IPv6 Status Update & Discussion Phil DeMar Winter 2014 ESCC meeting February 25, 2014.

Slides:



Advertisements
Similar presentations
Network Systems Sales LLC
Advertisements

Chapter 3: Planning a Network Upgrade
 Business Drivers / Why Now  Technology Drivers  How all of this affects our business and our customers  Frequently Asked Questions Appendix.
Deployment of MPLS VPN in Large ISP Networks
IPv4 - IPv6 Integration and Coexistence Strategies Warakorn Sae-Tang Network Specialist Professional Service Department A Subsidiary.
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
IPv6 Planning and Implementation at PSU.  1986 – PSU gets Class B network ( ) & 5 Class C networks  1988 – Department of Computer.
Guide to Network Defense and Countermeasures Second Edition
US Labs IPv6 Planning & Deployment Status Phil DeMar Oct. 4,
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Multi-Layer Switching Layers 1, 2, and 3. Cisco Hierarchical Model Access Layer –Workgroup –Access layer aggregation and L3/L4 services Distribution Layer.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
Remote Viewing Setup DVR & IP Video Devices
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Highly Available Central Services An Intelligent Router Approach Thomas Finnern Thorsten Witt DESY/IT.
Firewall Configuration Strategies
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 13: Troubleshoot TCP/IP.
Hardware Firewalls: Advanced Feature © N. Ganesan, Ph.D.
Trusted Internet Connections. Background Pervasive and sustained cyber attacks against the United States continue to pose a potentially devastating impact.
Maintaining and Updating Windows Server 2008
1 Restricted to Nortel Networks Internal Review Ebusiness Infrastructure Platform.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
1 Enabling Secure Internet Access with ISA Server.
ITGS Networks Based on the textbook “Information Technology in a Global Society for the IB Diploma” by Stuart Gray.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Mobile Networking Challenges1 5.6 Mobile Ad Hoc Networks  Ad hoc network does not have any preexisting centralized server nodes to perform packet routing,
CD FY09 Tactical Plan Status FY09 Tactical Plan Status Report for Site Networking Anna Jordan April 28, 2009.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
Module 4: Planning, Optimizing, and Troubleshooting DHCP
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
Natick Public Schools Technology Update April 23, 2007 Dennis Roche, CISA Director of Technology.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Identifying Application Impacts on Network Design Designing and Supporting.
Using DHCPv6 for DNS Configuration in Hosts draft-ietf-droms-dnsconfig-dhcpv6-00.txt Ralph Droms.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
ESnet Site Coordinators Committee (ESCC): IPv6 Activities & Directions Phil DeMar (ESCC Chair) HEPix IPv6 Workshop (CERN) June 22, 2011.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
FireProof. The Challenge Firewall - the challenge Network security devices Critical gateway to your network Constant service The Challenge.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
NUOL Internet Application Services Midterm presentation 22 nd March, 2004.
Terri Lahey Control System Cyber-Security Workshop October 14, SLAC Controls Security Overview Introduction SLAC has multiple.
Choosing a Network Camera The top 10 factors for making the right choice.
Security fundamentals Topic 10 Securing the network perimeter.
Module 1 Introduction to Designing a Microsoft® Exchange Server 2010 Deployment.
Network design Topic 2 Existing network infrastructure.
Welcome to Early Bird Class
+ Routing Concepts 1 st semester Objectives  Describe the primary functions and features of a router.  Explain how routers use information.
ORNL Site Report ESCC July 15, 2013 Susan Hicks David Wantland.
Model: DS-600 5x 10/100/1000Mbps Ethernet Port Centralized WLAN management and Access Point Discovery Manages up to 50 APs with access setting control.
IPv6 Status, Management, & Configuration Issues Winter 2013 ESCC meeting January 18, 2013.
IPv6 Status Stuff Phil DeMar Summer 2011 JointTechs meeting July 14, 2011.
DOE /ESnet-related IPv6 Activities Phil DeMar HEPix IPv6 Workshop (CERN) Sept. 6,
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Fermilab Cal Tech Lambda Station High-Performance Network Research PI Meeting BNL Phil DeMar September 29, 2005.
Labs. Session 1 Lab: Installing and Configuring Windows 7 Exercise 1: Migrating Settings by Using Windows Easy Transfer Exercise 2: Configuring a Reference.
WELCOME ALL.
Chapter 6: Securing the Cloud
Affinity Depending on the application and client requirements of your Network Load Balancing cluster, you can be required to select an Affinity setting.
Chapter 4: Routing Concepts
FY09 Tactical Plan Status Report for Site Networking
Introduction to Networking
Ebusiness Infrastructure Platform
IS4680 Security Auditing for Compliance
Planning a Network Upgrade
IPv6 Implementation at a Network Service Provider
AbbottLink™ - IP Address Overview
EE 122: Lecture 22 (Overlay Networks)
Presentation transcript:

IPv6 Status Update & Discussion Phil DeMar Winter 2014 ESCC meeting February 25, 2014

IPv6 – A Few High-Level Points IPv6 use continues to grow:  Still pretty small  But is growth exponential? Rumors of a new OMB IPv6 mandate:  Would focus on devices & mobility  Target milestone deadline = 2016

Lab IPv6 status at:

Comment: Compliance with the 2014 mandate would require a complete overhaul of our existing, best-practice cyber security implementation.

