SlideShare une entreprise Scribd logo
1  sur  36
IPv6
Presented by: ALLAOUI   Mohamed Amine




                        ALLAOUI Mohamed Amine – CCNP
                                                       1
                            allaoui.amine@gmail.com
Plan
I.      Introduction – TCP/IP model
II.     Limitations of ipv4
       1.   Public and private addresses
       2.   NAT/PAT
       3.   IPSec
III.    Ipv6
       1.   Ipv6 concepts and addressing
       2.   Ipv6 routing
       3.   Ipv6 Security
       4.   Migration to IPv6
IV.     Ipv6/ipv4 coexistence
       1.   NAT-PT
       2.   Tunneling
       3.   Dual stacks
V.      Live Demo

                                 ALLAOUI Mohamed Amine – CCNP
                                                                2
                                     allaoui.amine@gmail.com
TCP/IP
                                         letter


  Application                    Poste / UPS / DHL



 Host-to-Host     With/ without acknowledgment of receipt


                                  • Addresses
   Internet                       • Priority
                                  • Routes

Network Access                    Cars, airplanes, ships



                 ALLAOUI Mohamed Amine – CCNP
                                                            3
                     allaoui.amine@gmail.com
TCP/IP

  Application        HTTP – FTP – Telnet – RTP – DNS – SMTP



 Host-to-Host                            TCP - UDP



   Internet                             IPv4 – IPv6



Network Access   Ethernet – PPP – HDLC – Metro Ethernet – Frame Relay



                     ALLAOUI Mohamed Amine – CCNP
                                                                        4
                         allaoui.amine@gmail.com
TCP/IP
My computer                                                                 Google.com
192.168.0.100                                                               173.194.35.2




  Application                                                            Application


  Host-to-Host                                                          Host-to-Host


    Internet        Internet                              Internet        Internet


Network Access   Network Access                       Network Access   Network Access




                               ALLAOUI Mohamed Amine – CCNP
                                                                                     5
                                   allaoui.amine@gmail.com
TCP/IP
                         Router 1                                               Google.com
 My computer
                         IP: 192.168.0.254                                      IP: 173.194.35.2
 IP: 192.168.0.100
                         Mac: mac-r1
 Mac: mac-pc1




       HTTP                                    Request                             HTTP

  TCP (source 2655,                                                             TCP (source
   destination 80)                                                          2655, destination 80)


     IPv4 (source                   IPv4 (source                                 IPv4 (source
192.168.0.100, destina        192.168.0.100, destination                    192.168.0.100, destina
  tion 173.194.35.2)                173.194.35.2                              tion 173.194.35.2


                              Ethernet
       Ethernet          Source mac-         PPP / HDLC /
Source mac-pc1,          pc1, destination                                   PPP / HDLC / ATM
destination mac-r1       mac-r1                  ATM



                                             ALLAOUI Mohamed Amine – CCNP
                                                                                            6
                                                 allaoui.amine@gmail.com
TCP/IP
                        Router 1                                              Google.com
 My computer
                        IP: 192.168.0.254                                     IP: 173.194.35.2
 IP: 192.168.0.100
                        Mac: mac-r1
 Mac: mac-pc1




        HTTP                                    Reply                            HTTP

     TCP (source                                                             TCP (source 80,
80, destination 2655)                                                       destination 2655)


    IPv4 (source                   IPv4 (source
                                                                              IPv4 (source
    192.168.0.100,                                                           192.168.0.100,
                             192.168.0.100, destination
     destination                                                               destination
                                   173.194.35.2
    173.194.35.2)                                                             173.194.35.2

       Ethernet              Ethernet
                        Source mac-         PPP / HDLC /
Source mac-
pc1, destination mac-
                        pc1, destination                                   PPP / HDLC / ATM
                        mac-r1                  ATM
r1




                                            ALLAOUI Mohamed Amine – CCNP
                                                                                         7
                                                allaoui.amine@gmail.com
Limitations of ipv4
1.   Public and private addresses
2.   NAT/PAT
3.   IPSec




                 ALLAOUI Mohamed Amine – CCNP
                                                8
                     allaoui.amine@gmail.com
IPv4 addresses
•     32 bits of addresses - 4 Octets ( A.B.C.D)
•     Total number of addresses is (2^32-1) = 4.294.967.295
•     Different classes of IP addresses.

