Acknowledgments |
|
xi | |
Introduction |
|
xiii | |
1 Ipv6 Deployment Drivers |
|
1 | (12) |
|
1.1 The Internet: A Success Story |
|
|
1 | (6) |
|
|
3 | (3) |
|
1.1.2 Internet at a Crossroads |
|
|
6 | (1) |
|
1.1.3 Which Internet Are You On? |
|
|
7 | (1) |
|
1.2 Emerging Applications |
|
|
7 | (3) |
|
|
10 | (3) |
2 IPv6 Overview |
|
13 | (30) |
|
|
14 | (1) |
|
|
14 | (3) |
|
2.2.1 IPv6 Extension Headers |
|
|
15 | (2) |
|
|
17 | (18) |
|
|
18 | (1) |
|
|
19 | (1) |
|
2.3.3 IPv6 Address Allocations |
|
|
20 | (7) |
|
2.3.4 Internet Control Message Protocol for IPv6 (ICMPv6) |
|
|
27 | (1) |
|
|
28 | (1) |
|
2.3.6 Multicast Listener Discovery |
|
|
28 | (3) |
|
2.3.7 Multicast Router Discovery |
|
|
31 | (1) |
|
2.3.8 Neighbor Discovery Protocol |
|
|
31 | (2) |
|
2.3.9 Secure Neighbor Discovery (SEND) |
|
|
33 | (1) |
|
2.3.10 Inverse Neighbor Discovery |
|
|
33 | (1) |
|
2.3.11 Router Renumbering |
|
|
34 | (1) |
|
2.3.12 Node Information Query |
|
|
34 | (1) |
|
2.4 IPv6 Address Autoconfiguration |
|
|
35 | (3) |
|
2.4.1 Modified EUI-64 Interface Identifiers |
|
|
36 | (1) |
|
2.4.2 Duplicate Address Detection (DAD) |
|
|
37 | (1) |
|
|
38 | (2) |
|
2.6 Reserved Subnet Anycast Addresses |
|
|
40 | (1) |
|
2.7 Required Host IPv6 Addresses |
|
|
41 | (1) |
|
|
41 | (2) |
3 IPv4/IPv6 Co-Existence Technologies |
|
43 | (48) |
|
|
44 | (5) |
|
3.1.1 Implementing Dual Stack |
|
|
44 | (1) |
|
3.1.2 Which Address Is Used? |
|
|
45 | (2) |
|
|
47 | (1) |
|
3.1.4 DHCP Considerations |
|
|
48 | (1) |
|
|
49 | (14) |
|
3.2.1 Tunneling Scenarios for IPv6 Packets Over IPv4 Networks |
|
|
49 | (2) |
|
|
51 | (11) |
|
3.2.3 Tunneling Scenario for IPv4 Packets Over IPv6 Networks |
|
|
62 | (1) |
|
|
63 | (1) |
|
3.3 Translation Approaches |
|
|
63 | (15) |
|
3.3.1 IP/ICMP Translation |
|
|
65 | (7) |
|
3.3.2 Bump in the Host (BIH) |
|
|
72 | (2) |
|
3.3.3 Network Address Translation for IPv6/IPv4 (NAT64) |
|
|
74 | (1) |
|
3.3.4 Other Translation Techniques |
|
|
75 | (3) |
|
3.4 Application Support of IPv6 |
|
|
78 | (1) |
|
3.5 Service Provider IPv4/IPv6 Co-Existence |
|
|
78 | (9) |
|
3.5.1 Reference Architecture |
|
|
79 | (1) |
|
3.5.2 Deployment Approaches Overview |
|
|
80 | (1) |
|
3.5.3 Routing Infrastructure Deployment Approaches |
|
|
80 | (7) |
|
3.5.4 Comparison of Deployment Approaches |
|
|
87 | (4) |
|
3.6 Addressing and DNS Considerations |
|
|
87 | (4) |
4 IPv6 Readiness Assessment |
|
91 | (18) |
|
4.1 Putting a Plan in Place |
|
|
92 | (1) |
|
|
93 | (13) |
|
|
93 | (1) |
|
|
93 | (1) |
|
|
94 | (12) |
|
|
106 | (1) |
|
4.4 IPv6 Readiness Assessment Summary |
|
|
106 | (3) |
5 IPv6 Address Planning |
|
109 | (18) |
|
|
109 | (3) |
|
5.1.1 RIR Address Allocation Policies |
|
|
111 | (1) |
|
5.1.2 Address Allocation Efficiency |
|
|
112 | (1) |
|
5.2 IPv6 Address Planning |
|
|
112 | (1) |
|
5.3 IPv6 Address Allocation Methods |
|
|
113 | (5) |
|
|
114 | (2) |
|
5.3.2 Sparse Allocation Method |
|
|
116 | (1) |
|
|
117 | (1) |
|
5.3.4 DHCPv6 Prefix Delegation |
|
|
118 | (1) |
|
5.3.5 Unique Local Address Space |
|
|
118 | (1) |
|
5.4 Defining Your IPv6 Address Plan |
|
|
118 | (4) |
|
5.5 Multihoming and IP Address Space |
