Federal IPv6 Initiative: NIST Supporting Material Stephen Nightingale, NIST November 8, 2010.

Slides:



Advertisements
Similar presentations
IPv6 Keith Wichman. History Based on IPv4 Based on IPv4 Development initiated in 1994 Development initiated in 1994.
Advertisements

T HE E XPERIENCE OF T RANSITION TO IP V 6 Sudan University of Science & Technology.
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
Auto Configuration and Mobility Options in IPv6 By: Hitu Malhotra and Sue Scheckermann.
IPv4 to IPv6 Migration strategies. What is IPv4  Second revision in development of internet protocol  First version to be widely implied.  Connection.
A master thesis work by Christer Engman Network Services Telia Research AB Department of Teleinformatics Royal Institute of Technology.
IPv6 Planning and Implementation at PSU.  1986 – PSU gets Class B network ( ) & 5 Class C networks  1988 – Department of Computer.
IPv4 Depletion IPv6 Adoption 3 February /8s Remaining.
Implementing IPv6 Module B 8: Implementing IPv6
IPv4 & IPv6 Coexistence & Migration Joe Zhao SW2 Great China R&D Center ZyXEL Communications, Inc.
Enabling IPv6 in Corporate Intranet Networks
Chapter 8 Managing Windows Server 2008 Network Services
Understanding IPv6 Slide: 1 Lesson 1 Introduction to IPv6.
IPv6 at CERN Update on Network status David Gutiérrez Co-autor: Edoardo MartelliEdoardo Martelli Communication Services / Engineering
Configuring and Troubleshooting Network Connections
Issues of SAAG(ing?) Interest in the USGIPv6 V1.0 Profile. Doug Montgomery and Sheila Frankel NIST / Information.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
TDC375 Autumn 03/04 John Kristoff - DePaul University 1 Network Protocols Internet Protocol version 6 (IPv6)
Ian Rice Network Management May 4 th, 2009.
1 Secure Zero Configuration in a Ubiquitous Computing Environment Shenglan Hu and Chris J. Mitchell Information Security Group Royal Holloway, University.
TDC 375 Winter 2002John Kristoff1 Network Protocols IPv6.
1 IPv6 Address Management Rajiv Kumar. 2 Lecture Overview Introduction to IP Address Management Rationale for IPv6 IPv6 Addressing IPv6 Policies & Procedures.
DHCPv6 and other IPv6 docs Ralph Droms IETF 55, Atlanta.
1 TWNIC Update Sheng Wei Kuo, TWNIC NIR 38.
資 管 Lee Lesson 11 Coexistence and Migration. 資 管 Lee Lesson Objectives Coexistence and migration overview Coexistence mechanisms ◦ Dual Stack ◦ Tunneling.
Sean Mentzer IP Architecture Building an IPv6 Test Network.
Summary of Certification Process (part 1). IPv6 Client IPv6 packets inside IPv4 packets.
Coexistence and Migration
11 KDDI Trial Hub & Spoke Shu Yamamoto Carl Williams Hidetoshi Yokota KDDI R&D Labs.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 10: DHCP Routing & Switching.
Guide to TCP/IP Fourth Edition
Basic Transition Mechanisms for IPv6 Hosts and Routers -RFC 4213 Kai-Po Yang
KT's IPv6 status and trial service Future Technology Lab Dongjin Kwak, Jaehwa Lee Meeting 2008 at NZ.
Update on IPv6 Transition U.S. Federal IPv6 Task Force Jane Coffin Co-Chair of the U.S. Federal IPv6 Task Force August 2011 – CITEL PCC.I, Mar del Plata,
Guide to TCP/IP Fourth Edition Chapter 11: Deploying IPv6.
IPv6 – What You Need To Know Tom Hollingsworth CCNP,CCVP,CCSP, MCSE.
Deploying a Web Application Presented By: Muhammad Naveed Date:
1 AutoconfBOF2.PPT / Aug / Singh,Perkins,Clausen IETF Not Confidential Ad hoc network autoconfiguration: definition and problem statement (draft-singh-autoconf-adp-00.txt)
Draft-chown-v6ops-campus-transition-00 Tim Chown v6ops WG, IETF 60, San Diego, August 2, 2004.
CIT 384: Network AdministrationSlide #1 CIT 384: Network Administration IPv6.
IPv6, the Protocol of the Future, Today Mathew Harris.
Secure Deployment of IPv6 Sheila Frankel Computer Security Division NIST
APNIC Update The state of IP address distribution and IPv6 deployment status Miwa Fujii Senior IPv6 Program Specialist APNIC.
Securing IPv6 Ken Renard WareOnEarth Communications, Inc.
Ch 6: IPv6 Deployment Last modified Topics 6.3 Transition Mechanisms 6.4 Dual Stack IPv4/IPv6 Environments 6.5 Tunneling.
Node Information Queries July 2002 Yokohama IETF Bob Hinden / Nokia.
Lesson 2 Introduction to IPv6.
1 TWNIC Update Sheng Wei Kuo, TWNIC NIR SIG, APNIC 29.
© UNIVERSITY of NEW HAMPSHIRE INTEROPERABILITY LABORATORY UNH InterOperability Laboratory IPv6 Consortium Benefits and Testing Capability.
81th IETF, QuebecMTMA Multicast Tree Mobility Anchor (MTMA) Juan Carlos Zúñiga, Akbar Rahman InterDigital Luis M. Contreras, Carlos J. Bernardos Universidad.
IETF-90 (Toronto) DHC WG Meeting Wednesday, July 23, GMT IETF-90 DHC WG1 Last Updated: 07/21/ :10 EDT.
A Brief History of ARIN Matt Ryanczak Network Operations Manager.
1 Computer Networks IPv6. 2 Motivation The primary motivation from changing the IP datagram format is to increase the size of the useable address space.
Using IP Addressing in the Network Design
APNIC IPv6 Allocation Update IPv6 SIG APNIC 14, Kitakyushu, Japan 4 September 2002.
IETF IPv6 Activities Update Thomas Narten ARIN XVI October 26, 2005.
14 March 2002Update on SDoC - USA1 Update on Supplier’s Declaration of Conformity – USA William Hurst Federal Communications Commission Office of Engineering.
IETF-53-IPv6 WG- Cellular host draft 1 Minimum IPv6 Functionality for a Cellular Host Jari Arkko Peter Hedman Gerben Kuijpers Hesham Soliman John Loughney.
6to4
IETF 80: NETEXT Working Group – Logical Interface Support for IP Hosts 1 Logical Interface Support for IP Hosts Telemaco Melia, Sri Gundavelli, Carlos.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
CHAPTER 10: DHCP Routing & Switching. Objectives 10.0 Introduction 10.1 Dynamic Host Configuration Protocol v Dynamic Host Configuration Protocol.
Dhc WG 3/2/2004, IETF 59, Seoul. 3/2/2004dhc WG - IETF 59, Seoul2 Agenda Administrivia, Agenda bashing Ralph Droms 05 minutes DHCP Option for Proxy Server.
Presented By:- Avinash Kumar Nitesh Kumar Yadav. OUTLINE  Introduction of IP v4.  Introduction of IP v6.  Advantages of IP v6 over IP v4.  Transition.
V4 traversal for IPv6 mobility protocols - Scenarios Mip6trans Design Team MIP6 and NEMO WGs, IETF 63.
Issues of SAAG(ing?) Interest in the USGIPv6 V1.0 Profile.
IPv6 SIG 7 Sep 2006 APNIC 22, Kaohsiung, Taiwan George Kuo
Chapter 6 Exploring IPv6.
IPv6 Implementation at a Network Service Provider
Task Manager & Profile Interface
Presentation transcript:

Federal IPv6 Initiative: NIST Supporting Material Stephen Nightingale, NIST November 8, 2010

USGv6-v1.0 Profile: Vocabulary for Requirements 2 Capabilities Checklist Node Requirements USGv6 Profile UsersVendors V6 Product

USGv6-v1.0 Profile The USGv6-v1.0 profile was published in July It is effective since July It is an acquisition profile, not a deployment profile. It covers IPv6 nodes incorporating 12 functional categories: Basic Capabilities, Routing, QoS, Transition Mechs, Link Specs, Addressing, IP Security, Network Management, Multicast, Mobility, Application Reqts, Network Protection.

USGv6-v1.0 Profile In some cases your transition will involve acquisition. In some cases: turn-on, configure and secure. In support of deployment I would emphasize these three areas first: Network Protection, Addressing and Transition Mechanisms.

USGv6-v1.0 Profile Network Protection: Firewalls and ID/PS –Securing the network is always Job 1. –Firewall and ID/PS products are coming available. –See Test lab refs. for the latter. Addressing: All nodes must support address architecture and scoping mechanisms. Your address allocation is a separate administrative step conducted through ARIN. Addresses are configure for use through DHCPv6 or SLAAC autoconfiguration. Address resolution occurs through DNS using AAAA records for IPv6 and A records for IPv4. So be cognizant of your application’s need to use DNS results for either. Transition Mechanisms: The safest method is Dual Stack. –May need software update to your Windows or Linux boxes. –May need new acquisitions. –Configured tunnels may also be used.

USGv6-v1.0 Profile From the Acquisitions perspective: –The profile is part of a dialogue between Users and Vendors, representing User expectation of Vendor provision. –The Node Requirements Table details the technical expectations. –The Capabilities Checklist summarizes them. This can be, and is expected to be, tailored by Agencies for specific acquisitions.

Capabilities Checklist/Product Specs USGv6 Profile Users Vendors Test Labs V6 ProductTest Results Vendor’s SDOC USGv6-v1.0 Testing Program Corroboration

USGv6-v1.0 Testing Program What you as a buyer are looking for is a Vendor’s SDOC (Suppliers Declaration of Conformity). You can compare these against your tailored (or generic) Capabilities Checklist. This helps determine who supports most closely your stated requirements. Vendors are required to test their products in accredited test labs. –For Conformance and Interoperability, –And report results in the SDOC. –Agencies can corroborate SDOC claims with the relevant test lab. –The USGv6 testing website identifies accredited test labs. Each lab lists the products tested. See: We can discuss this in greater detail at subsequent meetings and over the mailgroup: