HSCN IP Addressing Good Practice Guidelines

Size: px
Start display at page:

Download "HSCN IP Addressing Good Practice Guidelines"

Transcription

1 Document filename: HSCN IP Addressing GPG v0.9 FINAL.docx Project / Programme HSCN Project HSCN Document Reference <insert> Project Manager <insert> Status [Status] Owner Version 0.9 Author Version issue date 15/11/2017 HSCN IP Addressing Good Practice Guidelines Copyright 2017 Health and Social Care Information Centre Page 1 of 25

2 Document management Revision History Version Date Summary of Changes /08/2016 Update to GPG produced for predecessor network customers /08/2016 Update following internal peer review /11/2016 Update following internal peer review /11/2016 Update following internal peer review /12/2016 Update following internal peer review /02/2017 Update following internal peer review /05/2017 Update following SMT review /11/2017 Re-order and update section on IPv /11/2017 Amendments to hyperlinks and update to GP firewall rule table section. Reviewers This document must be reviewed by the following people: Reviewer name Title / Responsibility Date Version Approved by This document must be approved by the following people: Name Signature Title Date Version Document Control: The controlled copy of this document is maintained in the NHS Digital corporate network. Any copies of this document held outside of that area, in whatever format (e.g. paper, attachment), are considered to have passed out of control and should be checked for currency and validity. Copyright 2017 Health and Social Care Information Centre. Page 2 of 25

3 Contents 1 About this Document Purpose Audience Disclaimer 5 2 Key Protocols and Methods Network Address Translation (NAT) and HSCN NAT Background Port Address Translation (PAT) Audit and Administration Considerations Full Cone NAT Overview Audit and Administration Considerations Restricted Cone NAT Overview Audit and Administration Considerations Symmetric NAT Overview NAT with Virtual Private Networks (VPNs) NAT Traversal (NAT-T) Other considerations when using NAT NAT enhances the level of security IPSec (IP Security) Application Level Gateway (ALG) 12 3 Dynamic Host Configuration Protocol (DHCP) and Network Address Management Introduction What is DHCP? Static and Dynamic Address Allocation BOOTP Benefits of DHCP DHCP Products 13 4 Classless Interdomain Routing (CIDR) 13 Copyright 2017 Health and Social Care Information Centre. Page 3 of 25

4 5 Guidance for IP Address Migration and Key Services Domain Name System (DNS) forwarding Domain Name System (DNS) delegation Web site URL's SMTP servers Authentication services GP firewall rule table 15 6 IPv Overview IPv4 to IPv6 Transition Mechanisms Tunnelling and Encapsulation Translation Conclusion Further Reading 22 7 Glossary of Terms 23 Copyright 2017 Health and Social Care Information Centre. Page 4 of 25

5 1 About this Document 1.1 Purpose This document provides advice and guidelines for IP Addressing and related key protocols for organisations connected to the Health and Social Care Network (HSCN). Related key protocols and methods include Network Address Translation (NAT), Domain Name System (DNS), and Dynamic Host Configuration Protocol (DHCP). 1.2 Audience Those with IM&T managerial and technical roles within organisations connected to the HSCN. 1.3 Disclaimer Reference to any specific commercial product, process or service by trade name, trademark manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favouring by NHS Digital. The views and opinions of authors expressed within this document shall not be used for advertising or product endorsement purposes. Any party relying on or using any information contained in this document and/or relying on or using any system implemented based upon information contained in this document should do so only after performing a risk assessment. It is important to note that a risk assessment is a prerequisite for the design of effective security countermeasures. A correctly completed risk assessment enables an NHS organisation to demonstrate that a methodical process has been undertaken which can adequately describe the rationale behind any decisions made. Risk assessments should include the potential impact to live services of implementing changes. This means that changes implemented following this guidance are done so at the implementers risk. Misuse or inappropriate use of this information can only be the responsibility of the implementer. Copyright 2017 Health and Social Care Information Centre. Page 5 of 25

6 2 Key Protocols and Methods 2.1 Network Address Translation (NAT) and HSCN The HSCN IP addressing policy is designed to future proof connectivity for Health and Social Care in the longer term. With the advent of cloud technologies and Internet enabled applications the NHS will inevitably move towards an Internet centric approach. The adoption of RIPE assigned addresses throughout the core of the network, and a move towards the same for all endpoints, will support the eventual move to a cloud/internet based solution. The HSCN IP addressing policy provides the flexibility to connect either with or without NAT. However, HSCN mandates the use of a public (RIPE assigned) address the point of connection for all new sites, whilst migrated sites may maintain a legacy addressing scheme where there is a technical or business requirement to do so. To meet with this requirement, NAT will be configured at the end-site HSCN CPE. This section provides detail on how NAT works and the importance of taking a co-ordinated approach to its deployment. 2.2 NAT Background NAT is a mechanism that translates IP addresses within private, internal networks to another range of IP addresses for transport over an external network (such as the Internet or HSCN). Incoming traffic is translated back for delivery within the inside network by the NAT technology. Network Address Translation is a widely used technology that permits the manipulation of IP traffic. Further details can be found in the Internet Engineering Task Force (IETF) Request for Comments (RFC) In using NAT it may be necessary to consider the practicalities of logging, as well as source/destination access control policies, as NAT manipulates the headers of IP packets, and effectively breaks the end to end Transmission Control Protocol/Internet Protocol (TCP/IP) connection. If considering using NAT it is prudent to establish full logging and auditing policies beforehand, to ensure compliance with good practice guidelines for auditing the use of shared IP addresses. Network Address Translation is a technology that is prevalent in Internet Protocol version 4 (IPv4) networks, where IPv4 public Internet addresses are a limited resource. Because of the continuing expansion of the World Wide Web (WWW), and other internet based services demanding IPv4 addresses, it is no longer an option for organisations to obtain additional public IPv4 address space to interface public facing systems, and so NAT has become a necessity for many network designs. Network Address Translation typically takes place at the boundary between an organisation s internal network and any external network gateway, and allows a multitude of private IP addresses, as defined in RFC1918, to use a limited pool of public IP addresses, or a single address if necessary. NHS organisations typically use NAT to interface between their local sites and the N3 network, whilst home workers may well use NAT within their local router to interface to their Internet Service Provider (ISP). There are many types of NAT offering many different benefits as well as limitations. I.e. the types of compatible applications or the levels of auditing that are applicable at the end service level. Copyright 2017 Health and Social Care Information Centre. Page 6 of 25

7 With NAT the border device, typically a router or firewall, uses stateful translation tables to map the private hidden IP addresses to the single address (or pool) and then rewrites the outgoing IP packets on exit so that they appear to originate from the border device. In the reverse communications path responses are mapped back to the originating IP address using the rules (or state ) stored in the translation tables. The translation table rules established in this fashion are flushed after a pre-determined period, unless new traffic refreshes their state. The border device can contain two types of NAT table entries, dependent on the NAT method in use: Dynamic entries where multiple internal (private) IP addresses are translated in to a single external IP address, or a pool of external IP addresses Static Entries - where internal and external IP addresses are mapped one-to-one. In large deployments the masking of unauthorised use of the network, using NAT, can be of serious concern. When faced with possible illegal activities external to the local source network, investigation and discovery of the originating machines within the network can be extremely difficult if detailed logs are not kept Port Address Translation (PAT) Port Address Translation (PAT), or Network Address Port Translation (NAPT) as it is also known, is a common form of IPv4 NAT. Also known as a hide NAT, PAT maps connections from many internal addresses to a single external IP address by using multiple ports that create and handle connections. These connections are held in a state table to preserve and maintain this connectivity. Because of the design of the TCP/IP protocol, well known ports (0-1023) are not used, leaving ports 1024 to to be mapped against a single external IP address. Whilst over connections could be mapped against a single IP address it is considered good practice not to exceed If this limit is regularly exceeded performance issues may be encountered, at which point the use of a second IP address, or pool of IP addresses, should be considered. It can sometimes be difficult to retrospectively build this into an existing solution; therefore it should be factored into the design from the outset. As a result of this mapping process it is not possible for an external host to create a connection directly to an internal host because the end-to-end connection is effectively terminated at the border device. Although in the first instance this can appear to be a limiting factor for the usefulness of PAT, this process also has its benefits. It provides a very simple yet effective method of protecting internal hosts from external attack at the network level Audit and Administration Considerations PAT is often utilised in home environments or in large scale deployments. From an administrative point of view PAT is the simplest to implement, only requiring the entry of a static rule to run effectively. Auditing, on the other hand, can generate large log files dependent on the level of information required and the amount of traffic passing through the border device. Copyright 2017 Health and Social Care Information Centre. Page 7 of 25

