| Foreword |
|
xiii | |
| Preface |
|
xv | |
| Authors |
|
xvii | |
|
Introduction and Overview |
|
|
1 | (22) |
|
Opportunities Offered by IPv6 |
|
|
1 | (3) |
|
Introductory Overview of IPv6 |
|
|
4 | (13) |
|
|
|
5 | (1) |
|
Traditional Addressing Classes for IPv4 |
|
|
6 | (2) |
|
Network Address Translation Issues in IPv4 |
|
|
8 | (1) |
|
|
|
9 | (1) |
|
Basic Protocol Constructs |
|
|
10 | (4) |
|
|
|
14 | (3) |
|
Migration and Coexistence |
|
|
17 | (3) |
|
|
|
20 | (3) |
|
|
|
20 | (3) |
|
|
|
23 | (20) |
|
|
|
23 | (1) |
|
IPv6 Addressing Mechanisms |
|
|
23 | (7) |
|
|
|
23 | (2) |
|
Addressing Issues/Reachability |
|
|
25 | (3) |
|
|
|
28 | (2) |
|
|
|
30 | (7) |
|
|
|
30 | (1) |
|
Aggregatable Global Unicast Addresses |
|
|
30 | (2) |
|
Link-Local (Unicast) Addresses |
|
|
32 | (1) |
|
Site-Local (Unicast) Addresses |
|
|
32 | (1) |
|
Unspecified (Unicast) Address |
|
|
33 | (1) |
|
Loopback (Unicast) Address |
|
|
33 | (1) |
|
Compatibility (Unicast) Addresses |
|
|
34 | (1) |
|
|
|
34 | (3) |
|
|
|
37 | (1) |
|
Addresses for Hosts and Routers |
|
|
37 | (6) |
|
|
|
38 | (1) |
|
Mapping EUI-64 Addresses to IPv6 Interface Identifiers |
|
|
38 | (2) |
|
Mapping IEEE 802 Addresses to IPv6 Interface Identifiers |
|
|
40 | (1) |
|
Randomly Generated Interface Identifiers |
|
|
40 | (1) |
|
|
|
41 | (2) |
|
|
|
43 | (10) |
|
|
|
43 | (1) |
|
|
|
43 | (5) |
|
|
|
43 | (2) |
|
Protocol Support Mechanisms |
|
|
45 | (3) |
|
Routing and Route Management |
|
|
48 | (5) |
|
|
|
50 | (3) |
|
IPv6 Autoconfiguration Techniques |
|
|
53 | (8) |
|
|
|
53 | (1) |
|
|
|
53 | (2) |
|
Dynamic Host Configuration Protocol for IPv6 |
|
|
55 | (6) |
|
|
|
60 | (1) |
|
IPv6 and Related Protocols (Details) |
|
|
61 | (46) |
|
|
|
61 | (1) |
|
|
|
62 | (1) |
|
|
|
63 | (1) |
|
|
|
64 | (15) |
|
|
|
66 | (1) |
|
|
|
66 | (2) |
|
Hop-by-Hop Options Header |
|
|
68 | (1) |
|
|
|
69 | (4) |
|
|
|
73 | (5) |
|
Destination Options Header |
|
|
78 | (1) |
|
|
|
79 | (1) |
|
|
|
79 | (1) |
|
|
|
80 | (1) |
|
|
|
81 | (1) |
|
Upper-Layer Protocol Issues |
|
|
81 | (3) |
|
|
|
81 | (2) |
|
|
|
83 | (1) |
|
Maximum Upper-Layer Payload Size |
|
|
83 | (1) |
|
Responding to Packets Carrying Routing Headers |
|
|
83 | (1) |
|
Semantics and Usage of the Flow Label Field |
|
|
84 | (1) |
|
Formatting Guidelines for Options |
|
|
85 | (2) |
|
Introduction to Addressing |
|
|
87 | (13) |
|
|
|
88 | (1) |
|
|
|
88 | (1) |
|
Text Representation of Addresses |
|
|
89 | (1) |
|
Text Representation of Address Prefixes |
|
|
90 | (1) |
|
