SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Downloaden Sie, um offline zu lesen
RĂŒdiger Rissmann – Research Staff Member and Senior Architect
05 Nov 2012




IPv6 Migration Technologies
IBM Research - Zurich




                                                                © 2009 IBM Corporation
IBM Presentation Template Full Version


Agenda



■   Overview
■   Dual Stack
■   Tunnels
■   Translations




2                                        © 2012 IBM Corporation
IPv4-to-IPv6 Transition Phases




3                                © 2012 IBM Corporation
IPv4/6 Migration Mechanisms




4                             © 2012 IBM Corporation
Dual Stack
Use whenever possible
    IPv4 and IPv6 in parallel.




5                                © 2012 IBM Corporation
Tunnels technologies



    ■   6in4
    ■   6rd
    ■   ISATAP
    ■   Teredo
    ■   4in6
    ■   6over4
    ■   6to4
    ■   GRE
    ■   MAP




6                      © 2012 IBM Corporation
6in4


Tunnel IPv6 over IPv4 in the network infrastructure.
Tunnel endpoints statically configured.




7                                                      © 2012 IBM Corporation
6rd
One way for providers to deploy IPv6 without reconfiguring their whole network.
Customer IPv4 address mapped to IPv6 address.




8                                                                                 © 2012 IBM Corporation
ISATAP


    Very fast and easy way to connect to the IPv6 network.
    Requires support from the client operating system.




9                                                            © 2012 IBM Corporation
Teredo


Designed to connect through IPv4 NAT firewalls. Basically establishes
a tunnel through the firewall to the internet.




10                                                                      © 2012 IBM Corporation
Translation technologies



■    CGN/LSN/Nat444 – to extend IPv4 address space
■    DS-lite
■    Nat64/DNS64
■    Nat46/DNS46
■    Transport Relay Translation (TRT)
■    Stateless IP/ICMP Translation (SIIT)




11                                                   © 2012 IBM Corporation
CGN/LSN/NAT444
In this use case not related to IPv6

 Extends IPv4 address space of providers. Not possible to connect from
 the internet to customer network anymore.




12                                                                       © 2012 IBM Corporation
DS-Lite

Extends IPv4 address space of providers. Not possible to connect from
the internet to customer network anymore.




13                                                                      © 2012 IBM Corporation
NAT64/DNS64

 To connect from IPv6 to IPv4.
 Some gateways also do NAT46 to enable connections from IPv4 to IPv6.




14                                                                      © 2012 IBM Corporation

Weitere Àhnliche Inhalte

Andere mochten auch

Andere mochten auch (6)

IPv6 Security und Hacking
IPv6 Security und HackingIPv6 Security und Hacking
IPv6 Security und Hacking
 
Ô”ŐŸÖ€ŐĄŐŽŐ«ŐžÖ‚Ő©Ő”ŐžÖ‚Ő¶
Ô”ŐŸÖ€ŐĄŐŽŐ«ŐžÖ‚Ő©Ő”ŐžÖ‚Ő¶Ô”ŐŸÖ€ŐĄŐŽŐ«ŐžÖ‚Ő©Ő”ŐžÖ‚Ő¶
Ô”ŐŸÖ€ŐĄŐŽŐ«ŐžÖ‚Ő©Ő”ŐžÖ‚Ő¶
 
Intro Swiss IPv6 Council Event, 24. MĂ€rz 2014
Intro Swiss IPv6 Council Event, 24. MĂ€rz 2014Intro Swiss IPv6 Council Event, 24. MĂ€rz 2014
Intro Swiss IPv6 Council Event, 24. MĂ€rz 2014
 
IPv6 Adressvergabe und Adressierung
IPv6 Adressvergabe und AdressierungIPv6 Adressvergabe und Adressierung
IPv6 Adressvergabe und Adressierung
 
LISP Update
LISP UpdateLISP Update
LISP Update
 
Multimedia
MultimediaMultimedia
Multimedia
 

Mehr von Swiss IPv6 Council

Members geneva dos and donts of transition silvia hagen
Members geneva   dos and donts of transition silvia hagen Members geneva   dos and donts of transition silvia hagen
Members geneva dos and donts of transition silvia hagen
Swiss IPv6 Council
 

Mehr von Swiss IPv6 Council (14)

IPv6 Integration im Datacenter - wie komplex ist es wirklich?
IPv6 Integration im Datacenter - wie komplex ist es wirklich?IPv6 Integration im Datacenter - wie komplex ist es wirklich?
IPv6 Integration im Datacenter - wie komplex ist es wirklich?
 