8 Without these detailed logs it is very difficult to track individual connections made through PAT. In addition, restrictions at the destination service may be difficult to enforce. 2.3 Full Cone NAT Overview Also known as One-to-One NAT or Static NAT, Full Cone NAT creates a static entry on the NAT device. This maps a single internal IP address to a single external IP address. In a typical installation this process also directly maps all the ports on a one to one basis. As this form of translation is static the translating device maintains only basic connection information, because the translation is applied directly at the initiation of each connection, by matching the source and destination IP addresses. Typically this form of NAT is utilised when connections are not only initiated from the private network, but also when connections need to be initiated into the private network, e.g. for access to a specific system from an external network. Fig. 1 provides an example of the translation undertaken by the border router when a user within a private network initiates a connection to a server on the Internet. In this scenario the ports are not illustrated as there is no port translation. Should the server initiate the connection to the user machine, the reverse of the connection process described above would be applicable Audit and Administration Considerations This form of NAT can prove useful in cases when other forms of NAT may already be in use for the masking of multiple internal IP addresses, and where certain machines require external identification. This could be an audit requirement, or be part of an access enforcement policy by a service which restricts access by IP address. Copyright 2017 Health and Social Care Information Centre. Page 8 of 25

9 If undertaking auditing at the service endpoint, this form of NAT provides a direct mapping of an external IP address to an internal IP address, which can be linked in case of investigation. The discovery of the internal address, together with its associated machine and user, is dependent on the source organisation s disclosure of this information. 2.4 Restricted Cone NAT Overview Restricted Cone NAT is very similar to Full Cone NAT in its operation but distinguishes itself by not allowing incoming connections, unless the private machine (internal to the network) has previously initiated a connection to the external destination address. Enhancements to Restricted Cone NAT can create a Port Restricted Cone NAT. This can also be utilised in enforcing policy by using the port to restrict access Audit and Administration Considerations This form of NAT has similar issues as Full Cone NAT. However with the addition of Port Restricted Cone NAT, further security measures at the service end can be utilised to restrict connections to individual ports. 2.5 Symmetric NAT Overview Also known as bi-directional NAT, symmetric NAT uses a rule that directs each request from the same internal IP address and port to a specific destination IP address and port to be mapped to a unique external source IP address and port. If the internal IP and port is utilised to connect to a different destination IP and port, a different mapping is used. Only an external host that receives a packet from an internal host can send a packet back. Please note that there are some problems associated with Symmetric NAT that may cause issues with User Datagram Protocol (UDP) traffic and the combination of IPv4 and IPv6 network traffic. With symmetric NAT, the NAT mapping refers specifically to the connection between the local host address and port number and the destination address and port number and a binding of the local address and port to a public-side address and port. Any attempt to change any one of these fields requires a different NAT binding. This is the most restrictive form of NAT behaviour under UDP, and it has been observed that this form of NAT behaviour is becoming quite rare, because it prevents the operation of all forms of applications that undertake referral and handover. 1 Fig. 2 gives an example of a request from an internal IP address and port to a specific destination IP address and port mapped to a unique external source IP address and port. 1 Source: Cisco Copyright 2017 Health and Social Care Information Centre. Page 9 of 25

10 2.6 NAT with Virtual Private Networks (VPNs) Owing to the nature of the packet manipulation carried out by NAT, there are several issues with attempting to pass Internet Protocol Security (IPSec) Virtual Private Network (VPN) traffic across devices that perform NAT functions. VPN tunnels gain protection through authentication headers, and use checksums to validate the encapsulated traffic. The NAT packet manipulation alters the checksum of the packet therefore rendering any protection invalid. In these cases technologies such as NAT Traversal (NAT-T) can be utilised. This uses UDP traffic along with the VPN traffic, thus allowing the creation of a VPN across the NAT device NAT Traversal (NAT-T) IPSec VPN users can run into trouble when traversing a NAT-ing device, such as a firewall or router, because: 1. The TCP/UDP header with in an IPSec Encapsulated Security Payload (ESP) packet is encrypted, preventing the mapping of ports by the NAT-ing device 2. NAT changes the IP and TCP/UDP headers carried within IP packets, invalidating IPSec s integrity check. VPN Pass-through, usually found in home routers that support PAT, addresses issue 1 (above) by NAT-ing encrypted packets without mapping ports inside the TCP/IP payload. However VPN Pass-through is not a standard and behaviour varies between vendors products. NAT Traversal (NAT-T) refers to a series of Internet Engineering Task Force (IETF) drafts that fix issue 2 (above) by wrapping encrypted IPSec packets inside a clear text UDP wrapper. Any NAT-ing device can translate both the source IP address and source UDP port of the clear text wrapper without changing any part of the encrypted IPSec packet carried inside. Copyright 2017 Health and Social Care Information Centre. Page 10 of 25

11 It is essential though that the devices at both ends of the IPSec tunnel support the same version of NAT-T, be able to detect when to use NAT-T, and keep the NAT mapping alive for the lifetime of the tunnel. Fig. 3 below provides an example of IPSec NAT Traversal 2.7 Other considerations when using NAT NHS Digital appreciates that the use of NAT comes with advantages and disadvantages. This section outlines some of the recognised drawbacks that can accompany the deployment of NAT NAT enhances the level of security The use of NAT is sometimes seen to enhance, the level of security within a network. This is due to the NAT technology hiding the internal addressing scheme of the organisation behind either a single or a series of separate IP Addresses that differ to the internal scheme. This can also be seen as a drawback where NAT may provide a false sense of security resulting in the overall level of security being lowered. There can be a danger of assuming all security threats are external, leading to practices that make internal breaches much easier. With a secured firewall at the network perimeter, the contribution of NAT to the overall security model is negligible IPSec (IP Security) IPSec is a set of protocols developed to support packet level authentication and encryption at the transport layer. The technology depends on end-to-end consistency of the IP addresses in the IP headers. NAT presents a significant obstacle to IPSec technology, as the IP address header is changed when traversing a NAT environment. Application layer security techniques, such as SSL, that do not depend on an IP address can function correctly in the presence of NAT Copyright 2017 Health and Social Care Information Centre. Page 11 of 25

12 2.7.3 Application Level Gateway (ALG) An Application Level Gateway (also known as Application Layer Gateway) is usually employed between application peers when an intervening protocol or device (in this case NAT) prevents direct connectivity. The purpose of the ALG is to simulate direct connectivity. The IETF RFC2663 relating to NAT Terminology provides a definition of ALG in section 2.9. The following lists a number of protocols that may require the aid of an ALG to traverse a NAT environment. FTP (File Transfer Protocol) DNS (Domain Name System/Service) RealAudio (de-facto standard for streaming data over the World Wide Web) H.323 (multimedia conferencing protocol, which includes voice, video, and data conferencing, for use over packet-switched networks) SMTP (Simple Mail Transfer Protocol) Telnet (terminal emulation) RSVP (Resource Reservation Set-up Protocol) SNMP (Simple Network Management Protocol) ALG s are vendor specific, and are not normally developed to generically fit environments outside the particular vendor s product range. It is recommended that these issues should be discussed with the hardware vendor prior to any purchase or implementation involving NAT. 3 Dynamic Host Configuration Protocol (DHCP) and Network Address Management 3.1 Introduction This section describes a technology that can assist in the deployment and management of IP addresses - Dynamic Host Configuration Protocol (DHCP). 3.2 What is DHCP? DHCP is a standardised protocol that enables clients to be dynamically assigned with various configuration parameters, such as an IP address, sub-network mask, default gateway, and other critical network configuration information. DHCP servers centrally manage such configuration data, and are configured by network administrators with settings that are appropriate for a given network environment. DHCP servers in turn communicate with DHCP clients through the use of DHCP messages. DHCP supports three methods of IP address allocation: Dynamic DHCP allocation Static allocation Dynamic BOOTP allocation A network can use one or more of these methods. The network administrator can select which methods to use. Copyright 2017 Health and Social Care Information Centre. Page 12 of 25

