SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
Happiest People Happiest Customers
Network transitioning from
IPv4 to IPv6 Document
• Introduction.......................................................................................................................................3
• Scope
• Purpose
• Executive Summary
• Techniques used in the transition.....................................................................................................4
• Dual Stack
• Tunnelling
• Static Tunnels, Point to Point Mechanisms
• Automatic tunnels, Point to Multipoint Mechanisms
• 6to4 Tunnels
• Teredo tunnelling
• ISATAP Tunnels
• IPv6 translation
• Benefits of IPv6 transitioning............................................................................................................6
• Which technique to choose..............................................................................................................7
• Things to consider before transition.................................................................................................7
• Offerings...........................................................................................................................................7
• Summary..........................................................................................................................................8
Contents
© Happiest Minds Technologies Pvt. Ltd. All Rights Reserved2
As enterprises are moving towards IPv6 it is imaginable that the migration process will happen gradually even within a
single enterprise. To facilitate this gradual migration several migration techniques have been defined. This document
details about the transitioning techniques and process being followed by Happiest Minds.
• Scope
This document will provide guidelines for network transitioning from IPv4 to IPv6.
• Purpose
The purpose of this document is to provide an overview of the transitioning techniques and standards.
• Executive Summary
As enterprises are moving towards IPv6 it is imaginable that the migration process will happen gradually even within a
single enterprise. To facilitate this gradual migration several migration techniques have been defined. The following transi-
tion techniques provide a mechanism to gradually migrate from an IPv4 infrastructure to an IPv6 infrastructure:
• Dual Stack - The ability to assign an IPv4 and an IPv6 address to the same network interface
• Tunneling - Static and automatic tunnelling of IPv6 packets over an IPv4 infrastructure
• NAT-PT - Static or Dynamic Network Address Translation - Protocol Translation
© Happiest Minds Technologies Pvt. Ltd. All Rights Reserved3
Introduction
IPv4 to IPv6 transition stages
Access network of IPv6 compatibility
Layout preparation for IPv6 address and subnet
Implement
Auto discovery tools
software
IP Address
Management
DHCP Considerations
DNS Considerations Monitor
Security Assesment
Sign Off
Dual Stack
Dual stack is the core technique which the other transition techniques are builds upon. As stated earlier Dual Stack is the
technique to allow an IPv4 and IPv6 address to be defined on the same network interface.
Tunnelling
Static Tunnels, Point to Point Mechanisms
The advantage of doing static tunnels is that dynamic routing protocols can be run over the tunnel. There are 2 variants
involved here for static tunnels;
• GRE - Default tunnel mode
• IPv6IP - Less overhead, no CLNS (IS-IS) transport Configuring static tunnels is a pretty straight forward process and
the difference between configuring a GRE or a IPv6 IP tunnel is marginal.
(config) ipv6 unicast-routing
(config) interface INTERFACE-ID
(config-if) ipv6 address ADDRRESS
© Happiest Minds Technologies Pvt. Ltd. All Rights Reserved4
Techniques used in the transition
Transition to IPv6
HOW IT WORKS
IP v6 INTERNET
IP v4 INTERNET
ROUTER
6to4 RELAY
6to4 ROUTER
6to4 HOST
LOCAL NETWORK
IPv6 TRAFFIC
IPv6 OVER IPv4 TRAFFIC
IPv6TRAFFIC
Next
(config) interface tunnel NUMBER
(config-if) tunnel source INTERFACE/IPv4-ADDRESS
(config-if) tunnel destination IPv4-ADDRESS
(config-if) ipv6 address IPv6-ADDRESS
(config-if) tunnel mode ipv6ip <-- tunnel IPv6 over
IPv4. GRE tunnel mode is the default
Automatic tunnels, Point to Multipoint Mechanisms
• 6to4 site to site tunnel
• ISATAP host to host & host to router tunnel protocol (Within a Site)
The advantage of automatic tunneling is that only one tunnel is needed (together with BGP or static routing) in order to
establish a full mesh of connectivity. IPv6 prefix 2002: is reserved for the use of automatic tunneling. The IPv4 tunnel
address is converted to Hex and pre-ended with 2002:. For instance with a tunnel IPv4 address of 1.1.1.1 the correspond-
ing IPv6 subnet is 2002:0101:0101::/48.
6to4 Tunnels
The configuration of a 6to4 tunnel is needed when one IPv6 site has to be connected with another IPv6 site through an
IPv4 infrastructure. The principle is simple as the mechanism to use is to create a tunnel interface. The core part is to
calculate the two 48 bit IPv6 subnets to be used between the two sites. As we saw earlier these subnets are calculated
from the IPv4 IP address on both site of the point to point link. After these 2 subnets have been calculated on the sites, a
