From Charles M. Kozierok, the creator of the highly regarded www.pcguide.com, comes The TCP/IP Guide. This completely up-to-date, encyclopedic reference on the TCP/IP protocol suite will appeal to newcomers and the seasoned professional alike. Kozierok details the core protocols that make TCP/IP internetworks function and the most important classic TCP/IP applications, integrating IPv6 coverage throughout. Over 350 illustrations and hundreds of tables help to explain the finer points of this complex topic. The book’s personal, user-friendly writing style lets readers of all levels understand the dozens of protocols and technologies that run the Internet, with full coverage of PPP, ARP, IP, IPv6, IP NAT, IPSec, Mobile IP, ICMP, RIP, BGP, TCP, UDP, DNS, DHCP, SNMP, FTP, SMTP, NNTP, HTTP, Telnet, and much more. The TCP/IP Guide is a must-have addition to the libraries of internetworking students, educators, networking professionals, and those working toward certification.
If your organization is gearing up for IPv6, this in-depth book provides the practical information and guidance you need to plan for, design, and implement this vastly improved protocol. Author Silvia Hagen takes system and network administrators, engineers, and network designers through the technical details of IPv6 features and functions, and provides options for those who need to integrate IPv6 with their current IPv4 infrastructure. The flood of Internet-enabled devices has made migrating to IPv6 a paramount concern worldwide. In this updated edition, Hagen distills more than ten years of studying, working with, and consulting with enterprises on IPv6. It’s the only book of its kind. IPv6 Essentials covers: Address architecture, header structure, and the ICMPv6 message format IPv6 mechanisms such as Neighbor Discovery, Stateless Address autoconfiguration, and Duplicate Address detection Network-related aspects and services: Layer 2 support, Upper Layer Protocols, and Checksums IPv6 security: general practices, IPSec basics, IPv6 security elements, and enterprise security models Transitioning to IPv6: dual-stack operation, tunneling, and translation techniques Mobile IPv6: technology for a new generation of mobile services Planning options, integration scenarios, address plan, best practices, and dos and don’ts
Includes new coverage on the advances in signaling protocols,second-generation switching and the development of non-switchedalternatives, and the implementation lessons learned. Contains in-depth coverage of network architectures used tosupport VoIP, performance and voice quality considerations,compression and integration methods for IP tranmissions.
This book contains everything you need to make your application program support IPv6. IPv6 socket APIs (RFC2553) are fully described with real-world examples. It covers security, a great concern these days. To secure the Internet infrastructure, every developer has to take a security stance - to audit every line of code, to use proper API and write correct and secure code as much as possible. To achieve this goal, the examples presented in this book are implemented with a security stance. Also, the book leads you to write secure programs. For instance, the book recommends against the use of some of the IPv6 standard APIs - unfortunately, there are some IPv6 APIs that are inherently insecure, so the book tries to avoid (and discourage) the use of such APIs. Another key issue is portability. The examples in the book should be applicable to any of UNIX based operating systems, MacOS X, and Windows XP.* Covers the new protocol just adopted by the Dept of Defense for future systems* Deals with security concerns, including spam and email, by presenting the best programming standards * Fully describes IPv6 socket APIs (RFC2553) using real-world examples * Allows for portability to UNIX-based operating systems, MacOS X, and Windows XP
Members of the Internet Engineering Task Force (IETF) and others explain the history and outcome of efforts in developing IPng technology, offering an insider's view of the rationale behind IPng and its ramifications across industries. They review IPng proposals, overview technical criteria and the resulting current IPv6 protocol, and explore IPng's impact in areas such as the military, cable TV, and corporate networking. For technology watchers, technical managers, and networking and communications professionals. Annotation copyright by Book News, Inc., Portland, OR
Anyone who is involved with information technology knows that the Internet is running out of IP addresses. The last block of Internet Protocol version 4 (IPv4) addresses was allocated in 2011. Internet Protocol version 6 (IPv6) is the replacement for IPv4, and it is designed to address the depletion of IP addresses and change the way traffic is managed. This IBM® RedpaperTM publication describes the concepts and architecture of IPv6 with a focus on: An overview of IPv6 features An examination of the IPv6 packet format An explanation of additional IPv6 functions A review of IPv6 mobility applications This paper provides an introduction to Internet Control Message Protocol (ICMP) and describes the functions of ICMP in an IPv6 network. This paper also provides IPv6 configuration steps for the following clients: Microsoft Windows Red Hat Enterprise Linux IBM AIX® VMware vSphere ESXi 5.0 After understanding the basics of IPv6 concepts and architecture, IT network professionals will be able to use the procedures outlined in this paper to configure various host operating systems to suit their network infrastructure.