13 3.3 Static and Dynamic Address Allocation DHCP provides for both static and dynamic configuration of IP clients. Static configuration enables you to assign a specific IP address and configuration to a client with a specific MAC address. When DHCP assigns IP addresses dynamically, IP clients are assigned an IP address that is chosen from a range of available addresses. Dynamic address assignment can be deployed when an individual client does not require a specific, static address. 3.4 BOOTP DHCP is based on the Bootstrap Protocol (BOOTP) and maintains some backward compatibility with it. There are two primary differences, between DHCP and BOOTP that should be noted. First, DHCP defines mechanisms through which clients can be assigned an IP address for a finite lease period, allowing for reassignment of the IP address to another client later. Secondly, DHCP provides the mechanism for a client to gather other IP configuration parameters it needs to operate in the TCP/IP network. Though BOOTP is a predecessor of DHCP, it is still a viable from of address management. The backward compatibility of DHCP ensures that, within a DHCP environment, BOOTP specific devices can be allocated IP addresses. 3.5 Benefits of DHCP The management overhead of introducing new clients to a network is simplified as the majority of addressing is administered centrally at the DHCP server. The task of introducing new sub-networks, or re-addressing portions, or the whole, of the network is also simplified through centralisation. The flexibility of DHCP ensures that devices that do require static address, whether for authentication purposes or other reasons, can be managed centrally. Most products will allocate static addresses by device MAC address, though some products can also assign by username or workgroup. 3.6 DHCP Products There are numerous software and hardware solutions that provide DHCP functionality, but inherently it is the Network Operating System (NOS) that is the most commonly used resource. Most standard NOS offerings include DHCP functionality as standard. 4 Classless Interdomain Routing (CIDR) Classless Inter Domain Routing (CIDR), also called "Supernetting", is a technique used to reduce the size of routing tables on large networks such as the Internet. A number of contiguous IP subnets can be represented by a single entry with some routing algorithms, allowing for faster routing decisions. Principally the Border Gateway Protocol (BGP4) and Open Shortest Path First (OSPF) routing protocols support CIDR. Copyright 2017 Health and Social Care Information Centre. Page 13 of 25

14 CIDR can also be useful in private class C networks to reduce routing times and generally improve performance. Secondary addressing and multi-site situations are scenarios where CIDR can be used, or where large class A LAN segments with more than 254 hosts need to be re-addressed. 5 Guidance for IP Address Migration and Key Services This section covers some of the key services that need to be considered when migrating from one IP address scheme to another, and the appropriate action required to ensure minimal disruption. For further guidance please refer the HSCN IP Addressing Guidance for Transition document which can be found on the Technical Guidance pages of the HSCN web site. 5.1 Domain Name System (DNS) forwarding As part of the HSCN service provision, a centrally hosted DNS is provided in the core. However, LAN hosts may not always access these services directly, but may instead reference one or a thread of locally hosted DNS name servers, before eventually referencing the national DNS. An example maybe when a host attempts to establish a connection to another IP host, it will first check its local HOSTS file (if there is one) for the name of the remote host. If the remote host is not in the HOSTS file, the host will send a query to its LAN hosted primary DNS name server. The primary name server may well not contain the information about the particular destination host; in that case, the query must be forwarded to another name server that is higher up in the domain name hierarchy. This is DNS forwarding. When re-addressing a LAN environment, though the national hosted DNS address does not change, it is essential to ensure locally hosted DNS are updated to reflect the new address scheme. 5.2 Domain Name System (DNS) delegation The HSCN core DNS may also cross reference locally hosted DNS servers at end user sites. This is DNS delegation. When re-addressing a LAN environment, it is essential to ensure changes to locally hosted DNS servers used for delegation are registered with DNS servers that sit higher up the DNS hierarchy. 5.3 Web site URL's Locally hosted web site domain names and their associated IP addresses are registered and updated using DNS Registration form on the NHS Digital website. When changing the external IP address scheme of a locally hosted service, it is essential this form is completed to ensure the correct DNS name entry and IP address appears within the national DNS table. To ensure the changeover is coordinated in a controlled manner, the end user site can specify to NHS Digital when the change is to be activated. Copyright 2017 Health and Social Care Information Centre. Page 14 of 25

15 5.3.1 SMTP servers Locally hosted SMTP servers and their associated domain names and IP addresses are registered and updated using the SMTP Registration form on the NHS Digital website. A Mail Exchanger (MX) record is an entry in a DNS table which controls where mail for a particular domain name is sent. This information is also registered and updated via the SMTP Registration form. When changing the external IP address scheme of a locally hosted SMTP mail server, it is essential this form is completed to ensure the correct domain name entry and IP address appears within the national DNS. To ensure the changeover is coordinated in a controlled manner, the end user site can specify to NHS Digital when the change is to be activated by contacting DNSTeam@nhs.net. 5.4 Authentication services End sites that host or access services that authenticate using the IP address need to ensure changes to advertised IP addresses at either the client or host site, are coordinated at both end user sites. 5.5 GP firewall rule table Changes to GP firewall rule tables to allow new incoming sessions into the GP LAN should be requested through your network service provider. 6 IPv6 6.1 Overview IPv6 is designated as the successor to IPv4, with the main driving force for its design being the expected depletion of the IPv4 public address space. The standard is specified in RFC2460: Internet Protocol, Version 6 (IPv6) Specification. Where IPv4 uses 32 bit addresses IPv6 uses 128 bits, resulting in an immensely larger address space than IPv4 (around 79 Octillion times the IPv4 address space), with the IPv6 subnet size standardised at 64 bits. This expanded address space eliminates the primary need for network address translation (NAT), from the network design point of view, as increased flexibility in IP address allocation and routing is provided by IPv6. As well as increased IP address space IPv6 provides several key benefits over IPv4, including: Simpler packet headers. IPv6 specifies a new packet format, designed to minimise packet-header processing. IPv6 provides better capabilities to support auto-configuration, such as Dynamic Host Configuration Protocol (DHCP), multicasting, traffic engineering, and zero configuration networking. Mandatory IPsec support. IPsec was originally developed for IPv6. Copyright 2017 Health and Social Care Information Centre. Page 15 of 25

16 6.2 IPv4 to IPv6 Transition Mechanisms (All information in this section is sourced from: RIPE NCC IPv6 Transition Mechanisms) IPv4 and IPv6 cannot communicate directly with each other. Network operators need to run IPv4 and IPv6 networks in parallel in order to ensure that all parts of the Internet remain reachable for everyone. There are various transition mechanisms that make this possible. Transition Mechanisms allow: IPv6 devices to communicate with each other over an IPv4 network ( tunnelling ) IPv6 devices to communicate with IPv4 devices ( translation ) Transition Mechanisms discussed in this section include: Tunnelling and Encapsulation: 6in4 6to4 6rd DS-lite Translation: Nat64 and DNS64 464XLAT When IPv6 was developed in the 1990s as the new Internet protocol to replace IPv4, which was already running out at that time, it was assumed that the transition would happen relatively swiftly and there wouldn t be a long period when both protocols would be used extensively at the same time. As we now know, this assumption was wrong and for the foreseeable future, both protocols will have to be used side by side until IPv6 is more widely deployed. However, this poses a challenge, because IPv6 was not developed to be backward compatible with IPv4. This means that an IPv4 device and an IPv6 device cannot communicate directly with each other without some mechanism or device in between. These mechanisms are called transition mechanisms Tunnelling and Encapsulation To connect IPv6 devices over an IPv4 network, an IPv6 tunnel over the IPv4 network is used. In the context of IPv4 to IPv6 transition, the IETF RFC4213 (Basic Transition Mechanisms for IPv6 Hosts and Routers) defines tunnelling as: A technique for establishing point-to-point tunnels by encapsulating IPv6 packets within IPv4 headers to carry them over IPv4 routing infrastructures. The IPv6 packet originating from the sender s IPv6 device is encapsulated at the entry node of the tunnel, where it gets an additional IPv4 header and then travels through the IPv4 Copyright 2017 Health and Social Care Information Centre. Page 16 of 25

17 network as an IPv4 packet. At the tunnel exit node, the IPv4 header gets removed (decapsulated) and the package reaches the destination IPv6 device as an IPv6 packet in4 6in4 uses tunnelling to encapsulate IPv6 traffic over explicitly, manually configured IPv4 links. The IPv4 tunnel endpoint address is determined by configuration information on the encapsulating node. 6in4 is the simplest tunnelling mechanism a manually configured tunnel towards a fixed tunnel broker. It is reliable and stable, but not scalable it s not suitable for a provider deploying IPv6 for a large customer base. However, this method is especially suitable for an individual home or small-site user to set up IPv6 connectivity via a tunnel broker, if the network provider doesn t provide IPv6 connectivity. Copyright 2017 Health and Social Care Information Centre. Page 17 of 25