static route to the remote 48 bit subnet pointing to the remote site’s 2002:: address is all what is needed to connect these
two IPv6 sites together. At each site the 48 bit subnet can be divided into several 64 bi
t prefixes for a hierarchical addressing scheme .
(config) ipv6 unicast-routing
(config) interface INTERFACE-ID
(config-if) ipv6 address ADDRRESS
(config) interface tunnel NUMBER
(config-if) tunnel source INTERFACE/IPv4-ADDRESS <-- no tunnel destination, we are multipoint
(config-if) ipv6 address 2002::[EXAMPLE]
(config-if) tunnel mode ipv6ip 6to4
As stated earlier a static route must be configured to the next-hop address to each endpoint. Static routes can be omitted
by using (e)BGP to peer using the 6to4 addresses between the two endpoints. By redistributing on each site the IPv6 IGP
routes into BGP full IPv6 connectivity can be obtained between the sites.
Teredo tunnelling
Instead of using routers to tunnel packets, Teredo tunneling has the hosts perform the tunneling. This requires the hosts
to be configured with double stacks. It is mostly put to use to move about packets through an IPv4 address translation
device.
ISATAP Tunnels
ISATAP tunnels are needed when point to multipoint connections must be made within one site. What ISATAP does is use
an improvised EUI-64 mechanism, resulting in the link-local address (FE80:) to be taken into account. So ISATAP is used
to connect two dispersed IPv6 islands in a single site. As the whole mechanism is based on the tunnel, this concept is not
the hardest to understand. The important difference here is in how the IPv6 endpoints addresses are calculated. The rest
of the concept remains the same as with the 6to4 tunneling mechanism. As the ISATAP host prefix is calculated automati-
cally the configuration is even more straightforward than the 6to4 method.
© Happiest Minds Technologies Pvt. Ltd. All Rights Reserved5
More Efficient Routing: IPv6 reduces the size of routing
tables and makes routing more efficient. IPv6 lets ISPs
aggregate the prefixes of their customers' networks into a
single prefix and announce this one prefix to the IPv6
Internet. On top of that, in IPv6 networks, the process of
fragmentation is taken care of by the sourcing device,
rather than the router, using some sort of a protocol to
discover the path's maximum transmission unit (MTU).
More Efficient Packet Processing: IPv6's simplified packet
header makes packet processing way more effective.
Compared to IPv4, IPv6 has no IP-level checksum, so it
does not need to be recalculated at every hop of the
router. Not using the IP-level checksum was possible
because most link-layer technologies already contain it
and other error-control capabilities. In addition, most of
the transport layers, that handle an end-to-end connectiv-
ity, have a checksum that calls for enabling the detection
of errors to a great extent.
(config) ipv6 unicast-routing
(config) interface INTERFACE-ID
(config-if) ipv6 address ADDRRESS
(config) interface tunnel NUMBER
(config-if) tunnel source INTERFACE/IPv4-ADDRESS <-- no tunnel destination, we are multipoint
(config-if) ipv6 address 100:100::/64 eui-64
(config-if) tunnel mode ipv6ip isatap
The modified EUI-64 mechanism calculates the host prefix/identifier as follows; the first 32 bits are always 0000:5EFE and
the last32 bits are the IPv4 address in Hex. The first 64 bit network prefix can be anything and is not bound to any rules.
With ISATAP the same routing considerations applies as for the 4to6 mechanism and will not be repeated here.
IPv6 translation
IPv6 translation schemes implement some form of packet-header translations between the IPv6 and IPv4 addresses. The
goal is to translate packets with IPv6 addresses to those with IPv4 addresses, so that IPv6-only hosts can talk to the IPv4-
only Internet. This may sound not very complex but in some cases it can be. For example, some server load balancers
(SLBs) are capable of load balancing and translating packets with IPv6 addresses to IPv4 packets. This competency may
turn out to be advantageous in data center deployments in that the existing IPv4 infrastructure can remain unchanged, and
only the SLB requires modification. This kind of technique requires other mechanisms (such as tunneling or dual-stack
techniques) to get the IPv6 packets to the SLB. However, as a means for accessing the IPv4 Internet, the translation tech-
nique can actually be quite complex. Originally, NAT-Protocol Translation (NAT-PT: RFC 2766) was proposed for this
cause, but it has consequently been considered non-practical to deploy (due to the need for application layer gateways
ALGs), the management of IPv6 Domain Name System (DNS) requests, and the need for session initiation ordering for
connection state establishment). In addition, IPv6 translation approaches break the Internet end-to-end connectivity
model (a common trait of all NAT implementations), and cannot handle fragmentation in the core.
© Happiest Minds Technologies Pvt. Ltd. All Rights Reserved6
Benefits of IPv6 transitioning
Directed Data Flows: IPv6 supports multicast more than
broadcast. Multicast lets bandwidth-intensive flows (like