    Class       Subnet mask                          range                     number

                                                                            126 networks of
     A            255.0.0.0             1.0.0.0              126.255.255
                                                                            16777214 hosts
                                                                            16320 networks
     B           255.255.0.0          128.0.0.0           191.255.255.255
                                                                             of 65534 hosts
                                                                                2145825
     C          255.255.255.0         192.0.0.0           223.255.255.255   networks of 254
                                                                                  hosts
         All the remaining addresses are reserved for multicast and experimentation
               Only approximately 3,5 B addresses are usable
                                  ALLAOUI Mohamed Amine – CCNP
                                                                                        9
                                      allaoui.amine@gmail.com
Public and Private addresses
• 3 ranges of addresses are used as private
  addresses
           » 192.168.0.0 – 192.168.255.255
           » 172.16.0.0 – 172.31.255.255
           » 10.0.0.0 – 10.255.255.255

• All other usable addresses are public
• Only public addresses are routed in the
  internet.

                     ALLAOUI Mohamed Amine – CCNP
                                                    10
                         allaoui.amine@gmail.com
Network Address Translation
               Range 192.168.0.0 255.255.255.0
192.168.0.1              Private
                      192.168.0.254
                                                      200.156.24.0 – 200.156.24.255
192.168.0.2
                                                          Public


192.168.0.3


                      Private                Public

                    192.168.0.1         200.168.24.1
                    192.168.0.2         200.168.24.2
                    192.168.0.3         200.168.24.3


                      ALLAOUI Mohamed Amine – CCNP
                                                                               11
                          allaoui.amine@gmail.com
Port Address Translation
                 Range 192.168.0.0 255.255.255.0
192.168.0.1                Private
                        192.168.0.254
                                                         200.156.24.4
192.168.0.2
                                                             Public


192.168.0.3
                        Private                    Public

                  private:source port       Public:source port

                  192.168.0.1:2233         200.168.24.4:2233
                  192.168.0.2:1554         200.168.24.4:1554
                  192.168.0.3:6651         200.168.24.4:6651

                          ALLAOUI Mohamed Amine – CCNP
                                                                        12
                              allaoui.amine@gmail.com
NAT/PAT
•   Uses a lot of processing power and memory
•   Hosting limitations
•   Provides basic security but not really useful
•   Slows down ip packets
•   …




                    ALLAOUI Mohamed Amine – CCNP
                                                    13
                        allaoui.amine@gmail.com
IPSec
• Security at network layer
• More reliable that transport/application layer
  security
• Consumes less processing power
• Provides a lot of features
• Provides some security to unsecure applications
• Provides authentication, protection, encryption
  and negociation

                  ALLAOUI Mohamed Amine – CCNP
                                                    14
                      allaoui.amine@gmail.com
IPSec

  Application



 Host-to-Host



   Internet



Network Access




                 ALLAOUI Mohamed Amine – CCNP
                                                15
                     allaoui.amine@gmail.com
Headers
                                               IPv4 packet         Host to Host Application




Transport Mode :                 Ipv4 packet    AH/ESP              Host to Host Application




Tunnel Mode :      IPv4 packet   AH/ESP         IPv4 packet         Host to Host Application


                                    ALLAOUI Mohamed Amine – CCNP
                                                                                               16
                                        allaoui.amine@gmail.com
IPSec
•   More overhead
•   More processing power
•   More bandwidth usage
•   More delay