18 to4 6to4 is generally not used anymore. It is a tunnelling technique that solved the disadvantage of the 6in4 tunnelling technique not being scalable. A provider could use it to roll out IPv6 deployment to a large customer base. However, 6to4 has a major drawback: it can cause unacceptably long latencies, resulting in negative user experiences. 6to4 uses only the 2002::/16 IPv6 prefix and the /24 IPv4 prefix for all the tunnel endpoints (tunnel entry and exit nodes) anywhere in the world. When a source 6to4 IPv6 device (which is often the tunnel entry point as well) wants to communicate with a destination IPv6 device, the tunnel entry point can find a tunnel exit point automatically by anycasting the prefix no tunnel configuration is necessary. However, the 6to4 end user device needs a public IPv4 address. The IPv4 tunnel exit point is embedded in bit numbers of the 6to4 IPv6 address. So the tunnel entry point automatically takes the IPv4 address of the tunnel exit point from the IPv6 address of the destination. A schematic representation of the different parts of a 6to4 IPv6 address: Since the tunnel endpoints are anycasted, the user has no control over which tunnel endpoint will be used. The return traffic can also choose another tunnel entry point, which can create asymmetrical routing, long latencies, and unacceptably long waiting times for users. Copyright 2017 Health and Social Care Information Centre. Page 18 of 25

19 rd The 6rd tunnelling technique was developed to fix the issues with long latencies that characterised 6to4, while maintaining scalability. The principle behind 6rd tunnelling is similar to that of 6to4, with the main difference being that the ISP s IPv4 and IPv6 address space is used for the tunnel endpoints. This means anycast is no longer used, and traffic is symmetrical and controlled by the ISP. Just like with 6to4, the IPv4 addresses of the tunnel endpoints have to be embedded in the IPv6 address of the end user device. Since the first 32 bits of the end user device s IPv6 address will be taken up by the ISP s prefix and the second 32 bits will be the embedded IPv4 address of the tunnel endpoints, only one /64 IPv6 range is available for each device. Requesting a larger allocation of address space (a /29 instead of a /32) would mean three more bits, which equals eight IPv6 subnets that can be assigned to each end user device, instead of just one. You can also choose to embed only the variable part of your IPv4 address in the 6rd IPv6 address. If you are using a /21 IPv4 allocation, that would mean embedding only the variable bits the last 11 bits (32-21 = 11bits) instead of embedding all 32 bits of the IPv4 address. Copyright 2017 Health and Social Care Information Centre. Page 19 of 25

20 Combining both measures (requesting a /29 IPv6 allocation and only using the variable bits of the IPv4 address) gives us the following: DS-lite In contrast to all the other transitioning mechanisms discussed above, DS-lite encapsulates IPv4 packets in IPv6 packets, resulting in the tunnelling of IPv4 over IPv6. This is just the opposite of all the other transitioning techniques discussed. DS-lite enables an IPv6 device to connect to IPv4 devices and the IPv4 Internet. The main purpose of DS-lite is for the ISP to avoid deploying a public IPv4 address to the customer's Customer Premises Equipment (CPE). Instead, only global IPv6 addresses are assigned. The CPE distributes private IPv4 addresses for the clients the same as a NAT device. However, instead of performing the NAT itself, the CPE encapsulates the IPv4 packet inside an IPv6 packet. The CPE uses its global IPv6 connection to deliver the packet to the ISP s carrier-grade NAT (CGN), which has a public IPv4 address. The IPv6 packet is decapsulated, restoring the original IPv4 packet. NAT is performed on the IPv4 packet and it is routed to the public IPv4 Internet. Copyright 2017 Health and Social Care Information Centre. Page 20 of 25

21 6.2.2 Translation In the case of translation, the IPv6 packet is not encapsulated in an IPv4 packet. Rather, the IPv6 header of the packet is replaced by an IPv4 header: so the IPv6 packet is converted into an IPv4 packet. NAT64/DNS64 NAT64/DNS64 is a technique that makes it possible for IPv6-only clients to talk to IPv4 devices. In the provider s domain there is a translator box (Nat64 server) that strips the IPv6 headers off the packets and replaces them with IPv4 headers. The NAT64 server is the endpoint for at least one IPv4 address and an IPv6 network segment of 32-bits (for example, 64:ff9b::/96). The central part of this mechanism is DNS64. In the case of DNS64, the DNS server converts IPv6 DNS queries into IPv4 DNS queries, and then converts the received answers (the IPv4 DNS records) into IPv6 records, which can be interpreted by the IPv6-only device. NAT64/DNS64 is used by large mobile providers. One issue is that some mobile phone apps are only supported over IPv4 and are not IPv6 capable. To solve this issue, an additional transition mechanism called 464XLAT is used in combination with NAT64/DNS XLAT works by installing software (CLAT demon) on the IPv6 mobile device. 464XLAT gives the mobile device a dummy (private) IPv4, so the IPv4-only applications can now work with an IPv4 address, and the demon translates locally on the mobile to IPv6. Copyright 2017 Health and Social Care Information Centre. Page 21 of 25

22 6.2.3 Conclusion Any transitioning technique adds complexity and requires more network management and should be avoided if possible. Dual stacking your entire network is the preferable solution if possible Further Reading IPv6 Transition Mechanisms Videos (RIPE NCC) A Comparison of IPv6 over IPv4 Tunnel Mechanisms (IETF Internet-Draft) Case Study: T-Mobile US Goes IPv6-only Using 464XLAT (Internet Society) Copyright 2017 Health and Social Care Information Centre. Page 22 of 25

23 7 Glossary of Terms Term / Abbreviation ALG Anycast Address BGP4 BOOTP CGN CIDR CLAT CPE DHCP DNS What it stands for ALG or Application Layer Gateway is a software component that manages specific application protocols such as SIP (Session Initiation Protocol) and FTP (File Transfer Protocol). An ALG acts an intermediary between the Internet and an application server that can understand the application protocol. The IETF RFC4291 IP Version 6 Addressing Architecture defines an Anycast Address as: An identifier for a set of interfaces (typically belonging to different nodes). A packet sent to an anycast address is delivered to one of the interfaces identified by that address (the "nearest" one, according to the routing protocols' measure of distance). Border Gateway Protocol is a standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems (AS) on the Internet. The current version of BGP is version 4 (BGP4), which was published as RFC4271 in 2006 which updated the specification with common industry practices and includes support for Classless Inter-Domain Routing and use of route aggregation to decrease the size of routing tables. The Bootstrap Protocol (BOOTP) is a computer networking protocol used in Internet Protocol networks to automatically assign an IP address to network devices from a configuration server. Carrier Grade Network Address Translation (CGN) - a large-scale NAT that translates private IPv4 addresses into public IPv4 addresses. CGN employs Network Address and Port Translation methods to aggregate multiple private IPv4 addresses into fewer public IPv4 addresses. (Source: Cisco) Classless Interdomain Routing - allows for the aggregation of different classes of IPv4 addresses. CIDR involves two portions of an IPv4 address, the network portion and the host portion. The network portion (the left-most bits) of a given IP address identifies a given network. The right-most bits are the host portion which identifies the host within a network. CIDR allows for the host portion of an IPv4 address to, in effect, borrow bits from the network portion, thus allowing for the conservation of address space, and allowing for more control within the local network. CLAT handles the translation of IPv4 to IPv6 for applications that do not support DNS64. CLAT is needed when transitioning to IPv6 on GSM networks using NAT64 as the IPv4 access method. Customer Premises Equipment associated equipment, generally a router (or modem e.g. DSL), located at the customer or subscriber's premises and connected with a network provider or carrier's telecommunication channel at the demarcation point i.e. where the provider service connects to the customer network. Dynamic Host Configuration Protocol (DHCP) is a network protocol that enables a server to automatically assign an IP address to a computer from a defined range of numbers (i.e., a scope) configured for a given network. Domain Name System - The Internet's system for converting alphabetic names into numeric IP addresses. For example, when a Web address (URL) is typed into a browser, DNS servers return the IP address of the Web server associated with that name. Copyright 2017 Health and Social Care Information Centre. Page 23 of 25

