© 2015 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. Tribal Telecom 2015.

Slides:



Advertisements
Similar presentations
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 4: Routing Concepts Routing Protocols.
Advertisements

IPv6 Deployment CANTO Nate Davis, Chief Operating Officer 13 August 2014.
 IPv6 Has built in security via IPsec (Internet Protocol Security). ◦ IPsec Operates at OSI layer 3 or internet layer of the Internet Protocol Suite.
T HE E XPERIENCE OF T RANSITION TO IP V 6 Sudan University of Science & Technology.
IPv6: Paving the way for next generation networks Tuesday, 16 July 2013 Nate Davis Chief Operating Officer, ARIN.
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
IPv4 to IPv6 Migration strategies. What is IPv4  Second revision in development of internet protocol  First version to be widely implied.  Connection.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Implementing IP Addressing Services Accessing the WAN – Chapter 7.
Prof. Dr. Sureswaran Ramadass Director National Advanced IPv6 Centre (NAv6) Universiti Sains Malaysia Prof. Dr. Sureswaran Ramadass Director National Advanced.
IPv4 Depletion IPv6 Adoption 3 February /8s Remaining.
Implementing IPv6 Module B 8: Implementing IPv6
© 2007 Cisco Systems, Inc. All rights reserved.ICND2 v1.0—7-1 Address Space Management Transitioning to IPv6.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Introduction to IPv4 Introduction to Networks.
17/10/031 Summary Peer to peer applications and IPv6 Microsoft Three-Degrees IPv6 transition mechanisms used by Three- Degrees: 6to4 Teredo.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 10: DHCP Routing & Switching.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Lecture14: DHCP Switched Networks Assistant Professor Pongpisit Wuttidittachotti,
© 2015 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Successfully Deploying.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 10: DHCP Routing and Switching Essentials.
Unleashing the Power of Ubiquitous Connectivity with IPv6 Sandeep K. Singhal, Ph.D Director of Program Management Windows Networking.
IPv4 Depletion and IPv6 Adoption Today Community Use Slide Deck Courtesy of ARIN May 2014.
Lesson 19: Configuring Windows Firewall
Networking with Windows Vista.. Vista’s New Tools and Features The Network and Sharing Center Network Discovery Network Map Network Diagnostics.
Lecture Week 7 Implementing IP Addressing Services.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
Campus IPv6 Deployment Phillip Deneault WPI Network Security Officer 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
7 IPv6: transition and security challenges Selected Topics in Information Security – Bazara Barry.
Mike Meyers’ CompTIA Network+ ® Guide to Managing and Troubleshooting Networks, Third Edition (Exam N ) © 2012 The McGraw-Hill Companies, Inc. All.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implementing IP Addressing Services Accessing the WAN – Chapter 7.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 10: DHCP Routing and Switching Essentials.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 10: DHCP Routing & Switching.
IPv4 TO IPv6 TRANSITION AND INTEROPERABILITY FOR TELECOM SERVICE PROVIDER Business Problem In today’s environment of growing connectivity where almost.
Basic Transition Mechanisms for IPv6 Hosts and Routers -RFC 4213 Kai-Po Yang
Configuring DNS and DHCP Chapter 20 powered by DJ 1.
Module 3: Designing IP Addressing. Module Overview Designing an IPv4 Addressing Scheme Designing DHCP Implementation Designing DHCP Configuration Options.
IPv6 at the University of Wisconsin Hopefully 79,228,162,514,264,337,593,543,950,336 IP addresses will be enough for a while. A subset of the UW IPv6 Task.
Guide to TCP/IP Fourth Edition Chapter 11: Deploying IPv6.
Connecting to a Network Lesson 5. Objectives Understand the OSI Reference Model and its relationship to Windows 7 networking Install and configure networking.
IPv6 – What You Need To Know Tom Hollingsworth CCNP,CCVP,CCSP, MCSE.
IPv6. Content  History  IPv4 Downfall  IPv6 Features  IPv6 Addresses  Changes from IPv4  IPv6 Headers/Frames/Packets  Autoconfiguration  Commands.
IPV6 DEPLOYMENT IN SINGAPORE 1 st Global IPv6 Summit in Asia Pacific 26 Feb 2003, Taipei Mr Lim Choon Sai (SGNIC)
Ch 6: IPv6 Deployment Last modified Topics 6.3 Transition Mechanisms 6.4 Dual Stack IPv4/IPv6 Environments 6.5 Tunneling.
1 NCM _05_2001_c1 © 2001, Cisco Systems, Inc. All rights reserved. How would you prepare for the technology you need.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Enhance Security of IP Network using New Architecture of Address Validation Xiaodong Duan China Mobile.
W&L Page 1 CCNA CCNA Training 3.4 Describe the technological requirements for running IPv6 in conjunction with IPv4 Jose Luis Flores /
Chapter 4: Implementing Firewall Technologies
Configuring Network Connectivity Lesson 7. Skills Matrix Technology SkillObjective DomainObjective # Using the Network and Sharing Center Use the Network.
GVF CyberSecurity Task Force Rakesh Bharania Chair, GVF Security Task Force Network Consulting Engineer, Cisco Tactical Operations 2015 Update on Activities.
6.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 6: Designing.
Public 4over6: WGLC feedback Peng Wu IETF84. Feedback from WGLC Relationship with stateless 4-over-6 solutions? Different primary targets and application.
1 © 2004 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Early vs. Cautious IPv6 deployment Issues and trade-offs Tony Hain Cisco.
IPv6 security for WLCG sites (preparing for ISGC2016 talk) David Kelsey (STFC-RAL) HEPiX IPv6 WG, CERN 22 Jan 2016.
1 Welcome to Designing a Microsoft Windows 2000 Network Infrastructure.
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
CHAPTER 10: DHCP Routing & Switching. Objectives 10.0 Introduction 10.1 Dynamic Host Configuration Protocol v Dynamic Host Configuration Protocol.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID Dynamic Host Configuration Protocol v6.
ITMT Windows 7 Configuration Chapter 5 – Connecting to a Network ITMT 1371 – Windows 7 Configuration 1.
Kevin Watson and Ammar Ammar IT Asset Visibility.
DHCP CONFIGURATION Routing & Switching. DHCPV4 OPERATION CONFIGURING A DHCPV4 SERVER A Cisco router running the Cisco IOS software can be configured to.
Labs. Session 1 Lab: Installing and Configuring Windows 7 Exercise 1: Migrating Settings by Using Windows Easy Transfer Exercise 2: Configuring a Reference.
IPv6 Autoconfiguration Plug & Play Dream or Security Nightmare
Chapter 10: DHCP Routing & Switching Chapter 10: DHCP
Introducing Novell IPv6 Stack
Sizing …today. T: Here’s how. .
Lesson 8: Configuring IP Settings MOAC : Configuring Windows Devices.
IPv6 in North America North American Global IPv6 Summit June Tony Hain
Presentation transcript:

