Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010093264 | TK5105.585 B52 2006 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
Understand IPv6, the protocol essential to future Internet growth.
Exhaustion of address space and global routing table growth necessitate important revisions to the current version of the Internet Protocol, IPv4. IP version 6 offers greater address space and additional features to support the evolving requirements of Internet applications. Deployed alongside current IPv4 networks, IPv6 will restore the full-fledge network necessary for Internet growth.
Migrating to IPv6 gives a comprehensive overview of IPv6 and related protocols, the layers below IPv6 to the application and end-user layers. Author Marc Blanchet offers a direct and clear route to understanding the topic, taking a top-down approach and ordering topics by relevance. Tried and tested practical techniques and advice on implementation, applications and deployment provide 'how-to' information on everything you need to know to put the technology to work.
Migrating to IPv6:
Provides a complete, up-to-date, in-depth, and accessible practical guide to IPv6. Demonstrates the theory with practical and generic examples and major implementation configurations, such as Windows, FreeBSD, Linux, Solaris, Cisco, Juniper and Hexago. Provides a comprehensive reference to key data structures and packet formats. Summarizes topics in table and graphical form to give fast access to information, including over 200 figures. Offers an accompanying website with extra coverage of specific topics, information on additional protocols and specifications, and updates on new features.This text will give network engineers, managers and operators, software engineers and IT professionals and analysts a thorough understanding of IPv6.
Author Notes
Marc Blanchet is CTO at Hexago. Hexago sells an IPv6 deployment product which implements the TSP tunnel broker. Hexago is a spin-off of Viagénie, known for the 6tap exchange point, normos, freenet6, the Tunnel Setup Protocol and other IPv6 initiatives, all of which Marc was architect and co-implementor of. In his previous job at Viagénie, he was a network security consultant for enterprises, governments and providers. Marc co-founded the IPv6Forum, and is a member of the board and technical directorate. He is also director and member of the steering committee of the North American IPv6 task force. Marc was co-chair of the internationalized domain names (idn) IETF working group and co-chair of the IPv6 exchanges ad hoc working group. He has written several IETF drafts and RFC in both the IPv6(RFC3531) and idn (RFC3454, RFC3491) fields. Since 1999, he has been giving IPv6 tutorials at conferences such as Networld-Interop, INET, IPv6Forum, 3G, Security and to organizations, taught to many thousands of people, and he also co-authored the Cisco IPv6 course.
Marc received a master's degree in electrical engineering from Laval University.
Marc, as author, can be reached at author@ipv6book.ca
Table of Contents
Foreword | p. xxiii |
Preface | p. xxvii |
1 IPv6 Rationale and Features | p. 1 |
1.1 Internet Growth | p. 1 |