|
|
122 | (3) |
|
5.6 IP Address Planning Summary |
|
|
125 | (2) |
6 IPv6 Security Planning |
|
127 | (22) |
|
6.1 The Good News: IP Is IP |
|
|
127 | (1) |
|
6.2 The Bad News: IPv6 Is Not IPv4 |
|
|
128 | (1) |
|
6.3 Update Your Security Policy |
|
|
129 | (1) |
|
6.4 Network Perimeter Monitoring and Intrusion Prevention |
|
|
129 | (3) |
|
6.4.1 IPv6 Address Filtering |
|
|
130 | (1) |
|
|
131 | (1) |
|
|
132 | (1) |
|
6.6 Internal Network Protection |
|
|
133 | (4) |
|
6.6.1 Network Reconnaissance |
|
|
133 | (1) |
|
|
134 | (1) |
|
|
135 | (1) |
|
|
135 | (1) |
|
|
136 | (1) |
|
6.6.6 Internal Network Filtering |
|
|
136 | (1) |
|
6.7 Network Device Security Considerations |
|
|
137 | (1) |
|
|
138 | (6) |
|
6.8.1 Mobility Extension Header |
|
|
139 | (4) |
|
6.8.2 Mobile IPv6 Vulnerabilities |
|
|
143 | (1) |
|
6.9 IPv4/IPv6 Coexistence Measures |
|
|
144 | (4) |
|
6.9.1 Securing Tunneling Implementations |
|
|
145 | (1) |
|
6.9.2 Securing Translation Implementations |
|
|
146 | (2) |
|
|
148 | (1) |
7 IPv6 Network Management Planning |
|
149 | (8) |
|
|
149 | (1) |
|
7.2 Network Management Scope |
|
|
150 | (2) |
|
|
150 | (1) |
|
7.2.2 IP Address Inventory |
|
|
151 | (1) |
|
7.2.3 The Management Network |
|
|
151 | (1) |
|
7.3 The Simple Network Management Protocol (SNMP) |
|
|
152 | (2) |
|
7.3.1 Configuration Management |
|
|
153 | (1) |
|
|
153 | (1) |
|
7.3.3 Accounting Management |
|
|
154 | (1) |
|
7.3.4 Performance Management |
|
|
154 | (1) |
|
7.4 Methods and Procedures |
|
|
154 | (1) |
|
|
155 | (2) |
8 Managing The Deployment |
|
157 | (6) |
|
|
157 | (2) |
|
|
159 | (1) |
|
|
160 | (1) |
|
8.4 Production Deployment |
|
|
161 | (2) |
9 Managing The IPv4/IPv6 Network |
|
163 | (22) |
|
9.1 Common Network Management Tasks |
|
|
163 | (1) |
|
9.2 Configuration Management |
|
|
163 | (13) |
|
9.2.1 Network Allocation-Related Tasks |
|
|
164 | (2) |
|
9.2.2 Adding a New Device |
|
|
166 | (1) |
|
|
167 | (1) |
|
9.2.4 Address Renumbering or Movement Tasks |
|
|
168 | (3) |
|
9.2.5 Block/Subnet Splits |
|
|
171 | (1) |
|
|
172 | (1) |
|
9.2.7 DHCPv6 Server Configuration |
|
|
173 | (1) |
|
9.2.8 DNS Server Configuration |
|
|
174 | (1) |
|
|
175 | (1) |
|
|
176 | (1) |
|
|
176 | (1) |
|
9.3.2 Troubleshooting and Fault Resolution |
|
|
177 | (1) |
|
9.4 Accounting Management |
|
|
177 | (4) |
|
9.4.1 Inventory Assurance |
|
|
177 | (3) |
|
9.4.2 Address Reclamation |
|
|
180 | (1) |
|
9.5 Performance Management |
|
|
181 | (2) |
|
9.5.1 Services Monitoring |
|
|
181 | (1) |
|
9.5.2 Application Performance Management |
|
|
182 | (1) |
|
9.5.3 Auditing and Reporting |
|
|
182 | (1) |
|
|
183 | (1) |
|
9.7 Disaster Recovery/Business Continuity |
|
|
183 | (2) |
10 IPv6 And The Future Internet |
|
185 | (6) |
|
|
185 | (2) |
|
10.2 The Internet's Dark Side |
|
|
187 | (1) |
|
10.3 The Internet's Bright Future |
|
|
187 | (2) |
|
|
187 | (1) |
|
|
188 | (1) |
|
10.3.3 Extensible Healthcare |
|
|
188 | (1) |
|
|
188 | (1) |
|
10.3.5 Credit Cards of the Future |
|
|
188 | (1) |
|
10.3.6 Consumer Applications |
|
|
188 | (1) |
|
|
189 | (2) |
Appendix |
|
191 | (2) |
Bibliography |
|
193 | (6) |
Index |
|
199 | |