 The biggest issue: We had one vendor ( filtering) who changed their mind about supporting us over IPv6 and dropped the service without notifying us first.  Impact only for IPv6 services not for IPv4  Few issues related to sendmail problems; absence of IP address based blacklists; and reverse PTR requirements.  We are in the process of implementing a new firewall and expect to have IPv6 functioning on externally facing services by the end of the fiscal year. With the previous firewall, we experienced insurmountable IPv6 implementation issues.  All IPv6 comments pertain to our small Science DMZ. No IPv6 is on our production network.  Largely transparent. The interesting aspect is the few IPv6-related issues have been challenging to identify as IPv6-related. Just recognizing that IPv6 is involved is the key element in dealing with the problem. Comments on: Have You Encountered IPv6 Service Disruptions?

 Our experience is that vendor support for filtering products is spotty. We've had several problems in this area, with cloud services and appliances.  None  We were limiting Google mail and Cisco because the was no reputation based on the IPv6 partner connection. We are still working with senderbase.org on understanding this and had to whitelist these organization so that we would not queue .  no  Yes, several incidents worth mentioning: - Performance issues when IPv6 traffic scaled up to science data movement - Bizarre IPv6 routing - Problems accessing an external IPv6 web site  Turning on IPv6 support in the edge firewall (Checkpoint) froze the system, even though specs claimed support. FW to be swapped out in February, Comments on: Do You Have Any IPv6 Lessons-Learned Incidents or Events to Share?

 We plan to maintain out externally facing presence as a production service. We will expand this to include more web servers and other services, both externally- and internally-facing. We are replacing equipment where IPv6 support is substandard as part of the normal hardware life cycle.  Cyber security is doing some work to upgrade their monitoring systems to support IPv6. Not much else is happening at the site.  Moving IPv6 internal to client has not reached high enough on the project funding list. We are interested in pursuing more and working with our Cyber Security group as the develop and procure tools for to include IPv6 parity. No immediate realized drivers for doing such and therefore funding has appeared to continue.  IPv6 deployed close to border - DMZs, server lan, working on visitor wireless.  IPv6 not being made available to general users because of lack of integration in tools, such as IPAM, netflow.  The Laboratory is in the process of upgrading IPAM and DHCP for v6 functionality. Comments on: High-Level Summary of your Site’s IPv6 Efforts - I

 Intention is to support v6 in our Science DMZ.  We have deployed IPv6 on our Science DMZ. We have had some delays because some applications are not IPv6. Applications are non-commercial 3rd party.  Overall, a modest effort to continue to develop IPv6 capabilities within our campus network, largely out of opportunity cost. We are also now evaluating IPv6 with our science application in anticipation of possible use within LHC GRID computing.  Integrated into our DNS management system, available to server subnets by customer request. Fully available on the wireless networks used by 90% of users. Security infrastructure support partially implemented. Pilot of wired desktop support starting. Full router support (including multicast) 90% completed.  We do not provide public facing services from our internal network, just from systems on the DMZ, so we do not anticipate any IPv6 changes internally. Also, Cybersecurity is concerned that IPv6 support cannot be handled by their internal systems (IPS, internal firewall, SPLUNK, etc.) Comments on: High-Level Summary of your Site’s IPv6 Efforts - II

 The general discussion of anything that is new/different with regard to IPv6 deployment at the sites is always useful. Warnings about potential pitfalls/cautionary tales are valuable.  Scanning IPv6 network and how other may achieve this without taking years. We also looked at enabling IPv6 for remote access but still waiting on vendor support and upgrade schedule before this will work. What dynamic address assignment protocol are others planning SLAAC or DHCPv6.  security issues  The obvious contention between the requirements of the OMB 2014 mandate and cyber security best practice.  How are sites handling addressing configuration options (A, M, & O bits) Comments on: IPv6 Areas You Would Like to See Discussed

Lessons-Learned Incidents or Events

FNAL IPv6 Lesson-Learned #1 – Sometimes it’s the App… Sequence:  science.energy.gov Timeout failure 100% reproduceable  But others can reach it…  Disengaging from the IPv6- enabled network works?  Check out netstat when attached to IPv6 network  Conclusion: science.doe.gov web server app hanging on IPv6 connections

FNAL IPv6 Lesson-Learned #2 – IPv6 Paths May Not Be Logical… Sequence:  FNAL HEPiX IPv6 testing shows FNAL StarLight transfers have poorest performance?  Traceroute-6 shows path is “less than optimal” FNAL CERN SL

FNAL IPv6 Lesson-Learned #3 – Traffic Loads May Reveal Hidden Problems… Sequence:  FNAL joins HEPiX IPv6 test bed IPv6 traffic levels jump from (o) Mb/s to (o) 100Mb/s Border router CPU jumps from 5% to ~50%  Investigation reveals ‘reverse path cache’ command caused problem