Address Type Identification |
|
|
91 | (1) |
|
|
|
91 | (1) |
|
|
|
92 | (1) |
|
|
|
93 | (1) |
|
|
|
93 | (1) |
|
|
|
94 | (1) |
|
IPv6 Addresses with Embedded IPv4 Addresses |
|
|
94 | (1) |
|
Local-Use IPv6 Unicast Addresses |
|
|
95 | (1) |
|
|
|
95 | (1) |
|
|
|
96 | (1) |
|
|
|
97 | (1) |
|
Predefined Multicast Addresses |
|
|
98 | (2) |
|
A Node's Required Addresses |
|
|
100 | (1) |
|
|
|
100 | (1) |
|
Creating Modified EUI-64 Format Interface Identifiers |
|
|
101 | (3) |
|
Links or Nodes with IEEE EUI-64 Identifiers |
|
|
101 | (1) |
|
Links or Nodes with IEEE 802 48-Bit MACs |
|
|
102 | (1) |
|
Links with Other Kinds of Identifiers |
|
|
103 | (1) |
|
Links without Identifiers |
|
|
103 | (1) |
|
Bit Global Identifier (EUI-64) Registration Authority |
|
|
104 | (1) |
|
|
|
104 | (1) |
|
Distribution Restrictions |
|
|
104 | (1) |
|
Application Documentation |
|
|
105 | (1) |
|
Manufacturer-Assigned Identifiers |
|
|
105 | (1) |
|
Additional Technical Details |
|
|
105 | (2) |
|
|
|
105 | (2) |
|
Transition Approaches and Mechanisms |
|
|
107 | (36) |
|
|
|
107 | (2) |
|
|
|
109 | (1) |
|
|
|
110 | (13) |
|
Stateless Internet Protocol/Internet Control Messaging Protocol Translation (SIIT) |
|
|
110 | (1) |
|
|
|
110 | (1) |
|
|
|
111 | (3) |
|
|
|
114 | (2) |
|
|
|
116 | (1) |
|
|
|
116 | (1) |
|
|
|
117 | (2) |
|
Network Address Translation-Protocol Translation |
|
|
119 | (1) |
|
|
|
119 | (1) |
|
|
|
119 | (2) |
|
Transport Relay Translator |
|
|
121 | (1) |
|
|
|
121 | (1) |
|
|
|
122 | (1) |
|
|
|
123 | (20) |
|
|
|
124 | (1) |
|
Automatic Tunneling Using IPv4-Compatible Addresses |
|
|
124 | (1) |
|
6over4 Transition Mechanism |
|
|
125 | (4) |
|
6to4 Transition Mechanism |
|
|
129 | (1) |
|
|
|
129 | (2) |
|
6to4 Addressing and Site Routing |
|
|
131 | (1) |
|
6to4 Transition Mechanism Details |
|
|
131 | (2) |
|
Intrasite Automatic Tunnel Addressing Protocol (ISATAP) |
|
|
133 | (1) |
|
|
|
133 | (1) |
|
|
|
133 | (1) |
|
|
|
134 | (1) |
|
|
|
135 | (1) |
|
|
|
135 | (3) |
|
|
|
138 | (1) |
|
Teredo Addressing and Address Configuration Process |
|
|
139 | (1) |
|
Sample Teredo Communication |
|
|
139 | (1) |
|
|
|
140 | (3) |
|
IPv6 Network Software and Hardware |
|
|
143 | (18) |
|
|
|
143 | (1) |
|
IPv6 End Systems Applications |
|
|
144 | (1) |
|
IPv6 End Systems Communications Software |
|
|
145 | (7) |
|
Dual-IP-Layer Architecture |
|
|
146 | (1) |
|
Installed and Enabled by Default |
|
|
146 | (1) |
|
|
|
147 | (1) |
|
|
|
147 | (1) |
|
Multicast Listener Discovery Version 2 (MLDv2) |
|
|
147 | (1) |
|
