Internet Protocol version 6 deployment: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Howard C. Berkowitz
imported>Howard C. Berkowitz
Line 46: Line 46:
  | url = http://www.ietf.org/rfc/rfc2890.txt}}</ref> Arguably, MPLS is also a tunneling technique.
  | url = http://www.ietf.org/rfc/rfc2890.txt}}</ref> Arguably, MPLS is also a tunneling technique.
====Non-tunneling in an IPv4 infrastructure====
====Non-tunneling in an IPv4 infrastructure====
Rather than use dedicated links, or require the establishment of tunnels over IPv4 clouds, the '''6OVER4''' method, also called '''virtual Ethernet''', uses IPv4 [[multicasing]] to provide connectivity. For a limited number of IPv6 hosts, it can make them think that the underlying multicast structure is a single link.<ref name=RFC2529>{{citation
Rather than use dedicated links, or require the establishment of tunnels over IPv4 clouds, the '''6OVER4''' method, also called '''virtual Ethernet''', uses IPv4 [[multicasting]] to provide connectivity. For a limited number of IPv6 hosts, it can make them think that the underlying multicast structure is a single link.<ref name=RFC2529>{{citation
  | title = Transmission of IPv6 over IPv4 Domains without Explicit Tunnels
  | title = Transmission of IPv6 over IPv4 Domains without Explicit Tunnels
  | author =  B. Carpenter, C. Jung
  | author =  B. Carpenter, C. Jung
  | date = March 1999
  | date = March 1999
  | url = http://www.ietf.org/rfc/rfc2529.txt}}</ref>
  | url = http://www.ietf.org/rfc/rfc2529.txt}}</ref>
====IPv6-over-IPv4 explicit tunneling====
====IPv6-over-IPv4 explicit tunneling====
This technique, also called '''6OVER4''', encapsulates  IPv6 packets within IPv4 so that they can be carried across IPv4 routing infrastructures.<ref name=RFC3056>{{citation
This technique, also called '''6OVER4''', encapsulates  IPv6 packets within IPv4 so that they can be carried across IPv4 routing infrastructures.<ref name=RFC3056>{{citation

Revision as of 13:10, 31 August 2008

Template:TOC-right It is necessary to have a basic idea of how IPv6 works in order to understand an explanation of deploying it; see Internet Protocol version 6. Not every detail is relevant, but some of the more critical aspects include addressing administration, address assignment, appropriate Domain Name System (DNS).

Node types

  • IPv4-only node: A host or router that implements only IPv4. An IPv4-only node does not understand IPv6. The installed base of IPv4 hosts and routers existing before the transition begins are IPv4-only nodes.
  • IPv6/IPv4 node: A host or router that implements both IPv4 and IPv6.
    • Dual stack node: A host or router whose IPv4 and IPv6 stacks never need to interconnect, and whose interface(s) are connected only to a pure IPv4 or IPv6 network. Ideally, the nature of the application being IPv4 or IPv6 is hidden from the user, and only the host or router administrator is aware of the dual stacks.
  • IPv6-only node: A host or router that implements IPv6 and does not implement IPv4. See the easiest case below.
  • IPv6 node: Any host or router that implements IPv6. IPv6/IPv4 and IPv6-only nodes are both IPv6 nodes.
  • IPv4 node: Any host or router that implements IPv4. IPv6/IPv4 and IPv4-only nodes are both IPv4 nodes.

Basic scenarios

The most basic IPv6 deployment scenarios involve no interaction between IPv6 and IPv4, either because the IPv6 packets are carried over non-IPv4 media, or there is a higher-layer gateway, such as a web proxy that is IPv6 on one side and IPv4 on the other, that completely isolates the IPv6 and IPv4 addressing domains.

Deploying IPv6 without any IPv4

The ideal situation for IPv6 introduction is one in which there is no particular need for compatibility with any existing networks. This has been the case in several situations, such as advanced cellular telephony networks, in which the Internet Protocol addressing is purely internal to the network. The telephones continue to use telephone numbers, not IP addresses.

Most major operating systems and routers have IPv6 support, as well as common support services such as domain name service. In this example, the various local IPv6 links are connected by physical layer services such as point-to-point optical links, broadcast-capable multiaccess layer 2 methods such as 802.3, or nonbroadcast multiaccess such as Layer 2 frame relay or Layer 3(-) multiprotocol label switching with point-to-multipoint topologies.

In this case, there is no immediately obvious need for IPv6-IPv4 interaction. Do no be surprised, however, if some infrastructure devices, such as a protocol analyzer, network management system, or security device, which you want to use, is not IPv6 compatible, and will present a relatively small coexistence or transition challenge.