multimedia streams) to be sent across to multiple destina-
tions simultaneously, saving the network bandwidth to the
greatest extent. Hosts with no interest of any sort no longer
must process packets of broadcasts. What’s more, the
IPv6 header has a new field, named Flow Label that can
identify packets belonging to the same flow.
Simplified Network Configuration: Address auto-
configuration (address assignment) is built in to IPv6. A
router will send the prefix of the local link in its router com-
mercials. A host, on the other hand is capable of generat-
ing its independent IP address by appending its link-layer
address, by converting the same into an Extended Univer-
sal Identifier (EUI) 64-bit format, to the 64 bits of the local
link prefix.
Support for New Services: By eliminating Network Address Translation (NAT), true end-to-end connectivity at the IP layer
is hence retained by enabling new and more valuable services. The advantage with Peer-to-peer network solutions is that
they are way easier to develop and maintain, and services such as VoIP and Quality of Service (QoS) become more
robust.
Security: IPsec, which provides privacy, authenticity and data compatibility, is wired into in IPv6. Due to its ability to carry
forward malware, IPv4 ICMP packets are most often blocked by firewalls that are corporate centric, but ICMPv6, the
execution of the Cyber Controlled Message Protocol for IPv6, could be allowed because IPSec can be implemented in the
ICMPv6 packets as well.
There is no straightforward answer to this question and difficulty compounds when we consider the vast list of possible
techniques suggested in previous sections. Network operators and administrators choose to experiment with a few tech-
niques and the IETF V6OPS workgroup is working towards providing guidance in the choice of these techniques for differ-
ent usage scenarios. Further, since multiple transition techniques are defined, it is likely that multiple techniques can be
used within a local network and hence the network administrator has to consider issues arising out of combinations of
techniques. For example, DSTM and ISATAP have opposite functions and should not be used on the same host. The
network administrator would require comprehensive tools to configure and manage a network where multiple transition
techniques interact with each other.
Transitioning from IPv4 to IPv6 requires detailed analysis of the existing infrastructure. We as Happiest Minds believe in
providing end-to-end solution and services. The services that we offer that distinguish in the market:
Consultation and planning services:
• Understanding of the requirement
• Detailing of the scope with respect to the existing infrastructure
• Highlighting the key areas of issue
• Validation or Preparation of the hardware inventory for IPv6 enabled NICs
• Asset or infrastructure proposal
• Selection of the transition technique to be used
Transition services:
• Implementation
• Function validation
• Security validation
Support services:
• Operational support
Routing protocol
DNS
Network management
© Happiest Minds Technologies Pvt. Ltd. All Rights Reserved7
Which technique to choose
Things to consider before transition
Offerings
Happiest Minds is focused on helping customers build Smart Secure and Connected experience by leveraging disruptive
technologies like mobility, analytics, security, cloud computing, social computing and unified communications. Enterprises
are embracing these technologies to implement Omni-channel strategies, manage structured & unstructured data and
make real time decisions based on actionable insights, while ensuring security for data and infrastructure. Happiest Minds
also offers high degree of skills, IPs and domain expertise across a set of focused areas that include IT Services, Product
Engineering Services, Infrastructure Management, Security, Testing and Consulting.
Headquartered in Bangalore, India, Happiest Minds has operations in the US, UK, Singapore and Australia. It secured a
$45 million Series-A funding led by Canaan Partners, Intel Capital and Ashok Soota.
Happiest Minds
Copyright Information
This document is an exclusive property of Happiest Minds Technologies Pvt. Ltd.
This document gives an overview of the technologies involved in the IPv4 to IPv6 transitioning. It also lists all the services
being offered.
Summary
© 2014 Happiest Minds. All Rights Reserved.
E-mail: Business@happiestminds.com
Visit us: www.happiestminds.com
Follow us on
© Happiest Minds Technologies Pvt. Ltd. All Rights Reserved8
Authors
Kapil Chaturvedi has 11 years of IT experience, including 3 years in Data center planning and
implementation and 2 years in wireless planning and implementation. He has worked in multiven-
dor environment including Cisco, Aruba, HP, Nortel, F5, Watchguard, Fortigate and others. He
has also worked in Open source technologies and providing solutions based upon them. Key
past project includes: Data center planning for one of the client at Malaysia having multiple sites
geographically distributed across the globe, NOC planning and new project implementation for
Standard Chartered bank, Wireless implementation for Aruba Networks Inc.Kapil Chaturvedi

