University of Southampton

Slides:



Advertisements
Similar presentations
Routing Routing in an internetwork is the process of directing the transmission of data across two connected networks. Bridges seem to do this function.
Advertisements

 WAN uses Serial ports  Ethernet Ports:  Straight through  Cross over.
IPv4 to IPv6 Migration strategies. What is IPv4  Second revision in development of internet protocol  First version to be widely implied.  Connection.
© 2006 Cisco Systems, Inc. All rights reserved.IP6FD v2.0—2-1 IPv6 Operations Defining and Configuring Neighbor Discovery.
 Reference:  Vehicle has 2 MANET routers, interconnected via Ethernet  Vehicle has access to 3 wireless networks  Applications on MANET Routers use.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Instructor & Todd Lammle
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Experiences of host behavior in broken IPv6 networks IETF#80 Prague – v6ops WG 31 st March 2011 Slide about Rogue RA relation to Happy Eyeballs:
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—7-1 Minimizing Service Loss and Data Theft Understanding Switch Security Issues.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Technologies Networking for Home and Small Businesses – Chapter 7.
Wireless LAN Provides network connectivity over wireless media An Access Point (AP) is installed to act as Bridge between Wireless and Wired Network.
IP ADDRESS(ıNTERNET PROTOCOL) Betül ŞAHİN
Building a Simple Network
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—1-1 Building a Simple Network Understanding the Host-to-Host Communications Model.
Controlling Traffic Offloading Using Neighbor Discovery Protocol IETF#80 Mif WG, 28-March-2011 draft-korhonen-mif-ra-offload-01 Jouni Korhonen Teemu Savolainen.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
NETWORKING COMPONENTS Zach Avis. Hub A hub is a low cost way to connect two computers. A hub can also act as a repeater. When a signal comes from one.
Introduction to IT and Communications Technology Justin Champion C208 – 3292 Ethernet Switching CE
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
Configuring Network Connectivity Lesson 7. Skills Matrix Technology SkillObjective DomainObjective # Using the Network and Sharing Center Use the Network.
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
Connecting to a Network Lesson 5. Objectives Understand the OSI Reference Model and its relationship to Windows 7 networking Install and configure networking.
IPv6 RA DoS Attacks Sam Bowne gogoNET Live 4 Nov 13, 2013.
SHAWN CROWE LTEC /026 ASSIGNMENT #3 Networking Components.
IPv6 Address Accountability Considerations draft-chown-v6ops-address-accountability-01 IETF81, Quebec Tim Chown, July 28 th, 2011.
Testing Eyeball Happiness Fred Baker. The issue I bring to your attention In dual stack networks, especially if BCP 38 is in use, opening a session can.
CCNP Network Route IPV-6 Part-I IPV6 Addressing: IPV-4 is 32-BIT, IPV-6 is 128-BIT IPV-6 are divided into 8 groups. Each is 4 Hex characters. Each group.
Media Access Control (MAC) addresses in the network access layer ▫ Associated w/ network interface card (NIC) ▫ 48 bits or 64 bits IP addresses for the.
IP addresses. Network Layer introduction 4.2 virtual circuit and datagram networks 4.3 what’s inside a router 4.4 IP: Internet Protocol datagram.
Draft-chown-v6ops-campus-transition-03 IPv6 Campus Transition Scenario Description and Analysis Tim Chown University of Southampton (UK)
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public BSCI Module 8 Lesson 3 1 BSCI Module 8 Lesson 3 Implementing Dynamic IPv6 Addresses.
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—7-1 Minimizing Service Loss and Data Theft Protecting Against VLAN Attacks.
Configuring Network Connectivity Lesson 7. Skills Matrix Technology SkillObjective DomainObjective # Using the Network and Sharing Center Use the Network.
Engineering Workshops Transition and Tunnels Dale Finkelson.
Defining the Border Between P and P Myung Lee CUNY/Samsung.
Transmission Control Protocol (TCP) Internet Protocol (IP)
Copyright 2009 Kenneth M. Chipps Ph.D. Addressing in Networks Last Update
Network Performance Test on IPv Technology Laboratory, KT Choi Sung Mi
Submission doc.: IEEE 11-13/ ak May 2013 Norman Finn, Cisco SystemsSlide 1 P802.1Qbz + P802.11ak Proposed Division of Work Date: Authors:
Price range varies from $17.99 to $34.99 or more. Device 1 Device 2 Network Connection.
Cisco I Introduction to Networks Semester 1 Chapter 8 JEOPADY.
ITMT Windows 7 Configuration Chapter 5 – Connecting to a Network ITMT 1371 – Windows 7 Configuration 1.
Draft-wing-v6ops-happy-eyeballs-ipv6 Happy Eyeballs: Trending Towards Success with Dual-Stack Hosts Dan Wing Andrew Yourtchenko {dwing,
V4 traversal for IPv6 mobility protocols - Scenarios Mip6trans Design Team MIP6 and NEMO WGs, IETF 63.
LTEC Assignment 3 Part 1 Shannon Smith /sls0571.
WISECURE Exam CCNP Wireless WISECURE Exam
Security Implications of IPv6 on IPv4 Networks
Internet Protocol Address
IPv6 Overview Address space Address types IPv6 and Tunneling.
Ipv6 addressing Chapter 5d.
Instructor Materials Chapter 8: Subnetting IP Networks
Network connectivity to the legacy wired LAN
Hubs Bridges Switches Last Update
Chapter 8: Subnetting IP Networks
doc.: IEEE /xxx Jon Edney, Nokia
Ct1403 Lecture#2: DATA LINK LAYER
DHCP Anonymity Profile Update
Instructor & Todd Lammle
Implement Inter-VLAN Routing
Wireless LAN Security 4.3 Wireless LAN Security.
Unit – 2 TCP.
Implement Inter-VLAN Routing
Liaison to WFA service discovery summary
Implement Inter-VLAN Routing
May 2004 doc.: IEEE /629r1 May 2004 The Nature of an ESS
Network connectivity to the legacy wired LAN
Implement Inter-VLAN Routing
Lec 7 Network Layer: Logical Addressing
Wireless LANs.
Presentation transcript:

University of Southampton Rogue RA stats summary Tim Chown, James Morse University of Southampton {tjc,jsmm104}@ecs.soton.ac.uk

Stats on campus rogue RAs Used RAmond (http://ramond.sourceforge.net) on a ~50 AP dual-stack wireless network RAmond issues deprecating RA against rogues Rogue may not actually be turned off for some time Period of 376 days (2010-02-18 to 2011-03-01) Rogue RA seen on 228 of those days (60%) 257,669 rogue RAs seen, all for 2002::/16 (connection sharing?) 35 different MAC sources using 38 different link layer sources Only two devices used EUI-64 addresses, one was an HTC Four devices sent only one rogue RA Presence of a rogue RA may cause connectivity problems Whether on a dual-stack or IPv4-only network if the hosts have IPv6 enabled – can Happy Eyeballs help mitigate this?