13.07.2015 Views

D2.2.4: Final IPv4 to IPv6 Transition Cookbook for ... - 6NET

D2.2.4: Final IPv4 to IPv6 Transition Cookbook for ... - 6NET

D2.2.4: Final IPv4 to IPv6 Transition Cookbook for ... - 6NET

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

IST-2001-32603Deliverable D 2.2.44.2.5. Configuration details ............................................................................................. 384.2.6. Moni<strong>to</strong>ring............................................................................................................. 394.2.7. Other services........................................................................................................ 404.2.8. Lessons learned ..................................................................................................... 404.3. RENATER CASE STUDY (FRANCE) ................................................................................ 404.3.1. Overview ............................................................................................................... 404.3.2. Native support ....................................................................................................... 414.3.3. Addressing and naming.......................................................................................... 414.3.4. Connecting <strong>to</strong> Renater 3......................................................................................... 414.3.5. The regional networks............................................................................................ 424.3.6. International connections....................................................................................... 434.3.7. Tunnel broker service deployment.......................................................................... 444.3.8. Network management............................................................................................. 444.3.9. <strong>IPv6</strong> Multicast ....................................................................................................... 454.4. SEEREN CASE STUDY (GRNET)................................................................................... 464.4.1. Introduction........................................................................................................... 464.4.2. SEEREN network................................................................................................... 464.4.3. Implementation details of CsC/6PE deployment..................................................... 485. DUAL-STACK ROUTING PERFORMANCE: RIPE-TTM VIEW ................................ 505.1. SURFNET (NL) TO UNIVERSITY OF SOUTHAMPTON (UK)................................................ 515.1.1. <strong>IPv4</strong>....................................................................................................................... 515.1.2. <strong>IPv6</strong>....................................................................................................................... 515.2. UNIVERSITY OF VIENNA (AT) TO UNIVERSITY OF SOUTHAMPTON (UK)........................... 525.2.1. <strong>IPv4</strong>....................................................................................................................... 525.2.2. <strong>IPv6</strong>....................................................................................................................... 525.3. NORDUNET (SE) TO UNIVERSITY OF SOUTHAMPTON (UK) ............................................ 535.3.1. <strong>IPv4</strong>....................................................................................................................... 535.3.2. <strong>IPv6</strong>....................................................................................................................... 535.4. NIIF/HUNGARNET (HU) TO UNIVERSITY OF SOUTHAMPTON (UK)................................... 545.4.1. <strong>IPv4</strong>....................................................................................................................... 545.4.2. <strong>IPv6</strong>....................................................................................................................... 545.5. GRNET (GR) TO UNIVERSITY OF SOUTHAMPTON (UK).................................................... 555.5.1. <strong>IPv4</strong>....................................................................................................................... 555.5.2. <strong>IPv6</strong>....................................................................................................................... 555.6. IIJ (JAPAN) TO UNIVERSITY OF SOUTHAMPTON (UK) ...................................................... 565.6.1. <strong>IPv4</strong>....................................................................................................................... 565.6.2. <strong>IPv6</strong>....................................................................................................................... 566. CONCLUSIONS ................................................................................................................. 577. REFERENCES.................................................................................................................... 584


IST-2001-32603Deliverable D 2.2.4Table of FiguresFIGURE 3-1: MPLS ROUTING HIERARCHY ....................................................................................... 16FIGURE 3-2: BGP AND LABEL ADVERTISEMENT OF A 6PE ROUTER .................................................. 18FIGURE 3-3: STRUCTURE OF A MPLS PACKET SENT FROM PE-1 TO P-1 ........................................... 18FIGURE 3-4: STRUCTURE OF AN MPLS PACKET.............................................................................. 19FIGURE 3-5: STRUCTURE OF A GRE TUNNEL PACKET ...................................................................... 19FIGURE 3-6: STRUCTURE OF AN IPV6 PACKET ENCAPSULATED IN IPV4 ............................................ 19FIGURE 3-7: DEPLOYMENT OF 6PE IN A PRODUCTION MPLS NETWORK........................................... 20FIGURE 3-8: TUNNEL BROKER OPERATION....................................................................................... 22FIGURE 3-9: THE 6TO4 ADDRESS FORMAT....................................................................................... 23FIGURE 3-10: TYPICAL EXAMPLE OF THE USAGE OF THE 6TO4 MECHANISM ...................................... 23FIGURE 4-1: LOGICAL TOPOLOGY FOR SURFNET5 .......................................................................... 28FIGURE 4-2: SURFNET PREFIXES PER POP...................................................................................... 31FIGURE 4-3: ANONYMOUS-FTP OVER IPV6 VOLUME....................................................................... 33FIGURE 4-4: FUNET NETWORK BY GEOGRAPHY................................................................................ 35FIGURE 4-5: THE FUNET NETWORK BY TOPOLOGY........................................................................... 36FIGURE 4-6: THE RENATER3 POP ADDRESSING SCHEME ................................................................. 41FIGURE 4-7: DENSITY OF IPV6 CONNECTED SITES ON RENATER3..................................................... 42FIGURE 4-8: THE RENATER3 NETWORK........................................................................................... 43FIGURE 4-9: THE RENATER TUNNEL BROKER ............................................................................... 44FIGURE 4-10: IPV6 TRAFFIC WEATHERMAP ..................................................................................... 45FIGURE 4-11: SEEREN PHYSICAL NETWORK TOPOLOGY................................................................. 47FIGURE 4-12: SEEREN LOGICAL TOPOLOGY .................................................................................. 47FIGURE 4-13: LABEL EXCHANGE IN THE CSC MODEL ...................................................................... 48FIGURE 4-14: ROUTING EXCHANGE IN SEEREN ............................................................................. 485


IST-2001-32603Deliverable D 2.2.4Deliverable D9.6 [D9.6] of the GÉANT project. With the NREN deployments now achieved,pushing <strong>IPv6</strong> <strong>to</strong> the end site universities is now a focus of activity <strong>for</strong> the NRENs.The mechanisms that may be used depend on the nature of the existing <strong>IPv4</strong> infrastructure, and thegoals of the particular NREN in question. These scenarios are discussed in Section 2. WhereATM or MPLS is already deployed, <strong>IPv6</strong> can be deployed on <strong>to</strong>p of those technologies, asdescribed in Section 3 of this document. However, one would not normally consider deployingATM or MPLS <strong>to</strong> enable <strong>IPv6</strong> deployment, unless hardware considerations en<strong>for</strong>ced it.Indeed, most NRENs have now moved from ATM <strong>to</strong> PoS and more “modern” technologies, thususe of ATM <strong>for</strong> <strong>IPv6</strong> is expected <strong>to</strong> be very limited (it is used <strong>for</strong> <strong>IPv4</strong> in SEEREN, see the casestudy in Section 4). MPLS is being used by a growing number of NRENs <strong>for</strong> traffic engineeringpurposes. <strong>IPv6</strong> delivery over MPLS (called “6PE” on Cisco hardware) has been used in situationswhere otherwise (expensive) hardware upgrades would be required <strong>to</strong> deliver line rate <strong>IPv6</strong> (anexample is given <strong>for</strong> SURFnet in Section 4). Being dual-stack does not necessarily mean that <strong>IPv4</strong>and <strong>IPv6</strong> are handled in hardware, e.g. older Cisco line cards would do <strong>IPv6</strong> only in software (thenwhen your <strong>IPv6</strong> traffic becomes high, <strong>IPv4</strong> service may be affected).The simplest early transition technique is <strong>to</strong> deploy an <strong>IPv6</strong> infrastructure tunnelled over theexisting <strong>IPv4</strong> network, leveraging the <strong>IPv4</strong> network routing <strong>to</strong>pology and per<strong>for</strong>mance, but this isonly an intermediate aid <strong>to</strong> transition. Most NRENs now have a dual-stack native infrastructuredeployed, as a direct result of the experience gained through <strong>6NET</strong>.We believe that this dual-stack <strong>IPv4</strong> and <strong>IPv6</strong> approach on the NREN backbone routers will beadopted by all the NRENs in due course. In a dual-stack deployment those routers hold <strong>IPv4</strong> and<strong>IPv6</strong> routing tables, possibly share a common IGP (in particular IS-IS), and both pro<strong>to</strong>cols runnatively on the wire. This is the basis <strong>for</strong> the examples and case studies in Section 4.One alternative, in use currently by DFN in the German 6WiN network, is the introduction of aparallel <strong>IPv6</strong> infrastructure, as was described in D2.2.3. The parallel infrastructure may includeseparate links, or just separate routers tunnelling over existing <strong>IPv4</strong> links. The choice betweendual-stack and a parallel infrastructure has a number of tradeoffs, in terms of fac<strong>to</strong>rs such as cost ofequipment, per<strong>for</strong>mance, independence of the networks, and management (tradeoffs which varywith <strong>for</strong>warding per<strong>for</strong>mance required and traffic levels observed in each pro<strong>to</strong>col). However, theultimate goal is almost universally a common infrastructure, as it is <strong>for</strong> those currently also usingMPLS as an interim solution.NRENs do not generally have <strong>to</strong> operate translation mechanisms; such mechanisms are applied atthe edges of the network, at the university border routers or within the university networks. Itwould be expected that any university operating <strong>IPv6</strong>-only network elements would introduce itsown translation mechanisms (if translation were the adopted interoperability/integration approach).Translation can occur at a variety of layers, e.g. the network layer (NAT-PT, a technique which iscurrently undergoing a review in the IETF), the transport layer (through transport layer relays), orthe application layers (through ALGs such as a web proxy).Ultimately the exit strategy <strong>for</strong> transition is an <strong>IPv6</strong>-only network carrying <strong>IPv4</strong> in tunnels, but weexpect that scenario <strong>to</strong> be a distant one, almost certainly not until the next decade). This documentdoes not discuss transition <strong>to</strong> an <strong>IPv6</strong>-only service (with encapsulated <strong>IPv4</strong>).NRENs may deploy support services <strong>for</strong> <strong>IPv6</strong> sites and users, e.g. they may deploy a tunnel brokeror a 6<strong>to</strong>4 relay service, and they may also make a number of their services dual-stack enabled (e.g.DNS, FTP sites, web resources). Such support deployment was discussed in the survey reported inD2.2.3, and Section 4 includes a report of a broker in use <strong>for</strong> Renater.7


IST-2001-32603Deliverable D 2.2.4MPLS in the NREN context is discussed in Section 3 below. ATM is not discussed in the I-D.Given its general absence from NREN networks now, this seems appropriate.The I-D considers OSPFv2 and IS-IS as the possible <strong>IPv4</strong> IGPs be<strong>for</strong>e transition. RIPv2 and iBGPare not considered beyond point-<strong>to</strong>-point routing. The choice presented in the I-D is the same asthe NRENs have generally faced however: OSPFv3 or IS-IS <strong>for</strong> <strong>IPv6</strong>. The important question thenis whether <strong>to</strong> have separate routing processes <strong>for</strong> each pro<strong>to</strong>col (<strong>IPv4</strong> and <strong>IPv6</strong>). Separateprocesses have more overhead, but offer separation and thus resilience between <strong>IPv4</strong> and <strong>IPv6</strong>stability. The possible combinations are:• OSPFv2 <strong>for</strong> <strong>IPv4</strong>, IS-IS <strong>for</strong> <strong>IPv6</strong>• OSPFv2 <strong>for</strong> <strong>IPv4</strong>, OSPFv3 <strong>for</strong> <strong>IPv6</strong>• IS-IS <strong>for</strong> <strong>IPv4</strong>, OSPFv3 <strong>for</strong> <strong>IPv6</strong>• IS-IS <strong>for</strong> both <strong>IPv4</strong> and <strong>IPv6</strong> (same process)• IS-IS with separate processes (databases), one instance <strong>for</strong> each pro<strong>to</strong>colThe deployment and usage of these pro<strong>to</strong>cols is discussed <strong>for</strong> NRENs in [<strong>6NET</strong>-D312].The I-D recommends IS-IS <strong>for</strong> <strong>IPv4</strong> and <strong>IPv6</strong>, a method already used by three of the NRENs(routing pro<strong>to</strong>col usage is discussed in the summarised survey report in Section 7).Multicast is somewhat dismissed by the I-D, but has <strong>for</strong>med a major part of the work of <strong>6NET</strong>. Fordiscussion on <strong>IPv6</strong> Multicast routing, see [<strong>6NET</strong>-D312].The I-D then discusses cus<strong>to</strong>mer connection, but because ISP cus<strong>to</strong>mers tend <strong>to</strong> be home or SOHOsites, the techniques discussed are generally out of scope <strong>for</strong> NRENs. However, an NREN shouldoffer some transition support <strong>for</strong> home users (e.g. academics or students on broadband) who mayhave no commercial ISP <strong>IPv6</strong> support and thus who may seek a tunnel broker or 6<strong>to</strong>4 relay <strong>to</strong> runtheir favoured tunnelling solution. This is discussed in Sections 3.7 and 7.2. Specific details ofend-site oriented <strong>to</strong>ols are reported in [<strong>6NET</strong>-D233], e.g. tunnel broker, 6<strong>to</strong>4, Teredo and NATtraversal.The I-D does include consideration of large end sites, but doesn’t comment in detail. The NRENexperience is that large end sites (universities) connect using statically configured tunnels where adual-stack service <strong>to</strong> the university PoP is not available (e.g. due <strong>to</strong> an intervening regional networkthat is as yet not dual-stack). This turns out <strong>to</strong> be manageable because the rate of change (addition,deletion or change of endpoint <strong>IPv4</strong> address) is quite low.The I-D cites three example scenarios <strong>for</strong> transition analysis. The first is an xDSL provider. Thisis not an NREN scenario, however the recommendations, e.g., <strong>to</strong> deploy a 6<strong>to</strong>4 relay <strong>for</strong> optimisedcus<strong>to</strong>mer 6<strong>to</strong>4 per<strong>for</strong>mance, do map <strong>to</strong> the NREN scenario (e.g. <strong>for</strong> home users in a non-<strong>IPv6</strong>capable ISP or users in a non-<strong>IPv6</strong> capable campus).The second example is an <strong>IPv4</strong> MPLS network; this scenario is in the NREN scope, and isdiscussed later in this document.The third example is <strong>for</strong> a transit provider, which would be equivalent <strong>to</strong> GÉANT as the inter-NREN backbone, which is presented here in Section 4.<strong>Final</strong>ly, the I-D closes with security considerations, in three areas:• Generic best practice security;• Security concerns through complexity of transition <strong>to</strong>ols (e.g. open 6<strong>to</strong>4 relays);10