© 2015 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. Tribal Telecom 2015 IPv6 Forum: Infrastructure Scott Hogg, CTO GTRI, Chair Emeritus RMv6TF, IPv6 COE Infoblox CCIE #5133, CISSP #4160

© 2015 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. Even if an organization hasn’t started using IPv6 yet, they already have some IPv6 running on their networks and didn’t realize it. –We all use Linux, Apple OS X (iOS), Android, BSD, and Microsoft Windows 7/8/Win2K8/Win2012 systems. –They all come with IPv6 capability enabled by default and prefer IPv6 connectivity. –They may try to use IPv6 first and then fall-back to IPv4. –Or they may create IPv6-in-IPv4 tunnels to Internet resources to reach IPv6 content. –These techniques take place regardless of user input or configuration or notification. IPv6 support is pervasive in our networking equipment, operating systems, and many software and services. IPv6 Support is Pervasive

© 2015 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. IPv6 has been under development for 20 years. –IPv6 has had time to mature and become gracefully adopted. –IPv6 will never be “finalized” just like IPv4 keeps evolving. Security researchers and attackers have been actively exploring IPv6, they still look for weaknesses in IPv4. All leading vendors have had to publish patches due to IPv6- related security vulnerabilities. The industry will continue to discover and fix new IPv6 vulnerabilities as they are discovered. Keeping our software patched and updated is critical. IPv6 Security Evolution

© 2015 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. Larger IPv6 address space, no need for NAT ICMPv6 and the Neighbor Discovery Protocol (NDP) DHCPv6 and IPv6 address management IPv6 Extension Headers (Option Headers) Visibility to our dual-protocol network connections –Dual-protocol security operations (SIEMs) –Content filtering of dual-protocol connections New Conventions in IPv6

© 2015 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. Dual-stack (Dual-protocol) is the predominant migration strategy (add IPv6, eventually turn off IPv4). During this phase we have twice as much work to do. –IP address management, dual-protocol network devices, DNS, DHCP, servers, firewalls, testing, configuration, troubleshooting stack-will-increase-operating-expenses.html –You are only as strong as the weakest of the two stacks. IPv6 Deployment Models IPv4IPv6

© 2015 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. We will still have... on IPv6 networks –Spam and phishing –Malware and command & control networks –DDoS attacks, botnets –Application vulnerabilities –Network and OS infrastructure threats Many of the same techniques we use to secure IPv4 networks are applicable to securing IPv6 networks –Firewalls, IPS, Unicast RPF, bogon filtering, RTBH, content filtering, sandboxes, endpoint security, DLP, SIEMs, NAC IPv6 (Same old, Same old)

© 2015 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. IPv6 is already embedded in many of our systems. IPv6 is no more or less secure than IPv4, our security focus should be at the applications and in our software. One way to control IPv6 is to enable it and be aware of it. We all must learn about IPv6 and strive to achieve equal capabilities for IPv6 as with IPv4. Ask our vendors about IPv6-capable products and assess “feature parity”. IPv6 Security Summary

© 2015 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. IPv6 Security, By Scott Hogg and Eric Vyncke, Cisco Press, –ISBN-10: , ISBN-13: ARIN IPv6 Info Center – Internet Society (ISOC) Deploy360 Programme – Rocky Mountain IPv6 Task Force – Infoblox IPv6 Center of Excellence (COE) – NetworkWorld Blog – IPv6 References

© 2015 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. Thank You Scott Hogg