                  ALLAOUI Mohamed Amine – CCNP
                                                 17
                      allaoui.amine@gmail.com
IPv6
1. Ipv6 concepts and addressing
2. Ipv6 routing
3. Ipv6 Security




                ALLAOUI Mohamed Amine – CCNP
                                               18
                    allaoui.amine@gmail.com
Ipv6 concepts and addressing

• New internet layer protocol
• 128 bits of addresses =
    340.282.366.920.938.463.463.374.607.431.770.000.000
•   Ipv6 header is less complex that IPv4.
•   No private addresses
•   No broadcasts
•   Very long addresses:
    2000:AD24:114d:aabc:1100:0001:0000:0001
                       ALLAOUI Mohamed Amine – CCNP
                                                          19
                           allaoui.amine@gmail.com
IPv6 Header




 ALLAOUI Mohamed Amine – CCNP
                                20
     allaoui.amine@gmail.com
Ipv6 concepts and addressing
• Address abbreviation
  – Ex: 2000:0000:0000:0000:0000:0000:0000:0001
    == 2000::1
  – 2000:0001::1 == 2000:1::1
• 3 types of addresses:
  – Link Local : FE80:: /10
  – Multicast : FF02 :: /8
  – Global Unicast : 2000 :: /3

                    ALLAOUI Mohamed Amine – CCNP
                                                   21
                        allaoui.amine@gmail.com
Ipv6 Routing
• Static routing
• Dynamic routing
  – RIPng
  – OSPF 3
  – EIGRP for IPv6
  – Multiprotocol BGP




                  ALLAOUI Mohamed Amine – CCNP
                                                 22
                      allaoui.amine@gmail.com
Static Routing




•   every router only knows it’s directly connected networks
•   every router needs to know how to get to all networks
•   Every router had its own routing table
•   Each route has to be added staticly to every router

                          ALLAOUI Mohamed Amine – CCNP
                                                               23
                              allaoui.amine@gmail.com
Dynamic Routing
                           • RIPng
                           • OSPF 3
                           • EIGRP for IPv6




• All routers has to use the same routing protocol
• Each router sends updates to his neighbors to tell them about networks
it knows


                               ALLAOUI Mohamed Amine – CCNP
                                                                           24
                                   allaoui.amine@gmail.com
IPv6 Security
• NDP replaced ARP and stateful DHCP
• Link local addresses are not routable
• No duplicate MAC-Address on a subnet
• « the Less we have on the header the more
  secure the protocol is »
• Ipv6 supports IPSec without adding another
  header.

                 ALLAOUI Mohamed Amine – CCNP
                                                25
                     allaoui.amine@gmail.com
Neighbor Discovery Protocol
• Hosts send a Neighbor Sollicitation to verify if
  the global unicast address is unique and if it is
  the the correct subnet (FF02::1)
• Hosts send a Neighbor Advertisement to the
  multicast address of all IPv6 hosts (FF02::1) to
  tell them about it’s link local address.
• Finally, to know how to get to the gateway,
  hosts send another NS to know the IPv6
  address of the gateway (FF02::2)

                   ALLAOUI Mohamed Amine – CCNP
                                                  26
                       allaoui.amine@gmail.com
Migration to IPv6
• Every computer supports Ipv6 since 2002
• Almost all routers support IPv6
• Servers on the Internet has to be configured
  to use IPv6
• Network Operators are not using ipv6 yet.
• Some countries in asia are already using IPv6.



                  ALLAOUI Mohamed Amine – CCNP
                                                   27
                      allaoui.amine@gmail.com
Migration to IPv6
• What are we waiting for?
  – Some feature on IPv6 are not yet industry
    standards
  – Internet users are afraid of using global unicast
    addressed
  – Networks administrators are not confortable with
    this new suite of protocols
  – Rare ressources are always more beneficial for
    Internet Operators
                   ALLAOUI Mohamed Amine – CCNP
                                                        28
                       allaoui.amine@gmail.com
Migration to IPv6
• What are we waiting for?
  – Some issues with NBMA (frame-relay, ATM, MPLS
    …)
  – Gouvernements don’t accept changes easily.