24 ESP (IPSec) FTP Encapsulating Security Payload (ESP) is a member of the IPsec protocol suite. In IPsec it provides origin authenticity, integrity and confidentiality protection of packets. Defined in RFC4303. File Transfer Protocol - a standard Internet protocol for transmitting files between computers over TCP/IP connections. H.323 H.323 is a recommendation from the ITU Telecommunication Standardization Sector (ITU-T) that defines the protocols to provide audiovisual communication sessions on any packet network. H.323 is commonly used in VoIP, Internet Telephony, and IP-based videoconferencing. HSCN IETF IPSec IPv4 IPv6 ISP MAC Address Multicast Address MX N3 NAT NAT-T NOS OSPF PAT / NAPT Health and Social Care Network Internet Engineering Task Force - a large open international community of network designers, operators, vendors, and researchers concerned with the evolution of the Internet architecture and Internet standards. IETF deals particularly with TCP/IP standards and the IP suite. Internet Protocol Security (IPsec) is a protocol suite for secure Internet Protocol (IP) communications that works by authenticating and encrypting each IP packet of a communication. Internet Protocol version 4 is the fourth revision of the Internet Protocol (IP). Internet Protocol version 6 is the most recent version of the Internet Protocol (IP). Internet Service Provider - a company that provides individuals and other companies with access to the Internet and other related services such as Web site building and virtual hosting. Media Access Control address - a hardware address that uniquely identifies each node of a network. The IETF RFC4291 IP Version 6 Addressing Architecture defines a Multicast Address as: An identifier for a set of interfaces (typically belonging to different nodes). A packet sent to a multicast address is delivered to all interfaces identified by that address. An MX record is an entry in a DNS table which controls where mail for a particular domain name is sent. NHS National Network. Network address translation (NAT) is a method of remapping one IP address space into another by modifying network address information in Internet Protocol (IP) datagram packet headers while they are in transit across a traffic routing device. NAT Traversal - a computer networking technique of establishing and maintaining Internet protocol connections across gateways that implement network address translation (NAT). An operating system designed for computer networking to allow shared file and printer access among multiple computers in a network, enable the sharing of data, users, groups, security, applications, and other networking functions, typically over a LAN or private network. Open Shortest Path First - a routing protocol for IP networks which uses a link state routing (LSR) algorithm and falls into the group of interior gateway protocols (IGPs), operating within a single autonomous system (AS). It is defined as OSPF Version 2 in RFC2328 (1998) for IPv4. Updates for IPv6 are specified as OSPF Version 3 in RFC5340 (2008). Port Address Translation, also referred to as Network Address Port Translation, is a method by which many network addresses and their Copyright 2017 Health and Social Care Information Centre. Page 24 of 25

25 RFC RIPE NCC RSVP SMTP SNMP SSL TCP/IP TN UDP URL VPN TCP/UDP ports are translated into a single network address and its TCP/UDP ports. See RFC3022 section 2.2. A Request for Comments (RFC) is a formal document from the Internet Engineering Task Force (IETF) that is the result of committee drafting and subsequent review by interested parties. The Réseaux IP Européens Network Coordination Centre (RIPE NCC) is the Regional Internet Registry (RIR) for Europe, the Middle East and parts of Central Asia. Resource Reservation Protocol is used by a host to request specific qualities of service from the network for particular application data streams or flows. See RFC2205. Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail ( ) transmission. First defined by RFC 821 in 1982, it was last updated in 2008 with the Extended SMTP additions by RFC 5321, which is the protocol in widespread use today. Simple Network Management Protocol - a set of protocols for network management and monitoring supported by many typical network devices such as routers, hubs, bridges, switches, servers, workstations, printers, and other network components and devices. Secure Sockets Layer - a standard security technology for establishing an encrypted link between a server and a client, typically a web server (website) and a browser, or a mail server and a mail client. Transmission Control Protocol/Internet Protocol is the basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network. TCP and IP are two distinct computer network protocols but so commonly used together that TCP/IP has become standard terminology for referring to either or both of the protocols. Transition Network - a backbone network service providing Core network functionality; Points of Presence (PoPs); external Gateways; Access PoPs supporting Legacy N3 Access Services, Head End services; Broadband; Video Conferencing (VC); Virtual Private Network (VPN); IP Address Management (IPAM); Domain Name System (DNS); Network Time Protocol (NTP); Enhanced Internet Gateway (EIG); Enhanced Monitoring Service (EMS); Advanced Behavioural Analysis Suite (ABAS); Security Management Services; connectivity to the HSCN Peering Exchange Network; and Transitional Assistance to migrate TN end users from the legacy environment to the new HSCN environment. User Datagram Protocol - part of the Internet Protocol suite. An alternative communications protocol to Transmission Control Protocol (TCP) used primarily for establishing low-latency and loss tolerating connections between applications. UDP is officially defined in RFC768. A Uniform Resource Locator is a reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it. Virtual Private Network - a private network that is built over a public infrastructure. Security mechanisms, such as encryption, allow VPN users to securely access a network from different locations via a public telecommunications network, most frequently the Internet. Copyright 2017 Health and Social Care Information Centre. Page 25 of 25

HSCN Internet Protocol (IP) addressing policy

HSCN Internet Protocol (IP) addressing policy HSCN Internet Protocol (IP) addressing policy Published 24 May 2017 Copyright 2017Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body created

More information

HSCN Quality of Service (QoS) Policy

HSCN Quality of Service (QoS) Policy HSCN Quality of Service (QoS) Policy Published March 2018 Copyright 2018 Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body created by statute,

More information

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP

More information

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12 TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group

More information

IPv6 Transition Mechanisms

IPv6 Transition Mechanisms IPv6 Transition Mechanisms Petr Grygárek rek 1 IPv6 and IPv4 Coexistence Expected to co-exist together for many years Some IPv4 devices may exist forever Slow(?) transition of (part of?) networks to IPv6

More information

Internet Routing Protocols, DHCP, and NAT

Internet Routing Protocols, DHCP, and NAT Internet Routing Protocols, DHCP, and NAT Hwajung Lee Modified from Slides Courtesy of Cisco Networking Academy and the book titled Communication Networks by Leon-Garcia Contents Basic Routing Single Area

More information

EEC-684/584 Computer Networks

EEC-684/584 Computer Networks EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking

More information

Integrated Security 22

Integrated Security 22 OUR 15TH YEAR CISCO SYSTEMS USERS MAGAZINE FIRST QUARTER 2003 Integrated Security 22 Safeguarding the Network from Within 18 IPv6 ing Strategies 55 Managed Services on the Rise 68 From Networking Academy

More information

Foreword xxiii Preface xxvii IPv6 Rationale and Features

Foreword xxiii Preface xxvii IPv6 Rationale and Features Contents Foreword Preface xxiii xxvii 1 IPv6 Rationale and Features 1 1.1 Internet Growth 1 1.1.1 IPv4 Addressing 1 1.1.2 IPv4 Address Space Utilization 3 1.1.3 Network Address Translation 5 1.1.4 HTTP

More information

TCP/IP Protocol Suite and IP Addressing

TCP/IP Protocol Suite and IP Addressing TCP/IP Protocol Suite and IP Addressing CCNA 1 v3 Module 9 10/11/2005 NESCOT CATC 1 Introduction to TCP/IP U.S. DoD created the TCP/IP model. Provides reliable data transmission to any destination under

More information

IPv6 Transition Mechanisms

IPv6 Transition Mechanisms IPv6 Transition Mechanisms Petr Grygárek rek 1 IPv6 and IPv4 Coexistence Expected to co-exist together for many years Some IPv4 devices may exist forever Slow(?) transition of (part of?) networks to IPv6

More information

Integrated Services. Integrated Services. RSVP Resource reservation Protocol. Expedited Forwarding. Assured Forwarding.