1.1.1 IPv4 Addressing | p. 1 |
1.1.2 IPv4 Address Space Utilization | p. 3 |
1.1.3 Network Address Translation | p. 5 |
1.1.4 HTTP Version 1.1 Virtual Hosting | p. 7 |
1.1.5 Variable Length Subnet Mask | p. 7 |
1.1.6 Classless IPv4 | p. 8 |
1.1.7 Provider-based Assignment and Aggregation of IPv4 Network Prefixes | p. 8 |
1.1.8 Constrained Allocation Policy of IPv4 Addresses | p. 9 |
1.1.9 Global Routing | p. 9 |
1.1.10 Summary of Internet Growth | p. 9 |
1.2 Real Issues and Trouble with IPv4 | p. 10 |
1.2.1 Deploying Voice over IP | p. 10 |
1.2.2 Deploying IP Security | p. 13 |
1.2.3 Deploying Application Security | p. 13 |
1.2.4 Videoconferencing | p. 14 |
1.2.5 A Simple Web Server at Home | p. 15 |
1.2.6 Using Remote Procedure Calls | p. 15 |
1.2.7 Remote Management of Applications and Servers | p. 16 |
1.2.8 VPN Between Same Address Space | p. 16 |
1.2.9 Deploying Services in the Home Network | p. 17 |
1.2.10 Merging or Connecting Two Networks Together | p. 18 |
1.2.11 Large Networks | p. 18 |
1.2.12 Address Plans and Secondary Addresses | p. 18 |
1.2.13 Provider VPN Address Collisions | p. 19 |
1.2.14 Should IP Addresses be Free? | p. 20 |
1.2.15 Summary | p. 20 |
1.3 Architectural Considerations | p. 20 |
1.3.1 Network Address Translator Variations | p. 25 |
1.4 Paradigm Shift | p. 26 |
1.5 IETF Work Towards IPv6 | p. 27 |
1.6 IPv6 Main Features | p. 30 |
1.7 IPv6 Milestones | p. 32 |
1.8 IPv6 Return on Investment | p. 32 |
1.9 What Happened to IPv5? | p. 33 |
1.10 Summary | p. 34 |
1.11 References | p. 34 |
2 I Can't Wait to Get my Hands Dirty! | p. 37 |
2.1 Setup Description | p. 37 |
2.2 Steps | p. 38 |
2.2.1 Enabling IPv6 on N2 and N3 | p. 38 |
2.2.2 Two Nodes Talking Already! | p. 40 |
2.2.3 Installing and Configuring the TSP Client on N2 | p. 40 |
2.2.4 Creating an IPv6 in IPv4 Tunnel with Freenet6 | p. 41 |
2.2.5 Testing IPv6 on N2 | p. 41 |
2.2.6 Requesting an IPv6 Prefix Delegation | p. 41 |
2.3 Summary | p. 42 |
2.4 References | p. 42 |
2.5 Further Reading | p. 42 |
3 IPv6 Datagram | p. 43 |
3.1 Description of the IP Datagram | p. 43 |
3.2 IPv4 Header | p. 44 |
3.3 IPv6 Header | p. 46 |
3.4 Header Fields | p. 47 |
3.4.1 Version | p. 47 |
3.4.2 Traffic Class | p. 48 |
3.4.3 Flow Label | p. 49 |
3.4.4 Payload Length | p. 49 |
3.4.5 Hop Limit | p. 49 |
3.4.6 Next Header | p. 49 |
3.5 Extension Headers | p. 50 |
3.5.1 Hop-by-Hop Option | p. 51 |
3.5.2 Routing | p. 52 |
3.5.3 Fragment | p. 52 |
3.5.4 Destination Options | p. 52 |
3.5.5 Authentication and Encapsulating Security Payload | p. 52 |
3.5.6 No Next Header | p. 52 |
3.5.7 Order of the Extension Headers | p. 53 |
3.6 Datagram Size | p. 53 |
3.6.1 Maximum Transmission Unit | p. 54 |
3.6.2 Path MTU Discovery | p. 54 |
3.6.3 Fragmentation | p. 55 |
3.6.4 Jumbogram | p. 56 |
3.6.5 Header Compression | p. 57 |
3.7 Upper-layer Protocols | p. 58 |
3.7.1 Checksum | p. 58 |
3.7.2 Implications in Application Protocols | p. 59 |
3.8 Summary | p. 59 |
3.9 References | p. 59 |
4 Addressing | p. 61 |
4.1 Address Space | p. 61 |
4.2 Format of an Address | p. 62 |
4.2.1 Text Representation of Addresses | p. 62 |
4.2.2 Text Representation of Prefixes | p. 63 |