                 ALLAOUI Mohamed Amine – CCNP
                                                    29
                     allaoui.amine@gmail.com
IPv6/IPv4 coexistence
1. NAT-PT
2. Tunneling
3. Dual stacks




                 ALLAOUI Mohamed Amine – CCNP
                                                30
                     allaoui.amine@gmail.com
IPv6/IPv4 coexistence

                                                                          ISP


                                                                195.25.111.3
  CS Professors




2001:AA01:45:3::0/64
                                                           NAT -PT

                                    2001:AA01:45:3::0/64             195.25.111.3


                       ALLAOUI Mohamed Amine – CCNP
                                                                                31
                           allaoui.amine@gmail.com
IPv6/IPv4 coexistence

                                                                   ISP


                                                            195.25.111.3
  CS Professors




2001:AA01:45:3::0/64
                                                       NAT –PT
                                                         &
              Dual Stack                              Dual stack


                       ALLAOUI Mohamed Amine – CCNP
                                                                           32
                           allaoui.amine@gmail.com
NAT-PT
• Translates IPv6 addresses to IPv4 and IPv4 to
  IPv6
• Same as classic NAT and PAT
             IPv6 address                   IPv4 address

      2001:AA01:45:3::1 port 1542 195.25.111.3 port 1542
      2001:AA01:45:3::2 port 1598 195.25.111.3 port 1598
      2001:AA01:45:3::3 port 4452 195.25.111.3 port 4452




                        ALLAOUI Mohamed Amine – CCNP
                                                           33
                            allaoui.amine@gmail.com
Tunneling
• Point-to-point Tunnels
  – Ip6ip
  – Generic Router Encapsulation (GRE)
• Multipoint Tunnels
  – Automatic 6to4
  – ISATAP tunnels


             IPv4 Packet       IPv6 Packet          Host to Host Application

                     ALLAOUI Mohamed Amine – CCNP
                                                                               34
                         allaoui.amine@gmail.com
Dual Stacks
• Interfaces that run both IPv4 and IPv6 at the
  same time

                       192.168.0.1

         2001:AA01:45:9::1/64                           192.168.0.254

                                                     2001:AA01:45:9::FFFF/64
                 192.168.0.2



              2001:AA01:45:9::2/64
                      ALLAOUI Mohamed Amine – CCNP
                                                                               35
                          allaoui.amine@gmail.com
Thank you for your attention
      Any questions ?




       ALLAOUI Mohamed Amine – CCNP
                                      36
           allaoui.amine@gmail.com

Contenu connexe

Similaire à Ipv6

103 Basic network concepts
103 Basic network concepts103 Basic network concepts
103 Basic network conceptsSsendiSamuel
 
Note I only need the last 3 sub-questions ( e, f and g) 3. Firew.pdf
Note I only need the last 3 sub-questions ( e, f and g) 3. Firew.pdfNote I only need the last 3 sub-questions ( e, f and g) 3. Firew.pdf
Note I only need the last 3 sub-questions ( e, f and g) 3. Firew.pdfezonesolutions
 
Internet Protocol
Internet ProtocolInternet Protocol
Internet ProtocolAvikGhara
 
Ch02 TCP/IP Concepts Review
Ch02 TCP/IP Concepts ReviewCh02 TCP/IP Concepts Review
Ch02 TCP/IP Concepts Reviewphanleson
 
cs522_presentation.ppt
cs522_presentation.pptcs522_presentation.ppt
cs522_presentation.ppthajAli4
 
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 FinalExploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Finalmasoodnt10
 
Caffe Latte Attack Presented In Toorcon
Caffe Latte Attack Presented In ToorconCaffe Latte Attack Presented In Toorcon
Caffe Latte Attack Presented In ToorconMd Sohail Ahmad
 
บทที่ 2 โพรโตคอล (protocol)
บทที่  2 โพรโตคอล (protocol)บทที่  2 โพรโตคอล (protocol)
บทที่ 2 โพรโตคอล (protocol)chrisman77
 
Computer network (2)
Computer network (2)Computer network (2)
Computer network (2)NYversity
 
Presentacion kamailio uvigo_09262011
Presentacion kamailio uvigo_09262011Presentacion kamailio uvigo_09262011
Presentacion kamailio uvigo_09262011Quobis
 
Primer to Browser Netwroking
Primer to Browser NetwrokingPrimer to Browser Netwroking
Primer to Browser NetwrokingShuya Osaki
 

Similaire à Ipv6 (20)

11
1111
11
 
103 Basic network concepts
103 Basic network concepts103 Basic network concepts
103 Basic network concepts
 
Note I only need the last 3 sub-questions ( e, f and g) 3. Firew.pdf
Note I only need the last 3 sub-questions ( e, f and g) 3. Firew.pdfNote I only need the last 3 sub-questions ( e, f and g) 3. Firew.pdf
Note I only need the last 3 sub-questions ( e, f and g) 3. Firew.pdf
 
یادگیری هک کلاه سفید و تست نفوذ به شبکه
یادگیری هک کلاه سفید و تست نفوذ به شبکهیادگیری هک کلاه سفید و تست نفوذ به شبکه
یادگیری هک کلاه سفید و تست نفوذ به شبکه
 
Internet Protocol
Internet ProtocolInternet Protocol
Internet Protocol
 
Ch02 TCP/IP Concepts Review
Ch02 TCP/IP Concepts ReviewCh02 TCP/IP Concepts Review
Ch02 TCP/IP Concepts Review
 
TCP/IP basics
TCP/IP basicsTCP/IP basics
TCP/IP basics
 
cs522_presentation.ppt
cs522_presentation.pptcs522_presentation.ppt
cs522_presentation.ppt
 
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 FinalExploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
 
Caffe Latte Attack Presented In Toorcon
Caffe Latte Attack Presented In ToorconCaffe Latte Attack Presented In Toorcon
Caffe Latte Attack Presented In Toorcon
 
6.Routing
6.Routing6.Routing
6.Routing
 
Caffe Latte Attack
Caffe Latte AttackCaffe Latte Attack
Caffe Latte Attack
 
บทที่ 2 โพรโตคอล (protocol)
บทที่  2 โพรโตคอล (protocol)บทที่  2 โพรโตคอล (protocol)
บทที่ 2 โพรโตคอล (protocol)
 
Computer network (2)
Computer network (2)Computer network (2)
Computer network (2)
 
C14-TCPIP.ppt
C14-TCPIP.pptC14-TCPIP.ppt
C14-TCPIP.ppt
 
11
1111
11
 
11
1111
11
 
Presentacion kamailio uvigo_09262011
Presentacion kamailio uvigo_09262011Presentacion kamailio uvigo_09262011
Presentacion kamailio uvigo_09262011
 
18
1818
18
 
Primer to Browser Netwroking
Primer to Browser NetwrokingPrimer to Browser Netwroking
Primer to Browser Netwroking
 

Dernier

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Dernier (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Ipv6