Integrated Services. Integrated Services. RSVP Resource reservation Protocol. Expedited Forwarding. Assured Forwarding. Integrated Services An architecture for streaming multimedia Aimed at both unicast and multicast applications An example of unicast: a single user streaming a video clip from a news site An example of

More information

Planning for Information Network

Planning for Information Network Planning for Information Network Lecture 7: Introduction to IPv6 Assistant Teacher Samraa Adnan Al-Asadi 1 IPv6 Features The ability to scale networks for future demands requires a limitless supply of

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring Dual-Stack Lite for IPv6 Access Release NCE0025 Modified: 2016-10-12 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Hands-On TCP/IP Networking

Hands-On TCP/IP Networking Hands-On Course Description In this Hands-On TCP/IP course, the student will work on a live TCP/IP network, reinforcing the discussed subject material. TCP/IP is the communications protocol suite on which

More information

1. IPv6 is the latest version of the TCP/IP protocol. What are some of the important IPv6 requirements?

1. IPv6 is the latest version of the TCP/IP protocol. What are some of the important IPv6 requirements? 95 Chapter 7 TCP/IP Protocol Suite and IP Addressing This chapter presents an overview of the TCP/IP Protocol Suite. It starts with the history and future of TCP/IP, compares the TCP/IP protocol model

More information

Network Address Translation (NAT)

Network Address Translation (NAT) The following topics explain and how to configure it. Why Use NAT?, page 1 NAT Basics, page 2 Guidelines for NAT, page 8 Configure NAT, page 12 Translating IPv6 Networks, page 40 Monitoring NAT, page 51

More information

Solved MCQ of Computer networking. Set-1

Solved MCQ of Computer networking. Set-1 Solved MCQ of Computer networking Set-1 1. The computer network is A) Network computer with cable B) Network computer without cable C) Both of the above D) None of the above 2. FDDI used which type of

More information

NT1210 Introduction to Networking. Unit 9:

NT1210 Introduction to Networking. Unit 9: NT1210 Introduction to Networking Unit 9: Chapter 9, The Internet Objectives Identify the major needs and stakeholders for computer networks and network applications. Identify the classifications of networks

More information

Unit 5 - IPv4/ IPv6 Transition Mechanism(8hr) BCT IV/ II Elective - Networking with IPv6

Unit 5 - IPv4/ IPv6 Transition Mechanism(8hr) BCT IV/ II Elective - Networking with IPv6 5.1 Tunneling 5.1.1 Automatic Tunneling 5.1.2 Configured Tunneling 5.2 Dual Stack 5.3 Translation 5.4 Migration Strategies for Telcos and ISPs Introduction - Transition - the process or a period of changing

More information

IPv6 migration challenges and Security

IPv6 migration challenges and Security IPv6 migration challenges and Security ITU Regional Workshop for the CIS countries Recommendations on transition from IPv4 to IPv6 in the CIS region, 16-18 April 2014 Tashkent, Republic of Uzbekistan Desire.karyabwite@itu.int

More information

Fundamentals of IP Networking 2017 Webinar Series Part 4 Building a Segmented IP Network Focused On Performance & Security

Fundamentals of IP Networking 2017 Webinar Series Part 4 Building a Segmented IP Network Focused On Performance & Security Fundamentals of IP Networking 2017 Webinar Series Part 4 Building a Segmented IP Network Focused On Performance & Security Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services

More information

IPv6: An Introduction

IPv6: An Introduction Outline IPv6: An Introduction Dheeraj Sanghi Department of Computer Science and Engineering Indian Institute of Technology Kanpur dheeraj@iitk.ac.in http://www.cse.iitk.ac.in/users/dheeraj Problems with

More information

IPv4 addressing, NAT. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.

IPv4 addressing, NAT. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley. IPv4 addressing, NAT http://xkcd.com/195/ Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Some materials copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights

More information

Networking: Network layer

Networking: Network layer control Networking: Network layer Comp Sci 3600 Security Outline control 1 2 control 3 4 5 Network layer control Outline control 1 2 control 3 4 5 Network layer purpose: control Role of the network layer

More information

IPv6 Rapid Deployment: Provide IPv6 Access to Customers over an IPv4-Only Network

IPv6 Rapid Deployment: Provide IPv6 Access to Customers over an IPv4-Only Network White Paper IPv6 Rapid Deployment: Provide IPv6 Access to Customers over an IPv4-Only Network What You Will Learn IPv6 Rapid Deployment (6rd) (RFC 5969) 6rd is a stateless tunneling mechanism which allows

More information

BIG-IP CGNAT: Implementations. Version 12.1

BIG-IP CGNAT: Implementations. Version 12.1 BIG-IP CGNAT: Implementations Version 12.1 Table of Contents Table of Contents Deploying a Carrier Grade NAT... 7 Overview: The carrier-grade NAT (CGNAT) module... 7 About ALG Profiles...8 About CGNAT

More information

BIG-IP CGNAT: Implementations. Version 13.0

BIG-IP CGNAT: Implementations. Version 13.0 BIG-IP CGNAT: Implementations Version 13.0 Table of Contents Table of Contents Deploying a Carrier Grade NAT... 9 Overview: The carrier-grade NAT (CGNAT) module... 9 About ALG Profiles...10 About CGNAT

More information

5. Providing a narrower address space is the primary design goal for IPv6.

5. Providing a narrower address space is the primary design goal for IPv6. Chapter 2: IP Addressing and Related Topics TRUE/FALSE 1. IP addresses can be represented as domain names to make it possible for users to identify and access resources on a network. T PTS: 1 REF: 59 2.

More information

Chapter 3 - Implement an IP Addressing Scheme and IP Services to Meet Network Requirements for a Small Branch Office

Chapter 3 - Implement an IP Addressing Scheme and IP Services to Meet Network Requirements for a Small Branch Office ExamForce.com 640-822 CCNA ICND Study Guide 31 Chapter 3 - Implement an IP Addressing Scheme and IP Services to Meet Network Requirements for a Small Branch Office Describe the need and role of addressing

More information

Transition To IPv6 October 2011

Transition To IPv6 October 2011 Transition To IPv6 October 2011 Fred Bovy ccie #3013 fred@fredbovy.com 2011 Fred Bovy fred@fredbovy.com. Transition to IPv6 1 1st Generation: The IPv6 Pioneers Tunnels for Experimental testing or Enterprises

More information

Chapter 18 and 22. IPv4 Address. Data Communications and Networking

Chapter 18 and 22. IPv4 Address. Data Communications and Networking University of Human Development College of Science and Technology Department of Information Technology Chapter 18 and 22 Data Communications and Networking IPv4 Address 1 Lecture Outline IPv4 Addressing

More information

Full file at

Full file at ch02 True/False Indicate whether the statement is true or false. 1. IP addresses have links to domain names to make it possible for users to identify and access resources on a network. 2. As a frame moves

More information

LOGICAL ADDRESSING. Faisal Karim Shaikh.

LOGICAL ADDRESSING. Faisal Karim Shaikh. LOGICAL ADDRESSING Faisal Karim Shaikh faisal.shaikh@faculty.muet.edu.pk DEWSNet Group Dependable Embedded Wired/Wireless Networks www.fkshaikh.com/dewsnet IPv4 ADDRESSES An IPv4 address is a 32-bit address

More information

The Interconnection Structure of. The Internet. EECC694 - Shaaban

The Interconnection Structure of. The Internet. EECC694 - Shaaban The Internet Evolved from the ARPANET (the Advanced Research Projects Agency Network), a project funded by The U.S. Department of Defense (DOD) in 1969. ARPANET's purpose was to provide the U.S. Defense

More information

IT220 Network Standards & Protocols. Unit 9: Chapter 9 The Internet

IT220 Network Standards & Protocols. Unit 9: Chapter 9 The Internet IT220 Network Standards & Protocols Unit 9: Chapter 9 The Internet 3 Objectives Identify the major needs and stakeholders for computer networks and network applications. Identify the classifications of

More information

Network Address Translation (NAT) Contents. Firewalls. NATs and Firewalls. NATs. What is NAT. Port Ranges. NAT Example

Network Address Translation (NAT) Contents. Firewalls. NATs and Firewalls. NATs. What is NAT. Port Ranges. NAT Example Contents Network Address Translation (NAT) 13.10.2008 Prof. Sasu Tarkoma Overview Background Basic Network Address Translation Solutions STUN TURN ICE Summary What is NAT Expand IP address space by deploying

More information

SD-WAN Deployment Guide (CVD)

SD-WAN Deployment Guide (CVD) SD-WAN Deployment Guide (CVD) All Cisco Meraki security appliances are equipped with SD-WAN capabilities that enable administrators to maximize network resiliency and bandwidth efficiency. This guide introduces

More information

01/17/08 TDC /17/08 TDC363-03

01/17/08 TDC /17/08 TDC363-03 Introduction to LAN TDC 363 Week 3 Network Protocols Book: Chapter 4 & 11 1 Outline The TCP/IP model vs. the OSI Model IP Address Address Resolution Protocol (ARP) IPX/SPX and NetBIOS Protocols on Windows