IST-2001-32603Deliverable D 2.2.4• Complexity in managing dual-stack, e.g. ACLs, and in being able <strong>to</strong> trace cus<strong>to</strong>mers (e.g.where stateless address au<strong>to</strong>configuration is used, or perhaps more importantly RFC3041addresses).In <strong>6NET</strong>, we report on (transition) security issues in [<strong>6NET</strong>-D312] and [<strong>6NET</strong>-D622].Overall, the IETF I-D contains many similar issues <strong>to</strong> this document. It does not include specifictheory, or case studies (at the same level as in this guide), or issues such as address allocation plans.It of course does not report current usage or configuration examples. However, the overlap isgood, and one thus feels the IETF direction is in line with the direction the NRENs are actuallytaking in practice. [Note that members of <strong>6NET</strong> have contributed <strong>to</strong> the I-D.]2.3. Requirements <strong>for</strong> transitionThere are a number of requirements that can be identified <strong>for</strong> an NREN wishing <strong>to</strong> introduce an<strong>IPv6</strong> service:• The existing <strong>IPv4</strong> service should not be adversely disrupted (e.g. as it might be by routerloading of encapsulating <strong>IPv6</strong> in <strong>IPv4</strong> <strong>for</strong> tunnels);• The <strong>IPv6</strong> service should per<strong>for</strong>m as well as the <strong>IPv4</strong> service (e.g. at the <strong>IPv4</strong> line rate, andwith similar network characteristics);• The service must be manageable and be able <strong>to</strong> be moni<strong>to</strong>red (thus <strong>to</strong>ols should be available<strong>for</strong> <strong>IPv6</strong> as they are <strong>for</strong> <strong>IPv4</strong>);• The security of the network should not be compromised, due <strong>to</strong> the additional pro<strong>to</strong>col itsel<strong>for</strong> a weakness of any transition mechanism used;• An <strong>IPv6</strong> address allocation plan must be drawn up (falling under the production SubTLAobtained by the NREN from the RIPE NCC in Europe).In this text we show some results of network moni<strong>to</strong>ring that illustrate the relative per<strong>for</strong>mance of<strong>IPv4</strong> and <strong>IPv6</strong> in Section 5. The network management <strong>to</strong>ols are briefly mentioned in the casestudies in this text, but are reported in more detail in D6.2.4 [<strong>6NET</strong>-D624]. As mentioned above,we report on (transition) security issues in [<strong>6NET</strong>-D312] and [<strong>6NET</strong>-D622]. Addressing plans arecovered in the case studies in this document.2.4. Solution space <strong>for</strong> <strong>IPv6</strong> transition <strong>for</strong> NRENsWe discuss the theory behind the potential transition mechanisms <strong>for</strong> NRENs in the next section,after which specific case studies are given.2.4.1. PoS scenarioIn the case of a “plain” <strong>IPv4</strong> over PoS network, one might take two different approaches:• The NREN may see dual stack operation on the NREN core routers as a natural path <strong>for</strong>ward,given appropriate robust code and appropriate studies in<strong>to</strong> the management and operationalimplications (e.g. as presented in [<strong>6NET</strong>-D622]). Examples are given in Section 5 <strong>for</strong>SURFnet, Funet and Renater.• The NREN may wish <strong>to</strong> deploy a parallel, non-disruptive <strong>IPv6</strong> network. An example was givenin D2.2.3 <strong>for</strong> the GWiN.11


IST-2001-32603Deliverable D 2.2.4We do not expect parallel infrastructures <strong>to</strong> be long-term transition solutions. DFN is the only<strong>6NET</strong> partner NREN following the parallel infrastructure path <strong>for</strong> backbone transition, with the6WiN network. The dual-stack, single infrastructure method is preferred, but the 6WiN is stillcited from D2.2.3 <strong>for</strong> completeness.Ideally in dual-stack both <strong>IPv4</strong> and <strong>IPv6</strong> are handled natively at line rate, but this may not be thecase. It depends on the vendor/plat<strong>for</strong>m architecture; as new vendor hardware is released over time,the position has improved such that <strong>for</strong> the majority of networks, those with current hardware (or incases using MPLS with 6PE), per<strong>for</strong>mance is equivalent.If moving <strong>to</strong> dual-stack, the NREN should also consider how long term its dual stack mode ofoperation would be, if it <strong>to</strong>ok that path, and what its exit strategy would be <strong>to</strong> run <strong>IPv6</strong> with <strong>IPv4</strong>carried as tunnelled traffic in the <strong>IPv6</strong>-only national backbone. That scenario is however sometime away (probably some time in the next decade).2.4.2. MPLS scenarioThe NREN may have an existing MPLS network. There are some specific options <strong>for</strong> running<strong>IPv6</strong> over MPLS (this is a scenario that has been used by Cisco with 6PE [Ooms01] <strong>for</strong> example).Discussion of this method is given in Section 3.MPLS would not normally be deployed purely <strong>to</strong> enable <strong>IPv6</strong>. However if the upgrade path <strong>for</strong>hardware <strong>to</strong> enable <strong>IPv6</strong> at line rate is expensive, MPLS is an option <strong>to</strong> carry <strong>IPv6</strong> natively at linerate; SURFnet deployed 6PE <strong>for</strong> this very reason.2.4.3. ATM scenarioThe NREN may have an ATM network, and thus be able <strong>to</strong> run <strong>IPv6</strong> over parallel PVCs.Discussion is given in Section 3, but – <strong>to</strong> our knowledge – no NRENs are currently using thismethod (outside of very specific testbeds that would not be part of a production network). ATMwould not be deployed purely <strong>to</strong> enable <strong>IPv6</strong>.Solutions are discussed in more detail via the case studies in Section 4.12


IST-2001-32603Deliverable D 2.2.43. Review of NREN/ISP transition mechanismsIn this section we discuss the range of transition and integration techniques available <strong>to</strong> NRENs,including some of the support mechanisms that an NREN may operate <strong>for</strong> universities (e.g. a tunnelbroker or a 6<strong>to</strong>4 service with 6<strong>to</strong>4 relay).3.1. General ApproachA general approach <strong>for</strong> an ISP looking <strong>to</strong> transition is given in the IETF v6ops WG document[Lind01].In the case of a <strong>6NET</strong> NREN this approach may be broken down in<strong>to</strong> broad stages as follows.1. Obtain <strong>IPv6</strong> address space: most likely a /32 SubTLA (from RIPE NCC in Europe);2. Devise an <strong>IPv6</strong> address allocation plan <strong>for</strong> the NRENs network and the end site universities(see the examples in the case studies in this document);3. Study the available <strong>to</strong>ols <strong>for</strong> network management and moni<strong>to</strong>ring (see [<strong>6NET</strong>-D633]) andestablish any required new operational procedures;4. Select the appropriate transition path <strong>for</strong> <strong>IPv6</strong> transport over the NREN networkinfrastructure (the theory <strong>for</strong> which is discussed below in this Section, but may includedirect transition <strong>to</strong> dual-stack, use of MPLS/6PE, or perhaps ATM PVCs);5. Select the appropriate <strong>IPv6</strong> routing pro<strong>to</strong>col (see [<strong>6NET</strong>-D312]) and decide the routingpolicy (which may be the same as <strong>IPv4</strong>);6. Deploy any necessary transition aids (e.g. tunnel broker or 6<strong>to</strong>4 relay, see [<strong>6NET</strong>-D234]);7. <strong>IPv6</strong>-enable any required services (e.g. DNS, QoS or Multicast see [<strong>6NET</strong>-D312]);8. Follow the best practice <strong>for</strong> secured transition mechanism deployment (see [<strong>6NET</strong>-D622]);9. Apply steps [#2-#8] <strong>for</strong> any regional networks attached <strong>to</strong> the NREN backbone between theNREN and end sites (universities);10. Enable the equipment in the end-site premises;If a native dual-stack approach is not enabled initially, the interim method (e.g. tunnelling or 6PE)should be upgraded <strong>to</strong> <strong>IPv6</strong> native when procurement allows.It would be expected that the resilience and robustness of the plat<strong>for</strong>m used would be tested in atestbed environment be<strong>for</strong>e production deployment (this has been a very valuable feature of the<strong>6NET</strong> testbed itself, of course).The specific transition path may depend on existing technology and equipment/software available,as well as non-technical issues such as available budget.13


IST-2001-32603Deliverable D 2.2.43.2. Dual-stackThe term "dual-stack" is a broad term, and can be used <strong>to</strong> mean many things. When per<strong>for</strong>mingdual-stack transition at the NREN scope, the ultimate goal is <strong>to</strong> make the same production routersroute and <strong>for</strong>ward both <strong>IPv4</strong> and <strong>IPv6</strong> traffic (and thus not create any kind of virtual overlaynetwork, e.g. via 6PE, AToM or ATM PVCs).The steps in deploying a dual-stack <strong>IPv4</strong>-<strong>IPv6</strong> network on common infrastructure may include:• Create and operate a test network with <strong>IPv4</strong>-tunnelled (or even MPLS or ATM) connections<strong>to</strong> gain perspective on the operation of <strong>IPv6</strong>.• Evaluate the router software versions in the test environment <strong>to</strong> see if they are stable androbust enough <strong>to</strong> be used in the main network with <strong>IPv4</strong> and <strong>IPv6</strong> <strong>to</strong>gether, and how <strong>IPv6</strong>affects <strong>IPv4</strong> per<strong>for</strong>mance.• If they are stable, start upgrading production routers <strong>to</strong> <strong>IPv4</strong>/<strong>IPv6</strong>, and enable <strong>IPv6</strong> on thelinks that are used. Usually the network <strong>to</strong>pology will be the same as with <strong>IPv4</strong>.• If problems (e.g. severe bugs affecting production services) arise, either try <strong>to</strong> fix or avoidthem or drop back <strong>to</strong> an <strong>IPv4</strong>-only operation.In this document we report on three of the <strong>6NET</strong> participating NRENs that have completed theprocess (SURFnet, Funet and Renater) in Section 4. The European NRENs in the <strong>6NET</strong> projectwere amongst the vanguard of production <strong>IPv6</strong> deployment when they made their initialdeployments back in 2002.Some router vendors have been shipping <strong>IPv6</strong> capability in their production software <strong>for</strong> some time,which has gained in stability <strong>for</strong> core features as a result of experience gained in deployment in the<strong>6NET</strong> NRENs. This is a big advantage <strong>for</strong> emerging subsequent commercial ISP deployment.In order <strong>to</strong> break the “chicken and egg” status, it is desirable <strong>to</strong> deploy <strong>IPv6</strong> in advance of heavydemand, as there will not be demand until the service is well-supported by the NRENs. Indeed, inacademic networks, a commercial case <strong>for</strong> deployment is not generally required – the service isprovisioned <strong>to</strong> enable research. By introducing dual-stack networking throughout the core(GÉANT) and NREN networks, provision and deployment issues are pushed <strong>to</strong> the edge, such thatthey become a per-university issue.The advantage of dual-stack operation is that the network is the same <strong>for</strong> <strong>IPv4</strong> and <strong>IPv6</strong>: there neednot be new routers <strong>for</strong> <strong>IPv6</strong>, and there is no need <strong>to</strong> maintain a potentially complex overlaynetwork. Similarly, this is also a disadvantage: because the network is the same, the problems(especially software bugs), if such arose, could also affect <strong>IPv4</strong> services, which would probably notbe the case if the network was separated. One also has <strong>to</strong> be aware of the per<strong>for</strong>mance impact ofrunning <strong>IPv6</strong> in the <strong>IPv4</strong> service, especially if the dual-stack implementation is not in hardware and<strong>IPv4</strong> routers are encapsulating <strong>IPv6</strong> in software. Parallel testbeds networks may be a safe initialtrial method. However, the overall advantage of a single infrastructure <strong>for</strong> production use outweighsthe disadvantages, assuming the <strong>IPv6</strong> operation is shown through testing <strong>to</strong> not adversely affect the<strong>IPv4</strong> per<strong>for</strong>mance.3.3. General tunnelsThere are two classes of general tunnelling techniques, <strong>IPv6</strong>-in-<strong>IPv4</strong> tunnels, and Layer 2 tunnels(including encapsulation methods such as AToM, CCC or UTI). Such tunnels can be considered <strong>to</strong>belong <strong>to</strong> the same family as MPLS or ATM, only the "link-layer" technology is different.14