100% application proxy

Another situation where IPv6 may be minimally disruptive is in a country that has no existing Internet infrastructure, and, for various national policy reasons, will permit no direct connections to the Internet; everything must go through a content filter and Web proxy server. All machines going into the "inside" can be natively IPv6. Again recognizing this as an ideal situation, assume that any Web requests will only use DNS names. The "inside" HTTP requests terminate at an application-layer proxy, which then takes the name in the URL, looks it up in an IPv4 DNS, speaks to the web server, gets the application data, and transfers the application data in the proxy. As long as there are no embedded IP addresses, this may well work. Of course, the Web is not all of the Internet, and the scenario described is Web only, and for those web pages that never embed IP addresses.

Transition terminology

Some terminology will help structure the discussion. From RFC 2893, there are definitions of node types and mechanisms of coexistence.[1] This document also two transition mechanisms, dual stack and configured tunneling. Of course, the ideal is when the network and hosts have no legacy IPv4 requirements, and can be all-IPv6 from the first day.

If the number of IPv6 links increases, then it will be necessary to have a multicast domain for each virtual link, interconnected by IPv6 routers.

Dual stack

RFC3056 identifies two basic transition techniques, dual stack and configured tunneling. Dual stack, in principle, could use a tunnel on one of the stacks, but it is usually associated with separate L1/L2 interfaces on the same router or host, with independent IPv4 and IPv6 routing or applications.

Configured tunneling

Configured tunneling means IPv6-over-IPv4 tunneling where the IPv4 tunnel endpoint address(es) are determined by configuration information on tunnel endpoints. All tunnels are assumed to be bidirectional. The tunnel provides a (virtual) point-to-point link to the IPv6 layer, using the configured IPv4 addresses as the lower-layer endpoint addresses. [1] The tunneling mechanism can vary with the router, such as Generic Route Encapsulation.[2] [3] Arguably, MPLS is also a tunneling technique.

Non-tunneling in an IPv4 infrastructure

Rather than use dedicated links, or require the establishment of tunnels over IPv4 clouds, the 6OVER4 method, also called virtual Ethernet, uses IPv4 multicasting to provide connectivity. For a limited number of IPv6 hosts, it can make them think that the underlying multicast structure is a single link.[4]

IPv6-over-IPv4 explicit tunneling

This technique, also called 6OVER4, encapsulates IPv6 packets within IPv4 so that they can be carried across IPv4 routing infrastructures.[5] It assigns an interim unique IPv6 address prefix to a site with at least one globally routable IPv4 address, and specifies an encapsulation mechanism for transmitting IPv6 packets using such a prefix over the global IPv4 network. Potential scaling problems are known to exist, although it does not increase the size of the IPv4 global routing table, and adds one entry to the IPv6 global routing table.

Hybrid methods

Other, more complex techniques, involve some type of automatic tunneling setup, or translation between IPv4 and IPv6 packets.

Tunnel broker

The motivation for the development of the tunnel broker' model is to help early IPv6 adopters to hook up to an existing IPv6 network (e.g., the 6bone) and to get stable, permanent IPv6 addresses and DNS names. [6] The authors of this method are concerted that the dual stack and configured tunneling approach is too labor intensive, and also creates the danger of bringing the IPv4 routing table into the IPv6 table. They consider 6over4 not to meet the needs of the isolated individual host user, given the need for having a multicast infrastructure that may not be available to a host user.

They do see their method as complementary to 6to4 mechanisms. Tunnel Broker is isolated host oriented, while 6to4 is isolated site oriented.

ISATAP

ISATAP is adds address assignment to host-to-host, host-to-router, and router-to-host automatic tunneling technology that is used to provide unicast IPv6 connectivity between IPv6/IPv4 hosts across an IPv4 intranet. [7]

TEREDO

The TEREDO service is a mechanism where the IPv6 packets are carried over a IPv4 network, with the additional constraint that the "TEREDO servers" are located on the "inside" of an IPv4 to IPv4 network address translation device. In addition to the stateless TEREDO servers, there are TEREDO relays, which appear, to the IPv6-only hosts, as IPv6 routers. [8]

Considering specific situations

To have meaningful discussions of deployment, the problem has to be stated in terms of:

  • The types of end nodes required (host vs. router, or possibly host with additional functionality (e.g., TEREDO)
  • The cases where the other protocol family needs to supply some part of connectivity (6 over 4 or, later, 4 over 6)
  • Any constraints that apply to the transfer of information over a "foreign" connectivity medium, such as MTU size or support of a particular per-hop behavior not supported in the foreign protocol
  • Higher-layer gateways
  • Operational requirements such as multihoming, especially when multiple providers are involved

An inventory is a fine place to start. Determine:

  • which hosts will never speak to anything that is not completely IPv6, such as the internals of the cellular network
  • which hosts can be completely proxied at an application level

IPv6 test and provider networks

6Bone

Operating system specific

Linux

Mac OS

Although IPv6 support has been in MacOS since 10.3 Panther, Apple's overall policy on IPv6 is not as clear as Microsoft's, but Apple is starting to use IPv6 as a routine component.