More information

Network Protocols - Revision

Network Protocols - Revision Network Protocols - Revision Luke Anderson luke@lukeanderson.com.au 18 th May 2018 University Of Sydney Overview 1. The Layers 1.1 OSI Model 1.2 Layer 1: Physical 1.3 Layer 2: Data Link MAC Addresses 1.4

More information

Domain 1.0 Network Technologies

Domain 1.0 Network Technologies ExamForce.com CompTIA Network+ N10-004 Study Guide 1 Domain 1.0 Network Technologies Chapter 1 1.1 Explain the function of common networking protocols TCP TCP is a connection oriented protocol that provides

More information

Network Address Translation (NAT)

Network Address Translation (NAT) The following topics explain and how to configure it. Why Use NAT?, page 1 NAT Basics, page 2 Guidelines for NAT, page 7 Dynamic NAT, page 12 Dynamic PAT, page 21 Static NAT, page 40 Identity NAT, page

More information

Network Address Translation (NAT) Background Material for Overlay Networks Course. Jan, 2013

Network Address Translation (NAT) Background Material for Overlay Networks Course. Jan, 2013 Network Address Translation (NAT) Background Material for Overlay Networks Course Jan, 2013 Prof. Sasu Tarkoma University of Helsinki, Department of Computer Science Contents Overview Background Basic

More information

Why IPv6? Roque Gagliano LACNIC

Why IPv6? Roque Gagliano LACNIC Why IPv6? Roque Gagliano LACNIC Agenda Initial Concepts. IPv6 History. What is IPv6? Planning IPv6. Agenda Initial Concepts. IPv6 History. What is IPv6? Planning IPv6. Some initial concepts. IPv6 is the

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

Configuring a DHCP Server DHCP Operation

Configuring a DHCP Server DHCP Operation CCNA4 Chapter 7 * Configuring a DHCP Server The steps to configure a router as a DHCP server: Step 1. Define a range of addresses that DHCP is not to allocate. These are usually static addresses reserved

More information

Internetworking Part 2

Internetworking Part 2 CMPE 344 Computer Networks Spring 2012 Internetworking Part 2 Reading: Peterson and Davie, 3.2, 4.1 19/04/2012 1 Aim and Problems Aim: Build networks connecting millions of users around the globe spanning

More information

Mapping of Address and Port (MAP) an ISPs Perspective. E. Jordan Gottlieb Principal Engineer Charter Communications

Mapping of Address and Port (MAP) an ISPs Perspective. E. Jordan Gottlieb Principal Engineer Charter Communications Mapping of Address and Port () an ISPs Perspective E. Jordan Gottlieb Principal Engineer Charter Communications jordan.gottlieb@charter.com Agenda What is? Benefits of in Action Algorithms in Action Deployment

More information

A few notes. The following slides are NOT from the online curriculum. However, they do cover the same topics using different examples.

A few notes. The following slides are NOT from the online curriculum. However, they do cover the same topics using different examples. Objectives This module explores the evolution and extension of IPv4, including the key scalability features that engineers have added to it over the years: Subnetting Classless interdomain routing (CIDR)

More information

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964 The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Six Designing Models for Addressing and Naming Copyright 2010 Cisco Press & Priscilla Oppenheimer Guidelines for Addressing and Naming Use a structured model for addressing

More information

ECE 158A: Lecture 7. Fall 2015

ECE 158A: Lecture 7. Fall 2015 ECE 158A: Lecture 7 Fall 2015 Outline We have discussed IP shortest path routing Now we have a closer look at the IP addressing mechanism We are still at the networking layer, we will examine: IP Headers

More information

FREQUENTLY ASKED QUESTIONS ABOUT IPv6

FREQUENTLY ASKED QUESTIONS ABOUT IPv6 FREQUENTLY ASKED QUESTIONS ABOUT IPv6 What is an IP? The letters IP stand for Internet Protocol. This protocol comprises a series of rules used by devices (computers, servers, routers and other equipment:

More information

Configuring NAT for IP Address Conservation

Configuring NAT for IP Address Conservation This module describes how to configure Network Address Translation (NAT) for IP address conservation and how to configure inside and outside source addresses. This module also provides information about

More information

Migration to IPv6 from IPv4. Is it necessary?

Migration to IPv6 from IPv4. Is it necessary? Introduction Today Internet plays a big role in every aspect of our lives and IP acted as an important pillar of Internet. Since its inception the Internet has reached almost all corners of globe and it

More information

Finding Feature Information

Finding Feature Information This module describes how to configure Network Address Translation (NAT) for IP address conservation and how to configure inside and outside source addresses. This module also provides information about

More information

white paper The Benefits of IPv6 for the Mobile Internet

white paper The Benefits of IPv6 for the Mobile Internet The Benefits of IPv6 for the Mobile Internet Table of contents Executive Summary 3 Introduction 4 The Benefits of IPv6 4 Addressing 4 Security 6 Performance 6 Administration 7 Mobility 7 IPv6 in the Mobile

More information

Transition Strategies from IPv4 to IPv6: The case of GRNET

Transition Strategies from IPv4 to IPv6: The case of GRNET Transition Strategies from IPv4 to IPv6: The case of GRNET C. Bouras 1,2, P. Ganos 1, A. Karaliotas 1,2 1 Research Academic Computer Technology Institute, Patras, Greece 2 Department of Computer Engineering

More information

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst EITF25 Internet Techniques and Applications L7: Internet Stefan Höst What is Internet? Internet consists of a number of networks that exchange data according to traffic agreements. All networks in Internet

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4 CCNA Exploration Network Fundamentals Chapter 06 Addressing the Network IPv4 Updated: 20/05/2008 1 6.0.1 Introduction Addressing is a key function of Network layer protocols that enables data communication

More information

Acknowledgments. Part One - Introduction to the TCP/IP Protocol

Acknowledgments. Part One - Introduction to the TCP/IP Protocol Illustrated TCP/IP by Matthew G. Naugle Wiley Computer Publishing, John Wiley & Sons, Inc. ISBN: 0471196568 Pub Date: 11/01/98 Acknowledgments Part One - Introduction to the TCP/IP Protocol Chapter 1 -

More information

OSI Data Link & Network Layer

OSI Data Link & Network Layer OSI Data Link & Network Layer Erkki Kukk 1 Layers with TCP/IP and OSI Model Compare OSI and TCP/IP model 2 Layers with TCP/IP and OSI Model Explain protocol data units (PDU) and encapsulation 3 Addressing

More information

Configuring the Cisco IOS DHCP Relay Agent

Configuring the Cisco IOS DHCP Relay Agent All Cisco devices that run Cisco software include a DHCP server and the relay agent software. A DHCP relay agent is any host or IP device that forwards DHCP packets between clients and servers. This module

More information

Chapter 7. IP Addressing Services. IP Addressing Services. Part I

Chapter 7. IP Addressing Services. IP Addressing Services. Part I Chapter 7 IP Addressing Services Part I CCNA4-1 Chapter 7-1 IP Addressing Services Dynamic Host Configuration Protocol (DHCP) CCNA4-2 Chapter 7-1 Dynamic Host Configuration Protocol (DHCP) Every device

More information

Virtual Private Networks (VPNs)

Virtual Private Networks (VPNs) CHAPTER 19 Virtual Private Networks (VPNs) Virtual private network is defined as customer connectivity deployed on a shared infrastructure with the same policies as a private network. The shared infrastructure

More information

Multicast Technology White Paper

Multicast Technology White Paper Multicast Technology White Paper Keywords: Multicast, IGMP, IGMP Snooping, PIM, MBGP, MSDP, and SSM Mapping Abstract: The multicast technology implements high-efficiency point-to-multipoint data transmission

More information

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 13 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of lecture 12 Routing Congestion

More information

IPsec NAT Transparency

IPsec NAT Transparency The feature introduces support for IP Security (IPsec) traffic to travel through Network Address Translation (NAT) or Port Address Translation (PAT) points in the network by addressing many known incompatibilities

More information

CS 356: Computer Network Architectures. Lecture 15: DHCP, NAT, and IPv6. [PD] chapter 3.2.7, 3.2.9, 4.1.3, 4.3.3

CS 356: Computer Network Architectures. Lecture 15: DHCP, NAT, and IPv6. [PD] chapter 3.2.7, 3.2.9, 4.1.3, 4.3.3 CS 356: Computer Network Architectures Lecture 15: DHCP, NAT, and IPv6 [PD] chapter 3.2.7, 3.2.9, 4.1.3, 4.3.3 Xiaowei Yang xwy@cs.duke.edu Dynamic Host Configuration Protocol (DHCP) Dynamic Assignment

More information

Aeronautical Systems Center

Aeronautical Systems Center Aeronautical Systems Center Internet Protocol (IP) version 6 (converting from version 4) 20 June 2007 Dennis Ludwig ASC/XRAI DSN: 785-7887 Dennis.ludwig@wpafb.af.mil IPv6 Presentation: Objectives 1. To

More information

IP Generic Training Programs. Catalog of Course Descriptions

IP Generic Training Programs. Catalog of Course Descriptions IP Generic Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION... 4 BGP OVERVIEW & FUNDAMENTALS... 5 BNG FUNDAMENTALS... 8 BNG OVERVIEW... 10 DHCP-CLIPS FUNDAMENTALS...

