Deployment Considerations for Dual-stack Lite IETF 80 Prague Yiu Lee, Roberta Magione, Carl Williams, Christian Jacquenet Mohamed Boucadair.

Slides:



Advertisements
Similar presentations
Draft-ietf-softwire-dual-stack-lite-01.txt Yiu Lee
Advertisements

Public IPv4 over Access IPv6 network draft-cui-softwire-host-4over6-06 draft-cui-softwire-dhcp-over-tunnel-01 Y. Cui, J. Wu, P. Wu Tsinghua Univ. C. Metz.
Dynamic Allocation of Shared IPv4 Addresses draft-csf-dhc-dynamic-shared-v4allocation-00 Q. Sun, Y. Cui, I. Farrer, Y. Lee, Q. Sun, M. Boucadair IETF 89,
CST Computer Networks NAT CST 415 4/10/2017 CST Computer Networks.
IPv4 - IPv6 Integration and Coexistence Strategies Warakorn Sae-Tang Network Specialist Professional Service Department A Subsidiary.
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
IPv4 to IPv6 Migration strategies. What is IPv4  Second revision in development of internet protocol  First version to be widely implied.  Connection.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 W. Schulte Chapter 5: Network Address Translation for IPv4  Connecting.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Lecture15: Network Address Translation for IPv4 Connecting Networks.
IP Transition Fix or a Band-Aid?
Deployment Considerations for Dual-stack Lite draft-lee-softwire-dslite-deployment-00 Yiu Lee, Roberta Magione, Carl Williams, Christian Jacquenet Mohamed.
Circuit & Application Level Gateways CS-431 Dick Steflik.
IPv4 over IP CS draft-madanapalli-16ng-ipv4-over-802-dot-16-ipcs-00 Soohong Daniel Park Syam Madanapalli 68 – Prague, Czech Republic March 18-23,
SP Wi-Fi Services over Residential Architectures (draft-gundavelli-v6ops-community-wifi-svcs) IETF 84 - August, 2012 Authors: Sri Gundavelli(Cisco) Mark.
IETF 80 th 1 Analysis of Solution Candidates to Reveal the Origin IP Address in Shared Address Deployments draft-boucadair-intarea-nat-reveal-analysis-01.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
DS-Lite for Point-to- Point Access Network IETF 78 Maastricht 2010 July 30.
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 4: Addressing in an Enterprise Network Introducing Routing and Switching in the.
4V6 – aka stateless 4Via6 stateless-4v6-00 W. Dec 1.
Service Function Chaining Use Cases draft-liu-service-chaining-use-cases IETF 89 London, March 3, 2014 Will Liu, Hongyu Li, Oliver Huang, Huawei Technologies.
Chapter 13 – Network Security
Lightweight 4over6 + SD-nat (aka stateless DS-Lite) = Lightweight DS-Lite (twice as light!) Alain Durand (Juniper) Ian Farrer (DT) (Softwire item, presented.
Application Level Control of Ports in a Service Provider NAT environment Dave Thaler Dan Wing Alain Durand 1.
Softwire Security Requirement draft-ietf-softwire-security-requirements-03.txt Softwires WG IETF#69, Chicago 25 th July 2007 Shu Yamamoto Carl Williams.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
Sharing a single IPv4 address among many broadband customers
IPv6, the Protocol of the Future, Today Mathew Harris.
1 IPv6 Deployment Scenarios in (e) Networks draft-ietf-v6ops deployment-scenarios-01 Myung-Ki Shin, ETRI Youn-Hee Han, KUT Sang-Eon Kim, KT.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 4: Addressing in an Enterprise Network Introducing Routing and Switching in the.
Softwire IETF 78. Note Well Any submission to the IETF intended by the Contributor for publication as all or part of an IETF Internet-Draft or RFC and.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Guidance for Running Multiple IPv6 Prefixes (draft-liu-v6ops-running-multiple-prefixes-02) Bing Liu, Sheng Jiang (Speaker), Yang Bo IETF91
RTCWEB Considerations for NATs, Firewalls and HTTP proxies draft-hutton-rtcweb-nat-firewall- considerations A. Hutton, T. Stach, J. Uberti.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 11: Network Address Translation for IPv4 Routing And Switching.
IETF-90 (Toronto) DHC WG Meeting Wednesday, July 23, GMT IETF-90 DHC WG1 Last Updated: 07/21/ :10 EDT.
NAT64-CPE Mode Operation for Opening Residential Service Gang Chen Hui
IETF 81 th Multicast Extensions to DS-Lite Technique in Broadband Deployments draft-qin-softwire-dslite-multicast-04 Wang, Q., Qin, J., Boucadair, M.,
IP Transitioning in CE Routers Mark Townsley, Ole Troan.
Multicast Considerations for Gateway Initiated Dual-Stack lite (draft-brockners-softwire-mcast-gi-ds-lite-00) Authors: Frank Brockners
1 Review – The Internet’s Protocol Architecture. Protocols, Internetworking & the Internet 2 Introduction Internet standards Internet standards Layered.
1/13 draft-carpenter-nvo3-addressing-00 Brian Carpenter Sheng Jiang IETF 84 Jul/Aug 2012 Layer 3 Addressing Considerations for Network Virtualization Overlays.
IPFIX Requirements: Document Changes and New Issues Raised Jürgen Quittek, NEC Benoit Claise, Cisco Tanja Zseby, Sebstian Zander, FhG FOKUS.
IETF 78 RADIUS extensions for DS-Lite draft-maglione-softwire-dslite-radius-ext-00 R. Maglione – Telecom Italia A. Durand – Juniper Networks.
User-group-based Security Policy for Service Layer Jianjie You Myo Zarny Christian Jacquenet
Deploying Dual-Stack Lite in IPv6 Network draft-boucadair-dslite-interco-v4v6-04 Mohamed Boucadair
Lightweight 4over6: An Extension to DS-Lite Architecture draft-cui-softwire-b4-translated-ds-lite-09 Y. Cui, Q. Sun, M. Boucadair, T. Tsou, Y. Lee and.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY IT375 Window Enterprise Administration Course Name – IT Introduction to Network Security Instructor.
Understand IPv6 Part 2 LESSON 3.3_B Networking Fundamentals.
Requirements for LER Forwarding of IPv4 Option Packets
Lightweight 4over6: An Extension to DS-Lite Architecture draft-cui-softwire-b4-translated-ds-lite-11 IETF 86-Orlando, March 2013 Y. Cui, Q. Sun, M.
IPV6 TECHNIQUES TO Re-IMAGINE RESEARCH AND EDUCATION NETWORKS
Booting up on the Home Link
User-group-based Security Policy for Service Layer
IT443 – Network Security Administration Instructor: Bo Sheng
Prepared By : Pina Chhatrala
Securing the Network Perimeter with ISA 2004
Instructor Materials Chapter 9: NAT for IPv4
Running Multiple PLATs in 464XLAT
Routing and Switching Essentials v6.0
Packet Switching To improve the efficiency of transferring information over a shared communication line, messages are divided into fixed-sized, numbered.
Instructor Materials Chapter 9: NAT for IPv4
دیواره ی آتش.
Firewalls.
Chapter 11: Network Address Translation for IPv4
Steven Feltner reveller – IRC
Sheng Jiang(Speaker) Bing Liu
M. Boucadair, J. Touch, P. Levis and R. Penno
Multicast Support for Dual Stack Lite and 6RD
Presentation transcript:

Deployment Considerations for Dual-stack Lite IETF 80 Prague Yiu Lee, Roberta Magione, Carl Williams, Christian Jacquenet Mohamed Boucadair

DS-lite Deployment Considerations Based on preliminary experimental deployment, this work describes deployment and operational considerations for DSLITE. Updated -01 version based on comments and feedback.

Interface Considerations It is recommended that the AFTR addressing architecture should consist of two individual interfaces (i.e. one dedicated for IPv4 and one dedicated for IPv6) to segregate the functions. This can simplify netflow accounting and other OSS tools.

Lawful Intercept Considerations Interception in DS-lite architecture must be performed within the AFTR itself. – Subjects can be uniquely identified by the IPv6 address assigned to the B4 element. – Operators must associate the B4’s IPv6 address and the public IPv4 address and port used by the subject.

AFTR AFTR must log the B4’s IPv6 address and the IPv4 information. There are two types of logging that must be done: – Source-specific log – AFTR must timestamp and log the B4’s IPv6 address, transport protocol, source IPv4 address after NAT-ing, and source port. – Destination-specific log –AFTR must timestamp and log the B4’s IPv6 address, transport protocol, source IPv4 address after NAT-ing, source port, destination address and destination port.

Blacklisting a shared IPv4 address To deal with blacklisting a public IP address the server must no longer rely solely on the IP address to identify a particular user. – Server should combine information stored in transport layer (e.g. source port) and application layer (e.g. HTTP) to identify an a particular user. – I.D.boucadair-intarea-nat-reveal-analysis

AFTR Policies Outgoing Policy – Should be implemented on the AFTR’s IPv6 interface. – May be enforced on a specific B4 (or set of) basis Incoming Policy – Should be implemented on the AFTR’s IPv4 interface. – Should be general enough to be applied for all B4s.

Placement of AFTR Model One – Deploy in the edge and closer to the B4 elements. – Cover smaller region Model Two – Deploy in core of the network and further away from the B4 elements – Cover larger region

Model One Closer to the B4 elements. Serve fewer B4 elements. Lower resource requirements for AFTR. Tunnel is shorter which is good for the traffic distribution. It requires more AFTRs. It requires IPv4 access close to the edge.

Model Two Further away from the B4 elements. Serve more B4 elements. Higher resource requirements for AFTR. Tunnel is longer and v4 traffic would aggregate in the v6 access network to the AFTR. It requires fewer AFTRs. The network south of AFTR can be v6-only.

Geo-location Aware Applications The IPv4 address alone can’t tell where the B4 element is. Application may rely on information in the application layer or GPS information to locate the user.

Port Forwarding Considerations Some applications require accepting incoming UDP or TCP traffic. Some applications rely on ALGs, UPnP IGD, or manual port configuration. Port Control Protocol (PCP) [I-D.ietf-pcp-base] is designed to address these issues.

DS-Lite Tunnel Security Limiting services offered by AFTR to registered customers – Approach to perform IPv6 ingress filter on the AFTR’s tunnel interface to accept only the IPv6 address range in the filter requires a priori knowledge of IPv6 prefix to configure filter. – One alternative approach is use DHCPv6 Leasequery [RFC5007]. AFTR uses leasequery when it receives packet from unknown (new) prefix to verify it was delegated and assigned to specific client.

Questions for consideration AFTR requires IPv4. Should the WG address AFTR in IPv6 only environment? There is an existing draft discussing this: – “draft-boucadair-softwire-dslite-v6only-00 “ Should this draft includes use cases? – Fixed line deployment – Wireless deployment – Etc.

Next Step Any questions and suggestions? This draft is in the new charter’s scope. Could we adopt this as WG document?