Organizations are increasingly transitioning to IPv6, the next generation protocol for defining how devices of all kinds communicate over networks. Now fully updated, IPv6 Fundamentals offers a thorough, friendly, and easy-to-understand introduction to the knowledge and skills you need to deploy and operate IPv6 networks. Leading networking instructor Rick Graziani explains all the basics simply and clearly, step-by-step, providing all the details you’ll need to succeed. You’ll learn why IPv6 is necessary, how it was created, how it works, and how it has become the protocol of choice in environments ranging from cloud to mobile and IoT. Graziani thoroughly introduces IPv6 addressing, configuration options, and routing protocols, including EIGRP for IPv6, and OSPFv3 (traditional configuration and with address families). Building on this coverage, he then includes more in-depth information involving these protocols and processes. This edition contains a completely revamped discussion of deploying IPv6 in your network, including IPv6/IPv4 integration, dynamic address allocation, and understanding IPv6 from the perspective of the network and host. You’ll also find improved coverage of key topics such as Stateless Address Autoconfiguration (SLAAC), DHCPv6, and the advantages of the solicited node multicast address. Throughout, Graziani presents command syntax for Cisco IOS, Windows, Linux, and Mac OS, as well as many examples, diagrams, configuration tips, and updated links to white papers and official RFCs for even deeper understanding. Learn how IPv6 supports modern networks encompassing the cloud, mobile, IoT, and gaming devices Compare IPv6 with IPv4 to see what has changed and what hasn’t Understand and represent IPv6 addresses for unicast, multicast, and anycast environments Master all facets of dynamic IPv6 address allocation with SLAAC, stateless DHCPv6, and stateful DHCPv6 Understand all the features of deploying IPv6 addresses in the network including temporary addresses and the privacy extension Improve operations by leveraging major enhancements built into ICMPv6 and ICMPv6 Neighbor Discovery Protocol Configure IPv6 addressing and Access Control Lists using a common topology Implement routing of IPv6 packets via static routing, EIGRP for IPv6, and OSPFv3 Walk step-by-step through deploying IPv6 in existing networks, and coexisting with or transitioning from IPv4
IPv6 was introduced in 1994 and has been in development at the IETF for over 10 years. It has now reached the deployment stage. KAME, the de-facto open-source reference implementation of the IPv6 standards, played a significant role in the acceptance and the adoption of the IPv6 technology. The adoption of KAME by key companies in a wide spectrum of commercial products is a testimonial to the success of the KAME project, which concluded not long ago. This book is the first and the only one of its kind, which reveals all of the details of the KAME IPv6 protocol stack, explaining exactly what every line of code does and why it was designed that way. Through the dissection of both the code and its design, the authors illustrate how IPv6 and its related protocols have been interpreted and implemented from the specifications. This reference will demystify those ambiguous areas in the standards, which are open to interpretation and problematic in deployment, and presents solutions offered by KAME in dealing with these implementation challenges. - Covering a snapshot version of KAME dated April 2003 based on FreeBSD 4.8 - Extensive line-by-line code listings with meticulous explanation of their rationale and use for the KAME snapshot implementation, which is generally applicable to most recent versions of the KAME IPv6 stack including those in recent releases of BSD variants - Numerous diagrams and illustrations help in visualizing the implementation - In-depth discussion of the standards provides intrinsic understanding of the specifications