More information

HP A-F1000-A-EI_A-F1000-S-EI VPN Firewalls

HP A-F1000-A-EI_A-F1000-S-EI VPN Firewalls HP A-F1000-A-EI_A-F1000-S-EI VPN Firewalls NAT Configuration Guide Part number:5998-2649 Document version: 6PW100-20110909 Legal and notice information Copyright 2011 Hewlett-Packard Development Company,

More information

Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS

Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk Date: January 17 th 2006 at 14:00 18:00 SOLUTIONS 1. General (5p) a) Draw the layered

More information

Information Network Systems The network layer. Stephan Sigg

Information Network Systems The network layer. Stephan Sigg Information Network Systems The network layer Stephan Sigg Tokyo, November 1, 2012 Error-detection and correction Decoding of Reed-Muller codes Assume a second order (16, 11) code for m = 4. The r-th order

More information

IPv4/v6 Considerations Ralph Droms Cisco Systems

IPv4/v6 Considerations Ralph Droms Cisco Systems Title IPv4/v6 Considerations Ralph Droms Cisco Systems Agenda Motivation for IPv6 Review of IPv6 Impact of differences Tools and techniques Why IPv6? More addresses More addresses More addresses Security,

More information

Performance Comparison of Internet Protocol v4 with Internet Protocol v6

Performance Comparison of Internet Protocol v4 with Internet Protocol v6 Performance Comparison of Internet Protocol v4 with Internet Protocol v6 Mrs. Sheetal Mali Department of Electronics and Telecommunication Parvatibai Genba Sopanrao Moze College of Engineering Wagholi,

More information

IPv6 Feature Facts

IPv6 Feature Facts 12.1.2 IPv6 Feature Facts The current IP addressing standard, version 4, will eventually run out of unique addresses, so a new system is being developed. It is named IP version 6 or IPv6. You should know

More information

FIGURE 3. Two-Level Internet Address Structure. FIGURE 4. Principle Classful IP Address Formats

FIGURE 3. Two-Level Internet Address Structure. FIGURE 4. Principle Classful IP Address Formats Classful IP Addressing When IP was first standardized in September 1981, the specification required that each system attached to an IP-based Internet be assigned a unique, 32-bit Internet address value.

More information

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) Application Note Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) This document describes how to configure McAfee Firewall Enterprise to provide

More information

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6 RMIT University Data Communication and Net-Centric Computing COSC 1111/2061 Internetworking IPv4, IPv6 Technology Slide 1 Lecture Overview During this lecture, we will understand The principles of Internetworking

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e Chapter 8 Networking Essentials Objectives Learn about the protocols and standards Windows uses for networking Learn how to connect

More information

Chapter 15 IPv6 Transition Technologies

Chapter 15 IPv6 Transition Technologies Chapter 15 IPv6 Transition Technologies Published: April 18, 2006 Updated: November 06, 2006 Writer: Joe Davies 1 Abstract This chapter describes the mechanisms that aid in the transition of Internet Protocol

More information

Network Working Group. Category: Informational Bay Networks Inc. September 1997

Network Working Group. Category: Informational Bay Networks Inc. September 1997 Network Working Group Request for Comments: 2185 Category: Informational R. Callon Cascade Communications Co. D. Haskin Bay Networks Inc. September 1997 Routing Aspects Of IPv6 Transition Status of this

More information

IPsec NAT Transparency

IPsec NAT Transparency sec NAT Transparency First Published: November 25, 2002 Last Updated: March 1, 2011 The sec NAT Transparency feature introduces support for Security (sec) traffic to travel through Network Address Translation

More information

Architectural Approaches to Multi-Homing for IPv6

Architectural Approaches to Multi-Homing for IPv6 Architectural Approaches to Multi-Homing for IPv6 A Walk-Through of draft-huston-multi6-architectures-00 Geoff Huston June 2004 Recap Multi-Homing in IPv4 Either: Or: Obtain a local AS Obtain PI space

More information

Configuring NAT for IP Address Conservation

Configuring NAT for IP Address Conservation This module describes how to configure Network Address Translation (NAT) for IP address conservation and how to configure inside and outside source addresses. This module also provides information about

More information

Network+ Guide to Networks 5 th Edition. Chapter 10 In-Depth TCP/IP Networking

Network+ Guide to Networks 5 th Edition. Chapter 10 In-Depth TCP/IP Networking Network+ Guide to Networks 5 th Edition Chapter 10 In-Depth TCP/IP Networking Objectives Understand methods of network design unique to TCP/IP networks, including subnetting, CIDR, and address translation

More information

IPv6 Transition Strategies

IPv6 Transition Strategies IPv6 Transition Strategies Philip Smith APNIC 36 Xi an 20 th -30 th August 2013 Last updated 25 July 2013 1 Presentation Slides p Will be available on n http://thyme.apnic.net/ftp/seminars/apnic36-

More information

IPv6 Transition Technologies (TechRef)

IPv6 Transition Technologies (TechRef) Tomado de: http://technet.microsoft.com/en-us/library/dd379548.aspx IPv6 Transition Technologies (TechRef) Updated: January 7, 2009 IPv6 Transition Technologies Protocol transitions are not easy, and the

More information

Transition Network IP Addressing Policy

Transition Network IP Addressing Policy Transition Network IP Addressing Policy Version 0.5 1 November 2017 Copyright 2017 Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body created

More information

IPv6 Transitioning. An overview of what s around. Marco Hogewoning Trainer, RIPE NCC

IPv6 Transitioning. An overview of what s around. Marco Hogewoning Trainer, RIPE NCC IPv6 Transitioning An overview of what s around Marco Hogewoning Trainer, RIPE NCC There Was a Plan The original idea was to have IPv6 deployed before we were out of IPv4 addresses By now the whole of

More information

Tunnels. Jean Yves Le Boudec 2015

Tunnels. Jean Yves Le Boudec 2015 Tunnels Jean Yves Le Boudec 2015 1. Tunnels Definition: a tunnel, also called encapsulation occurs whenever a communication layer carries packets of a layer that is not the one above e.g.: IP packet in

More information

IPv6 Transition Strategies

IPv6 Transition Strategies IPv6 Transition Strategies Philip Smith MENOG 14 Dubai 1 st April 2014 Last updated 5 th March 2014 1 Presentation Slides p Will be available on n http://thyme.apnic.net/ftp/seminars/

More information

GLOSSARY. A syslog or SNMP message notifying an operator or administrator of a problem.

GLOSSARY. A syslog or SNMP message notifying an operator or administrator of a problem. GLOSSARY A alert API audit log A syslog or SNMP message notifying an operator or administrator of a problem. Application programming interface. Specification of function-call conventions that defines an

More information

Virtual private networks

Virtual private networks Technical papers Virtual private networks Virtual private networks Virtual private networks (VPNs) offer low-cost, secure, dynamic access to private networks. Such access would otherwise only be possible

More information

Transitioning to IPv6

Transitioning to IPv6 Transitioning to IPv6 麟瑞科技區域銷售事業處副處長張晃崚 CCIE #13673 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0 7-1 IPv4 and IPv6 Currently, there are approximately 1.3 billion usable IPv4 addresses available.

More information

Radware ADC. IPV6 RFCs and Compliance

Radware ADC. IPV6 RFCs and Compliance Radware ADC IPV6 s and Compliance Knowledgebase Team February 2016 Scope: This document lists most of the s that relevant to IPv6. Legend: Yes supported N/A not applicable No Currently not supported Relevance:

More information

GLOSSARY. See ACL. access control list.

GLOSSARY. See ACL. access control list. GLOSSARY A access control list ACL API Application Programming Interface area AS ASN ATM autonomous system autonomous system number See ACL. access control list. application programming interface. APIs

More information