Internet Protocol version 6 deployment
This article may be deleted soon. | ||
---|---|---|
It is necessary to have a basic idea of how IPv6 works in order to understand an explanation of deploying it; see Internet Protocol version 6]]. Not every detail is relevant, but some of the more critical aspects include addressing administration, address assignment, appropriate Domain Name System]] (DNS). This article is intended to help the reader characterize the issues that will be involved in a particular deployment, and select a reasonable set of tools for deployment. There may be more detailed articles on individual deployment techniques, but, in any real deployment, the particular software and hardware documentation will remain authoritative. The article Internet Protocol version 6 laboratory]] suggests a framework that could be used for familiarization with IPv6 deployment issues. Do not assume that every piece of infrastructure for IPv6 deployment is ready for full production. Do not assume that IPv6 will not be deployed, and that all deployment will go smoothly. There are, however, a sufficient number of pieces in place that organizations and networking people should be gaining familiarity. Before dealing with Internet Protocol version 6 address management]], the architectural issues, specific to a particular deployment, need to be understood. There remain deployment issues where the IPv6-specific isssues are still evolving, such as the specific techniques to be used for the general practice of multihoming]], with IPv6-specific aspects summarized, then discussed in specific contexts throughout this article. Node types
Basic scenariosThe most basic IPv6 deployment scenarios involve no interaction between IPv6 and IPv4, either because the IPv6 packets are carried over non-IPv4 media, or there is a higher-layer gateway, such as a web proxy that is IPv6 on one side and IPv4 on the other, that completely isolates the IPv6 and IPv4 addressing domains. Deploying IPv6 without any IPv4The ideal situation for IPv6 introduction is one in which there is no particular need for compatibility with any existing networks. This has been the case in several situations, such as advanced cellular telephony networks, in which the Internet Protocol addressing is purely internal to the network. The telephones continue to use telephone numbers, not IP addresses. Most major operating systems and routers have IPv6 support, as well as common support services such as domain name service]]. In this example, the various local IPv6 links are connected by physical layer services such as point-to-point optical links, broadcast-capable multiaccess layer 2 methods such as 802.3, or nonbroadcast multiaccess such as Layer 2 frame relay]] or Layer 3(-) multiprotocol label switching]] with point-to-multipoint topologies. In this case, there is no immediately obvious need for IPv6-IPv4 interaction. Do no be surprised, however, if some infrastructure devices, such as a protocol analyzer]], network management]] system, or security device, which you want to use, is not IPv6 compatible, and will present a relatively small coexistence or transition challenge. 100% application proxyAnother situation where IPv6 may be minimally disruptive is in a country that has no existing Internet infrastructure, and, for various national policy reasons, will permit no direct connections to the Internet; everything must go through a content filter and Web proxy server. All machines going into the "inside" can be natively IPv6. Again recognizing this as an ideal situation, assume that any Web requests will only use DNS names. The "inside" HTTP]] requests terminate at an application-layer proxy, which then takes the name in the URL, looks it up in an IPv4 DNS, speaks to the web server, gets the application data, and transfers the application data in the proxy. As long as there are no embedded IP addresses, this may well work. Of course, the Web is not all of the Internet, and the scenario described is Web only, and for those web pages that never embed IP addresses. Transition terminologySome terminology will help structure the discussion. From RFC 4213, there are definitions of node types and mechanisms of coexistence.[1] This document also two transition mechanisms, dual stack and configured tunneling. Of course, the ideal is when the network and hosts have no legacy IPv4 requirements, and can be all-IPv6 from the first day. If the number of IPv6 links increases, then it will be necessary to have a multicast domain for each virtual link, interconnected by IPv6 routers. Dual stackRFC3056 identifies two basic transition techniques, dual stack and configured tunneling. Dual stack, in principle, could use a tunnel on one of the stacks, but it is usually associated with separate L1/L2 interfaces on the same router or host, with independent IPv4 and IPv6 routing or applications. Configured tunnelingConfigured tunneling means IPv6-over-IPv4 tunneling where the IPv4 tunnel endpoint address(es) are determined by configuration information on tunnel endpoints. All tunnels are assumed to be bidirectional. The tunnel provides a (virtual) point-to-point link to the IPv6 layer, using the configured IPv4 addresses as the lower-layer endpoint addresses. [1] The tunneling mechanism can vary with the router, such as Generic Route Encapsulation]].[2] [3] Arguably, MPLS is also a tunneling technique. Non-tunneling in an IPv4 infrastructureRather than use dedicated links, or require the establishment of tunnels over IPv4 clouds, the 6OVER4 method, also called virtual Ethernet, uses IPv4 multicasting]] to provide connectivity. For a limited number of IPv6 hosts, it can make them think that the underlying multicast structure is a single link.[4] IPv6-over-IPv4 explicit tunnelingThis technique, also called 6OVER4 or Protocol 41 encapsulates IPv6 packets within IPv4 so that they can be carried across IPv4 routing infrastructures.