Apple's function Back to My Mac, Apple uses IPv6 tunneled in IPv4 using IPSec, for a secure connection anywhere on the Internet. [9] This feature requires support of an Internet-Draft router feature, NAT Port Mapping Protocol (NAT-PMP).[10] This appears to be deployed only in Apple AirPort routers.

Microsoft

Microsoft has announced strategies for Windows products, especially Vista and Server 2008, for IPv6 operation in various combinations of existing IPv4 public network connectivity,native ISP IPv6 support, IPv4 private address space networks, and coexisting V4/V6.[11]

Microsoft assumes that at present, the basic ISP environment will be IPv4, so Windows will default to IPv6 over IPv4 tunneling unless the ISP indicates native v6 is available. Any IPv6 Windows system directly connected to an ISP will require one globally routable IPv4 address. Subsequent Windows system connected to the IPv6 gateway will hear 6to4 router announcements for the host with the v4 address. [5]

If an existing network has no public IPv4 addresses, and there are NATs that are IPv4 only, Microsoft will use Teredo IPv6 over UDP over IPv4 tunneling.

When enterprises want to move incrementally to IPv6, Microsoft's approach is ISATAP, which allows coexistence and interoperation between IPv4 and IPv6.[7]

Router specific

Cisco

Cisco distinguishes between service provider and enterprise IPv6 deployment. The company strongly recommends that organizations first set up familiarization laboratory environments, become familiar with the technology, and then assess specific requirements and select deployment strategies. [12]

According to Cisco, there are four basic means of communication: The four key strategies for deploying IPv6 are as follows:

  • Deploying over dedicated layer 1/2 links, described above as deploying IPv6 without any IPv4. In this model, the individual domains connect using the same transmission infrastructure as the existing V4. Such an approach makes the most sense when the organization has its own physical facilities, in a laboratory environment, as a telecommunications service provider, or a specialized enterprise (e.g., military) that has its own physical facilities. This could be done with new leased lines from a provider, but it might be more economical to get MPLS links from the provider, and run separate V4 and V6 paths.
  • MPLS, according to Cisco, is still essentially IPv4 independent, like the previous srategy, offers a number of techniques, but very little change will be needed to a running MPLS environments, since only the Label Edge Routers (LER) need be aawre of v6.
  • IPv6 in IPv4 tunnels, with a number of implementation choices including manually configured IPv6 tunnels, generic route encapsulation (GRE) tunnels, tunnel broker and other semiautomatic methods, and automatic tunneling with IPv4-compatible addressing or 6to4.
  • Coexistence in a mixed IPv4-IPv6 backbone, with dual-stack routers. [1]

Enterprise

Enterprises have two basic ways to set up familiarization. The first is to get V6 address space and connect to the 6bone or other appropriate test network. Alternaltively, the enterpise can create two or more IPv6 domains, experiment with single-domain operations, and then interconnect them over the existing IPv4 infrastructure.

Service provider

Juniper

Quagga

All Quagga interfaces may be configured with IPv6 addressing, and static routing, as well as RIPng, OSPFv3, and BGP-4+ all are supported. The routers participate in stateless autoconfiguration. Quagga supports RIPng, OSPFv3 and BGP-4+. [13]

References

  1. 1.0 1.1 1.2 E. Nordmark, R. Gilligan. (October 2005), Basic Transition Mechanisms for IPv6 Hosts and Routers, RFC 4213
  2. D. Farinacci, T. Li, S. Hanks, D. Meyer, P. Traina (March 2000), Generic Routing Encapsulation (GRE), RFC 2784
  3. G. Dommety (September 2000), Key and Sequence Number Extensions to GRE, RFC 2890
  4. B. Carpenter, C. Jung (March 1999), Transmission of IPv6 over IPv4 Domains without Explicit Tunnels
  5. 5.0 5.1 B. Carpenter, K. Moore (February 2001), Connection of IPv6 Domains via IPv4 Clouds, RFC3056
  6. A. Durand, P. Fasano, I. Guardini, D. Lento. (January 2001), IPv6 Tunnel Broker, RFC 3053
  7. 7.0 7.1 F. Templin, T. Gleeson, D. Thaler. (March 2008.), Intra-Site Automatic Tunnel Addressing Protocol (ISATAP)., RFC5214
  8. C. Huitema (February 2006), Teredo: Tunneling IPv6 over UDP through Network Address Translations (NATs)., RFC4380
  9. Martellaro, John (August 20th, 2008), Apple's Oh-so Quiet Implementation of IPv6
  10. S. Cheshire, M. Krochmal, K. Sekar (April 16, 2008), NAT Port Mapping Protocol (NAT-PMP), draft-cheshire-nat-pmp-03.txt
  11. Microsoft Corporation (February 12, 2008), Microsoft's Objectives for IP Version 6
  12. Cisco Systems, IPv6 deployment strategies
  13. Quagga, IPv6 support