  • 1. IPv6 Presented by: ALLAOUI Mohamed Amine ALLAOUI Mohamed Amine – CCNP 1 allaoui.amine@gmail.com
  • 2. Plan I. Introduction – TCP/IP model II. Limitations of ipv4 1. Public and private addresses 2. NAT/PAT 3. IPSec III. Ipv6 1. Ipv6 concepts and addressing 2. Ipv6 routing 3. Ipv6 Security 4. Migration to IPv6 IV. Ipv6/ipv4 coexistence 1. NAT-PT 2. Tunneling 3. Dual stacks V. Live Demo ALLAOUI Mohamed Amine – CCNP 2 allaoui.amine@gmail.com
  • 3. TCP/IP letter Application Poste / UPS / DHL Host-to-Host With/ without acknowledgment of receipt • Addresses Internet • Priority • Routes Network Access Cars, airplanes, ships ALLAOUI Mohamed Amine – CCNP 3 allaoui.amine@gmail.com
  • 4. TCP/IP Application HTTP – FTP – Telnet – RTP – DNS – SMTP Host-to-Host TCP - UDP Internet IPv4 – IPv6 Network Access Ethernet – PPP – HDLC – Metro Ethernet – Frame Relay ALLAOUI Mohamed Amine – CCNP 4 allaoui.amine@gmail.com
  • 5. TCP/IP My computer Google.com 192.168.0.100 173.194.35.2 Application Application Host-to-Host Host-to-Host Internet Internet Internet Internet Network Access Network Access Network Access Network Access ALLAOUI Mohamed Amine – CCNP 5 allaoui.amine@gmail.com
  • 6. TCP/IP Router 1 Google.com My computer IP: 192.168.0.254 IP: 173.194.35.2 IP: 192.168.0.100 Mac: mac-r1 Mac: mac-pc1 HTTP Request HTTP TCP (source 2655, TCP (source destination 80) 2655, destination 80) IPv4 (source IPv4 (source IPv4 (source 192.168.0.100, destina 192.168.0.100, destination 192.168.0.100, destina tion 173.194.35.2) 173.194.35.2 tion 173.194.35.2 Ethernet Ethernet Source mac- PPP / HDLC / Source mac-pc1, pc1, destination PPP / HDLC / ATM destination mac-r1 mac-r1 ATM ALLAOUI Mohamed Amine – CCNP 6 allaoui.amine@gmail.com
  • 7. TCP/IP Router 1 Google.com My computer IP: 192.168.0.254 IP: 173.194.35.2 IP: 192.168.0.100 Mac: mac-r1 Mac: mac-pc1 HTTP Reply HTTP TCP (source TCP (source 80, 80, destination 2655) destination 2655) IPv4 (source IPv4 (source IPv4 (source 192.168.0.100, 192.168.0.100, 192.168.0.100, destination destination destination 173.194.35.2 173.194.35.2) 173.194.35.2 Ethernet Ethernet Source mac- PPP / HDLC / Source mac- pc1, destination mac- pc1, destination PPP / HDLC / ATM mac-r1 ATM r1 ALLAOUI Mohamed Amine – CCNP 7 allaoui.amine@gmail.com
  • 8. Limitations of ipv4 1. Public and private addresses 2. NAT/PAT 3. IPSec ALLAOUI Mohamed Amine – CCNP 8 allaoui.amine@gmail.com
  • 9. IPv4 addresses • 32 bits of addresses - 4 Octets ( A.B.C.D) • Total number of addresses is (2^32-1) = 4.294.967.295 • Different classes of IP addresses. Class Subnet mask range number 126 networks of A 255.0.0.0 1.0.0.0 126.255.255 16777214 hosts 16320 networks B 255.255.0.0 128.0.0.0 191.255.255.255 of 65534 hosts 2145825 C 255.255.255.0 192.0.0.0 223.255.255.255 networks of 254 hosts All the remaining addresses are reserved for multicast and experimentation Only approximately 3,5 B addresses are usable ALLAOUI Mohamed Amine – CCNP 9 allaoui.amine@gmail.com
  • 10. Public and Private addresses • 3 ranges of addresses are used as private addresses » 192.168.0.0 – 192.168.255.255 » 172.16.0.0 – 172.31.255.255 » 10.0.0.0 – 10.255.255.255 • All other usable addresses are public • Only public addresses are routed in the internet. ALLAOUI Mohamed Amine – CCNP 10 allaoui.amine@gmail.com
  • 11. Network Address Translation Range 192.168.0.0 255.255.255.0 192.168.0.1 Private 192.168.0.254 200.156.24.0 – 200.156.24.255 192.168.0.2 Public 192.168.0.3 Private Public 192.168.0.1 200.168.24.1 192.168.0.2 200.168.24.2 192.168.0.3 200.168.24.3 ALLAOUI Mohamed Amine – CCNP 11 allaoui.amine@gmail.com
  • 12. Port Address Translation Range 192.168.0.0 255.255.255.0 192.168.0.1 Private 192.168.0.254 200.156.24.4 192.168.0.2 Public 192.168.0.3 Private Public private:source port Public:source port 192.168.0.1:2233 200.168.24.4:2233 192.168.0.2:1554 200.168.24.4:1554 192.168.0.3:6651 200.168.24.4:6651 ALLAOUI Mohamed Amine – CCNP 12 allaoui.amine@gmail.com
  • 13. NAT/PAT • Uses a lot of processing power and memory • Hosting limitations • Provides basic security but not really useful • Slows down ip packets • … ALLAOUI Mohamed Amine – CCNP 13 allaoui.amine@gmail.com
  • 14. IPSec • Security at network layer • More reliable that transport/application layer security • Consumes less processing power • Provides a lot of features • Provides some security to unsecure applications • Provides authentication, protection, encryption and negociation ALLAOUI Mohamed Amine – CCNP 14 allaoui.amine@gmail.com
  • 15. IPSec Application Host-to-Host Internet Network Access ALLAOUI Mohamed Amine – CCNP 15 allaoui.amine@gmail.com
  • 16. Headers IPv4 packet Host to Host Application Transport Mode : Ipv4 packet AH/ESP Host to Host Application Tunnel Mode : IPv4 packet AH/ESP IPv4 packet Host to Host Application ALLAOUI Mohamed Amine – CCNP 16 allaoui.amine@gmail.com
  • 17. IPSec • More overhead • More processing power • More bandwidth usage • More delay ALLAOUI Mohamed Amine – CCNP 17 allaoui.amine@gmail.com
  • 18. IPv6 1. Ipv6 concepts and addressing 2. Ipv6 routing 3. Ipv6 Security ALLAOUI Mohamed Amine – CCNP 18 allaoui.amine@gmail.com
  • 19. Ipv6 concepts and addressing • New internet layer protocol • 128 bits of addresses = 340.282.366.920.938.463.463.374.607.431.770.000.000 • Ipv6 header is less complex that IPv4. • No private addresses • No broadcasts • Very long addresses: 2000:AD24:114d:aabc:1100:0001:0000:0001 ALLAOUI Mohamed Amine – CCNP 19 allaoui.amine@gmail.com
  • 20. IPv6 Header ALLAOUI Mohamed Amine – CCNP 20 allaoui.amine@gmail.com
  • 21. Ipv6 concepts and addressing • Address abbreviation – Ex: 2000:0000:0000:0000:0000:0000:0000:0001 == 2000::1 – 2000:0001::1 == 2000:1::1 • 3 types of addresses: – Link Local : FE80:: /10 – Multicast : FF02 :: /8 – Global Unicast : 2000 :: /3 ALLAOUI Mohamed Amine – CCNP 21 allaoui.amine@gmail.com
  • 22. Ipv6 Routing • Static routing • Dynamic routing – RIPng – OSPF 3 – EIGRP for IPv6 – Multiprotocol BGP ALLAOUI Mohamed Amine – CCNP 22 allaoui.amine@gmail.com
  • 23. Static Routing • every router only knows it’s directly connected networks • every router needs to know how to get to all networks • Every router had its own routing table • Each route has to be added staticly to every router ALLAOUI Mohamed Amine – CCNP 23 allaoui.amine@gmail.com