Weitere ähnliche Inhalte

Was ist angesagt?

Conceptos ipv6, direccionamiento
Conceptos ipv6, direccionamientoConceptos ipv6, direccionamiento
Conceptos ipv6, direccionamiento
Edgardo Scrimaglia
 
5. transistion mechanisum 1
5. transistion mechanisum 15. transistion mechanisum 1
5. transistion mechanisum 1
rajataro
 
Como definir un esquema de direcciones IPv6
Como definir un esquema de direcciones IPv6Como definir un esquema de direcciones IPv6
Como definir un esquema de direcciones IPv6
Edgardo Scrimaglia
 
Cisco presentation2
Cisco presentation2Cisco presentation2
Cisco presentation2
ehsan nazer
 

Was ist angesagt? (20)

IPv6 Best Practice
IPv6 Best PracticeIPv6 Best Practice
IPv6 Best Practice
 
Conceptos ipv6, direccionamiento
Conceptos ipv6, direccionamientoConceptos ipv6, direccionamiento
Conceptos ipv6, direccionamiento
 
Mecanismos de transicion pv6
Mecanismos de transicion pv6Mecanismos de transicion pv6
Mecanismos de transicion pv6
 
IPv6 Transition & Deployment, including IPv6-only in cellular and broadband
IPv6 Transition & Deployment, including IPv6-only in cellular and broadbandIPv6 Transition & Deployment, including IPv6-only in cellular and broadband
IPv6 Transition & Deployment, including IPv6-only in cellular and broadband
 
Introduction to IPv6
Introduction to IPv6Introduction to IPv6
Introduction to IPv6
 
Introduction to segment routing
Introduction to segment routingIntroduction to segment routing
Introduction to segment routing
 
SEGMENT Routing
SEGMENT RoutingSEGMENT Routing
SEGMENT Routing
 
5. transistion mechanisum 1
5. transistion mechanisum 15. transistion mechanisum 1
5. transistion mechanisum 1
 
IPv6
IPv6IPv6
IPv6
 
Implementation of isp mpls backbone network on i pv6 using 6 pe routers main PPT
Implementation of isp mpls backbone network on i pv6 using 6 pe routers main PPTImplementation of isp mpls backbone network on i pv6 using 6 pe routers main PPT
Implementation of isp mpls backbone network on i pv6 using 6 pe routers main PPT
 
IPv6_Quick_Start_Guide
IPv6_Quick_Start_GuideIPv6_Quick_Start_Guide
IPv6_Quick_Start_Guide
 
ISP core routing project
ISP core routing projectISP core routing project
ISP core routing project
 
IPv6 - Neighbour Discovery
IPv6 - Neighbour DiscoveryIPv6 - Neighbour Discovery
IPv6 - Neighbour Discovery
 
Funtions of i pv6
Funtions of i pv6Funtions of i pv6
Funtions of i pv6
 
Ipv6
Ipv6Ipv6
Ipv6
 
NAT_Final
NAT_FinalNAT_Final
NAT_Final
 
Como definir un esquema de direcciones IPv6
Como definir un esquema de direcciones IPv6Como definir un esquema de direcciones IPv6
Como definir un esquema de direcciones IPv6
 
Cisco presentation2
Cisco presentation2Cisco presentation2
Cisco presentation2
 
bgp protocol
 bgp protocol bgp protocol
bgp protocol
 
BGP Advanced topics
BGP Advanced topicsBGP Advanced topics
BGP Advanced topics
 

Andere mochten auch

Andere mochten auch (9)

Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest MindsWhitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
 
Open Daylight Forum India 2015
Open Daylight Forum India 2015Open Daylight Forum India 2015
Open Daylight Forum India 2015
 
Top 5 reasons
Top 5 reasonsTop 5 reasons
Top 5 reasons
 
Achieving 360° view of security for complete situational awareness
Achieving 360° view of security for complete situational awarenessAchieving 360° view of security for complete situational awareness
Achieving 360° view of security for complete situational awareness
 
Goggles for retail banking
Goggles for retail bankingGoggles for retail banking
Goggles for retail banking
 
Web rtc based-prospect-interaction-tool
Web rtc based-prospect-interaction-toolWeb rtc based-prospect-interaction-tool
Web rtc based-prospect-interaction-tool
 
Artificial intelligence-an-early-enhancement-in-different-verticals
Artificial intelligence-an-early-enhancement-in-different-verticalsArtificial intelligence-an-early-enhancement-in-different-verticals
Artificial intelligence-an-early-enhancement-in-different-verticals
 
Product engineering services at a glance
Product engineering services at a glanceProduct engineering services at a glance
Product engineering services at a glance
 
Awareness of Cyber Security - Response for Emergency Support Function 18 plan...
Awareness of Cyber Security - Response for Emergency Support Function 18 plan...Awareness of Cyber Security - Response for Emergency Support Function 18 plan...
Awareness of Cyber Security - Response for Emergency Support Function 18 plan...
 

Ähnlich wie Whitepaper: Network transitioning from IPv4 to IPv6 Document - Happiest Minds

Iccsit 2010 paper1
Iccsit 2010 paper1Iccsit 2010 paper1
Iccsit 2010 paper1
hanums1
 
Paper id 25201418
Paper id 25201418Paper id 25201418
Paper id 25201418
IJRAT
 
Iccsit 2010 rljit
Iccsit 2010 rljitIccsit 2010 rljit
Iccsit 2010 rljit
hanums1
 
10 IP VERSION SIX (6) WEEK TEN notes.pptx
10 IP VERSION SIX (6)  WEEK TEN notes.pptx10 IP VERSION SIX (6)  WEEK TEN notes.pptx
10 IP VERSION SIX (6) WEEK TEN notes.pptx
JoshuaAnnan5
 
Understanding i pv6 2
Understanding i pv6 2Understanding i pv6 2
Understanding i pv6 2
srmanjuskp
 
Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002
suvobgd
 
Iccsit 2010 p_1
Iccsit 2010 p_1Iccsit 2010 p_1
Iccsit 2010 p_1
hanums1
 

Ähnlich wie Whitepaper: Network transitioning from IPv4 to IPv6 Document - Happiest Minds (20)

Performance Analysis of Ipv4 Ipv6 Transition Techniques
Performance Analysis of Ipv4 Ipv6 Transition TechniquesPerformance Analysis of Ipv4 Ipv6 Transition Techniques
Performance Analysis of Ipv4 Ipv6 Transition Techniques
 
3hows
3hows3hows
3hows
 
Iccsit 2010 paper1
Iccsit 2010 paper1Iccsit 2010 paper1
Iccsit 2010 paper1
 
Why We Need IPv6
Why We Need IPv6Why We Need IPv6
Why We Need IPv6
 
Paper id 25201418
Paper id 25201418Paper id 25201418
Paper id 25201418
 
Iccsit 2010 rljit
Iccsit 2010 rljitIccsit 2010 rljit
Iccsit 2010 rljit
 
10 IP VERSION SIX (6) WEEK TEN notes.pptx
10 IP VERSION SIX (6)  WEEK TEN notes.pptx10 IP VERSION SIX (6)  WEEK TEN notes.pptx
10 IP VERSION SIX (6) WEEK TEN notes.pptx
 
Understanding i pv6 2
Understanding i pv6 2Understanding i pv6 2
Understanding i pv6 2
 
RASHMI VT REPORT
RASHMI VT REPORTRASHMI VT REPORT
RASHMI VT REPORT
 
Tutorial: IPv6-only transition with demo
Tutorial: IPv6-only transition with demoTutorial: IPv6-only transition with demo
Tutorial: IPv6-only transition with demo
 
On the migration of a large scale network from i pv4 to ipv6 environment
On the migration of a large scale network from i pv4 to ipv6 environmentOn the migration of a large scale network from i pv4 to ipv6 environment
On the migration of a large scale network from i pv4 to ipv6 environment
 
A Survey On Next Generation Internet Protocol IPv6
A Survey On Next Generation Internet Protocol  IPv6A Survey On Next Generation Internet Protocol  IPv6
A Survey On Next Generation Internet Protocol IPv6
 
IPv4aaS tutorial and hands-on
IPv4aaS tutorial and hands-onIPv4aaS tutorial and hands-on
IPv4aaS tutorial and hands-on
 
M017147275
M017147275M017147275
M017147275
 
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...
 
Features & benifits of ipv6 firewall
Features & benifits of ipv6 firewallFeatures & benifits of ipv6 firewall
Features & benifits of ipv6 firewall
 
IPv6 .pdf
IPv6 .pdfIPv6 .pdf
IPv6 .pdf
 
Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002
 
Iccsit 2010 p_1
Iccsit 2010 p_1Iccsit 2010 p_1
Iccsit 2010 p_1
 
Network optimization of ipv6 networks using tunnel header compression
Network optimization of ipv6 networks using tunnel header compressionNetwork optimization of ipv6 networks using tunnel header compression
Network optimization of ipv6 networks using tunnel header compression
 

Mehr von Happiest Minds Technologies

Mehr von Happiest Minds Technologies (20)

Largest Electricity provider in the US- Case Study
Largest Electricity provider in the US- Case StudyLargest Electricity provider in the US- Case Study
Largest Electricity provider in the US- Case Study
 
BFSI GLOBAL TRENDS FY 24
BFSI GLOBAL TRENDS FY 24BFSI GLOBAL TRENDS FY 24
BFSI GLOBAL TRENDS FY 24
 
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKINGARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
 
DIGITAL MANUFACTURING
DIGITAL MANUFACTURINGDIGITAL MANUFACTURING
DIGITAL MANUFACTURING
 
Exploring the Potential of ChatGPT in Banking, Financial SERVICES & Insurance
Exploring the Potential of ChatGPT in Banking, Financial SERVICES & InsuranceExploring the Potential of ChatGPT in Banking, Financial SERVICES & Insurance
Exploring the Potential of ChatGPT in Banking, Financial SERVICES & Insurance
 
AN OVERVIEW OF THE METAVERSE
AN OVERVIEW OF THE METAVERSEAN OVERVIEW OF THE METAVERSE
AN OVERVIEW OF THE METAVERSE
 
VMware to AWS Cloud Migration
VMware to AWS Cloud MigrationVMware to AWS Cloud Migration
VMware to AWS Cloud Migration
 
Digital-Content-Monetization-DCM-Platform-2.pdf
Digital-Content-Monetization-DCM-Platform-2.pdfDigital-Content-Monetization-DCM-Platform-2.pdf
Digital-Content-Monetization-DCM-Platform-2.pdf
 
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
 
Cloud Reshaping Banking
Cloud Reshaping BankingCloud Reshaping Banking
Cloud Reshaping Banking
 