IST-2001-32603Deliverable D 2.2.4There is an advantage <strong>to</strong> using <strong>IPv6</strong> tunnels over the existing <strong>IPv4</strong> infrastructure – namely that theinfrastructure is already well-tuned by the NREN <strong>to</strong> per<strong>for</strong>m well; thus even with the tunnellingoverhead, the <strong>IPv6</strong> overlay should per<strong>for</strong>m sufficiently well.Where the tunnels are configured manually, it is quite possible that the tunnels do not always takean optimal path between sites, where one <strong>IPv6</strong> hop may span many <strong>IPv4</strong> hops. Au<strong>to</strong>matic (6<strong>to</strong>4)tunnelling is described in a later part of Section 3, but is very rarely used by the NRENs <strong>for</strong>connection of large university sites (where static tunnels are used if native connectivity is notavailable); 6<strong>to</strong>4 routes <strong>IPv6</strong> traffic over <strong>IPv4</strong> tunnels by the most efficient <strong>IPv4</strong> path between two6<strong>to</strong>4 gateways, the problem is the interaction with other (non-6<strong>to</strong>4) <strong>IPv6</strong> gateways, <strong>for</strong> which therouting may be very unpredictable, or even not available at all.The dependence on the existing <strong>IPv4</strong> infrastructure may be a weakness, e.g. software problems,denial of service attacks against routers, etc, would also affect the <strong>IPv6</strong> service. That said, onewould expect the production <strong>IPv4</strong> service <strong>to</strong> be well supported, so such issues ought <strong>to</strong> be rare.In <strong>IPv6</strong>, path MTU discovery and management, fragmentation and reassembly is handled by the endhosts, not intermediate routers. This has a number of implications. For example, in Ethernetnetworks, on Fast Ethernet interfaces, the MTU is 1500. Using tunnelling on the interfaces wherethe MTU is 1500 reduces the usual path MTU <strong>to</strong> 1480 bytes, which will add some latency as pathMTU discovery is initiated.3.4. <strong>IPv6</strong> over MPLSMulti Pro<strong>to</strong>col Label Switching (MPLS) is growing in popularity in the European NRENs, <strong>for</strong> usein traffic engineering, though we believe that as yet only a minority of NRENs have deployed it.There are two likely usage scenarios <strong>for</strong> <strong>IPv6</strong> deployment over MPLS:• Where an MPLS network exists, the method may be most appropriate <strong>for</strong> the NREN;• If hardware upgrade <strong>for</strong> line rate <strong>IPv6</strong> is expensive, running <strong>IPv6</strong>-over-<strong>IPv4</strong>/MPLS (6PE)may be a good compromise <strong>for</strong> line rate <strong>IPv6</strong> (avoiding encapsulation in software tunnels),as described in the SURFnet case study in Section 5.Backbone networks that have already deployed MPLS might consider several <strong>IPv4</strong>-<strong>IPv6</strong> migrationstrategies:• Native <strong>IPv6</strong> over MPLS: In this scenario, <strong>IPv6</strong> transport over an MPLS network iscompletely symmetric <strong>to</strong> the <strong>IPv4</strong> case. It requires that all routers in the MPLS networkbecome dual-stack and use <strong>IPv6</strong> routing pro<strong>to</strong>cols (both interior and exterior) <strong>to</strong>gether with<strong>IPv6</strong>-enabled Label Distribution Pro<strong>to</strong>col (LDP);• L2 tunnelling over MPLS: The underlying technology is based on the IETF draft[Martini02]. Entire L2 frames (e.g., Ethernet with IEEE 802.1q encapsulation, ATM AAL5etc.) are switched across the MPLS core, hence the L3 pro<strong>to</strong>col is completely transparent.This feature is available, in one <strong>for</strong>m or another, on most major routing plat<strong>for</strong>ms includingCisco IOS and Juniper JunOS;• <strong>IPv6</strong> over <strong>IPv4</strong>/MPLS core: This method is a special case of BGP tunnelling as described inIETF draft [Ooms01]. It relies on the distribution of <strong>IPv6</strong> prefixes (and correspondinglabels) among the edge Label-Switching Routers (LSR) using standard BGPv4 over <strong>IPv4</strong>,where the Next Hop is identified by an <strong>IPv4</strong> address. Cisco Systems implements this15


IST-2001-32603Deliverable D 2.2.4functionality under the name 6PE (<strong>IPv6</strong> Provider Edge Router), which has now beenapplied generically <strong>to</strong> the draft [Ooms01].From the above approaches, only the latter one is of immediate interest <strong>to</strong> <strong>6NET</strong> partners. Native<strong>IPv6</strong> over MPLS is currently available on minority or development plat<strong>for</strong>ms (ZebOS, AYAME)while major router vendors seem <strong>to</strong> have no plans <strong>for</strong> adding <strong>IPv6</strong> support <strong>to</strong> LDP in a <strong>for</strong>eseeablefuture (although RFC 3036 contains a specification, there is little demand <strong>for</strong> it at present). On theother hand, L2 tunnelling over MPLS brings nothing new from the perspective of <strong>IPv6</strong> and,moreover, is not really suitable <strong>for</strong> wide-area networks.3.4.1. 6PE – theory of operationThe concept of 6PE stems from the canonical routing hierarchy of an MPLS network, which isillustrated in Figure 3-1.CE-5CE-6CE-7PE-3PE-4P-2CE-4PE-2P-1CE-3P-3PE-1PE-5CE-1CE-2Figure 3-1: MPLS routing hierarchyCE-8In this hierarchy, the core of the network consists of so called P (Provider) routers that switchMPLS packets and thus, <strong>for</strong> the most part, do not parse the L3 header. At the edge of the MPLScore we find PE (Provider Edge) routers. They receive standard IP packets from CE (Cus<strong>to</strong>merEdge) routers, impose an MPLS label 1 according <strong>to</strong> their MPLS <strong>for</strong>warding table and send thepacket <strong>to</strong> the appropriate P router. There<strong>for</strong>e, MPLS packets travel only across PE-P and P-P links(thick lines in Figure 3-1). P and PE routers are <strong>to</strong>gether denoted as Label Switching Routers (LSR).Routing is per<strong>for</strong>med in three relatively independent levels:1. Between PE and CE routers, any of the common routing pro<strong>to</strong>cols may be configured (RIP,OSPF, BGP or even static routing). Using this routing pro<strong>to</strong>col, the PE router learns theprefixes that are reachable through each CE router.1 Unless the destination is behind a CE router that is attached <strong>to</strong> the same PE router.16


IST-2001-32603Deliverable D 2.2.42. PE routers exchange these prefixes among each other via iBGP sessions. Depending on thesituation, either a full mesh of BGP sessions may be established or route reflec<strong>to</strong>rs[RFC2796] may be used. In any case, each PE router advertises the (summarised) prefixeslearned from attached CE routers <strong>to</strong> all other PEs as NLRI in BGP and inserts itself as thenext hop <strong>for</strong> these prefixes.3. Consequently, each PE router must also be able <strong>to</strong> determine the route <strong>to</strong> each potential BGPnext hop (another PE). This is accomplished by an interior gateway pro<strong>to</strong>col like IS-IS orOSPF. This pro<strong>to</strong>col involves exactly all P and PE routers and its routing database usually<strong>for</strong>ms the basis of the MPLS <strong>for</strong>warding table. In other words, Label-Switched Paths (LSP)between PE routers are initially constructed from the in<strong>for</strong>mation provided by this IGP. Inorder <strong>to</strong> achieve stability of label assignments in the network core, only host routes <strong>to</strong> the Pand PE routers should be included in this IGP.As opposed <strong>to</strong> the typical configuration of IGP and iBGP in an au<strong>to</strong>nomous system, in this setup theP routers are completely unaware of any external routing in<strong>for</strong>mation so that• synchronisation between IGP and iBGP, which is suggested by [RFC1772], must be turnedoff – the sets of prefixes in the two routing pro<strong>to</strong>cols are practically disjoint.• P routers can not per<strong>for</strong>m the usual “hot pota<strong>to</strong>” IP routing <strong>to</strong> external prefixes – MPLS isthe only method they can use <strong>for</strong> <strong>for</strong>warding traffic <strong>to</strong> external destinations.The 6PE concept leaves the MPLS core (P routers) intact and assumes that PE routers become dualstack.CE routers may be dual-stack or <strong>IPv6</strong>-only and use again any of <strong>IPv6</strong> routing pro<strong>to</strong>cols <strong>for</strong>advertising local <strong>IPv6</strong> prefixes <strong>to</strong> the PE router they are directly connected <strong>to</strong>. PE routersreadvertise this reachability in<strong>for</strong>mation in<strong>to</strong> iBGP, this time under IP6 address family. iBGPsessions are transported over TCP/<strong>IPv4</strong> as be<strong>for</strong>e and the backbone OSPF process is alsounchanged. Each PE router thus identifies itself as next hop using its <strong>IPv4</strong> address. However, thenext hop field in BGP UPDATE messages must be of the same address family as the NLRI, whichis IP6 in this case. There<strong>for</strong>e, the <strong>IPv4</strong> next hop address is encoded as “<strong>IPv4</strong>-mapped <strong>IPv6</strong>address” [RFC2373]. In the same BGP UPDATE message, the PE router also includes the MPLSlabel associated with the prefix using the method of [RFC3107]. The ingress PE router uses thislabel as the inner MPLS label – the outer one in the standard label learned from IGP, which is used<strong>for</strong> <strong>for</strong>warding traffic <strong>to</strong>wards the egress PE (the next hop <strong>for</strong> the destination).2001:F00:1::/48NLRI=2001:F00:3::/48Next Hop=::FFFF:192.168.1.4Label=1082001:F00:3::/48CE-1PE-1192.168.1.1P-1 P-2CE-3PE-2192.168.1.4CE-2BGP17


IST-2001-32603Deliverable D 2.2.4Figure 3-2: BGP and label advertisement of a 6PE routerAn example is shown in Figure 3-2. Router PE-2 advertises <strong>to</strong> PE-1 the reachability of destinationsunder 2001:F00:3::/48 and announces itself as the next hop <strong>for</strong> these destinations using the<strong>IPv4</strong>-mapped address ::FFFF.192.168.1.4 and also advertises the binding of label 108 <strong>to</strong> theprefix.Now assume PE-1 receives a datagram, e.g., from CE-1, with destination in 2001:F00:3::/48.Using the above in<strong>for</strong>mation, it finds the BGP next hop and looks up the in<strong>for</strong>mation <strong>for</strong> <strong>IPv4</strong>address 192.168.1.4 in its MPLS <strong>for</strong>warding table, obtaining thus the outgoing interface, theIGP next hop (P-1) and the outer label, say 55. The MPLS packet sent <strong>to</strong> P-1 then has the structureshown in Figure 3-3.Outer label = 55 Inner label = 108 <strong>IPv6</strong> datagramFigure 3-3: Structure of a MPLS packet sent from PE-1 <strong>to</strong> P-1This packet is then switched <strong>to</strong> P-2 in a normal MPLS way where only the outer MPLS header isinspected and its label rewritten. P-2 then per<strong>for</strong>ms penultimate hop popping (PHP), i.e., removesthe outer MPLS header so that PE-2 receives the packet with a single label. PE-2 removes this labeland per<strong>for</strong>ms standard <strong>for</strong>warding based on the <strong>IPv6</strong> destination address etc.The above scenario is quite similar <strong>to</strong> packet <strong>for</strong>warding in MPLS/BGP VPNs [RFC 2547]. Thedifference is that in the latter case the inner label carries the in<strong>for</strong>mation about the VPNRouting/Forwarding (VRF) instance the packet belongs <strong>to</strong>. For the basic 6PE it is not the case andso the question naturally arises whether the second level of MPLS labels is really necessary if theegress PE router does <strong>IPv6</strong> header lookup anyway. Indeed, the inner label is not required <strong>for</strong> thismechanism <strong>to</strong> work, it only helps <strong>to</strong> keep the MPLS core unaffected. In particular, without the innerlabel the “penultimate hop” P router would have <strong>to</strong> be able <strong>to</strong> <strong>for</strong>ward a plain <strong>IPv6</strong> datagram <strong>to</strong> theegress PE router. Moreover, a VPN-based extension of the 6PE mechanism is currently underdiscussion in IETF and then the inner label will carry important <strong>for</strong>warding in<strong>for</strong>mation.3.4.2. Comparison <strong>to</strong> other transition technologiesThe 6PE approach differs from other <strong>IPv6</strong> tunnelling techniques in two main aspects:• tunnel set up• tunnel overheadOf course, the most significant difference is the whole MPLS control plane but we have <strong>to</strong> assume itis in place anyway – it would probably not make sense <strong>to</strong> deploy MPLS only <strong>for</strong> the sake of 6PEunless hardware constraints dictated otherwise, e.g. one NREN has a backbone running at 10 Gbit/sat 15 PoPs and no Cisco Engine 5 line cards are available yet from Cisco – thus there is no solution<strong>for</strong> becoming wire speed <strong>for</strong> <strong>IPv6</strong> in hardware and 6PE becomes viable <strong>for</strong> that purpose (although afar from ideal solution, OC-192c POS line cards are not cheap!).3.4.2.1. Tunnel set upThe 6PE mechanism relies on MPLS <strong>to</strong> create tunnels through the <strong>IPv4</strong>/MPLS core. The basicvariant, where MPLS tunnels follow the IGP shortest paths, is almost equivalent <strong>to</strong> the 6<strong>to</strong>418


IST-2001-32603Deliverable D 2.2.4technique [RFC3056], except that the latter needs special <strong>IPv6</strong> addresses. However, 6PE can alsouse MPLS tunnels (LSPs) configured by other means, e.g., traffic engineering.3.4.2.2. Tunnel overheadTunnel encapsulations by definition add new pro<strong>to</strong>col header and thus increase the transmissionoverhead. We can directly compare the overheads of the 6PE MPLS encapsulation and the two mostcommon tunnelling methods:• We saw previously that the 6PE encapsulation involves two labels, which are – at least inthe common cases of Ethernet or PoS link layers – contained in two “shim” headers, each 4bytes long. The structure of the entire packet is shown in Figure 3-4.4 bytes 4 bytesOuter MPLS shim header Inner MPLS shim header <strong>IPv6</strong> datagramFigure 3-4: Structure of an MPLS packet• One option <strong>for</strong> configured <strong>IPv6</strong> tunnels is the Generic Routing Encapsulation (GRE) definedin [RFC2784]. In this case, the overhead consists of the GRE header (4 bytes) and outer<strong>IPv4</strong> header (mostly 20 bytes) as shown in Figure 3-5.20 bytes 4 bytes<strong>IPv4</strong> header GRE header <strong>IPv6</strong> datagramFigure 3-5: Structure of a GRE tunnel packet• In the <strong>IPv6</strong> world, the most common tunnelling technique is the direct encapsulation of <strong>IPv6</strong>datagrams in <strong>IPv4</strong> [RFC2893], which is used <strong>for</strong> both configured tunnels and au<strong>to</strong>matic 6<strong>to</strong>4tunnels [RFC3056]. Figure 3-6 indicates that the overhead is just the <strong>IPv4</strong> header of 20bytes (again assuming no IP header options).20 bytes<strong>IPv4</strong> header<strong>IPv6</strong> datagramFigure 3-6: Structure of an <strong>IPv6</strong> packet encapsulated in <strong>IPv4</strong>Table 3-1 shows overhead percentages <strong>for</strong> different lengths of the tunnelled <strong>IPv6</strong> datagram. Forsmall packets the 6PE encapsulation is clearly superior whereas <strong>for</strong> packet sizes close <strong>to</strong> the MTUof common backbone media types (Gigabit Ethernet or PoS) the difference becomes essentiallynegligible.Datagram size [Bytes] 6PE/MPLS GRE <strong>IPv6</strong> in <strong>IPv4</strong>40 20.0% 60.0% 50.0%200 4.0% 12.0% 10.0%19