Link-Local Multicast Name Resolution (LLMNR) |
|
|
147 | (1) |
|
Literal IPv6 Addresses in URLs |
|
|
148 | (1) |
|
Support for ipv6-literal.net Names |
|
|
148 | (1) |
|
|
|
148 | (1) |
|
Dynamic Host Control Protocol Version 6 |
|
|
149 | (1) |
|
|
|
149 | (1) |
|
|
|
149 | (1) |
|
Enhanced Security for IPv6 and Teredo |
|
|
150 | (1) |
|
Features to Disable IPv6 Components |
|
|
151 | (1) |
|
IPv6 Support by Major Router Vendors |
|
|
152 | (3) |
|
|
|
153 | (1) |
|
|
|
154 | (1) |
|
|
|
154 | (1) |
|
Carrier/ISP IPv6 Services |
|
|
155 | (4) |
|
|
|
155 | (1) |
|
NTT Communications IPv6-Related Services |
|
|
155 | (2) |
|
|
|
157 | (1) |
|
|
|
157 | (1) |
|
|
|
157 | (1) |
|
European Internet Exchange Association |
|
|
157 | (1) |
|
|
|
158 | (1) |
|
|
|
158 | (1) |
|
|
|
158 | (1) |
|
|
|
158 | (1) |
|
|
|
159 | (1) |
|
IPv6 in Wireless Networks |
|
|
159 | (2) |
|
|
|
160 | (1) |
|
Implementing IPv6 Transition Strategies |
|
|
161 | (8) |
|
|
|
161 | (1) |
|
Summary of NREN Transition Recommendations |
|
|
162 | (4) |
|
General Approach for NREN Transition |
|
|
162 | (1) |
|
|
|
162 | (1) |
|
|
|
163 | (1) |
|
|
|
164 | (1) |
|
Layer 2 Transport Protocol Considerations for NRENs |
|
|
165 | (1) |
|
Packet over SONET (PoS) Scenario |
|
|
165 | (1) |
|
|
|
165 | (1) |
|
|
|
165 | (1) |
|
IPv6 Operations Working Group: Transition Scenarios for ISPs |
|
|
166 | (3) |
|
|
|
168 | (1) |
|
|
|
169 | (8) |
|
|
|
169 | (1) |
|
Application Programming Interface Overview |
|
|
169 | (2) |
|
|
|
171 | (4) |
|
|
|
172 | (1) |
|
|
|
172 | (2) |
|
Name-to-Address Translation Functions |
|
|
174 | (1) |
|
Address Conversion Functions |
|
|
174 | (1) |
|
Socket Functions for IPv6 |
|
|
174 | (1) |
|
IPv6 Support for Networking Applications |
|
|
175 | (2) |
|
|
|
176 | (1) |
|
Security in IPv6 Networks |
|
|
177 | (46) |
|
|
|
177 | (1) |
|
Confidentiality and Integrity of Information While in Transit |
|
|
177 | (3) |
|
|
|
180 | (6) |
|
Keyed Hashing for Message Authentication |
|
|
182 | (1) |
|
Security Architecture for the Internet Protocol |
|
|
182 | (1) |
|
|
|
183 | (1) |
|
Use of HMAC-MD5-96 within ESP and AH |
|
|
183 | (1) |
|
Use of HMAC-SHA-96 within ESP and AH |
|
|
184 | (1) |
|
ESP DES-CBC Cipher Algorithm with Explicit IV |
|
|
184 | (1) |
|
IP Encapsulating Security Payload |
|
|
185 | (1) |
|
|
|
185 | (1) |
|
The Internet Key Exchange |
|
|
185 | (1) |
|
Transport Layer Security Mechanisms |
|
|
186 | (1) |
|
|
|
187 | (2) |
|
|
|
187 | (2) |
|
|
|
|
|
|
189 | (14) |
|
|
|
203 | (20) |
| Index |
|
223 | |