4.2.3 Addresses in URL | p. 63 |
4.3 Unicast Addresses | p. 64 |
4.3.1 Global Unicast Addresses | p. 64 |
4.3.2 Scoped Addresses | p. 66 |
4.3.3 Protocol Use Addresses | p. 69 |
4.3.4 Unspecified Address | p. 70 |
4.3.5 Loopback Address | p. 71 |
4.4 Multicast Addressing | p. 71 |
4.5 Anycast | p. 74 |
4.6 Addressing Architecture | p. 74 |
4.7 Summary | p. 76 |
4.8 References | p. 77 |
4.9 Further Reading | p. 77 |
5 Configuring Node Addresses | p. 79 |
5.1 Static Address Configuration | p. 79 |
5.2 Address Auto-Configuration | p. 79 |
5.2.1 Interface Identifier | p. 80 |
5.2.2 Router Advertisements and Solicitations | p. 81 |
5.3 Lifetime of Advertised Prefixes | p. 84 |
5.4 Node Booting Process | p. 87 |
5.5 DHCPv6 | p. 88 |
5.5.1 Basic Behavior | p. 88 |
5.5.2 Initial Exchange | p. 89 |
5.5.3 Data Exchange | p. 90 |
5.5.4 DHCPv6 Prefix Delegation | p. 92 |
5.5.5 Differences Between DHCPv4 and DHCPv6 | p. 92 |
5.5.6 Dual Stack DHCP Clients | p. 93 |
5.5.7 Renumbering with DHCP | p. 93 |
5.6 Node Addresses | p. 93 |
5.7 Configuring Interfaces and Router Advertisements on Hosts and Routers | p. 93 |
5.7.1 Network Example | p. 94 |
5.7.2 FreeBSD | p. 94 |
5.7.3 Linux | p. 96 |
5.7.4 Solaris | p. 98 |
5.7.5 Windows | p. 99 |
5.7.6 Cisco | p. 101 |
5.7.7 Hexago | p. 104 |
5.7.8 Juniper | p. 105 |
5.7.9 Debugging Autoconfiguration and Router Advertisements | p. 107 |
5.8 Summary | p. 107 |
5.9 Appendix | p. 108 |
5.9.1 Router Advertisement and Solicitation Message Formats | p. 108 |
5.9.2 DHCP Variables, Addresses and Ports | p. 109 |
5.10 References | p. 111 |
6 Link-layer Integration | p. 113 |
6.1 Solicited-Node Multicast Address | p. 113 |
6.2 Neighbor Solicitation and Advertisement | p. 115 |
6.2.1 IPv4 Address Resolution Protocol | p. 115 |
6.2.2 IPv6 Differences | p. 115 |
6.2.3 Neighbor Solicitation Process | p. 116 |
6.3 Duplicate Address Detection | p. 117 |
6.4 Neighbor Cache | p. 117 |
6.4.1 Neighbor Unreachability Detection | p. 118 |
6.5 EUI-64 and Neighbor Discovery | p. 118 |
6.6 IPv6 over Ethernet | p. 119 |
6.6.1 Frame Identifier | p. 119 |
6.6.2 Multicast | p. 119 |
6.6.3 Ethernet MTU | p. 121 |
6.7 Point-to-Point Links | p. 122 |
6.8 Multi-link Subnets | p. 124 |
6.9 Router Advertisements of the Link MTU | p. 125 |
6.10 Managing Neighbors on Hosts and Routers | p. 125 |
6.10.1 FreeBSD | p. 126 |
6.10.2 Linux | p. 126 |
6.10.3 Solaris | p. 127 |
6.10.4 Windows | p. 128 |
6.10.5 Cisco | p. 128 |
6.10.6 Hexago | p. 129 |
6.10.7 Juniper | p. 129 |
6.11 Summary | p. 129 |
6.12 References | p. 129 |
6.13 Further Reading | p. 130 |
7 Internet Control Message Protocol | p. 131 |
7.1 ICMP | p. 131 |
7.1.1 Error Messages | p. 132 |
7.1.2 Informational Messages | p. 135 |
7.2 Neighbor Discovery | p. 136 |
7.3 Hop Limit Set to 255 | p. 136 |
7.4 Managing ICMP on Hosts and Routers | p. 136 |
7.4.1 FreeBSD | p. 136 |
7.4.2 Linux | p. 137 |
7.4.3 Solaris | p. 137 |
7.4.4 Windows | p. 137 |
7.4.5 Cisco | p. 137 |
7.4.6 Hexago | p. 138 |
7.4.7 Juniper | p. 138 |
7.5 Summary | p. 138 |
7.6 References | p. 13 |
8 Naming with DNS and Selecting an Address | p. 139 |
8.1 Hostname To IPv6 Address with the AAAA Record | p. 139 |