IST-2001-32603Deliverable D 2.2.4750 1.0% 3.2% 2.7%1500 0.5% 1.6% 1.3%3000 0.3% 0.8% 0.7%4470 0.2% 0.5% 0.4%Table 3-1: Overhead ratio <strong>for</strong> different encapsulation methodsWe already mentioned that the 6PE technology by itself does not justify the deployment of theMPLS control plane. However, backbone networks that already use MPLS in their core mightbenefit from 6PE, since, apart from the lower overhead, it fits very well in<strong>to</strong> the general MPLSphilosophy, being actually one of very few instances of “multipro<strong>to</strong>colness” of MPLS <strong>to</strong>wards thenetwork layer.As long as the 6PE features are included only in experimental releases of routing software, it wouldbe rather risky <strong>to</strong> install it on production PE routers. Instead, one could use the configuration shownin Figure 3-7.MPLS coreP routerProduction PEFigure 3-7: Deployment of 6PE in a production MPLS networkIn this case, the original <strong>IPv4</strong>/MPLS infrastructure requires no hardware or software modificationand the probability of 6PE routers interfering with the production network functions is reasonablysmall. Actually, the added 6PE routers can induce problems <strong>to</strong> the production backbone only in thelimited area of MPLS <strong>for</strong>warding and LDP sessions between adjacent 6PE and P routers.3.4.3. <strong>IPv6</strong> over MPLS on HUNGARNETHUNGARNET has deployed <strong>IPv6</strong> over MPLS. The key points of the configuration are:• <strong>IPv6</strong> connectivity provided via Metropolitan Ethernet VLANs, 6PE and <strong>IPv4</strong> tunnels.• Use of OSPFv2 <strong>for</strong> distributing <strong>IPv4</strong> address of loopback interfaces of PE routers.• Use of ISIS <strong>to</strong> exchange <strong>IPv6</strong> loopback addresses and ISIS passive interfaces. There is noGlobally Aggregatable Address assigned <strong>to</strong> backbone point-<strong>to</strong>-point interfaces. All loopbackinterfaces, interfaces connecting <strong>to</strong> the HUNGARNET members, <strong>IPv4</strong> tunnels and LANstub interfaces were made passive.• A BGP route reflec<strong>to</strong>r is being used.• 6PE is used <strong>to</strong> propagate <strong>IPv6</strong> reachability over the <strong>IPv4</strong>/MPLS core of HUNGARNETbackbone. TDP is used <strong>for</strong> propagating labels related <strong>to</strong> <strong>IPv4</strong> prefixes. Labels related <strong>to</strong> <strong>IPv6</strong>NLRI are exchanged between 6PE routers through BGP adding6PE20


IST-2001-32603Deliverable D 2.2.4neighbor {peer-group-name | ipv6-address} send-label.• An <strong>IPv6</strong> source interface was also configured on the 6PE <strong>for</strong> <strong>IPv6</strong> traffic generated locally.3.4.3.1. Configuration exampleThe configuration example on pecs.6net.hbone.hu, the 6PE router, is given in Appendix A ofD2.2.3.3.5. <strong>IPv6</strong> over ATMSee D2.2.3 <strong>for</strong> details of <strong>IPv6</strong> over ATM. We have removed the theoretical discussion from thisrelease of the cookbook series, since we were aiming <strong>to</strong> streamline the content, and the onlydeployment of ATM in a production environment is currently in SEEREN, and there <strong>IPv6</strong> is beingintroduced using an MPLS-based method (see Section 4).3.6. Deploying a parallel <strong>IPv6</strong>-only networkDeployment of a separate <strong>IPv6</strong> network may also be an option <strong>for</strong> some NRENs. In someenvironments, e.g. where there are tight service-level agreements in <strong>IPv4</strong>, or there would have <strong>to</strong> bea great deal of <strong>IPv6</strong> education <strong>for</strong> <strong>IPv4</strong> opera<strong>to</strong>rs, deploying a parallel infrastructure may be anappropriate early method, be<strong>for</strong>e moving <strong>to</strong> a dual-stack single infrastructure with laterprocurements.However, given there is a cost <strong>to</strong> having two sets of routers, and two sets of links if the network isfully parallel, a more detailed cost analysis would be necessary <strong>to</strong> see whether this makes financialsense. In some cases, it might (e.g. if <strong>IPv4</strong> routers are all upgraded and the older ones are leftunused, and they would be sufficient <strong>for</strong> <strong>IPv6</strong>, and if line costs would not be <strong>to</strong>o much during a lowbandwidth early adopter period). Building such a network would, however, practically require thatit would be used considerably, so people could see the justification <strong>for</strong> the costs. This may or maynot happen. Also, it seems probable that the users, being used <strong>to</strong> high-speed connections, would notsettle <strong>for</strong> anything significantly less than with <strong>IPv4</strong>, e.g. “low cost” serial lines would probably beout of the question.In an early deployment, with low levels of <strong>IPv6</strong> traffic, a PC-based parallel infrastructure (e.g.based on BSD and Zebra) may suffice. However, this is not a long-term solution where <strong>IPv6</strong>traffic levels grow. This scenario is discussed in Section 6 considering the example of the DFN6WiN network. A similar method can also be used <strong>for</strong> <strong>IPv6</strong> deployment in site networks, with aparallel <strong>IPv6</strong> routed hierarchy feeding <strong>IPv6</strong> prefixes in<strong>to</strong> shared <strong>IPv4</strong> VLANs <strong>for</strong> dual-stacknetworking (see [<strong>6NET</strong>-D234]).3.7. Support mechanisms: Tunnel BrokerIn addition <strong>to</strong> the transition mechanisms already mentioned in this section, there are also supportingmechanisms that, in the absence of such services on a site (university), may be operated by anNREN <strong>for</strong> the benefit of its community. Two examples of such services are the tunnel broker,discussed here, and 6<strong>to</strong>4 (with an associated 6<strong>to</strong>4 relay), discussed in the next section.The tunnel broker (described in [<strong>6NET</strong>-D234]) allows a user on a dual-stack host <strong>to</strong> connect <strong>to</strong> aweb server <strong>to</strong> request a tunnel connection from their (dual-stack) workstation <strong>to</strong> the broker’s <strong>IPv6</strong>21


IST-2001-32603Deliverable D 2.2.4network (and wider <strong>IPv6</strong> internet). After filling in in<strong>for</strong>mation on their <strong>IPv4</strong> address and operatingsystem (the tunnel creation commands on the user’s host would be OS-specific), the user candownload a script that can then be run <strong>to</strong> establish an <strong>IPv6</strong> connection (an <strong>IPv6</strong>-in-<strong>IPv4</strong> tunnel) <strong>to</strong>the tunnel broker’s tunnel server.Tunnel brokertunnel server3<strong>IPv6</strong> networks12Tunnel brokerWeb server123User connects <strong>to</strong> web serverrequesting tunnelWeb server returns script <strong>to</strong> createtunnel <strong>to</strong> the tunnel server, andin<strong>for</strong>ms tunnel server of new clientDual-stack hostClient activates script, and gainingaccess <strong>to</strong> <strong>IPv6</strong> networks via thetunnel serverFigure 3-8: Tunnel broker operationThe tunnel broker setup process is illustrated in Figure 3-8. The key requirement <strong>for</strong> the broker isthat the broker has a mechanism <strong>to</strong> remotely set up tunnel end points on the tunnel server. In a PCbasedimplementation, the server and broker could be co-located.At an early stage of <strong>IPv6</strong> deployment within an NREN, rather than having each university manageits own tunnel broker, the NREN could operate a tunnel broker <strong>for</strong> the benefit of its memberuniversities. This would be preferable <strong>to</strong> the users seeking tunnels from overseas networks (e.g.popular tunnel brokers such as Freenet6 in Canada), where routing would be far from optimal (due<strong>to</strong> the significantly long first hop).In [<strong>6NET</strong>-D234] tunnel brokers from Lancaster University (Microsoft <strong>to</strong>ol based), the University ofSouthamp<strong>to</strong>n (open source based using Apache2, OpenLDAP and ssh) and the University ofMuenster/JOIN project (using OpenVPN) are described.3.8. Support mechanisms: 6<strong>to</strong>4 and 6<strong>to</strong>4 relayThe 6<strong>to</strong>4 transition mechanism [RFC 3056], also described in [<strong>6NET</strong>-D234], is a flexiblemechanism that enables communication between <strong>IPv6</strong> islands over the <strong>IPv4</strong> Internet. Its usage isexpected <strong>to</strong> be most common during the medium-term phase of the transition process <strong>to</strong> <strong>IPv6</strong>, whenthere are many <strong>IPv6</strong> islands, but no wide scale native <strong>IPv6</strong> connectivity exists.3.8.1. ArchitectureThe 6<strong>to</strong>4 mechanism has been assigned the 2002::/16 <strong>IPv6</strong> prefix. Any organization that wants <strong>to</strong>enable the <strong>IPv6</strong> pro<strong>to</strong>col can use this prefix in order <strong>to</strong> gain its own /48 <strong>IPv6</strong> prefix without needing22


IST-2001-32603Deliverable D 2.2.4<strong>to</strong> request production address space (under 2001::/16) from its associated NREN or the RIPE NCC;only a single global <strong>IPv4</strong> address is needed.Construction of the 6<strong>to</strong>4 <strong>IPv6</strong> prefix is made by the concatenation of the 2002::/16 prefix and theglobal <strong>IPv4</strong> address. The <strong>for</strong>mat of the 6<strong>to</strong>4 <strong>IPv6</strong> address is illustrated in Figure 3-9.0x2002V4ADDR32 bits16 bits ofsite <strong>IPv6</strong>subnetspaceInterface ID64 bitsFigure 3-9: The 6<strong>to</strong>4 address <strong>for</strong>matWhen connecting <strong>to</strong> another 6<strong>to</strong>4 site, because the <strong>IPv4</strong> address of the far tunnel endpoint isencoded inside the <strong>IPv6</strong> destination address, no direct configuration is needed, since the connection<strong>to</strong> the remote site can be established as an “au<strong>to</strong>matic” tunnel when required. In most cases the <strong>IPv4</strong>address that is used is the address of the interface that connects the organization <strong>to</strong> the Internet, butif only part of the site is <strong>IPv6</strong>-enabled, it could be an internal site router. Inside the organization’snetwork the <strong>IPv6</strong> prefix can be used like any other <strong>IPv6</strong> prefix <strong>for</strong> subnetting and au<strong>to</strong>configurationtasks (because the general allocation <strong>for</strong> any site is a /48 prefix, whether from 6<strong>to</strong>4 or productionSubTLA address space).By using the 6<strong>to</strong>4 mechanism any site can fully deploy the <strong>IPv6</strong> pro<strong>to</strong>col, and any 6<strong>to</strong>4 site caneasily communicate with other 6<strong>to</strong>4 sites. However, communication with the native <strong>IPv6</strong> world,and <strong>IPv6</strong> sites under non-6<strong>to</strong>4 address space (i.e the production 2001::/16 space or the 6bone3ffe::/16 space) is achieved only with the deployment of a 6<strong>to</strong>4 relay router. The relay router is arouter connected <strong>to</strong> the non-6<strong>to</strong>4 <strong>IPv6</strong> network that has been enabled <strong>for</strong> the 6<strong>to</strong>4 mechanism, i.e. itcan communicate with both 6<strong>to</strong>4 and non-6<strong>to</strong>4 <strong>IPv6</strong> sites.<strong>IPv6</strong> (6<strong>to</strong>4) network prefix-2002:968c:0101::/48<strong>IPv6</strong> (6<strong>to</strong>4) network prefix-2002:968d:0101::/48<strong>IPv6</strong> networkE0<strong>IPv4</strong> Network<strong>IPv6</strong> over <strong>IPv4</strong> tunnelE0<strong>IPv6</strong> networkRouter#Interface loopback0ip address 150.140.2.1 255.255.255.0interface ethernet0ipv6 address 2002:968c:0101:1::/64 eui-64Interface tunnel 0<strong>IPv6</strong> unnumbered ethernet 0tunnel source loopback0tunnel mode ipv6ip 6<strong>to</strong>46<strong>to</strong>4 router6<strong>to</strong>4 routerSite1 150.140.1.1 150.141.1.1Site 2Router#Interface loopback0ip address 150.141.2.1 255.255.255.0interface ethernet0ipv6 address 2002:968d:0101:1::/64 eui-64Interface tunnel 0<strong>IPv6</strong> unnumbered ethernet 0tunnel source loopback0tunnel mode ipv6ip 6<strong>to</strong>4Figure 3-10: Typical example of the usage of the 6<strong>to</strong>4 mechanism23


IST-2001-32603Deliverable D 2.2.4A typical example that demonstrates the usage of the 6<strong>to</strong>4 mechanism is shown in Figure 3-10. Alsoin the same figure the configuration that is needed <strong>for</strong> the two routers (Cisco-like) is shown.In order <strong>for</strong> Site 1 and Site 2 <strong>to</strong> communicate with the <strong>IPv6</strong> world beyond other 6<strong>to</strong>4 sites, theymust deploy a 6<strong>to</strong>4 relay router either in their premises or use an external (public) 6<strong>to</strong>4 relayservice. It is that 6<strong>to</strong>4 relay router that the NREN can deploy as a supporting mechanism <strong>to</strong> theuniversity sites.The relay advertises 2002::/16 <strong>to</strong> the native <strong>IPv6</strong> internet, and is reachable from 6<strong>to</strong>4 routers insideits “domain” by use of a well-known anycast address (although the 6<strong>to</strong>4 router may be manuallyconfigured with the 6<strong>to</strong>4 relay’s real <strong>IPv4</strong> address). The 6<strong>to</strong>4 relay router can be deployed on an<strong>IPv4</strong> anycast address, allowing multiple relay routers <strong>to</strong> be available.Regarding 6<strong>to</strong>4 relay reachability, the192.88.99.0/24 block is allocated <strong>for</strong> use as 6<strong>to</strong>4 relay anycastaddresses, according <strong>to</strong> [RFC3068]. In <strong>6NET</strong>, NRENs deploying 6<strong>to</strong>4 relays are using 192.88.99.1as the advertised relay (anycast) address.3.8.2. Considerations <strong>for</strong> 6<strong>to</strong>4The advantages of deploying 6<strong>to</strong>4 services can be summarised as follows:• The 6<strong>to</strong>4 mechanism is a very powerful <strong>to</strong>ol that enables <strong>IPv6</strong> deployment in a corporatenetwork with relatively low resource requirements. Connections <strong>to</strong> other 6<strong>to</strong>4 sites areestablished by au<strong>to</strong>matic tunnels, while other connections are directed <strong>to</strong> a 6<strong>to</strong>4 relay router.• Any site by deploying the 6<strong>to</strong>4 mechanism can easily enable the <strong>IPv6</strong> pro<strong>to</strong>col inside itsnetwork independently of its ISP support <strong>to</strong> <strong>IPv6</strong> (i.e. if the site has no native <strong>IPv6</strong> serviceoffered, 6<strong>to</strong>4 is a practical solution).• It is a very scalable mechanism that can be deployed from a single host case <strong>to</strong> an entirenetwork; 6<strong>to</strong>4 can be used <strong>for</strong> a whole university, a student household, or just a single host.• By deploying the 6<strong>to</strong>4 mechanism any organization gains a full functional <strong>IPv6</strong> prefixwithout having <strong>to</strong> request one from its NREN or the registries.For a university, the immediate alternative <strong>to</strong> 6<strong>to</strong>4 is a manually configured tunnel <strong>to</strong> a routeroperated by the NREN. This would have the advantage of using production <strong>IPv6</strong> address space,which would be used anyway when the link became native <strong>IPv6</strong>. If this choice is adopted by theuniversity, the NREN’s 6<strong>to</strong>4 relay router is still useful <strong>for</strong> the university <strong>to</strong> reach 6<strong>to</strong>4 sites withinthe same country (or beyond). In this case, the relay router can advertise the 2002::/16 prefix, sinceit is able <strong>to</strong> reach any 6<strong>to</strong>4 site.The reality of deployment at present in <strong>6NET</strong> NRENs is that manually configured tunnels are used<strong>for</strong> university connections. The use of 6<strong>to</strong>4 is constrained <strong>to</strong> home/SOHO users, or <strong>to</strong> universitieswhere only individuals (rather than the administra<strong>to</strong>rs) have a big interest in <strong>IPv6</strong>.In the NREN survey reported in D2.2.3, 75% of NRENs operated a 6<strong>to</strong>4 relay, compared <strong>to</strong> 25%who operated a tunnel broker. However, more tunnel brokers have been and are being deployedsince that time.3.8.3. Operational and security issuesThe <strong>IPv4</strong> address should be a static long-lived address, since a dynamic address implicitlyrenumbers the entire <strong>IPv6</strong>-island (<strong>IPv6</strong>-prefix).24


IST-2001-32603Deliverable D 2.2.4Also, 6<strong>to</strong>4 only works in the (<strong>to</strong>day's) world where <strong>IPv4</strong> connectivity is complete, since 2002::/16can be announced by a million different relays. To guarantee connectivity, 6<strong>to</strong>4 sites have <strong>to</strong> accepttraffic from any relay. That's where 6<strong>to</strong>4's big security problem comes from - there is nothing <strong>to</strong>s<strong>to</strong>p “evil” people from creating bogus relays generating DDoS attacks. The NREN should becareful in checking who can use the relay router.Security concerns with 6<strong>to</strong>4 and 6<strong>to</strong>4 relays are also described in [<strong>6NET</strong>-D6.2.2].One should also be careful about using RFC 1918 addresses since 6<strong>to</strong>4 makes no sense with nonroutableaddresses. However, 6<strong>to</strong>4 can work between <strong>IPv4</strong> NAT gateways where each NAT has aglobal <strong>IPv4</strong> address, and devices behind the device then become dual-stack (<strong>IPv4</strong> NAT and <strong>IPv6</strong>global with a 6<strong>to</strong>4 prefix).3.8.4. Configuration example <strong>for</strong> 6<strong>to</strong>4In this subsection we show the example code <strong>for</strong> a 6<strong>to</strong>4 router; in the next section we describe morefully examples <strong>for</strong> 6<strong>to</strong>4 relays.3.8.4.1. Cisco IOS: 6<strong>to</strong>4 routerThe following example configuration enables 6<strong>to</strong>4 on IOS:interface Tunnel0no ip addressno ip redirectsipv6 unnumbered FastEthernet0tunnel source FastEthernet0tunnel mode ipv6ip 6<strong>to</strong>4!ipv6 route 2002::/16 Tunnel03.8.4.2. BSD 6<strong>to</strong>4 relay configuration, with ZebraOn BSD plat<strong>for</strong>ms running Zebra, 6<strong>to</strong>4 configuration, with the relay on the anycast address of192.88.99.1, can be done using the following example configuration:In /etc/rc.conf (relevant parts):ifconfig_xl0_alias0="inet 192.88.99.1 netmask 0xffffff00"stf_interface_ipv4addr="192.88.99.1"stf_interface_ipv6_ifid="::"ipv6_gateway_enable="YES"In /etc/rc.local (relevant parts):--8


IST-2001-32603Deliverable D 2.2.4ifconfig stf0 inet6 2002:c058:6301:: prefixlen 16 anycast# start zebra and bgpd./usr/local/sbin/zebra –d/usr/local/sbin/bgpd –d/usr/local/sbin/ospfd –d/usr/local/bin/vtysh –b--8


IST-2001-32603Deliverable D 2.2.44. Dual-stack NREN deployment case studiesThe most common method <strong>to</strong> introduce <strong>IPv6</strong> services in<strong>to</strong> <strong>IPv4</strong> networks will be through dual-stacknetworking on the NREN. This complements the backbone transition and pushes the issue ofdeployment <strong>to</strong> the edge, i.e. <strong>to</strong> the universities.In the scope of <strong>6NET</strong>, many NRENs have already migrated <strong>to</strong> dual stack; the specific experiencesof SURFnet, Funet and Renater are reported here. A summary of a survey of the status of otherNREN deployments was given in the survey reported in D2.2.3.The SURFnet case study (updated from both D.2.2.2 and D2.2.3) is particularly interesting becausethere SURFnet changed <strong>to</strong> use 6PE because SURFnet regards this solution as the mosteconomically sound way <strong>to</strong> implement <strong>IPv6</strong> at wire speed despite the fact that MPLS is not required<strong>for</strong> any other network service (in the previous dual-stack mode up until March 2004, <strong>IPv6</strong> washandled in software).4.1. SURFnet Case Study (Netherlands)4.1.1. IntroductionSURFnet is the national computer network <strong>for</strong> higher education and research in the Netherlands.SURFnet connects the networks of universities, colleges, research centers, academic hospitals andscientific libraries <strong>to</strong> one another and <strong>to</strong> other networks in Europe and the rest of the world. TheSURFnet network enables its users <strong>to</strong> communicate with other network users and <strong>to</strong> consult theInternet from their office or their home PC.In the summer of 2001 the national research infrastructure of SURFnet, called SURFnet5, wasconstructed as part of the GigaPort project and in partnership with BT Nederland 2 and CiscoSystems. 3 After a public procurement process these partners were awarded a six year contract at thevery end of 1999, with BT Nederland supplying the infrastructure and Cisco Systems providing therouter equipment.The building of the successor <strong>to</strong> SURFnet5, called SURFnet6, started at the end of 2004 and isper<strong>for</strong>med in partnership with Nortel, Avici Systems, and Telindus. SURFnet6 will be a hybridoptical and packet switching infrastructure delivering <strong>IPv4</strong>, <strong>IPv6</strong>, and lambda services <strong>to</strong>SURFnet’s constituency. The <strong>IPv6</strong> implementation <strong>for</strong> unicast and multicast on SURFnet6 will benative and truly dual-stack, i.e. not using MPLS.2 The original contract was signed with Tel<strong>for</strong>t, who later became BT Ignite The Netherlands; the current name is BTNederland.3 See also the press release: “GigaPort, BT Ignite, Cisco Systems and SURFnet launch the world's most advancedresearch network” at http://www.gigaport.nl/publicaties/pers/en_pers270601.html.27


IST-2001-32603Deliverable D 2.2.44.1.2. The SURFnet5 dual stack networkThe SURFnet5 network consists of a core that is situated at two locations in Amsterdam, at thePoints of Presence (PoPs) called “Amsterdam1” 4 and “Amsterdam2” 5 . Two Cisco 12416 routers areinstalled at each location implementing the core functionality. Fifteen concentra<strong>to</strong>r PoPs are eachconnected <strong>to</strong> both core locations over two separate unprotected SONET/SDH framed lambdasrunning at 10 Gbit/s. The engineering of the lambdas is such that it ensures that one connection isalways maintained in case of a single transmission or core router failure. At each of the fifteen PoPsa router of type Cisco 124xx is installed <strong>to</strong>gether with a Cisco 7507 router <strong>for</strong> the low speed, legacyconnections at speeds up <strong>to</strong> 155 Mbit/s. The backbone of SURFnet5 makes use of IP-over-DWDM,using POS framing. BT owns and operates the DWDM transmission infrastructure. Figure 4-1shows the logical <strong>to</strong>pology of SURFnet5.Figure 4-1: Logical <strong>to</strong>pology <strong>for</strong> SURFnet5From the start of SURFnet5 all routers running Cisco’s IOS have <strong>IPv6</strong> implemented. During theearly days of the network, IOS versions in the 12.0ST train were used in the GSR routers. During2002 the transition <strong>to</strong> 12.0S was made. The current version, in March 2004, in the GSR routers is“IOS Version 12.0(26)S1” and in the 7500 routers is “IOS Version 12.2(14)S2”.SURFnet5 started as a dual-stack network and has been running as such until March 2004. DuringMarch 2004 <strong>IPv6</strong> routing within the core of the network was migrated from dual-stack <strong>to</strong> 6PE. Thereason <strong>for</strong> this migration was <strong>to</strong> achieve line rate <strong>IPv6</strong> <strong>for</strong>warding in the SURFnet5 network.SURFnet5 is a 10 Gbit/s network largely build on Engine4 line cards and these cards handle <strong>IPv4</strong>on the fast path while <strong>IPv6</strong> is handled by the processor of the line card. After a large replacement in2003 of Engine2 line cards with Engine3 line cards, the edges of SURFnet5 became capable of4 This PoP is located at SARA in the eastern part of Amsterdam.5 This PoP is located at Hempoint, a BT Nederland co-lo facility, in the western part of Amsterdam.28


IST-2001-32603Deliverable D 2.2.4handling <strong>IPv6</strong> traffic at line rate. By implementing 6PE in the core of the network it was ensuredthat <strong>IPv6</strong> traffic was also handled at line rate in the core and potential bottlenecks were removed.The routing set-up as implemented and running <strong>to</strong>day runs without problems. A number of featuresare on SURFnet’s requirements list, of which <strong>IPv6</strong> multicast is high on the list. SURFnet alreadyhas hands-on experience with <strong>IPv6</strong> multicast in the <strong>6NET</strong> context using external MBGP <strong>for</strong> <strong>IPv6</strong>.4.1.3. Cus<strong>to</strong>mer connectionsToday, the vast majority of SURFnet’s cus<strong>to</strong>mer connections are at 1 Gbit/s using Ethernettechnology. Three cus<strong>to</strong>mers are connected at 10GE, connected <strong>to</strong> line cards in the backbone thatdo not support <strong>IPv6</strong> at wire speed. In SURFnet6, the number of connected organizations using10GE is expected <strong>to</strong> rapidly increase. Wire speed 10 Gbit/s <strong>IPv6</strong> will be one of the featuresimplemented in SURFnet6.SURFnet5 supports cus<strong>to</strong>mer connections on <strong>IPv4</strong> as well as <strong>IPv6</strong>. For <strong>IPv4</strong> unicast and multicastare supported, while <strong>for</strong> <strong>IPv6</strong> this is currently unicast only. <strong>IPv6</strong> can be delivered <strong>to</strong>wardsSURFnet’s 180 cus<strong>to</strong>mers in the field of research and higher education using either a native ortunnelled approach.Native <strong>IPv6</strong> connections are implemented either “dual stack” or “on a dedicated port”. Dual stackimplies that the cus<strong>to</strong>mer connection runs <strong>IPv4</strong> as well as <strong>IPv6</strong> on the same local loop. A fewcus<strong>to</strong>mers, however, prefer <strong>IPv6</strong> on a dedicated port, next <strong>to</strong> their <strong>IPv4</strong> port <strong>for</strong> the simple reasonthat they have a dedicated router <strong>for</strong> <strong>IPv6</strong> on their LAN.Tunnelled connections <strong>to</strong> cus<strong>to</strong>mers are only allowed in case the cus<strong>to</strong>mer is not able <strong>to</strong> implement<strong>IPv6</strong> in dual stack mode or on a dedicated port. In case we implement a tunnel connection with acus<strong>to</strong>mer, we always ask the cus<strong>to</strong>mer <strong>to</strong> make plans <strong>for</strong> going native.4.1.4. Addressing planSURFnet received an official <strong>IPv6</strong> prefix from the RIPE NCC in August 1999 of length /35, whichwas enlarged <strong>to</strong> a /32 during the summer of 2002:2001:0610::/32 6This prefix is split up as follows:3 bits | 13 bits | 16 bits | 3 bits | 5 bits | 8 bits |-------+-------------+--------------+--------+--------+--------+FP | TLA | sub-TLA | slow | PoP | site || | | start | (NLA 1)| (NLA 2)|/3 /16 /29 /35 /40 /48Only the first /35 is currently used. The other 7 /35s are <strong>for</strong> future use right now. For each PoP a/40 prefix (NLA 1) is reserved and each /40 is again split in<strong>to</strong> 256 /48 prefixes (NLA 2) <strong>to</strong> numberthe backbone links and cus<strong>to</strong>mer networks. The break-down of SURFnet’s prefix on a per-PoPbasis is shown in detail below.The prefix 2001:0610::/40 is in use as the carrier network <strong>for</strong> SURFnet5, in which all links reside.For the links SURFnet uses /64 prefixes, in the <strong>for</strong>mat:6 For registration details on this prefix, see: http://www.ripe.net/cgi-bin/whois?2001:0610::/32.29


IST-2001-32603Deliverable D 2.2.42001:0610:00xx:xyyy::zzzIn this <strong>for</strong>mat, xxx denotes the third octet of the link’s or LAN’s <strong>IPv4</strong> prefix and yyy denotes thefourth octet of the link’s or LAN’s <strong>IPv4</strong> prefix. The zzz denotes the actual address. An example ofthis is shown below in Figure 4-2:Cisco#sh int po0/0 | inc InternetInternet address is 145.145.160.5/30Cisco#sh ipv6 int po0/0 | inc subnet2001:610:16:4::5, subnet is 2001:610:16:4::/64Prefix NLA 1 PoP2001:0610:0000::/40 0 (not used yet)2001:0610:0100::/40 1 Amsterdam12001:0610:0200::/40 2 Amsterdam22001:0610:0300::/40 3 Hilversum2001:0610:0400::/40 4 Leiden12001:0610:0500::/40 5 Utrecht2001:0610:0600::/40 6 Chicago, IL, USA2001:0610:0700::/40 7 (not used yet)2001:0610:0800::/40 8 (not used yet)2001:0610:0900::/40 9 Delft2001:0610:0A00::/40 10 (not used yet)2001:0610:0B00::/40 11 DenHaag2001:0610:0C00::/40 12 Rotterdam2001:0610:0D00::/40 13 (not used yet)2001:0610:0E00::/40 14 (not used yet)2001:0610:0F00::/40 15 (not used yet)2001:0610:1000::/40 16 (not used yet)2001:0610:1100::/40 17 Eindhoven2001:0610:1200::/40 18 Maastricht2001:0610:1300::/40 19 Nijmegen30


IST-2001-32603Deliverable D 2.2.44.1.5. Routing2001:0610:1400::/40 20 Tilburg2001:0610:1500::/40 21 (not used yet)2001:0610:1600::/40 22 (not used yet)2001:0610:1700::/40 23 (not used yet)2001:0610:1800::/40 24 (not used yet)2001:0610:1900::/40 25 Enschede2001:0610:1A00::/40 26 Groningen2001:0610:1B00::/40 27 (not used yet)2001:0610:1C00::/40 28 (not used yet)2001:0610:1D00::/40 29 Wageningen2001:0610:1E00::/40 30 Zolle2001:0610:1F00::/40 31 (not used yet)Figure 4-2: SURFnet prefixes per POPDuring the build-up of SURFnet5, in the summer of 2001, IS-IS was used <strong>for</strong> <strong>IPv4</strong> and <strong>IPv6</strong>. Sincethe transmission of SURFnet5, the 10G lambdas, is unprotected we used MPLS TrafficEngineering’s extension Fast ReRoute as the pro<strong>to</strong>col <strong>to</strong> protect the network against failures bymaking available an alternative path well within the 50 msec time frame. However, MPLS TE wasonly supporting <strong>IPv4</strong>, yielding a situation in which the <strong>IPv4</strong> <strong>to</strong>pology was different from the <strong>IPv6</strong><strong>to</strong>pology. At that time, IS-IS was not able <strong>to</strong> handle different <strong>to</strong>pologies <strong>for</strong> the two pro<strong>to</strong>cols, andwe had <strong>to</strong> move away from IS-IS <strong>for</strong> <strong>IPv6</strong>. We temporarily transitioned <strong>to</strong> RIPng <strong>for</strong> <strong>IPv6</strong>, while westayed at IS-IS in combination with MPLS TE FRR <strong>for</strong> <strong>IPv4</strong>.In the mean time Cisco developed multi-<strong>to</strong>pology IS-IS, which enabled SURFnet <strong>to</strong> move awayfrom RIPng back <strong>to</strong> the original plan. Be<strong>for</strong>e we went back <strong>to</strong> IS-IS <strong>for</strong> <strong>IPv6</strong>, we decided <strong>to</strong>abandon the MPLS TE FRR ship <strong>for</strong> network management reasons, as we found the operations andmaintaining of FRR <strong>to</strong>o complex. At the same time, enhancements <strong>to</strong> IS-IS made it possible <strong>to</strong> fullyrely on the routing pro<strong>to</strong>cols at the IP layer <strong>for</strong> the resilience in SURFnet5. During March 2004 thedual-stack approach was migrated <strong>to</strong> a 6PE implementation. The four core routers act as BGP routereflec<strong>to</strong>rsin both the <strong>IPv4</strong> as <strong>IPv6</strong>/6PE routing. All fifteen concentra<strong>to</strong>r routers and border routersare BGP route-reflec<strong>to</strong>r clients hanging of these BGP route-reflec<strong>to</strong>rs.4.1.6. Network management and Moni<strong>to</strong>ringAs a ground rule, SURFnet treats <strong>IPv6</strong> on the network level equal <strong>to</strong> <strong>IPv4</strong>, as much as possible.This implies that procedures between SURFnet’s NOC and SURFnet Network Services arestreamlined <strong>to</strong> support this. Also, the external peering policy <strong>to</strong>wards other non-European NRENssuch as Abilene and CA*net 4 and <strong>to</strong>wards the commodity Internet through SURFnet’s upstreamproviders and through peerings at the Amsterdam Internet Exchange (AMS-IX) is the same <strong>for</strong> <strong>IPv4</strong>and <strong>IPv6</strong>. At the AMS-IX it means that <strong>IPv6</strong> peering requests are handled exactly like <strong>IPv4</strong> peering31


IST-2001-32603Deliverable D 2.2.4requests, as SURFnet’s peering policy on the Exchange is identical <strong>for</strong> both pro<strong>to</strong>cols. In December2004, SURFnet had approx. 65 <strong>IPv6</strong> peering sessions enabled over the AMS-IX.While SURFnet strives <strong>to</strong> be able <strong>to</strong> per<strong>for</strong>m network management over <strong>IPv6</strong> as well, <strong>to</strong>day this isdone only partly at this moment. SURFnet moni<strong>to</strong>rs the availability of the <strong>IPv6</strong> cus<strong>to</strong>merconnections as well as external connections. Also where software allows it (like SSH, Nagios andRancid) <strong>IPv6</strong> is used <strong>to</strong> manage the router equipment in SURFnet5.4.1.7. Other servicesThe following actions on applications and the like in the area of <strong>IPv6</strong> are being or have beenundertaken:• The anonymous-FTP archive of SURFnet and NLUUG was enabled <strong>for</strong> <strong>IPv6</strong> in the secondquarter of 2002. See Figure 4-3 <strong>for</strong> the <strong>IPv6</strong> volume transferred by this server.• Four of SURFnet’s Stratum 1 Network Time Pro<strong>to</strong>col (NTP) servers are up and running andserving time over <strong>IPv6</strong>.• All of SURFnet’s three DNS server and three DNS resolvers are <strong>IPv6</strong> aware as well asreachable over <strong>IPv6</strong>.• Two Net News Transfer Pro<strong>to</strong>col (NNTP) production feeders and three test feeders run <strong>IPv6</strong>and have external peerings with Switch and Funet and other smaller peerings. In the test bedtwo news reader machines are used with <strong>IPv6</strong> connectivity..• The main web site of SURFnet 7 is enabled <strong>for</strong> <strong>IPv6</strong>.• Several experimental services like video streaming (unicast, multicast) and internettelephony (SIP) run over <strong>IPv6</strong> <strong>to</strong>day.• All SURFnet services are available over <strong>IPv6</strong>, either native or through a tunnel.For new application services that are being developed and <strong>for</strong> which equipment or software isprocured, we asked the potential suppliers on their readiness <strong>for</strong> <strong>IPv6</strong>.7 The English version is available at: http://www.surfnet.nl/en/.32


IST-2001-32603Deliverable D 2.2.4Figure 4-3: Anonymous-FTP over <strong>IPv6</strong> volume.4.1.8. Contact in<strong>for</strong>mationFor more in<strong>for</strong>mation on this case study, the reader can contact SURFnet Network Services. 84.2. Funet Case Study (Finland)This case study was reported in D2.2.3, and is updated here, including more in<strong>for</strong>mation on routingissues <strong>for</strong> <strong>IPv4</strong> and <strong>IPv6</strong>, and network per<strong>for</strong>mance.4.2.1. OverviewIn 2001, Funet's core network was upgraded <strong>to</strong> 2.5Gbit/s PoS links. Six Juniper routers (M20)were added <strong>to</strong> the previously all-Cisco network. There was not so much user demand <strong>for</strong> native8 SURFnet, Department of Network Services, P.O. Box 19035, 3501DA Utrecht, The Netherlands, Email:netmaster@surfnet.nl, Tel: +31 30 230530533


IST-2001-32603Deliverable D 2.2.4<strong>IPv6</strong> at this stage, but by the end of 2001, some plans <strong>for</strong> enabling dual-stack on these Juniperrouters had been made.During Q1/2002 various tests and trials were run.After fixing all the issues, the Funet core had transitioned <strong>to</strong> complete dual-stack deployment in thecore networks by Q2/2002. As of Q1/2005, dual-stack has worked well without any problems orper<strong>for</strong>mance impact.4.2.2. His<strong>to</strong>ryThe Funet experience involved some bleeding edge <strong>IPv6</strong> deployment, leading <strong>to</strong> a subsequentlystable service.In Q2/2002, the minimum <strong>IPv6</strong> working version 5.2R2 was installed on the Juniper routers. Later,versions 5.3R2, 5.3R3, and 5.4R3 were also used. Version 5.6R3 fixed a problem with <strong>IPv6</strong>loopback access list breaking Neighbor Discovery, but since then (as of Q1/2005) no <strong>IPv6</strong> issueshave come up.The <strong>IPv4</strong> network used OSPFv2 and BGP <strong>for</strong> routing, but OSPFv3 <strong>for</strong> <strong>IPv6</strong> was not ready. Funetdidn't want <strong>to</strong> change the routing pro<strong>to</strong>col, and <strong>for</strong> clarity, they wanted clearly separate IGP's <strong>for</strong><strong>IPv4</strong> and <strong>IPv6</strong>: OSPF and IS-IS. In addition, if IS-IS had been deployed <strong>for</strong> <strong>IPv4</strong> and <strong>IPv6</strong>,multiple <strong>to</strong>pologies would have <strong>to</strong> have been supported as <strong>IPv6</strong> routing would have been different(in parts) from <strong>IPv4</strong>. So, <strong>IPv6</strong>-only IS-IS was clearly the best (and only, discounting RIPng) choiceat that time.Un<strong>for</strong>tunately, there were problems in the Juniper and Cisco devices with <strong>IPv6</strong>-only IS-IS. Forexample, the Juniper plat<strong>for</strong>m would not support IS-IS only <strong>for</strong> <strong>IPv6</strong>. The first, and worst, problemwas that the Juniper routers would always also advertise <strong>IPv4</strong> addresses used in loopbacks andpoint-<strong>to</strong>-point links. Cisco's IOS, unless you enabled IS-IS <strong>for</strong> <strong>IPv4</strong> <strong>to</strong>o (which was a non-starter<strong>for</strong> Funet), would discard all such attempts <strong>to</strong> <strong>for</strong>m adjacencies: a <strong>to</strong>tal inoperability problem.Cisco's IS-IS implementation has an option 'no adjacency-check' <strong>to</strong> override this; however, anundocumented fact was that it would only work (at least in this case) when using level-2-only IS-IScircuit-type (which was not the default). A first step in interoperability was gained when these wereenabled in IOS.Some problems continued. IS-IS route advertisements from Ciscos <strong>to</strong> Junipers were accepted in theroute database, but not put <strong>to</strong> the Junipers' routing table: this was caused by the above mentionedproblem with adjacencies; this was reported, and fixed, in 5.2R2; a minimum workable version <strong>for</strong>Funet <strong>to</strong> use. The issue with Juniper always advertising <strong>IPv4</strong> addresses in IS-IS was fixed, as (thenundocumented) feature 'no-ipv4-routing' in 5.4R1. Also, one could not redistribute static discardroutes <strong>to</strong> IS-IS (<strong>to</strong> generate a default route) until this was fixed in 5.3R3. You also could not set ametric when advertising a default route other than by redistributing a static discard route andapplying a route-map in Cisco.Fortunately, the rigorous tests in the lab network were enough <strong>to</strong> expose all of the above problems,which were fixed.Also in 2002, most of Funet's Cisco routers were replaced by Junipers in an upgrade of the network.In early 2003, Funet noticed significant bandwidth bottlenecks (in the order of dozens ofmegabits/second) with their remaining Cisco equipment - 7200's, 7500's, GSR's - regarding <strong>IPv6</strong><strong>for</strong>warding capabilities, but the situation improved tremendously when software supporting CEFv634


IST-2001-32603Deliverable D 2.2.4come out later in 2003. This is very important <strong>for</strong> Funet as the <strong>IPv6</strong> traffic level is at least 30-40Mbit/s.In early 2005, all <strong>IPv6</strong> routing is done on production equipment; there are no longer any special"<strong>IPv6</strong> routers", or any special <strong>IPv6</strong>-only links or connections. Almost all of these are Junipers(M10, M20, T320), about twenty, and two CSC's access routers are Ciscos (VXR with 12.2Ssoftware).As of early 2005, Funet has not yet deployed <strong>IPv6</strong> multicast support though the software capabilityhas existed <strong>for</strong> a long time. Funet has waited <strong>for</strong> Embedded RP support (available in Junipers since7.0R1 on Q4/2004), and availability of <strong>IPv6</strong> multicast service from the upstream. It is expected that<strong>IPv6</strong> multicast support is rolled out soon when the software becomes stable, within half a year or so.Beyond that, no further <strong>IPv6</strong> features have been identified missing in the core network.The Funet <strong>IPv6</strong> network is shown in Figure 4-4 (geography) and Figure 4-5 (<strong>to</strong>pology).Figure 4-4: Funet network by geography35


IST-2001-32603Deliverable D 2.2.4Figure 4-5: The Funet network by <strong>to</strong>pology4.2.3. Addressing planFunet has an <strong>IPv6</strong> SubTLA address block of 2001:708::/32.There are two different aspects <strong>to</strong> addressing: the cus<strong>to</strong>mers and the network infrastructure.4.2.3.1. Cus<strong>to</strong>mersThere are six "SuperPoP" core routers; these are used when giving out /48 prefixes <strong>to</strong> cus<strong>to</strong>mers,e.g.:2001:708:0KLM::/48"K" here is the number of the regional SuperPoP. This is not meant <strong>to</strong> be used <strong>for</strong> aggregationpurposes, rather than <strong>to</strong> just create some mild hierarchy <strong>for</strong> the addresses, rather than allocate themin a sequential fashion."L" is the sequential number of cus<strong>to</strong>mers within the SuperPoP. "0" is reserved.36


IST-2001-32603Deliverable D 2.2.4"M" is reserved <strong>for</strong> expanding the number of cus<strong>to</strong>mers in the SuperPoP and/or increasing the sizeof the assignment <strong>to</strong> the cus<strong>to</strong>mers. To maintain future flexibility, this is still zero.When assigning the prefix <strong>to</strong> the cus<strong>to</strong>mers, Funet recommends they keep the first four bits (thefirst nibble) zero <strong>for</strong> now.An example of a cus<strong>to</strong>mer assignment is 2001:708:510::/48.4.2.3.2. Network InfrastructureHere, "KLM" has a slightly different meaning. "K" still means the SuperPoP, "L" means the PoPacting under the SuperPoP in an access network, and "M" is an identifier <strong>for</strong> the router in the PoP.Loopback addresses are taken from the prefix:2001:708:0:10:KLM::/112So, a few loopback addresses will be:tut0-rtr.funet.fi: 2001:708:0:10:300::1tut1-rtr.funet.fi: 2001:708:0:10:301::1uta3-rtr.funet.fi: 2001:708:0:10:313::1These are configured using /128 prefix length. Note that the identifier of the router is also reflectedin the naming ("uta_3_-rtr").Point-<strong>to</strong>-point addresses in the core and the access networks are taken from one block - alladdresses come from under a single /64:2001:708:0:F000::/64In particular:2001:0708:0:F000::klmn:KLMm:z/112klm and KLM identify the routers at the end of the point-<strong>to</strong>-point links, taken from the loopbackaddresses; in above, these would have been "300", "301", and "313". SuperPoP's or the smallestnumber goes first as klm. "n" and "m" are sequential numbers, used when necessary - <strong>for</strong> exampleif there are multiple links between routers which need <strong>to</strong> be numbered - defaulting <strong>to</strong> zero. "z" isthe end-point of the point-<strong>to</strong>-point link: always "1" or "2". The same SuperPoP or smallest first ruleapplies here <strong>to</strong>o. So, in consequence, the addressing becomes like:uku0-jyu3: 2001:708:0:F000::4000:3230:[12]/112uku0-oulu0: 2001:708:0:F000::4000:5000:[12]/112uta3-jyu3: 2001:708:0:F000::3130:3230:[12]/112The point-<strong>to</strong>-point links <strong>to</strong>ward cus<strong>to</strong>mers are always numbered from the cus<strong>to</strong>mer's addresses, due<strong>to</strong> simplicity and policy reasons.For peerings and miscellaneous use, a block of:2001:708:0:F001::/64is reserved.In addition, some special use addresses are used inside 2001:708::/48, <strong>for</strong> example 2001:708::{1,2}(<strong>for</strong> a few routers), 2001:708::123 (NTP), 2001:708::53 (DNS) etc.37


IST-2001-32603Deliverable D 2.2.44.2.4. RoutingAs was already noted, Funet network uses (as of Q1/2005) OSPFv2 <strong>for</strong> <strong>IPv4</strong> and IS-IS (<strong>for</strong> <strong>IPv6</strong>only) <strong>for</strong> <strong>IPv6</strong>. <strong>IPv4</strong> infrastructure uses BGP with multiple (private) au<strong>to</strong>nomous systems. Due <strong>to</strong>the (relatively) low number of <strong>IPv6</strong> cus<strong>to</strong>mers and traffic, the same kind of BGP <strong>to</strong>pology has notbeen built <strong>for</strong> <strong>IPv6</strong>. Instead, <strong>IPv6</strong> BGP has only been set up at the border routers, and the rest useIS-IS.A longer term idea has been <strong>to</strong> switch from OSPFv2 <strong>to</strong> using IS-IS <strong>for</strong> both <strong>IPv4</strong> and <strong>IPv6</strong>, but thishas been a low priority task, and as of this writing, has not been done yet. At the same time, thesame kind of BGP <strong>to</strong>pology would probably be built.4.2.5. Configuration detailsIn this section, core and cus<strong>to</strong>mer (edge) configuration examples are listed.4.2.5.1. Configuring the CoreThe configuration of the Juniper routers is given in Appendix B of D2.2.3.As can be seen, the model is such that all the routes of the router are redistributed in the IS-IS. Analternative approach would be <strong>to</strong> include all the interfaces in the IS-IS as passive interfaces.This is not considered <strong>to</strong> have serious drawbacks, as none of these redistributed routes areadvertised outside the au<strong>to</strong>nomous system: the advertisement includes the aggregates only.4.2.5.2. Connecting the Cus<strong>to</strong>mers (edge)Cus<strong>to</strong>mers are connected using static routes. The configuration is very simple, like the below onJuniper:interfaces {fe-X/X/X {unit Y {[...]family inet6 {rpf-check fail-filter RPF_FAIL_IPV6;address 2001:708:KLM:xxxx::2/64; # from the cus<strong>to</strong>mer}}}}routing-options {rib inet6.0 {static {38


IST-2001-32603Deliverable D 2.2.4}}}route 2001:708:KLM::/48 next-hop 2001:708:KLM:xxxx::1;firewall {family inet6 {filter RPF_FAIL_IPV6 {term DEFAULT {then {count count-rpf-fail-ipv6;log;discard;}}}}}And on Cisco this could look like:interface Fa0/0[...]ipv6 address 2001:708:KLM:xxxx::2/64!ipv6 route 2001:708:KLM::/48 2001:708:KLM:xxxx::14.2.6. Moni<strong>to</strong>ringThe addresses of all loopback and point-<strong>to</strong>-point addresses are entered in<strong>to</strong> DNS in a special <strong>for</strong>mat.A script configured <strong>to</strong> allow zone-transfer of "ipv6.funet.fi" zone fetches this in<strong>for</strong>mation and digsout the IP addresses which should be in use. The pinger periodically (once in five minutes) checksthat the links (including the links <strong>to</strong> cus<strong>to</strong>mers and the peers) are up and responding; if not, it sendsan alert.BGP and IS-IS adjacencies are also moni<strong>to</strong>red using a <strong>to</strong>ol which collects syslog warnings sentfrom routers <strong>to</strong> a central syslog server. If adjacencies or sessions flap, this can be noted in themoni<strong>to</strong>ring page.All routers and links are collected <strong>to</strong> a cus<strong>to</strong>m network map/moni<strong>to</strong>ring <strong>to</strong>ol, where the traffic levelsand similar can be moni<strong>to</strong>red easily.39


IST-2001-32603Deliverable D 2.2.4A challenge in the dual-stack infrastructure is getting a feel how much traffic on the links is <strong>IPv4</strong>and how much <strong>IPv6</strong>. As of this writing, there are no good mechanisms <strong>to</strong> get that. When <strong>IPv6</strong>MIBs are complete and are implemented, getting such measurements may be easier.The per<strong>for</strong>mance has not been rigorously tested, as the Junipers include a hardware <strong>IPv6</strong> <strong>for</strong>wardingcapability. When Cisco's per<strong>for</strong>mance issues were noticed, and CEFv6 was tested, Funet alsobriefly tested the backbone network's <strong>IPv6</strong> <strong>for</strong>warding capabilities; a PC with Gigabit Ethernetinterface could not send enough traffic <strong>to</strong> cause any impact on the network, which was indeed whatwas expected.4.2.7. Other servicesFunet has been using and advertising a 6<strong>to</strong>4 relay <strong>to</strong> everywhere (openly) since late 2001. Thisincludes the advertisement of 2002::/16 and 192.88.99.0/24. The router in question is a FreeBSDsystem running zebra OSPF and BGP routing pro<strong>to</strong>cols. A more detailed description is available inthe <strong>6NET</strong> Site <strong>Transition</strong> <strong>Cookbook</strong> (Deliverable D2.3.2, and later versions).<strong>IPv6</strong> multicast has also been tested using separate infrastructure and tunnels, but this has been shutdown as of Q1/2005, pending the upgrade of the core network <strong>to</strong> support <strong>IPv6</strong> multicast.A TCP/UDP relay (faith in FreeBSD) is used on server-side <strong>to</strong> experimentally enable <strong>IPv6</strong> access <strong>to</strong>a few <strong>IPv4</strong>-only services.An <strong>IPv6</strong> newsfeed service is <strong>IPv6</strong>-enabled, and is generating 30+ Mbit/s of steady <strong>IPv6</strong> traffic.Also, ftp.ipv6.funet.fi is also <strong>IPv6</strong>-operational.4.2.8. Lessons learnedIt was noticed that especially if the network is built with Junipers, there is no need <strong>to</strong> worry aboutper<strong>for</strong>mance impacts, and building a dual-stack infrastructure in the core network is very easy andsimple <strong>to</strong> maintain.The more difficult part comes from getting the universities <strong>to</strong> use <strong>IPv6</strong>, either through tunnels ornatively. This requires some education, but the main bottleneck is probably at the IT managementat those organizations. The IT staff is typically overloaded with work, or otherwise reticent <strong>to</strong> starttesting <strong>IPv6</strong> or <strong>to</strong> provide that as a service <strong>to</strong> the university departments or other facilities.As such, it seems that the researchers and departments, if they want <strong>to</strong> try out <strong>IPv6</strong>, should be moreinsistent in asking <strong>for</strong> it from their university's IT staff.4.3. RENATER Case Study (France)4.3.1. OverviewWithin the framework of a pilot project by GIP RENATER, carried out by G6, the infrastructure ofRenater2bis has been used <strong>to</strong> set up an <strong>IPv6</strong> pilot network. The aim <strong>for</strong> the GIP RENATER was <strong>to</strong>begin <strong>to</strong> establish the means and mechanisms required <strong>to</strong> allocate the necessary resources <strong>to</strong> connectthe test sites <strong>to</strong> the <strong>IPv6</strong> pilot (NLA-ID allocation, reverse DNS delegation, <strong>IPv4</strong> - <strong>IPv6</strong> transitionmechanisms, etc.)The 2001:660::/35 prefix was used <strong>for</strong> addressing the pilot and connected academic sites. Allindustrial partners were addressed in the 3ffe:300::/24 address space. Dedicated ATM PVCs wereused <strong>to</strong> transport <strong>IPv6</strong> between the different <strong>IPv6</strong> POPs. The original /35 prefix has been expanded<strong>to</strong> a /32 by the RIPE NCC (as part of common RIR policy) since the prefix was originally allocated.40


IST-2001-32603Deliverable D 2.2.44.3.2. Native supportThanks <strong>to</strong> this pilot experience, <strong>IPv6</strong> is now offered as a native service on Renater3's backbone.All Renater3's points of presence offer global IP connectivity <strong>to</strong> the regional networks and <strong>to</strong> thesites which contain both <strong>IPv4</strong> unicast, <strong>IPv4</strong> multicast and <strong>IPv6</strong> unicast.Both traffic types (<strong>IPv4</strong> and <strong>IPv6</strong>) are carried in the backbone without any distinction, offeringequal per<strong>for</strong>mance, availability, supervision and support levels. The Renater NOC was <strong>IPv6</strong> trained<strong>to</strong> be able <strong>to</strong> achieve the same service <strong>for</strong> <strong>IPv6</strong> and <strong>IPv4</strong>.4.3.3. Addressing and namingThe addressing of the whole network is designed in a hierarchic way: this makes it possible <strong>to</strong>aggregate all routes, so reducing the routing table’s size. Each point of presence of Renater3'sbackbone is allocated a /40 <strong>IPv6</strong> prefix. Sites connected <strong>to</strong> a POP receive a /48 prefix derived fromthe /40 of the POP. For moni<strong>to</strong>ring purpose, the /48 prefixes are not aggregated at the POP's in/40's. This way it is possible <strong>to</strong> have a view of sites routing announcements in the routing table. Theaddressing scheme is illustrated on the figure below.RENATER prefix = 2001:0660::/32/32 /48 /642001:0660 NLA SLAInterface ID322001:0660: ----------------Reg-ID8 bitsSites (NLA-ID)8 bits2001:0660:3000:/40 PoP Paris NRI2001:0660:3300:/40 PoP ParisJussieu2001:0660:4400:/40 PoP Lille2001:0660:5400:/40 PoP Marseille(…)2001:0660::/48Figure 4-6: The Renater3 POP addressing schemeThe GIP Renater manages the delegation of reverse zones of Renater3's SubTLA prefix(2001:0660::/32). It delegates <strong>to</strong> each site the reverse zone of the NLA-ID (/48) allocated <strong>to</strong> the site.AFNIC, the French Network In<strong>for</strong>mation Center, is managing the .fr <strong>to</strong>p-level domain name. Theyare connected <strong>to</strong> Renater3's Internet exchange point (SFINX) that supports <strong>IPv6</strong>.4.3.4. Connecting <strong>to</strong> Renater 3Using the experience gained with the <strong>IPv6</strong> pilot of Renater2, procedures <strong>for</strong> connecting <strong>to</strong> Renater3were designed and the teams were trained <strong>to</strong> be aware of the new processes. All the sites connected41


IST-2001-32603Deliverable D 2.2.4<strong>to</strong> the pilot have <strong>to</strong> be moved <strong>to</strong> Renater3, and be allocated a new prefix in the new address space.There was no D-day between the pilot and Renater3 as connectivity was not shut down <strong>for</strong> peopleconnected through the pilot, <strong>to</strong> let them have time <strong>to</strong> do the procedures <strong>to</strong> connect <strong>to</strong> Renater3. Nowall the sites have migrated <strong>to</strong> Renater3 and the pilot prefix is not used.The procedures defined <strong>for</strong> <strong>IPv6</strong> are very close <strong>to</strong> the ones defined <strong>for</strong> <strong>IPv4</strong>. This implies that a sitecan connect only if the network administra<strong>to</strong>r fills some <strong>for</strong>ms. An issue is that all theseadministra<strong>to</strong>rs are not <strong>IPv6</strong> aware, and that some people in the site they manage need <strong>IPv6</strong>connectivity. The prefix given <strong>to</strong> the site is aimed at addressing the whole network, and theadministra<strong>to</strong>r has <strong>to</strong> delegate a part of this prefix <strong>to</strong> the lab, which implies some <strong>IPv6</strong> deployment<strong>for</strong>ecast. This is not easy if the administra<strong>to</strong>r is not <strong>IPv6</strong> aware. This can lead <strong>to</strong> long delays <strong>to</strong>connect some sites <strong>to</strong> Renater3.After 18 months, 50 sites are connected <strong>to</strong> the <strong>IPv6</strong> service of Renater3 and 75 sites have received aprefix. The following map shows the density of <strong>IPv6</strong> connected sites in the different French regions.Figure 4-7: Density of <strong>IPv6</strong> connected sites on Renater34.3.5. The regional networksRenater3 is a national backbone with at least one POP in every French region. To connect <strong>to</strong> thisPOP, the sites use some access network (regional or metropolitan network). At the beginning ofRenater3, none of these access networks were <strong>IPv6</strong> enabled, meaning that the connection betweenthe Renater3 POPs and the sites was done using tunnels or dedicated links (ATM PVCs, seriallinks, etc). As the core backbone is a Cisco GSR infrastructure, the choice was made not <strong>to</strong> set uptunnels on the core routers. Some dedicated equipment was deployed <strong>to</strong> concentrate the tunnels inthe regions. Some of these routers are the ones used <strong>for</strong> the <strong>IPv6</strong> pilot.Eighteen months after the deployment of Renater3, there are 13 regional or metropolitan networksproviding <strong>IPv6</strong> connectivity <strong>to</strong> their cus<strong>to</strong>mers, and 19 have received a prefix, so new networksshould be connected soon. These networks used many different approaches <strong>for</strong> this <strong>IPv6</strong>42


