What options do you have when you want to transition to IPv6?
Besides the native IPv6 method, if your ISP is able to deliver, it is possible to get connected through an intermediate solution.
Read about it in “Geoff Hutson’s story“.
What options do you have when you want to transition to IPv6?
Besides the native IPv6 method, if your ISP is able to deliver, it is possible to get connected through an intermediate solution.
Read about it in “Geoff Hutson’s story“.
Posted in Documents
With the introduction of the IPv6 protocol we face not only a new extended addressing scheme, but also a new composition of the IP packet. Compared to the IPv4 protocol, we are dealing with a much more simplified and reduced amount of header sections.
This little “IPv6 tcpip Pocket Reference Guide” will help you understand the differences and composition.
Posted in Documents
With SLAAC, your MAC address is embedded into your IPv6 address. When you connect to the world, you’re giving them something that can be traced back to you (or at least a piece of hardware you have). RFC3041 was created to help address this privacy issue. It’s since been obsoleted by RFC4941.
Read more in the article of IPcalypse how to enable this on Ubuntu (which will probably work on other Linux flavours as well)
Posted in Interesting
Do you wonder what you download/upload speed it over IPv6?
You can check your actual speed at the IPv6-Speedtest website.
Posted in Toolbox
With IPv6 traffic is mainly regulated through ICMP6, whereas in IPv4 it was a mess of different protocols. Therefor it should be carefully configured and secured, to garantee a smooth functioning network environment.
The recommendations for ICMPv6 firewall filtering are based on RFC 4890. These recommendations allow propagation of ICMPv6 messages needed to maintain functionality of the network but drop messages posing potential security risks. Many ICMPv6 messages should only be used in a link-local context, rather than end-to-end, and filters need to be concerned with the types of addresses in ICMPv6 packets as well as the specific source address, destination addresses, and ICMPv6 Type. RFC 4890 classifies ICMPv6 messages according to whether they are designed for end-to-end communications (traffic to transit a firewall) or local communications within a link (local traffic addressed to an interface on a firewall). All experimental and undefined ICMPv6 messages should be dropped. ACLs should permit only those ICMPv6 messages that are required, based on specific local needs and policies; all others should be dropped.
|
Must Not Drop |
Should Not Drop |
||
Message (Type) |
Transit |
Local |
Transit |
Local |
Maintenande of Communication: Allow non-local when associated with allowed connections |
||||
Destination Unreachable (1) – All codes |
X |
X |
|
|
Packet Too Big (2) |
X |
X |
|
|
Time Exceeded (3) – Code 0 only |
X |
X |
|
|
Parameter Problem (4) – Codes 1 and 2 only |
X |
X |
|
|
Connectivity Checking: Allow/disallow non-localvbased on topology/information concealment policy |
||||
Echo Request (128) |
X |
X |
|
|
Echo Response (129) |
X |
X |
|
|
Address Configuration and Router Selection: Allow in link-local only |
||||
Router Solicitation (133) |
|
X |
|
|
Router Advertisement (134) |
|
X |
|
|
Neighbor Solicitation (135) |
|
X |
|
|
Neighbor Advertisement (136) |
|
X |
|
|
Inverse Neighbor Discovery Solicitation (141) |
|
X |
|
|
Inverse Neighbor Discovery Advertisement (142) |
|
X |
|
|
Link-local Multicast Receiver |
||||
Listener Query (130) |
|
X |
|
|
Listener Report (131) |
|
X |
|
|
Listener Done (132) |
|
X |
|
|
Listener Report v2 (143) |
|
X |
|
|
SEND Certification Path Notification: Allow in link-local traffic only |
||||
Certification Path Solicitation (148) |
|
X |
|
|
Certification Path Advertisement (149) |
|
X |
|
|
Multicast Router |
||||
Multicast Router Advertisement (151) |
|
X |
|
|
Multicast Router Solicitation (152) |
|
X |
|
|
Multicast Router Termination (153) |
|
X |
|
|
Error |
||||
Time Exceeded (3) – Code 1 |
|
|
X |
X |
Parameter Problem (4) – Code 0 |
|
|
X |
x |
Mobile IPv6: Allow non-local for predefined endpoints |
||||
Home Agent Address Discovery Request (144) |
|
|
x |
|
Home Agent Address Discovery Reply (145) |
|
|
X |
|
Mobile Prefix Solicitation (146) |
|
|
x |
|
Mobile Prefix Advertisement (147) |
|
|
X |
|
Source – Guidelines for the Secure Deployment of IPv6 (NIST)
Posted in Documents
Dutch organisation SURFnet has created a document explaining how to prepair an addressing plan for your IPv6 based network. This document is intended for network architects and network managers implementing IPv6 in their organisation.
The manual is translated by the RIPE NCC and is available as:
“Preparing an IPv6 Adressing Plan“
Posted in Documents