Unleashing the Power of Ubiquitous Connectivity with IPv6 Sandeep K. Singhal, Ph.D Director of Program Management Windows Networking.

Slides:



Advertisements
Similar presentations
Connected Health Framework
Advertisements

2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
 IPv6 Has built in security via IPsec (Internet Protocol Security). ◦ IPsec Operates at OSI layer 3 or internet layer of the Internet Protocol Suite.
Enabling IPv6 in Corporate Intranet Networks
Guide to Network Defense and Countermeasures Second Edition
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Chapter 10 Securing Windows Server 2008 MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Dan Stolts IT Pro Evangelist US DPE - North East Microsoft Corporation
Threat Management Gateway 2010 Questo sconosciuto? …ancora per poco! Manuela Polcaro Security Advisor.
Understanding Active Directory
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Enabling Secure Always-On Connectivity [Name] Microsoft Corporation.
Private Cloud: Application Transformation Business Priorities Presentation.
WSV404 DirectAccess Server (Server 2008 R2) DirectAccess Client (Windows 7) Internet Native IPv6 6to4 Teredo IP-HTTPS Tunnel over IPv4 UDP, HTTPS,
Khaja Ahmed Architect Windows Networking Microsoft Corporation.
Windows Azure Networking & Active Directory Nasir (Muhammad Nasiruddin) Developer Evangelist - Azure Microsoft Corporation
Windows ® Powered NAS. Agenda Windows Powered NAS Windows Powered NAS Key Technologies in Windows Powered NAS Key Technologies in Windows Powered NAS.
Gavin Carius Architect Microsoft Services SVR311.
Clinic Security and Policy Enforcement in Windows Server 2008.
Network LANscape Servers & Equipment Found In a Typical Local Area Network (LAN) By George Squillace New Horizons of MichiganGeorge Squillace MCT, MCSE,
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
1 Week #7 Network Access Protection Overview of Network Access Protection How NAP Works Configuring NAP Monitoring and Troubleshooting NAP.
Introduction to Networking Concepts. Introducing TCP/IP Addressing Network address – common portion of the IP address shared by all hosts on a subnet/network.
Selecting the Right Network Access Protection Architecture
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
70-411: Administering Windows Server 2012
Implementing Network Access Protection
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
Module 14: Configuring Server Security Compliance
Windows 7 Firewall.
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
Module 8: Configuring Network Access Protection
Windows Small Business Server 2003 Setting up and Connecting David Overton Partner Technical Specialist.
From Virtualization Management to Private Cloud with SCVMM 2012 Dan Stolts Sr. IT Pro Evangelist Microsoft Corporation
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Configuring Network Access Protection
Terminal Services Technical Overview Olav Tvedt TVEDT.info Microsoft Speaker Community
Module 5: Designing Security for Internal Networks.
Enabling Secure Always-On Connectivity [Name] Microsoft Corporation.
Providing seamless, secure access to enterprise resources from anywhere.
Unleashing the Power of IP Communications™ Calling Across The Boundaries Mike Burkett, VP Products September 2002.
Deploying IPv6, Now Christian Huitema Architect Windows Networking & Communications Microsoft Corporation.
Module 10: Windows Firewall and Caching Fundamentals.
© 2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
6.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 6: Designing.
IPv6 - The Way Ahead Christian Huitema Architect Windows Networking & Communications
Windows Small Business Server 2003 R2 Powering Small Businesses.
Virtualization Vitalis Konopelec Technology Solution Professional Microsoft Slovakia s.r.o.
Asif Jinnah Field Desktop Services Enabling a Flexible Workforce, an insider’s view.
Enabling Secure Always-On Connectivity Gustav Kaleta Partner Technology Advisor Microsoft Corporation.
Managing Network Access Protection. Introduction to NAP Issues  Although corporate networks are highly secured, no control over the configuration of.
Windows Vista Configuration MCTS : Network Security.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Implementing Network Access Protection
ExpressRoute for Office 365 Training
Forefront Security ISA
Lesson #10 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 10 Configuring Network and Firewall Settings.
ExpressRoute for Office 365 Training
Microsoft Virtual Academy
{ Security Technologies}
IPv6 Deploying The Foundation For Tomorrow
Enabling the hybrid cloud with remote access appliances
Microsoft Virtual Academy
Using Software Restriction Policies
Microsoft Virtual Academy
Presentation transcript:

Unleashing the Power of Ubiquitous Connectivity with IPv6 Sandeep K. Singhal, Ph.D Director of Program Management Windows Networking

Agenda The Connectivity Imperative IPv6 Product Report Card The power of IPv6 and Windows networking Call to Action 2

New business goals Agile, responsive Data driven decisions 3 The Connectivity Imperative And changing expectations Multiple devices Always on Always connected Create new requirements Interoperability Secure, reliable connectivity Seamless, dynamic applications

Seamless Applications Impact The Future of Business Computing Dynamic Datacenter Dynamic Datacenter Focus on Security, Productivity, and Impact Focus on Security, Productivity, and Impact Providing a unique “customer experience” Providing a unique “customer experience” The Future of Personal Computing From personal computer to personal computing From personal computer to personal computing Across multiple PCs and devices Across multiple PCs and devices Blurring of digital workstyle and lifestyle Blurring of digital workstyle and lifestyle Individual in control of their digital world Individual in control of their digital world 4

IPv6 is a Key Building Block Continued seamless connectivity demands a new paradigm Security Scalability Flexibility 5 IPv6 is required to support the new network and Internet

Windows Vista Windows Server 2008 SQL Server 2008 SQL Server 2005 Exchange Server 2007 SP1 Host Integration Server 2007 Biztalk Server 2006 Office Sharepoint Server 2007 SMS/SCCM 2007 MOM/SCOM 2007 System Center Virtual Machine Manager Office 2007 Active Directory/DNS/DHCPv6 Groove Coming Soon! ISA Server Coming Soon! IPv6 Report Card 6

Windows Vista Windows Server 2008 SQL Server 2008 SQL Server 2005 Exchange Server 2007 SP1 Host Integration Server 2007 Biztalk Server 2006 Office Sharepoint Server 2007 SMS/SCCM 2007 MOM/SCOM 2007 System Center Virtual Machine Manager Office 2007 Active Directory/DNS/DHCPv6 Groove Coming Soon! ISA Server Coming Soon! IPv6 Report Card 7

More Than the Stack… All standard Windows Server 2008 components are IPv6 capable IPv6 is on by default, and preferred Controllable via Group Policy All Enterprise-class products currently in production are IPv6 capable GUI-based configuration Full support for IPsec 8

IPv6 Now – Infrastructure Later Transition Technologies let enterprises deploy IPv6 before infrastructure supports it Phased deployments Managed rollout out native IPv6 Native IPv6 ISATAP tunnel (IPv6 in IPv4) Native IPv4 IPv4 IPv6 ISATAP Router 9 ISATAP (RFC 4214) works well inside the network Single box can enable IPv6 in the enterprise Secure tunneling of IPv6 over IPv4

IPv6 Now – Infrastructure Later IPv4 Internet Restricted NAT Teredo Server Bubble Packets Teredo works well for unmanaged/home users Works through a NAT Protocol of last resort Automatically disables in a managed environment Transition Technologies let consumers deploy IPv6 before infrastructure supports it Phased deployments Transition to managed infrastructure

On by default Server Roles plumb firewall rules Stateful IP filtering inbound and outbound Full support for IPv6/ICMPv6 Location-aware policy profiles Domain, Public, Private Service Hardening Prevent critical Windows services from being used for malicious activity Enabled by default, and applies to inbound and outbound traffic Windows Firewall Features

Server and Domain Isolation Labs Unmanaged guests Protect managed computers from unmanaged or rogue computers and users Protect specific high-value servers and data Server Isolation Domain Isolation Dynamically segment your Windows environment into more secure and isolated logical networks based on policy 12

Policy-Based Network Access Protection Network Access ProtectionNetwork Access Protection Policy-based solution that Validates whether computers meet health policies Limits access for noncompliant computers Automatically remediates noncompliant computers Continuously updates compliant computers to maintain health state Solution HighlightsSolution Highlights Standards-based Plug and Play Works with most devices Supports multiple antivirus solutions Has become the standard for Network Access Control

14 IPv6 Deployment at Microsoft ISATAP available in all buildings world-wide Native v6 connectivity in all development buildings world-wide Where do we need native v6? That is where we concentrate upgrades Everywhere else gets ISATAP connections

Lessons Learned Start early with training Set up a test lab Ensure you have a good application inventory Enable IPv6 on all machines Use ISATAP to decrease deployment costs Phased deployments work best Client impact in dual-stack environment is minimal The only way to achieve business value with IPv6 is to use applications that leverage the new features of the IPv6 stack 15

Call to Action Install Windows Vista SP1 and Windows Server 2008 Don’t disable IPv6 Start training now Don't buy hardware that won't support IPv6 You don't have to deploy IPv6 today, but you do have to start getting ready for IPv6 today 16

© 2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.