Automating SOC1/2 Compliance- For a leading Software solution company in UK
Automating SOC1/2 Compliance- For a leading Software solution company in UKAutomating SOC1/2 Compliance- For a leading Software solution company in UK
Automating SOC1/2 Compliance- For a leading Software solution company in UK
 
PAMaaS- Powered by CyberArk
PAMaaS- Powered by CyberArkPAMaaS- Powered by CyberArk
PAMaaS- Powered by CyberArk
 
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
 
SECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKESSECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKES
 
Complete Guide to General Data Protection Regulation (GDPR)
Complete Guide to General Data Protection Regulation (GDPR)Complete Guide to General Data Protection Regulation (GDPR)
Complete Guide to General Data Protection Regulation (GDPR)
 
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
 
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDITREDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
 
REDUCING TRANSPORTATION COSTS IN CPG THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN CPG THROUGH INTELLIGENT FREIGHT AUDITREDUCING TRANSPORTATION COSTS IN CPG THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN CPG THROUGH INTELLIGENT FREIGHT AUDIT
 
How to Approach Tool Integrations
How to Approach Tool IntegrationsHow to Approach Tool Integrations
How to Approach Tool Integrations
 
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDITREDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 

Whitepaper: Network transitioning from IPv4 to IPv6 Document - Happiest Minds

  • 1. Happiest People Happiest Customers Network transitioning from IPv4 to IPv6 Document
  • 2. • Introduction.......................................................................................................................................3 • Scope • Purpose • Executive Summary • Techniques used in the transition.....................................................................................................4 • Dual Stack • Tunnelling • Static Tunnels, Point to Point Mechanisms • Automatic tunnels, Point to Multipoint Mechanisms • 6to4 Tunnels • Teredo tunnelling • ISATAP Tunnels • IPv6 translation • Benefits of IPv6 transitioning............................................................................................................6 • Which technique to choose..............................................................................................................7 • Things to consider before transition.................................................................................................7 • Offerings...........................................................................................................................................7 • Summary..........................................................................................................................................8 Contents © Happiest Minds Technologies Pvt. Ltd. All Rights Reserved2
  • 3. As enterprises are moving towards IPv6 it is imaginable that the migration process will happen gradually even within a single enterprise. To facilitate this gradual migration several migration techniques have been defined. This document details about the transitioning techniques and process being followed by Happiest Minds. • Scope This document will provide guidelines for network transitioning from IPv4 to IPv6. • Purpose The purpose of this document is to provide an overview of the transitioning techniques and standards. • Executive Summary As enterprises are moving towards IPv6 it is imaginable that the migration process will happen gradually even within a single enterprise. To facilitate this gradual migration several migration techniques have been defined. The following transi- tion techniques provide a mechanism to gradually migrate from an IPv4 infrastructure to an IPv6 infrastructure: • Dual Stack - The ability to assign an IPv4 and an IPv6 address to the same network interface • Tunneling - Static and automatic tunnelling of IPv6 packets over an IPv4 infrastructure • NAT-PT - Static or Dynamic Network Address Translation - Protocol Translation © Happiest Minds Technologies Pvt. Ltd. All Rights Reserved3 Introduction IPv4 to IPv6 transition stages Access network of IPv6 compatibility Layout preparation for IPv6 address and subnet Implement Auto discovery tools software IP Address Management DHCP Considerations DNS Considerations Monitor Security Assesment Sign Off
  • 4. Dual Stack Dual stack is the core technique which the other transition techniques are builds upon. As stated earlier Dual Stack is the technique to allow an IPv4 and IPv6 address to be defined on the same network interface. Tunnelling Static Tunnels, Point to Point Mechanisms The advantage of doing static tunnels is that dynamic routing protocols can be run over the tunnel. There are 2 variants involved here for static tunnels; • GRE - Default tunnel mode • IPv6IP - Less overhead, no CLNS (IS-IS) transport Configuring static tunnels is a pretty straight forward process and the difference between configuring a GRE or a IPv6 IP tunnel is marginal. (config) ipv6 unicast-routing (config) interface INTERFACE-ID (config-if) ipv6 address ADDRRESS © Happiest Minds Technologies Pvt. Ltd. All Rights Reserved4 Techniques used in the transition Transition to IPv6 HOW IT WORKS IP v6 INTERNET IP v4 INTERNET ROUTER 6to4 RELAY 6to4 ROUTER 6to4 HOST LOCAL NETWORK IPv6 TRAFFIC IPv6 OVER IPv4 TRAFFIC IPv6TRAFFIC