If you’re ready to join the move to IPv6, this comprehensive guide gets you started by showing you how to create an effective IPv6 address plan. In three example-driven sections—preparation, design, and maintenance—you’ll learn principles and best practices for designing, deploying, and maintaining an address plan far beyond what’s possible with IPv4 networks. During the course of the book, you’ll walk through the process of building a sample address plan for a fictional company. Enterprise IT network architects, engineers, and administrators will see firsthand how IPv6 provides opportunities for creating an operationally efficient plan that’s scalable, flexible, extensible, manageable, and durable. Explore IPv6 addressing basics, including representation, structure, and types Manage risks and costs by using a three-phase approach for deploying IPv6 Dig into IPv6 subnetting methods and learn how they differ from IPv4 Determine the appropriate size and type of the IPv6 allocation you require Apply current network management tools to IPv6 Use IPv6 renumbering methods that enable greater network scale and easier integration Implement policies and practices to keep IPv6 addresses reachable
IPv6 Security Protection measures for the next Internet Protocol As the world’s networks migrate to the IPv6 protocol, networking professionals need a clearer understanding of the security risks, threats, and challenges this transition presents. In IPv6 Security, two of the world’s leading Internet security practitioners review each potential security issue introduced by IPv6 networking and present today’s best solutions. IPv6 Security offers guidance for avoiding security problems prior to widespread IPv6 deployment. The book covers every component of today’s networks, identifying specific security deficiencies that occur within IPv6 environments and demonstrating how to combat them. The authors describe best practices for identifying and resolving weaknesses as you maintain a dual stack network. Then they describe the security mechanisms you need to implement as you migrate to an IPv6-only network. The authors survey the techniques hackers might use to try to breach your network, such as IPv6 network reconnaissance, address spoofing, traffic interception, denial of service, and tunnel injection. The authors also turn to Cisco® products and protection mechanisms. You learn how to use Cisco IOS® and ASA firewalls and ACLs to selectively filter IPv6 traffic. You also learn about securing hosts with Cisco Security Agent 6.0 and about securing a network with IOS routers and switches. Multiple examples are explained for Windows, Linux, FreeBSD, and Solaris hosts. The authors offer detailed examples that are consistent with today’s best practices and easy to adapt to virtually any IPv6 environment. Scott Hogg, CCIE® No. 5133, is Director of Advanced Technology Services at Global Technology Resources, Inc. (GTRI). He is responsible for setting the company’s technical direction and helping it create service offerings for emerging technologies such as IPv6. He is the Chair of the Rocky Mountain IPv6 Task Force. Eric Vyncke, Cisco Distinguished System Engineer, consults on security issues throughout Europe. He has 20 years’ experience in security and teaches security seminars as a guest professor at universities throughout Belgium. He also participates in the Internet Engineering Task Force (IETF) and has helped several organizations deploy IPv6 securely. Understand why IPv6 is already a latent threat in your IPv4-only network Plan ahead to avoid IPv6 security problems before widespread deployment Identify known areas of weakness in IPv6 security and the current state of attack tools and hacker skills Understand each high-level approach to securing IPv6 and learn when to use each Protect service provider networks, perimeters, LANs, and host/server connections Harden IPv6 network devices against attack Utilize IPsec in IPv6 environments Secure mobile IPv6 networks Secure transition mechanisms in use during the migration from IPv4 to IPv6 Monitor IPv6 security Understand the security implications of the IPv6 protocol, including issues related to ICMPv6 and the IPv6 header structure Protect your network against large-scale threats by using perimeter filtering techniques and service provider—focused security practices Understand the vulnerabilities that exist on IPv6 access networks and learn solutions for mitigating each This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks. Category: Networking: Security Covers: IPv6 Security