8.2 IPv6 Address To Hostname | p. 140 |
8.3 Transport | p. 141 |
8.4 DNS Server Discovery | p. 143 |
8.5 Node Information Query | p. 143 |
8.6 IP Address Selection | p. 143 |
8.7 Cofiguring DNS and Address Selection on Hosts and Routers | p. 144 |
8.7.1 Configuring a Unix Client | p. 144 |
8.7.2 Configuring BIND | p. 144 |
8.7.3 Troubleshooting with Dig | p. 146 |
8.7.4 FreeBSD | p. 146 |
8.7.5 Linux | p. 146 |
8.7.6 Solaris | p. 146 |
8.7.7 Windows | p. 146 |
8.7.8 Cisco | p. 147 |
8.7.9 Hexago | p. 147 |
8.7.10 Juniper | p. 148 |
8.8 Summary | p. 148 |
8.9 References | p. 148 |
8.10 Further Reading | p. 149 |
9 Routing | p. 151 |
9.1 Required Router Addresses | p. 151 |
9.2 Source Routing with the Routing Header | p. 151 |
9.3 Route Redirect | p. 154 |
9.4 Static Routes | p. 155 |
9.5 RIP | p. 155 |
9.5.1 Changes | p. 156 |
9.6 OSPF | p. 157 |
9.6.1 Changes | p. 157 |
9.6.2 Router ID | p. 157 |
9.6.3 Link-State Database | p. 157 |
9.7 IS-IS | p. 158 |
9.7.1 Changes | p. 158 |
9.7.2 Multi-topology | p. 159 |
9.8 BGP | p. 159 |
9.8.1 Changes | p. 159 |
9.8.2 Router ID | p. 160 |
9.8.3 Link-local Addresses for Peering | p. 160 |
9.8.4 Site Scoped Prefixes in Routes | p. 160 |
9.9 Tunneling IPv6 | p. 160 |
9.10 Renumbering Routers | p. 162 |
9.11 Internet Routing | p. 163 |
9.12 Multihoming | p. 166 |
9.12.1 Provider Independent Address Space | p. 166 |
9.12.2 Multiple Prefixes | p. 167 |
9.12.3 Cross-tunnels at Site Exit Routers | p. 168 |
9.12.4 Propagation using Router Renumbering and Advertisements | p. 168 |
9.12.5 Multihoming Work Progress | p. 170 |
9.13 Summary | p. 171 |
9.14 References | p. 171 |
10 Configuring Routing | p. 173 |
10.1 Considerations on Using Autoconfiguration for Router Interfaces | p. 173 |
10.2 FreeBSD | p. 174 |
10.2.1 Forwarding | p. 174 |
10.2.2 Static Routes | p. 174 |
10.2.3 Route Redirect | p. 175 |
10.2.4 RIP | p. 175 |
10.2.5 Troubleshooting | p. 176 |
10.3 Linux | p. 176 |
10.3.1 Forwarding | p. 176 |
10.3.2 Static Routes | p. 176 |
10.3.3 Route Redirect | p. 177 |
10.3.4 Troubleshooting | p. 177 |
10.4 Solaris | p. 177 |
10.4.1 Static Routes | p. 177 |
10.4.2 Troubleshooting | p. 177 |
10.5 Window | p. 178 |
10.5.1 Forwarding | p. 178 |
10.5.2 Static Routes | p. 178 |
10.5.3 Troubleshooting | p. 178 |
10.6 Cisco | p. 179 |
10.6.1 IPv6 Forwarding | p. 179 |
10.6.2 Cisco Express Forwarding | p. 179 |
10.6.3 Prefix Lists | p. 180 |
10.6.4 Static Routes | p. 180 |
10.6.5 Route Redirect | p. 180 |
10.6.6 RIP | p. 180 |
10.6.7 OSPF | p. 181 |
10.6.8 IS-IS | p. 182 |
10.6.9 BGP | p. 183 |
10.6.10 Troubleshooting | p. 184 |
10.7 Hexago | p. 184 |
10.8 Juniper | p. 184 |
10.8.1 Martian Routes | p. 185 |
10.8.2 Router ID | p. 185 |
10.8.3 Static Routes | p. 185 |
10.8.4 RIP | p. 186 |
10.8.5 OSPF | p. 186 |
10.8.6 IS-IS | p. 187 |
10.8.7 BGP | p. 188 |
10.8.8 Troubleshooting | p. 190 |
10.9 Zebra | p. 190 |
10.9.1 Static Routes | p. 191 |
10.9.2 RIP | p. 191 |
10.9.3 OSPF | p. 191 |
10.9.4 BGP | p. 192 |
10.9.5 Troubleshooting | p. 193 |
10.10 Summary | p. 193 |
10.11 Further Reading | p. 193 |
11 Mobility | p. 195 |
11.1 Overview | p. 196 |
