Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
A Note Regarding Supplemental Files
Foreword
Preface
What This Book Is ... and Is Not
History and Background
People
Adoption
Commercial Services
Conventions Used in This Book
Using Code Examples
Comments and Questions
Safari Enabled
Contacting the Authors
A Note on RFCs and Internet Drafts
Acknowledgments
Contributors
Support
Donations
I. The Character of IPv6
1. The Unforeseen Limitations of IPv4
1.1. Addressing Model
1.1.1. CIDR
1.2. NAT
1.3. Security
1.3.1. DNS
1.4. MAC Layer Address Resolution
1.5. Broadcast Versus Multicast
1.6. Quality of Service
1.7. Routing
1.7.1. Internal Routing Protocols
1.7.2. BGP: The External Routing Protocol
1.7.3. Limits to Success of BGP
1.8. Summary
2. The (Un)foreseen Successes of IPv4
2.1. Simplicity
2.2. Resiliency
2.3. Scalability
2.4. Flexibility
2.5. Autoconfiguration
2.6. Extensibility
2.7. In Short...
3. Describing IPv6
3.1. Designed for Today and Tomorrow
3.1.1. Address Space Exhaustion
3.1.2. Optimization
3.2. Packets and Structures
3.2.1. Basic Header Structure
3.2.2. Addressing Concepts
3.2.3. Notation
3.2.4. Subnetting
3.3. Address Architecture
3.3.1. Global Unicast Addressing
3.3.2. Link-Local Addressing
3.3.3. Site-Local Addressing
3.3.4. Multicast
3.3.5. Anycast
3.4. ICMPv6
3.4.1. ICMP Echoes and Errors
3.4.2. Neighborhood Watch
3.4.3. Router Renumbering
3.4.4. Multicast Listener Discovery
3.4.5. Summary of ICMPv6 Types
3.5. Address Selection
3.6. More About Headers
3.6.1. Extension Headers
3.6.2. Checksums
3.6.3. Header Compression
3.7. Introduction to Mobile IPv6
3.8. Routing
3.8.1. RIPng
3.8.2. OSPF
3.8.3. Integrated IS-IS
3.8.4. BGP-4+
3.9. Security
3.10. Quality of Service
3.11. The Promise of IPv6
3.11.1. Simplicity and Flexibility
3.11.2. Mobility and Security
II. Deploying IPv6
4. Planning
4.1. Transition Mechanisms
4.1.1. Dual Stack
4.1.2. Configured Tunnelling
4.1.3. Automatic Tunnelling
4.1.4. 6to4
4.1.5. Teredo
4.1.6. 6over4
4.1.7. ISATAP
4.1.8. SIIT
4.1.9. NAT46/64-PT
4.1.10. TRT
4.1.11. Bump in the Stack/API
4.1.12. Proxies
4.1.13. Summary of Transition Mechanisms
4.2. Obtaining IPv6 Address Space and Connectivity
4.2.1. Upstream Providers
4.2.2. 6to4
4.2.3. 6Bone
4.2.4. Only Intermittently Connected
4.2.5. RIRs
4.3. Network Design
4.3.1. Addressing
4.3.2. Subnetting
4.3.3. DHCP
4.3.4. Multihoming
4.4. Managing IPv4 and IPv6 Coexistence
4.4.1. Fudging Native Connectivity with Ethernet
4.5. Deploying IPv6
4.6. Inputs to Deployment Plans
4.6.1. Existing IPv4 Infrastructure
4.6.2. No Existing IPv4 Infrastructure
4.6.3. Topologies
4.7. Worked Examples
4.7.1. Enterprise-class IPv4-connected network
4.8. Summary
5. Installation and Configuration
5.1. Workstations and Servers
5.1.1. Windows
5.1.2. Macintosh (OS X and Darwin)
5.1.3. Linux
5.1.4. Solaris
5.1.5. AIX
5.1.6. Tru64
5.1.7. FreeBSD
5.1.8. Other Workstation/Server OSs
5.2. Routers
5.2.1. Cisco
5.2.2. Juniper
5.3. Enabling, Testing, and Troubleshooting
5.3.1. Turning on IPv6