  • 5. Next (config) interface tunnel NUMBER (config-if) tunnel source INTERFACE/IPv4-ADDRESS (config-if) tunnel destination IPv4-ADDRESS (config-if) ipv6 address IPv6-ADDRESS (config-if) tunnel mode ipv6ip <-- tunnel IPv6 over IPv4. GRE tunnel mode is the default Automatic tunnels, Point to Multipoint Mechanisms • 6to4 site to site tunnel • ISATAP host to host & host to router tunnel protocol (Within a Site) The advantage of automatic tunneling is that only one tunnel is needed (together with BGP or static routing) in order to establish a full mesh of connectivity. IPv6 prefix 2002: is reserved for the use of automatic tunneling. The IPv4 tunnel address is converted to Hex and pre-ended with 2002:. For instance with a tunnel IPv4 address of 1.1.1.1 the correspond- ing IPv6 subnet is 2002:0101:0101::/48. 6to4 Tunnels The configuration of a 6to4 tunnel is needed when one IPv6 site has to be connected with another IPv6 site through an IPv4 infrastructure. The principle is simple as the mechanism to use is to create a tunnel interface. The core part is to calculate the two 48 bit IPv6 subnets to be used between the two sites. As we saw earlier these subnets are calculated from the IPv4 IP address on both site of the point to point link. After these 2 subnets have been calculated on the sites, a static route to the remote 48 bit subnet pointing to the remote site’s 2002:: address is all what is needed to connect these two IPv6 sites together. At each site the 48 bit subnet can be divided into several 64 bi t prefixes for a hierarchical addressing scheme . (config) ipv6 unicast-routing (config) interface INTERFACE-ID (config-if) ipv6 address ADDRRESS (config) interface tunnel NUMBER (config-if) tunnel source INTERFACE/IPv4-ADDRESS <-- no tunnel destination, we are multipoint (config-if) ipv6 address 2002::[EXAMPLE] (config-if) tunnel mode ipv6ip 6to4 As stated earlier a static route must be configured to the next-hop address to each endpoint. Static routes can be omitted by using (e)BGP to peer using the 6to4 addresses between the two endpoints. By redistributing on each site the IPv6 IGP routes into BGP full IPv6 connectivity can be obtained between the sites. Teredo tunnelling Instead of using routers to tunnel packets, Teredo tunneling has the hosts perform the tunneling. This requires the hosts to be configured with double stacks. It is mostly put to use to move about packets through an IPv4 address translation device. ISATAP Tunnels ISATAP tunnels are needed when point to multipoint connections must be made within one site. What ISATAP does is use an improvised EUI-64 mechanism, resulting in the link-local address (FE80:) to be taken into account. So ISATAP is used to connect two dispersed IPv6 islands in a single site. As the whole mechanism is based on the tunnel, this concept is not the hardest to understand. The important difference here is in how the IPv6 endpoints addresses are calculated. The rest of the concept remains the same as with the 6to4 tunneling mechanism. As the ISATAP host prefix is calculated automati- cally the configuration is even more straightforward than the 6to4 method. © Happiest Minds Technologies Pvt. Ltd. All Rights Reserved5
  • 6. More Efficient Routing: IPv6 reduces the size of routing tables and makes routing more efficient. IPv6 lets ISPs aggregate the prefixes of their customers' networks into a single prefix and announce this one prefix to the IPv6 Internet. On top of that, in IPv6 networks, the process of fragmentation is taken care of by the sourcing device, rather than the router, using some sort of a protocol to discover the path's maximum transmission unit (MTU). More Efficient Packet Processing: IPv6's simplified packet header makes packet processing way more effective. Compared to IPv4, IPv6 has no IP-level checksum, so it does not need to be recalculated at every hop of the router. Not using the IP-level checksum was possible because most link-layer technologies already contain it and other error-control capabilities. In addition, most of the transport layers, that handle an end-to-end connectiv- ity, have a checksum that calls for enabling the detection of errors to a great extent. (config) ipv6 unicast-routing (config) interface INTERFACE-ID (config-if) ipv6 address ADDRRESS (config) interface tunnel NUMBER (config-if) tunnel source INTERFACE/IPv4-ADDRESS <-- no tunnel destination, we are multipoint (config-if) ipv6 address 100:100::/64 eui-64 (config-if) tunnel mode ipv6ip isatap The modified EUI-64 mechanism calculates the host prefix/identifier as follows; the first 32 bits are always 0000:5EFE and the last32 bits are the IPv4 address in Hex. The first 64 bit network prefix can be anything and is not bound to any rules. With ISATAP the same routing considerations applies as for the 4to6 mechanism and will not be repeated here. IPv6 translation IPv6 translation schemes implement some form of packet-header translations between the IPv6 and IPv4 addresses. The goal is to translate packets with IPv6 addresses to those with IPv4 addresses, so that IPv6-only hosts can talk to the IPv4- only Internet. This may sound not very complex but in some cases it can be. For example, some server load balancers (SLBs) are capable of load balancing and translating packets with IPv6 addresses to IPv4 packets. This competency may turn out to be advantageous in data center deployments in that the existing IPv4 infrastructure can remain unchanged, and only the SLB requires modification. This kind of technique requires other mechanisms (such as tunneling or dual-stack techniques) to get the IPv6 packets to the SLB. However, as a means for accessing the IPv4 Internet, the translation tech- nique can actually be quite complex. Originally, NAT-Protocol Translation (NAT-PT: RFC 2766) was proposed for this cause, but it has consequently been considered non-practical to deploy (due to the need for application layer gateways ALGs), the management