11.1.1 MobileIP Terminology | p. 197 |
11.1.2 Basic MobileIP Process | p. 197 |
11.1.3 Triangle Routing | p. 198 |
11.1.4 Route Optimization | p. 200 |
11.1.5 Handoff | p. 200 |
11.2 MobileIP | p. 202 |
11.3 Applications are not Aware of Mobility | p. 202 |
11.4 Mobile Node is at Home | p. 202 |
11.5 Mobile Node is away from Home | p. 203 |
11.5.1 Mobile Node Registering to the Home Agent | p. 204 |
11.5.2 Mobile Node Registering to the Correspondent Nodes | p. 204 |
11.5.3 Mobile Node Sending Packets | p. 204 |
11.5.4 Correspondent Node Sending Packets to the Mobile Node | p. 205 |
11.6 Mobile Node is Moving Again | p. 206 |
11.7 Mobile Node Comes Back Home | p. 207 |
11.8 Securing the Binding Update | p. 207 |
11.8.1 Security Association with Home Agent | p. 207 |
11.8.2 Return Routability Procedure with Correspondent Nodes | p. 207 |
11.9 Correspondent Node is Not MobileIP Aware | p. 209 |
11.9.1 Mobile Node Registering to the Correspondent Node | p. 210 |
11.9.2 Mobile Node Sending Packets | p. 210 |
11.9.3 Correspondent Node Sending Packets to the Mobile Node | p. 211 |
11.10 Advanced Features | p. 212 |
11.10.1 Fast Handoff | p. 212 |
11.10.2 Home Agent is Not Reachable | p. 213 |
11.10.3 Mobile Networks | p. 214 |
11.11 MobileIP Messaging | p. 215 |
11.11.1 Mobility Extension Header | p. 215 |
11.11.2 Home Address Destination Option Extension Header | p. 215 |
11.11.3 Type 2 Routing Header | p. 215 |
11.11.4 ICMP Messages | p. 215 |
11.11.5 Neighbor Discovery | p. 217 |
11.12 Deployment Considerations | p. 218 |
11.12.1 Enterprise Network with Mobile Nodes on Most Links | p. 218 |
11.12.2 Security Considerations | p. 219 |
11.12.3 IP Version Centric | p. 219 |
11.12.4 Ubiquitous IP | p. 219 |
11.13 Configuring Mobility | p. 219 |
11.13.1 FreeBSD | p. 219 |
11.13.2 Linux | p. 221 |
11.13.3 Solaris | p. 222 |
11.13.4 Windows | p. 222 |
11.13.5 Hexago | p. 222 |
11.14 Summary | p. 223 |
11.15 References | p. 223 |
12 Wireless IP | p. 225 |
12.1 Characteristics of Wireless Links | p. 225 |
12.2 Header Compression over Limited Bandwidth Link Layers | p. 226 |
12.3 TCP Behavior over Wireless | p. 228 |
12.4 3GPP | p. 229 |
12.5 3GPP2 | p. 231 |
12.6 Summary | p. 231 |
12.7 References | p. 231 |
12.8 Further Reading | p. 232 |
13 Security | p. 233 |
13.1 IP Security (IPsec) | p. 234 |
13.1.1 IPsec Transport and Tunnel Modes | p. 234 |
13.1.2 Establishing a Security Association | p. 235 |
13.1.3 AH Header | p. 235 |
13.1.4 ESP Header | p. 239 |
13.1.5 IPsec and IPv4 NAPT | p. 241 |
13.1.6 IPsec and IPv6 | p. 243 |
13.2 Secure Shell (SSH) | p. 243 |
13.3 Filtering and Firewalls | p. 244 |
13.3.1 ICMP Filtering | p. 244 |
13.3.2 MobileIPv6 | p. 244 |
13.3.3 Network Address/Port Translation | p. 244 |
13.4 Temporary Addresses | p. 244 |
13.5 More Secure Protocols | p. 245 |
13.6 Securing IPv6 on the Link | p. 245 |
13.6.1 Threats and Trust Models for IPv6 on the Link | p. 246 |
13.6.2 Secure Neighbor Discovery | p. 246 |
13.7 Is IPv6 More Secure? | p. 248 |
13.8 Configuring Security on Hosts and Routers | p. 248 |
13.8.1 FreeBSD | p. 248 |
13.8.2 Windows | p. 250 |
13.8.3 Cisco | p. 250 |
13.8.4 Juniper | p. 251 |
13.9 Summary | p. 253 |