Swisscom: Testing von IPv6 Security Devices
Swisscom: Testing von IPv6 Security DevicesSwisscom: Testing von IPv6 Security Devices
Swisscom: Testing von IPv6 Security Devices
 
Dual-Stack IPv6 Monitoring bei AWK - Member Anlass Swiss IPv6 Council Nov 2013
Dual-Stack IPv6 Monitoring bei AWK - Member Anlass Swiss IPv6 Council Nov 2013Dual-Stack IPv6 Monitoring bei AWK - Member Anlass Swiss IPv6 Council Nov 2013
Dual-Stack IPv6 Monitoring bei AWK - Member Anlass Swiss IPv6 Council Nov 2013
 
IPv6 bei PostFinance AG - Erste Erkenntnisse aus der Vorstudie
IPv6 bei PostFinance AG - Erste Erkenntnisse aus der VorstudieIPv6 bei PostFinance AG - Erste Erkenntnisse aus der Vorstudie
IPv6 bei PostFinance AG - Erste Erkenntnisse aus der Vorstudie
 
IPv6 bei der Post - Step by Step zu IPv6
IPv6 bei der Post - Step by Step zu IPv6IPv6 bei der Post - Step by Step zu IPv6
IPv6 bei der Post - Step by Step zu IPv6
 
SIG IPv6 Provider "IPv6 Ready"
SIG IPv6 Provider "IPv6 Ready"SIG IPv6 Provider "IPv6 Ready"
SIG IPv6 Provider "IPv6 Ready"
 
Dos And Donts Of IPv6 Transition
Dos And Donts Of IPv6 TransitionDos And Donts Of IPv6 Transition
Dos And Donts Of IPv6 Transition
 
Members geneva dos and donts of transition silvia hagen
Members geneva   dos and donts of transition silvia hagen Members geneva   dos and donts of transition silvia hagen
Members geneva dos and donts of transition silvia hagen
 
IPv6 Security - Myths and Reality
IPv6 Security - Myths and RealityIPv6 Security - Myths and Reality
IPv6 Security - Myths and Reality
 
IPv6 Adoption --- Acceleration
IPv6 Adoption --- AccelerationIPv6 Adoption --- Acceleration
IPv6 Adoption --- Acceleration
 
IPv6 Transition
IPv6 TransitionIPv6 Transition
IPv6 Transition
 
Der Einsatz von Lisp fĂŒr die IPv6 Migration
Der Einsatz von Lisp fĂŒr die IPv6 MigrationDer Einsatz von Lisp fĂŒr die IPv6 Migration
Der Einsatz von Lisp fĂŒr die IPv6 Migration
 
IPv6 at CSCS
IPv6 at CSCSIPv6 at CSCS
IPv6 at CSCS
 
IPv6 strategy for deployment at ETH Switzerland
IPv6 strategy for deployment at ETH SwitzerlandIPv6 strategy for deployment at ETH Switzerland
IPv6 strategy for deployment at ETH Switzerland
 

KĂŒrzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

KĂŒrzlich hochgeladen (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

2012 11-05-council-ipv6 migration-technologies

  • 1. RĂŒdiger Rissmann – Research Staff Member and Senior Architect 05 Nov 2012 IPv6 Migration Technologies IBM Research - Zurich © 2009 IBM Corporation
  • 2. IBM Presentation Template Full Version Agenda ■ Overview ■ Dual Stack ■ Tunnels ■ Translations 2 © 2012 IBM Corporation
  • 3. IPv4-to-IPv6 Transition Phases 3 © 2012 IBM Corporation
  • 4. IPv4/6 Migration Mechanisms 4 © 2012 IBM Corporation
  • 5. Dual Stack Use whenever possible IPv4 and IPv6 in parallel. 5 © 2012 IBM Corporation
  • 6. Tunnels technologies ■ 6in4 ■ 6rd ■ ISATAP ■ Teredo ■ 4in6 ■ 6over4 ■ 6to4 ■ GRE ■ MAP 6 © 2012 IBM Corporation
  • 7. 6in4 Tunnel IPv6 over IPv4 in the network infrastructure. Tunnel endpoints statically configured. 7 © 2012 IBM Corporation
  • 8. 6rd One way for providers to deploy IPv6 without reconfiguring their whole network. Customer IPv4 address mapped to IPv6 address. 8 © 2012 IBM Corporation
  • 9. ISATAP Very fast and easy way to connect to the IPv6 network. Requires support from the client operating system. 9 © 2012 IBM Corporation
  • 10. Teredo Designed to connect through IPv4 NAT firewalls. Basically establishes a tunnel through the firewall to the internet. 10 © 2012 IBM Corporation
  • 11. Translation technologies ■ CGN/LSN/Nat444 – to extend IPv4 address space ■ DS-lite ■ Nat64/DNS64 ■ Nat46/DNS46 ■ Transport Relay Translation (TRT) ■ Stateless IP/ICMP Translation (SIIT) 11 © 2012 IBM Corporation
  • 12. CGN/LSN/NAT444 In this use case not related to IPv6 Extends IPv4 address space of providers. Not possible to connect from the internet to customer network anymore. 12 © 2012 IBM Corporation
  • 13. DS-Lite Extends IPv4 address space of providers. Not possible to connect from the internet to customer network anymore. 13 © 2012 IBM Corporation
  • 14. NAT64/DNS64 To connect from IPv6 to IPv4. Some gateways also do NAT46 to enable connections from IPv4 to IPv6. 14 © 2012 IBM Corporation