of IPv6 Domain Name System (DNS) requests, and the need for session initiation ordering for connection state establishment). In addition, IPv6 translation approaches break the Internet end-to-end connectivity model (a common trait of all NAT implementations), and cannot handle fragmentation in the core. © Happiest Minds Technologies Pvt. Ltd. All Rights Reserved6 Benefits of IPv6 transitioning Directed Data Flows: IPv6 supports multicast more than broadcast. Multicast lets bandwidth-intensive flows (like multimedia streams) to be sent across to multiple destina- tions simultaneously, saving the network bandwidth to the greatest extent. Hosts with no interest of any sort no longer must process packets of broadcasts. What’s more, the IPv6 header has a new field, named Flow Label that can identify packets belonging to the same flow. Simplified Network Configuration: Address auto- configuration (address assignment) is built in to IPv6. A router will send the prefix of the local link in its router com- mercials. A host, on the other hand is capable of generat- ing its independent IP address by appending its link-layer address, by converting the same into an Extended Univer- sal Identifier (EUI) 64-bit format, to the 64 bits of the local link prefix.
  • 7. Support for New Services: By eliminating Network Address Translation (NAT), true end-to-end connectivity at the IP layer is hence retained by enabling new and more valuable services. The advantage with Peer-to-peer network solutions is that they are way easier to develop and maintain, and services such as VoIP and Quality of Service (QoS) become more robust. Security: IPsec, which provides privacy, authenticity and data compatibility, is wired into in IPv6. Due to its ability to carry forward malware, IPv4 ICMP packets are most often blocked by firewalls that are corporate centric, but ICMPv6, the execution of the Cyber Controlled Message Protocol for IPv6, could be allowed because IPSec can be implemented in the ICMPv6 packets as well. There is no straightforward answer to this question and difficulty compounds when we consider the vast list of possible techniques suggested in previous sections. Network operators and administrators choose to experiment with a few tech- niques and the IETF V6OPS workgroup is working towards providing guidance in the choice of these techniques for differ- ent usage scenarios. Further, since multiple transition techniques are defined, it is likely that multiple techniques can be used within a local network and hence the network administrator has to consider issues arising out of combinations of techniques. For example, DSTM and ISATAP have opposite functions and should not be used on the same host. The network administrator would require comprehensive tools to configure and manage a network where multiple transition techniques interact with each other. Transitioning from IPv4 to IPv6 requires detailed analysis of the existing infrastructure. We as Happiest Minds believe in providing end-to-end solution and services. The services that we offer that distinguish in the market: Consultation and planning services: • Understanding of the requirement • Detailing of the scope with respect to the existing infrastructure • Highlighting the key areas of issue • Validation or Preparation of the hardware inventory for IPv6 enabled NICs • Asset or infrastructure proposal • Selection of the transition technique to be used Transition services: • Implementation • Function validation • Security validation Support services: • Operational support Routing protocol DNS Network management © Happiest Minds Technologies Pvt. Ltd. All Rights Reserved7 Which technique to choose Things to consider before transition Offerings
  • 8. Happiest Minds is focused on helping customers build Smart Secure and Connected experience by leveraging disruptive technologies like mobility, analytics, security, cloud computing, social computing and unified communications. Enterprises are embracing these technologies to implement Omni-channel strategies, manage structured & unstructured data and make real time decisions based on actionable insights, while ensuring security for data and infrastructure. Happiest Minds also offers high degree of skills, IPs and domain expertise across a set of focused areas that include IT Services, Product Engineering Services, Infrastructure Management, Security, Testing and Consulting. Headquartered in Bangalore, India, Happiest Minds has operations in the US, UK, Singapore and Australia. It secured a $45 million Series-A funding led by Canaan Partners, Intel Capital and Ashok Soota. Happiest Minds Copyright Information This document is an exclusive property of Happiest Minds Technologies Pvt. Ltd. This document gives an overview of the technologies involved in the IPv4 to IPv6 transitioning. It also lists all the services being offered. Summary © 2014 Happiest Minds. All Rights Reserved. E-mail: Business@happiestminds.com Visit us: www.happiestminds.com Follow us on © Happiest Minds Technologies Pvt. Ltd. All Rights Reserved8 Authors Kapil Chaturvedi has 11 years of IT experience, including 3 years in Data center planning and implementation and 2 years in wireless planning and implementation. He has worked in multiven- dor environment including Cisco, Aruba, HP, Nortel, F5, Watchguard, Fortigate and others. He has also worked in Open source technologies and providing solutions based upon them. Key past project includes: Data center planning for one of the client at Malaysia having multiple sites geographically distributed across the globe, NOC planning and new project implementation for Standard Chartered bank, Wireless implementation for Aruba Networks Inc.Kapil Chaturvedi