  • 24. Dynamic Routing • RIPng • OSPF 3 • EIGRP for IPv6 • All routers has to use the same routing protocol • Each router sends updates to his neighbors to tell them about networks it knows ALLAOUI Mohamed Amine – CCNP 24 allaoui.amine@gmail.com
  • 25. IPv6 Security • NDP replaced ARP and stateful DHCP • Link local addresses are not routable • No duplicate MAC-Address on a subnet • « the Less we have on the header the more secure the protocol is » • Ipv6 supports IPSec without adding another header. ALLAOUI Mohamed Amine – CCNP 25 allaoui.amine@gmail.com
  • 26. Neighbor Discovery Protocol • Hosts send a Neighbor Sollicitation to verify if the global unicast address is unique and if it is the the correct subnet (FF02::1) • Hosts send a Neighbor Advertisement to the multicast address of all IPv6 hosts (FF02::1) to tell them about it’s link local address. • Finally, to know how to get to the gateway, hosts send another NS to know the IPv6 address of the gateway (FF02::2) ALLAOUI Mohamed Amine – CCNP 26 allaoui.amine@gmail.com
  • 27. Migration to IPv6 • Every computer supports Ipv6 since 2002 • Almost all routers support IPv6 • Servers on the Internet has to be configured to use IPv6 • Network Operators are not using ipv6 yet. • Some countries in asia are already using IPv6. ALLAOUI Mohamed Amine – CCNP 27 allaoui.amine@gmail.com
  • 28. Migration to IPv6 • What are we waiting for? – Some feature on IPv6 are not yet industry standards – Internet users are afraid of using global unicast addressed – Networks administrators are not confortable with this new suite of protocols – Rare ressources are always more beneficial for Internet Operators ALLAOUI Mohamed Amine – CCNP 28 allaoui.amine@gmail.com
  • 29. Migration to IPv6 • What are we waiting for? – Some issues with NBMA (frame-relay, ATM, MPLS …) – Gouvernements don’t accept changes easily. ALLAOUI Mohamed Amine – CCNP 29 allaoui.amine@gmail.com
  • 30. IPv6/IPv4 coexistence 1. NAT-PT 2. Tunneling 3. Dual stacks ALLAOUI Mohamed Amine – CCNP 30 allaoui.amine@gmail.com
  • 31. IPv6/IPv4 coexistence ISP 195.25.111.3 CS Professors 2001:AA01:45:3::0/64 NAT -PT 2001:AA01:45:3::0/64 195.25.111.3 ALLAOUI Mohamed Amine – CCNP 31 allaoui.amine@gmail.com
  • 32. IPv6/IPv4 coexistence ISP 195.25.111.3 CS Professors 2001:AA01:45:3::0/64 NAT –PT & Dual Stack Dual stack ALLAOUI Mohamed Amine – CCNP 32 allaoui.amine@gmail.com
  • 33. NAT-PT • Translates IPv6 addresses to IPv4 and IPv4 to IPv6 • Same as classic NAT and PAT IPv6 address IPv4 address 2001:AA01:45:3::1 port 1542 195.25.111.3 port 1542 2001:AA01:45:3::2 port 1598 195.25.111.3 port 1598 2001:AA01:45:3::3 port 4452 195.25.111.3 port 4452 ALLAOUI Mohamed Amine – CCNP 33 allaoui.amine@gmail.com
  • 34. Tunneling • Point-to-point Tunnels – Ip6ip – Generic Router Encapsulation (GRE) • Multipoint Tunnels – Automatic 6to4 – ISATAP tunnels IPv4 Packet IPv6 Packet Host to Host Application ALLAOUI Mohamed Amine – CCNP 34 allaoui.amine@gmail.com
  • 35. Dual Stacks • Interfaces that run both IPv4 and IPv6 at the same time 192.168.0.1 2001:AA01:45:9::1/64 192.168.0.254 2001:AA01:45:9::FFFF/64 192.168.0.2 2001:AA01:45:9::2/64 ALLAOUI Mohamed Amine – CCNP 35 allaoui.amine@gmail.com
  • 36. Thank you for your attention Any questions ? ALLAOUI Mohamed Amine – CCNP 36 allaoui.amine@gmail.com