[5] It assigns an interim unique IPv6 address prefix to a site with at least one globally routable IPv4 address, and specifies an encapsulation mechanism for transmitting IPv6 packets using such a prefix over the global IPv4 network. Potential scaling problems are known to exist, although it does not increase the size of the IPv4 global routing table, and adds one entry to the IPv6 global routing table. Hybrid methodsOther, more complex techniques, involve some type of automatic tunneling setup, or translation between IPv4 and IPv6 packets. Tunnel brokerThe motivation for the development of the tunnel broker' model is to help early IPv6 adopters to hook up to an existing IPv6 network (e.g., the 6bone) and to get stable, permanent IPv6 addresses and DNS names. [6] The authors of this method are concerted that the dual stack and configured tunneling approach is too labor intensive, and also creates the danger of bringing the IPv4 routing table into the IPv6 table. They consider 6over4 not to meet the needs of the isolated individual host user, given the need for having a multicast infrastructure that may not be available to a host user. They do see their method as complementary to 6to4 mechanisms. Tunnel Broker is isolated host oriented, while 6to4 is isolated site oriented. ISATAPISATAP is adds address assignment to host-to-host, host-to-router, and router-to-host automatic tunneling technology that is used to provide unicast IPv6 connectivity between IPv6/IPv4 hosts across an IPv4 intranet. [7] TEREDOThe TEREDO service is a mechanism where the IPv6 packets are carried over a IPv4 network, with the additional constraint that the "TEREDO servers" are located on the "inside" of an IPv4 to IPv4 network address translation]] device. In addition to the stateless TEREDO servers, there are TEREDO relays, which appear, to the IPv6-only hosts, as IPv6 routers. [8] Considering specific situationsTo have meaningful discussions of deployment, the problem must be defined, then a first-level pass made to identify source of building blocks. Administrative matters dealing with address prefix will need to be considered at the high level of whether the organization deploying the service, or some external organization, will provide the addresses Problem definitionState the deployment-specific needs in terms of the basic services required to support user and administrative applications,
An inventory is a fine place to start, starting at a block diagram Determine:
Building blocks
Address and routing responsibilityIdentify where an outside organization will be the source of a high-level prefix (i.e., a address registry#Provider-assigned IPv6|provider-assigned (PA)]] block of globally routable space), versus the organization obtaining address registry#Provider-independent IPv6|provider-independent]] address space. It will be far easier to get PI space in IPv6 than IPv4 Operational refinementFault tolerance and load distribution clearly need additional work.
Transition mandatesChinaOutside specific programs such as designated military or air traffic control networks, the U.S. government is an "unfunded mandate". In 2003, however, the Chinese the National Development Reform Commission (NDRC) funded China’s IPv6 program by setting up the China Next-generation Internet (CNGI) program/ CNGI was IPv6 from the beginning. How did it to with its USD $169 million in funding? How much of the Olympics ran over IPv6, and were international news organizations able to connect to Chinese IPv6? If so, how? [9] U.S. militaryIPv6 is targeted as the military standard by 2012. There have been comments that industry is not providing enough IPv6 products. Is this a real problem? Will investment help? Can the deadline be met? Should it? U.S. general GovernmentThere is a U.S. government mandate to [10] Measuring the decree of compliance required as "June 2008 as the date by which all agencies’ infrastructure (network backbones) must be using IPv6 and agency networks must interface with this infrastructure." How is "using IPv6" and "interface with" defined? If there is a parallel set of IPv6 links and routers parallel to a major part of the IPv4 backbone, and IPv6 hosts at some sites, is that compliant? It has been suggested that agencies will technically meet their deadlines, but still will be using IPv4 for most day-to-day operations.[11] Operating system specificAppleSince Version 10.3 (Panther), the Apple Macintosh OS has supported IPv6. Apple is using IPv6 in the Back to My Mac application, which allows users anywhere on the Internet secure access to their home systems. Although there are third-party applications that provide versions of this functionality, Linux and Vista do not have it as a basic operating system, and Google does not have a free equivalent.[12] Routers supporting this application have to understand the NAT-PMP (NAT Port Mapping Protocol), which Apple published as an open specification and runs on AirPort routers. The protocol, however, is still in Internet Draft status and does not appear to have been implemented widely except on Apple routers. [13] IBMThe 1997 release of AIX included IPv6, and IBM continues to add it to products such as DB2. LinuxMicrosoftMicrosoft has announced strategies for Windows products, especially Vista and Server 2008, for IPv6 operation in various combinations of existing IPv4 public network connectivity,native ISP IPv6 support, IPv4 private address space networks, and coexisting V4/V6.[14] Microsoft assumes that at present, the basic ISP environment will be IPv4, so Windows will default to IPv6 over IPv4 tunneling unless the ISP indicates native v6 is available. Any IPv6 Windows system directly connected to an ISP will require one globally routable IPv4 address. Subsequent Windows system connected to the IPv6 gateway will hear 6to4 router announcements for the host with the v4 address. [5] If an existing network has no public IPv4 addresses, and there are NATs that are IPv4 only, Microsoft will use Teredo IPv6 over UDP over IPv4 tunneling. When enterprises want to move incrementally to IPv6, Microsoft's approach is ISATAP, which allows coexistence and interoperation between IPv4 and IPv6.[7] Router specificCiscoCisco distinguishes between service provider and enterprise IPv6 deployment. The company strongly recommends that organizations first set up familiarization laboratory environments, become familiar with the technology, and then assess specific requirements and select deployment strategies. [15] According to Cisco, there are four basic means of communication, which consider more layer 1 and layer 2 methods as part of the solution space than do most of the IPv6 transition projects:
Cisco understands:
EnterpriseEnterprises have two basic ways to set up familiarization. The first is to get V6 address space and connect to the 6bone or other appropriate test network. Alternatively, the enterpise can create two or more IPv6 domains, experiment with single-domain operations, and then interconnect them over the existing IPv4 infrastructure. Service providerJuniperProduct families with IPv6 support
NortelNortel actively supports IPv6, the most flexible product being its 8600 router. QuaggaAll Quagga interfaces may be configured with IPv6 addressing, and static routing, as well as RIPng, OSPFv3, and BGP-4+ all are supported. The routers participate in stateless autoconfiguration. Quagga supports RIPng, OSPFv3 and BGP-4+. [18] References
|