5.3.2. Testing with ping and telnet
5.3.3. Know Thy Neighbor (Before Thyself)
5.3.4. Configuring Name Resolution
5.3.5. Testing Further Afield: ping, telnet, and traceroute
5.4. Static Routing
5.5. Configuring Transition Mechanisms
5.5.1. Configured Tunnels
5.5.2. 6to4 configuration
5.6. Applications
5.6.1. Web Browsers
5.6.2. Email Clients
5.6.3. SSH
5.6.4. Miscellaneous
5.7. Gotchas
5.8. Summary
6. Operations
6.1. DNS
6.1.1. Record Types
6.1.2. IPv6 Transport
6.1.3. Recursive DNS Servers
6.1.4. Gotchas
6.2. IPsec
6.2.1. Configuration
6.3. Routing
6.3.1. Router Advertisements and Renumbering
6.3.2. Multiple Routers
6.3.3. Routing Protocols
6.3.4. Multicast Routing
6.4. Firewalls
6.4.1. Filtering on IPv6 Addresses
6.4.2. Filtering ICMPv6
6.4.3. Ingress and Egress Filtering
6.4.4. Suspicious Addresses
6.4.5. Packages Available for IPv6 Firewalling
6.4.6. Impact of IPv6 Deployment on IPv4 Filtering
6.4.7. Port Scanning
6.4.8. Gotchas
6.5. Management
6.5.1. Running DHCPv6
6.5.2. SNMP
6.5.3. Scripting Network Monitoring
6.5.4. Intrusion Detection
6.6. Providing Transition Mechanisms
6.6.1. 6to4 Relay Routers
6.6.2. Faith
6.6.3. Hacking Native Connectivity Around Incompatible Equipment
6.7. Summary
7. Services
7.1. General Notes
7.2. Inetd/TCP Wrappers
7.3. HTTP
7.3.1. Apache
7.3.2. IIS
7.3.3. General Issues
7.3.4. HTTP Proxies and Caches
7.3.5. Using Apache as a Proxy/Cache
7.3.6. Using Apache to Fetch Content for an IPv4-Only Proxy/Cache
7.3.7. Using Apache to Allow IPv6 Clients to Access an IPv4 Only Proxy/Cache
7.3.8. Small Proxies
7.4. SMTP
7.4.1. Sendmail
7.4.2. Postfix
7.4.3. Qmail
7.4.4. Exim
7.5. POP/IMAP
7.5.1. WU-IMAP
7.5.2. Courier-IMAP
7.5.3. Qpopper
7.5.4. Cyrus Imapd2
7.6. NNTP
7.7. NTP
7.7.1. Mills's Ntpd
7.7.2. Other Time-Synchronization Software
7.8. Syslog
7.9. Printing
7.10. FTP
7.11. Remote Login Services
7.11.1. Telnetd
7.11.2. SSH
7.12. If All Else Fails...
7.13. Summary
8. Programming
8.1. Relevant Functions
8.1.1. Socket Functions
8.1.2. Address Resolution Functions
8.2. Some Simple Examples
8.2.1. Parsing and Printing Names and Addresses
8.2.2. A UDP Echo Server and Client
8.2.3. A TCP Client and Server
8.3. Case Study: MMDF
8.3.1. Incoming SMTP Channel
8.3.2. Outgoing SMTP Channel
8.3.3. DNS Table Code
8.4. Other Considerations for Developers
8.4.1. Switching Between IPv4 and IPv6
8.4.2. How Long Is a sockaddr?
8.4.3. When IPv6 Addresses Don't Fit
8.4.4. Services on Dual-Stacked Hosts
8.4.5. Mapped IPv4 Addresses
8.4.6. Tools for Auditing Sockets Code
8.4.7. Online Guides to Coding for IPv6
8.4.8. Languages Other than C
8.5. Summary
9. The Future
9.1. Unresolved Issues
9.1.1. Site-Local Addresses
9.1.2. Anycast
9.1.3. DNS
9.1.4. Multihoming
9.2. Up and Coming Subject Areas
9.2.1. Cellular Devices
9.2.2. P2P Applications
9.2.3. SIP, IM, and VoIP
9.2.4. Supporting Notes for Understanding 3G
9.2.5. 3G from the IETF Point of View
9.2.6. IPv6 in a 3G Network
9.3. Summary
Glossary
Index
← Prev
Back
Next →
← Prev
Back
Next →