snoo!in& will remain use%ul either to com!lement +e.' 8where a switch runnin& /A Fuard can !otentiall, be a +e.' !ro5,9 or to assist in scenarios %or which +e.' is not de!lo,ed.? +e.' is documented in /FC 3421. #t used !ublic ke, cr,!to&ra!h, to secure .' and a (K# %or router discover,. n%ortunatel, there are no workin& im!lementation available that can be de!lo,ed ri&ht now0 however0 Cisco does have an im!lementation %or their e;ui!ment. The Cr,!to&ra!hicall, Fenerated Address 8CFA9 o% +e.'0 documented in /FC 34220 works as %ollows: ever, station &enerates a !ublic/!rivate ke, and uses this to &enerate an #( address in a 8!ublished9 network !re%i5 usin& 8secure9 hashin&. Thus it will be im!ossible to choose ,our own #( address0 avoidin& takin& 8over9 an #( address %or which the matchin& !rivate ke, is not available. To veri%, /As the advertisements would have to be si&ned b, some trusted (K# root. (ossibl, this can be combined with /(K# router certi%ication 22 8(K# %or JF(9 or '.++GC. Tools to e5!eriment with %or instance nei&hbor discover, and ro&ue router advertisements
12 +ee htt!://ecd,sis.via&enie.ca/. 13 +ee htt!://tools.iet%.or&/html/dra%t7arkko7i!v)7onl,7e5!erience700. 14 @an7#n7The7@iddle attack: in this attack tra%%ic is 8tem!orar,9 redirected throu&h a machine controlled b, an attacker to snoo!0 modi%, or block tra%%ic without the user noticin& this. 20 +ee htt!://datatracker.iet%.or&/doc/dra%t7iet%7v)o!s7ra7&uard/. 21 +ee htt!://datatracker.iet%.or&/doc/dra%t7iet%7v)o!s7ro&ue7ra/. 22 +ee htt!://www.ri!e.net/certi%ication/.

3/10

can be %ound in the T-C7#(C)7ATTACK7TDD"K#T23. To monitor .' the tools .'(@on 2$ and +"AACer2* are available. #t will monitor 8and o!tionall, lo&9 all 8multicast9 .' messa&es on the network and can be used to re!ort on sus!icious activit,.

12

D'CPv6

#n both #(v$ and #(v) networks '-C(8v)9 works usin& '(. #n the case o% #(v$ via broadcast0 in the case o% #(v) via multicast. For #(v$ this is documented in /FC 2131 and %or #(v) in /FC 331*. A !roblem o% '-C(8v)9 is that it is !ossible to create a ro&ue '-C(8v)9 server. Gver, s,stem on the same 8!h,sical9 "A. can do this. #% the ro&ue '-C( server res!ond be%ore the authoritative server res!onds this can result in a broken con%i&uration or !ossibl, @#T@ attacks. This can alread, ha!!en b, accident b, enablin& >#nternet Connection +harin&? on some o!eratin& s,stems. To solve this it is !ossible to block all '-C(8v)9 res!onses comin& %rom other hosts than the authoritative '-C( server in the "A.. This can be done on switches that su!!ort la,er73 %ilterin&. +ee %or e5am!le >#(v) First -o! +ecurit,M(rotectin& Iour #(v) Access .etwork? written b, Cisco2). For wireless networks0 direct communication between hosts should be disabled0 this can be done b, enablin& access point isolation. To detect ro&ue '-C(8v)9 servers i% blockin& them is not !ossible0 can be done %or '-C( wi the tool d c,-,ro+e22. #t should not be too di%%icult to create a tool like this %or '-C(v)0 but so %ar im!lementations are not known.

1%

&ervers an! 'osts

To secure end7user hosts and servers on the network #(v) should be considered as well. Firewalls should work %or both #(v$ and #(v). #n case this is %or&otten it mi&ht be !ossible the server and end7user hosts are secured a&ainst attacks via #(v$0 but o!en %or attacks usin& #(v). Dn "inu57s,stems i,6ta+les should be used as well as i,ta+les. Dn =indows7s,stems the de%ault %irewall will also block #(v) tra%%ic the same wa, it blocks #(v$ tra%%ic. -owever some third !art, =indows %irewall solutions either block all #(v) tra%%ic or Kust let it !ass throu&h un%iltered. The %irst can result in broken connections0 the second can result in 8more9 insecure s,stems as with #(v) one usuall, &ets a !ublic #( address.

I!entification of 4osts

#t is use%ul %or network administrators to be able to trace !roblems with hosts in the network. #n case a s,stem is in%ected with a virus or con%i&ured in a wron& wa, and >attacks? other s,stems on the #nternet. +ometimes it ma, even be necessar, to trace an attack to a certain user as the @AC address o% a network device can be mani!ulated and cannot be considered a uni;ue ma!!in& to a host or user.

51

IPv$

An a!!roach used in #(v$ networks is creatin& a white list o% network devices that are allowed to connect based on the @AC address o% said device. #n this case the user has to re&ister their devices at the hel! desk so the, can be linked to the owner so it is !ossible to %ind out who is
23 +ee htt!://%reeworld.thc.or&/thc7i!v)/ and the !resentation slides durin& Chaos Com!uter Club 22C3 con%erence at htt!://www.,outube.com/watch1vBc2h;2;$KNIw 820107127229. 2$ +ee htt!://.'(@on.source%or&e.net/. 2* +ee htt!://www.di&ri6.or&.uk/slaacer. 2) +ee htt!://www.cisco.com/en/ +/!rod/collateral/iosswrel/!s)*32/!s)**3/white!a!erHc117)0213*.html. 22 +ee htt!://www.net.!rinceton.edu/so%tware/dhc!H!robe/.

4/10

res!onsible %or the device i% !roblems occur. This t,!icall, onl, works i% the user uses a %i5ed !ort on the wired "A.. #% %or instance students take all kinds o% 8mobile9 devices to the universit, it will become ver, cumbersome to re&ister them all. #n case 302.1E is used on the 8wireless9 network0 linkin& a user to a device 8@AC address9 becomes much easier. Access !oints ca!able o% 302.1E will usuall, send the #( address 8and @AC address o% the device9 to the access !oint controller 8or /A'# + server9.

52

IPv6

Access !oint controllers we investi&ated0 that su!!ort 302.1E0 do not re&ister the #(v) address in the /A'# + lo& like the, do %or #(v$. This is because the, do not !er%orm '-C(v) rela,in& like in the #(v$ situation. D% course0 it will remain to be seen whether or not all networks de!lo,in& #(v) will actuall, also de!lo, '-C(v) as it is not strictl, necessar,0 so it is unknown how this will be solved in the %uture. -owever0 i% dual stack networks are created and a host &ets both an #(v$ and #(v) address it will be !ossible to use the link created %or #(v$ 8between @AC address and #(v$ address9 to use this knowled&e to determine the actual user o% an #(v) address b, anal,6in& the nei&hbor discover, messa&es over the network8s9. Tools that can do this are %or e5am!le .'(@on and +"AACer.

Concl"sion

To de!lo, >dual7stack? #(v) networks in an or&ani6ation and su!!ort as man, as !ossible !lat%orms it is necessar, to de!lo, both stateless address auto con%i&uration 8+"AAC9 and '-C(v). '-C(v) is then used onl, %or !assin& the '.+ resolvers to the hosts. Jelow a list o% o!eratin& s,stems and whether or not the, are >dual stack? ca!able. #% the column >'ual stack? sa,s >Ies? this means that the #nternet connection remains workin& even when the #(v$ connectivit, is com!letel, dro!!ed. #% it sa,s >.o? that means an #(v$ connection is still re;uired to be able to communicate with #(v) services. #n this table manual con%i&uration was not considered as that does not scale in or&ani6ations with lots o% hosts on the network.

,peratin# &ystem -ersion D"al stack @icroso%t =indows A!!le @ac D+ E A!!le iD+ Foo&le Android "inu5 8 buntu9 "inu5 8Fedora9 Cisco #D+ 2 10.).* $.2.1 2.2 10.0$.1 1$ 1*.5 3es .o 3es .o .o 3es 3es

/i&ht now0 the + /Fnet o%%ice network is a real dual stack network. #% at some !oint it is decided to com!lete disable #(v$ on the "A.0 the dual stack o!eratin& s,stems as shown in the table able will kee! workin&. The list will be more !ositive in the near %uture0 e5ce!t in the case o% Android where no 8short term9 !lan is known %or im!rovin& #(v) su!!ort.

10/10

You might also like