13.10 References | p. 253 |
14 Quality of Service | p. 255 |
14.1 IPv5: Streaming Protocol | p. 255 |
14.2 Diffserv | p. 256 |
14.3 Integrated Services | p. 256 |
14.3.1 RSVP | p. 257 |
14.3.2 Flow Label | p. 259 |
14.4 Network Address Translation | p. 260 |
14.5 Hardware processing | p. 260 |
14.6 Configuring QoS on Hosts and Routers | p. 261 |
14.6.1 FreeBSD | p. 261 |
14.6.2 Linux | p. 262 |
14.6.3 Solaris | p. 262 |
14.6.4 Cisco | p. 262 |
14.7 Summary | p. 262 |
14.8 References | p. 262 |
15 Multicast and Anycast | p. 265 |
15.1 Multicast Basics | p. 265 |
15.2 Multicast Listener Discovery | p. 267 |
15.2.1 Node Joining a Multicast Group | p. 267 |
15.2.2 Node Leaving a Multicast Group | p. 268 |
15.2.3 Router Verifying Group Membership | p. 268 |
15.2.4 Electing a Router | p. 269 |
15.2.5 Multicast Listener Discovery Version 2 | p. 269 |
15.3 Multicast Routing | p. 270 |
15.4 Multicast Address Allocation | p. 270 |
15.5 Unicast-based Multicast Addressing | p. 271 |
15.6 Allocation of Multicast Addresses | p. 271 |
15.7 Multicast Reserved Addresses | p. 272 |
15.8 Anycast | p. 273 |
15.9 Configuring Anycast and Multicast on Hosts and Routers | p. 275 |
15.9.1 FreeBSD | p. 275 |
15.9.2 Linux | p. 275 |
15.9.3 Solaris | p. 275 |
15.10 Summary | p. 275 |
15.11 References | p. 275 |
16 Deploying IPv6 in IPv4 Dominant Networks | p. 277 |
16.1 Combined IPv4 and IPv6 Network | p. 277 |
16.2 Tunneling IPv6 in IPv4 | p. 278 |
16.2.1 Encapsulation | p. 278 |
16.2.2 Host to Router Encapsulation | p. 279 |
16.2.3 Router to Router Encapsulation | p. 280 |
16.2.4 Static Tunneling | p. 281 |
16.2.5 6to4 | p. 283 |
16.2.6 ISATAP | p. 290 |
16.2.7 IPv6 in IPv4 Tunneling Considerations | p. 294 |
16.2.8 Encapsulating IPv6 in UDP IPv4 | p. 300 |
16.2.9 Tunnel Setup Protocol (TSP) Tunnel Broker | p. 301 |
16.2.10 Teredo | p. 317 |
16.3 Tunneling IPv6 in GRE-IPv4 | p. 325 |
16.3.1 Requirements | p. 326 |
16.3.2 Limitations | p. 326 |
16.3.3 Applicability | p. 326 |
16.4 Comparing IPv6 in IPv4 Solutions | p. 326 |
16.5 Configuring IPv6 in IPv4 Dominant Networks | p. 326 |
16.5.1 Examples | p. 326 |
16.5.2 FreeBSD | p. 329 |
16.5.3 Linux | p. 330 |
16.5.4 Solaris | p. 331 |
16.5.5 Windows | p. 333 |
16.5.6 Cisco | p. 335 |
16.5.7 Hexago | p. 336 |
16.5.8 Juniper | p. 342 |
16.6 Summary | p. 343 |
16.7 References | p. 343 |
17 Deploying IPv6 Dominant Networks with IPv4 Support | p. 345 |
17.1 Tunneling IPv4 in IPv6 | p. 345 |
17.1.1 IPv4 in IPv6 Encapsulation | p. 345 |
17.1.2 IPv4 in IPv6 Static Tunnels | p. 345 |
17.1.3 DSTM with DHCPv6 | p. 347 |
17.1.4 TSP Tunnel Broker | p. 348 |
17.2 IP Packet and Transport Translation | p. 350 |
17.3 Configuring IPv4 in IPv6 Dominant Networks | p. 351 |
17.3.1 FreeBSD | p. 351 |
17.3.2 Solaris | p. 352 |
17.3.3 Cisco | p. 353 |
17.3.4 Hexago | p. 353 |
17.3.5 Juniper | p. 354 |
17.4 Summary | p. 355 |
17.5 References | p. 355 |
18 Migrating with Application Level Gateways | p. 357 |
18.1 Application Level Gateway | p. 357 |
18.2 Application Specific Proxy | p. 358 |
18.3 Considerations of Application Level Gateways | p. 358 |
18.4 Summary | p. 358 |
19 Transport Protocols | p. 359 |
19.1 Checksum | p. 359 |
19.2 Transmission Control Protocol (TCP) | p. 360 |
19.2.1 Explicit Congestion Notification (ECN) | p. 360 |
19.3 User Datagram Protocol (UDP) | p. 362 |
19.4 Internet Control Message Protocol (ICMP) | p. 363 |
19.5 Summary | p. 363 |
19.6 References | p. 363 |
20 Network Management | p. 365 |
20.1 SNMP Transport | p. 365 |
20.2 Management Information Base (MIB) | p. 366 |
20.3 Other Management Tools | p. 367 |
20.4 Authentication, Authorization and Accounting using RADIUS | p. 367 |
20.5 Configuring SNMP on Hosts and Routers | p. 368 |
20.5.1 Cisco | p. 368 |
20.5.2 Hexago | p. 368 |
20.5.3 Juniper | p. 368 |
20.6 Summary | p. 369 |
20.7 References | p. 369 |
21 Porting Applications | p. 371 |
21.1 Introduction | p. 371 |
21.2 Considerations | p. 371 |
21.2.1 IP Protocol Version Independence | p. 372 |
21.2.2 Multiple Addresses | p. 372 |
21.2.3 Scoped Addresses | p. 372 |
21.2.4 Address Memory Space | p. 372 |
21.2.5 URL and Text Representation of IP Addresses | p. 372 |
21.3 Structures | p. 373 |
21.3.1 Struct addrinfo | p. 373 |
21.3.2 Struct sockaddr_in6 | p. 374 |
21.3.3 Struct sockaddr_storage | p. 374 |
21.3.4 Definitions | p. 374 |
21.4 Functions | p. 375 |
21.4.1 Getaddrinfo | p. 375 |
21.4.2 Getnameinfo | p. 375 |
21.4.3 Macros | p. 376 |
21.5 Change Table | p. 376 |
21.6 Best Practice | p. 377 |
21.7 Basic Example | p. 377 |
21.8 Summary | p. 380 |
21.9 References | p. 380 |
21.10 Further Reading | p. 380 |
22 Configuration and Usage of IPv6-enabled Open Source Software | p. 381 |
22.1 Apache Web Server | p. 381 |
22.2 Sendmail | p. 382 |
22.3 Postfix | p. 382 |
22.4 SSH | p. 383 |
22.5 XFree86 | p. 383 |
22.6 MRTG | p. 383 |
22.7 Dovecot | p. 384 |
22.8 Summary | p. 384 |
22.9 References | p. 384 |
23 Best Current Practices and Case Studies | p. 385 |
23.1 IPv6 Internet Address Space | p. 385 |
23.2 IPv6 Address Policy | p. 385 |
23.3 IPv6 Address Planning | p. 387 |
23.3.1 Optimal Address Plans | p. 387 |
23.3.2 Numbering Links | p. 388 |
23.3.3 EUI-64 Considerations | p. 388 |
23.3.4 Use of Unique Local Address Space | p. 389 |
23.4 Incremental Deployment | p. 389 |
23.5 DNS Considerations | p. 390 |
23.5.1 Publishing the AAAA Record | p. 390 |
23.5.2 Publishing Special IPv6 Addresses | p. 390 |
23.5.3 TTL Use | p. 391 |
23.6 Routing Considerations | p. 391 |
23.6.1 Topologies | p. 391 |
23.6.2 Policies | p. 391 |
23.7 Security Considerations | p. 391 |
23.7.1 End-to-End-Model | p. 391 |
23.7.2 Policies | p. 392 |
23.7.3 Transition Mechanisms | p. 393 |
23.7.4 Special Addresses | p. 393 |
23.8 Mail Considerations | p. 393 |
23.9 Deploying IPv6 and Connecting to the IPv6 Internet | p. 393 |
23.9.1 Connecting a Single Node | p. 393 |
23.9.2 Connecting a Mobile Node | p. 394 |
23.9.3 Connecting a Home Network | p. 394 |
23.9.4 Connecting a Small Network | p. 394 |
23.9.5 Enterprise and Military Networks | p. 404 |
23.9.6 Provider Networks | p. 406 |
23.9.7 Mobile Networks | p. 406 |
23.9.8 IPv6-only Networks | p. 406 |
23.10 Summary | p. 407 |
23.11 References | p. 407 |
23.12 Further Reading | p. 407 |
24 Conclusion | p. 409 |
25 Quick Reference | p. 411 |
Index | p. 413 |