IST-2001-32603Deliverable D 2.2.4deployment: 6PE, VLANs, fully dual-stack, PVC ATM, tunnels, etc, and all these deployments aredone in straight collaboration with Renater. It is clear that the deployment made in the core networkis a real motivation <strong>for</strong> the other networks at the edges <strong>to</strong> follow4.3.6. International connectionsRenater3 offers <strong>IPv6</strong> connectivity <strong>to</strong> national (RNRT) and Europeans (IST) projects. It is connected<strong>to</strong> GEANT with a 10Gbps link where it exchanges traffic with the european NRENs. It has aconnection <strong>to</strong> Asia via TEIN link, a 10Mbps ATM PVC is configured <strong>for</strong> <strong>IPv6</strong>, while the globallink can offer 155Mbps. It also has an <strong>IPv6</strong> connection <strong>to</strong> the transit network OpenTransit via one2.5 Gbps link from the PoP of Lyon.The <strong>IPv6</strong> service is extended <strong>to</strong> the SFINX (Service <strong>for</strong> French Internet eXchange), which offers IPac<strong>to</strong>rs an interconnection point that carries both <strong>IPv4</strong> and <strong>IPv6</strong>. <strong>IPv6</strong> is exchanged in dedicatedVLANs. This makes it possible <strong>to</strong> manage <strong>IPv6</strong> traffic more easily. At this stage, 13 entities areconnected <strong>to</strong> the SFINX using <strong>IPv6</strong>.Figure 4-8: The Renater3 network43


IST-2001-32603Deliverable D 2.2.44.3.7. Tunnel broker service deploymentTo overcome the lack of <strong>IPv6</strong> in regional or metropolitan access networks, RENATER is deployinga tunnel broker service. The solution chosen is Hexago Migration Broker. Its main function is <strong>to</strong>connect sites or end-users who do not have <strong>IPv6</strong> connectivity by creation of <strong>IPv6</strong> dynamic tunnels.End-users can connect <strong>to</strong> the Tunnel Broker via a client software based on TSP (Tunnel SetupPro<strong>to</strong>col). This process will rely on MD5 authentication. The following scheme from Hexago showsthe different use cases <strong>for</strong> the tunnel broker service.Figure 4-9: The RENATER tunnel brokerThe tunnel broker will also be used <strong>for</strong> bringing <strong>IPv6</strong> connectivity <strong>to</strong> meetings, conferences or anykind of event requiring <strong>IPv6</strong> (IST, Launch events...).4.3.8. Network managementBeing able <strong>to</strong> moni<strong>to</strong>r the <strong>IPv6</strong> service always stayed a priority since its deployment in Renater3backbone. As it is offered now as a production service, same guarantees are required <strong>for</strong> <strong>IPv4</strong> and<strong>IPv6</strong>.4.3.8.1. Traffic moni<strong>to</strong>ringDuring the <strong>IPv6</strong> pilot phase of Renater2, <strong>IPv6</strong> was transported in dedicated ATM PVCs. Themoni<strong>to</strong>ring of <strong>IPv6</strong> traffic was very easy as polling was made on separate interfaces. In Renater3, as<strong>IPv6</strong> and <strong>IPv4</strong> are transported on the same links and MIBs <strong>for</strong> moni<strong>to</strong>ring <strong>IPv6</strong> traffic are not yetimplemented on Renater3 equipments, it is not possible <strong>to</strong> moni<strong>to</strong>r <strong>IPv6</strong> traffic the same way.A script was developed <strong>to</strong> poll the routers using the CLI every 60 minutes. This feeds the Renatermoni<strong>to</strong>ring database and results can then be displayed using graphs or weathermaps.44


IST-2001-32603Deliverable D 2.2.4Figure 4-10: <strong>IPv6</strong> traffic weathermap4.3.8.2. Routing moni<strong>to</strong>ringDue <strong>to</strong> the lack of MIBs capable of moni<strong>to</strong>ring <strong>IPv6</strong> routing on Renater3 equipments, some scriptswere deployed capable of checking the status of BGP4+ peerings. Alarms are sent when peering godown.ASPath-tree was also deployed <strong>to</strong> give an overview of the routing policy in Renater. It cannot beused <strong>for</strong> operational routing moni<strong>to</strong>ring but is useful <strong>for</strong> checking routing policies and make newrouting plans. Details on this <strong>to</strong>ol are given in D6.2.4 [<strong>6NET</strong>-D624].4.3.8.3. Flow moni<strong>to</strong>ringAt this stage, the routers on Renater3 are not capable of exporting <strong>IPv6</strong> flows using Netflow v9.Nevertheless, a lot of work has been made <strong>to</strong> make the Netflow collec<strong>to</strong>r of RENATER capable ofcollecting these <strong>IPv6</strong> flows. A first version of the collec<strong>to</strong>r is about <strong>to</strong> be submitted <strong>for</strong> tests <strong>to</strong> theinterested <strong>6NET</strong> partners.4.3.9. <strong>IPv6</strong> MulticastAn experimental <strong>IPv6</strong> multicast network (M6Bone) is running on the Renater3 infrastructure. Itallows the connection of lots of sites, all over the world. This network allows all the sites connected<strong>to</strong> test and develop <strong>IPv6</strong> multicasting. It is connecting <strong>to</strong>day over 80 sites and networks in Europe,Asia and Africa, making the network one of the most advanced multicast <strong>IPv6</strong> network in theworld.45


IST-2001-32603Deliverable D 2.2.44.4. SEEREN Case Study (GRNET)The SEEREN case study has been added <strong>for</strong> this release of the cookbook. It was not included inthe previous release, D2.2.3.4.4.1. IntroductionThe South East European Research and Education Networking (SEEREN) infrastructureinterconnects the Research and Education Networks (NRENs) of Albania, Bosnia-Herzegovina,Bulgaria, FYR of Macedonia, Greece, Hungary, Romania and Serbia-Montenegro amongstthemselves and <strong>to</strong> the European backbone network. In this respect, it constitutes the South-EasternEuropean segment of the multi-gigabit pan-European Research and Education network, GÉANT.The SEEREN infrastructure was officially inaugurated in January 2004, with first <strong>IPv4</strong> servicesprovided in November 2003. Since then, the project has been developing several services and <strong>to</strong>olson <strong>to</strong>p of the infrastructure, including a virtual network operations centre and a one-s<strong>to</strong>p-shop <strong>for</strong>the management <strong>to</strong>ols [SEEREN-V]. The deployment of <strong>IPv6</strong> services has been planned sinceSpring 2004.4.4.2. SEEREN networkThe SEEREN physical and logical network <strong>to</strong>pologies are depicted in Figure 4-11 and Figure 4-12,respectively. The MPLS-enabled core network infrastructure, which is provided by a consortium ofopera<strong>to</strong>rs in SE Europe, has Points of Presence (PoPs) in all the SE European capital cities.Interconnection between the SEEREN NRENs is achieved with the Carrier supporting Carrier(CsC) technique (see Figure 4-13), which enables an MPLS VPN-based service provider, called thecarrier provider, <strong>to</strong> allow other IP (or MPLS) service providers, called cus<strong>to</strong>mers carriers(SEEREN NRENs 9 ), <strong>to</strong> use a segment of its backbone network.The access links of SEEREN NRENs range from 2Mbps up <strong>to</strong> 34Mbps, while connectivity isachieved by using diverse technologies from ATM <strong>to</strong> Ethernet over PPP (EoPPP). The SEERENprimary connection <strong>to</strong> GEANT is a 95Mbps ATM PVC crossing GRNET. A secondary (backup)34Mbps ATM connection diverts traffic <strong>to</strong> RoduNET (Bucharest GEANT PoP) in case of failure inthe primary connection.9 Each SEEREN NREN has deployed and manages one border router <strong>for</strong> its international connectivity. These routersconsist of a “virtual” cus<strong>to</strong>mer provider network.46


IST-2001-32603Deliverable D 2.2.4.ba.mkSkopje.roOTEGlobe MPLSNetworkBucharestBelgrade.yuSofia.bgAthensTirana.gr.alFigure 4-11: SEEREN physical network <strong>to</strong>pology.gr1552.al.hu2.ba.ro18-34.bg.si34 344.mk.at34.yu.hrFigure 4-12: SEEREN logical <strong>to</strong>pologyAccording <strong>to</strong> the CsC technique, in the data plane, the traffic exchanged between SEEREN NRENsborder routers (CEs 10 ) is encapsulated in<strong>to</strong> MPLS frames and, then <strong>for</strong>warded through the CarrierProviders MPLS network. The MPLS label is removed by the far-end along the path SEEREN CErouter and <strong>for</strong>warded as an ordinary IP packet. In the control plane, SEEREN CEs exchange withthe Carrier Provider PEs only IGP routing in<strong>for</strong>mation, i.e. CE loopback IP addresses and CE-PEinterconnection subnets. The corresponding routing in<strong>for</strong>mation populates a Carriers Provider10 Each SEEREN NREN border router that is connected <strong>to</strong> the Carrier Provider’s router is called cus<strong>to</strong>mer edge (CE)router. The Carrier Provider’s router connected <strong>to</strong> a Cus<strong>to</strong>mer’s router is called provider edge (PE) router.47


IST-2001-32603Deliverable D 2.2.4virtual routing and <strong>for</strong>warding (VRF) table. For each routing entry in the VRF a label is assigned bythe carrier PE and advertised via eBGP or LDP <strong>to</strong> the directly connected SEEREN CE (see Figure4-14).Figure 4-13: Label exchange in the CsC modelThe CsC technique offers <strong>to</strong> the SEEREN NRENs multiple technical and economical advantages.SEEREN NRENs do not need <strong>to</strong> deploy, operate and maintain an international backboneinfrastructure but only need <strong>to</strong> exchange minimal routing in<strong>for</strong>mation with its cus<strong>to</strong>mers, e.g. only15 routes are needed <strong>for</strong> the entire SEEREN network, even in cases where several instances of theentire Full Internet Routing Table is exchanged over the Provider’s network. This allows SEERENNRENs <strong>to</strong> define their routing policy (eBGP sessions) transparently over the carrier provider’snetwork and the carrier provider <strong>to</strong> minimize the routing in<strong>for</strong>mation s<strong>to</strong>red in the VRF tables.Figure 4-14: Routing exchange in SEEREN4.4.3. Implementation details of CsC/6PE deploymentThe solution that was finally implemented in SEEREN infrastructure combined 6PE services at theNREN CE routers with transparent <strong>for</strong>warding of <strong>IPv6</strong> traffic over the Carrier Provider MPLS48


IST-2001-32603Deliverable D 2.2.4network. This solution did not require any software or hardware upgrades in the Carrier Providernetwork nor the creation of tunnels between the CE routers.The 6PE deployment approach allows an ISP <strong>to</strong> support <strong>IPv6</strong> services over an MPLS/<strong>IPv4</strong> network.It has many technical implementation similarities <strong>to</strong> the MPLS VPN deployment solutions, whereIP traffic is encapsulated in<strong>to</strong> MPLS frames and sent over the MPLS core network. The theory isdescribed above in Section 3.At the SEEREN infrastructure, the NREN border routers act as 6PE routers and encapsulate <strong>IPv6</strong>packets in<strong>to</strong> MPLS frames. Concurrently, the NREN border routers act as CsC-CE routers and thusalso encapsulate <strong>IPv4</strong> (or <strong>IPv6</strong>) packets in<strong>to</strong> MPLS frames. Consequently, the control and dataplane of the CsC/6PE approach differs from the respective planes of either 6PE or CsC approaches.In the CsC/6PE control plane, the 6PE routers (the NREN border routers) are dual stack, i.e. support<strong>IPv6</strong> and <strong>IPv4</strong> pro<strong>to</strong>cols, and communicate with the rest local NREN infrastructure with anycommon <strong>IPv6</strong>-enable routing pro<strong>to</strong>col. The routing prefixes learned from the local networks aredistributed among the 6PEs via multi-pro<strong>to</strong>col MBGP (MP-iBGP). The BGP next-hop <strong>for</strong> eachadvertised <strong>IPv6</strong> prefix derives from the <strong>IPv4</strong> address of the connected 6PEs. Furthermore, the 6PErouters, now acting as CE routers in the CsC context, exchange routing and label in<strong>for</strong>mation withthe Service Provider (<strong>IPv4</strong>-only) PE routers. This process allows the 6PE routers <strong>to</strong> identify thelabels <strong>for</strong> the <strong>IPv4</strong> next-hop address <strong>for</strong> all destinations in the VPN, i.e. <strong>IPv4</strong> addresses of CsC-CErouters. <strong>Final</strong>ly, communication among CsC-PE routers is achieved via “pure” MPLS switching,where the (<strong>IPv4</strong>) IGP pro<strong>to</strong>col is used <strong>for</strong> the distribution of appropriate MPLS labels <strong>for</strong> CsC-PEaddresses.In the data plane, <strong>IPv6</strong> packets are sent from the local infrastructure routers <strong>to</strong> the NREN ingress6PEs router. The latter imposes two labels on <strong>to</strong>p of the <strong>IPv6</strong> packet. The inner label identifies the<strong>IPv6</strong> BGP next-hop and the outer label identifies the egress 6PE router. After the MPLS frame isreceived by the ingress CsC-PE router, the latter will replace the outer label in order <strong>to</strong> identify theVPN that the encapsulated packet belongs <strong>to</strong>. On <strong>to</strong>p of the two labels, the ingress CsC – PE routerwill stack one additional label that identifies the MPLS-next hop along the path <strong>to</strong> the egress CsC –PE router. This label changes as the MPLS frame is switched inside the Service Provider MPLScore network. If MPLS penultimate hop poping operation is activated, the egress CsC-PE routerreceives an MPLS frame with two labels and removes the outer label as it <strong>for</strong>wards the frame <strong>to</strong> the6PE router. <strong>Final</strong>ly, the egress 6PE router removes the remaining label and <strong>for</strong>wards the <strong>IPv6</strong>packet <strong>to</strong> the appropriate CE.49


IST-2001-32603Deliverable D 2.2.45. Dual-stack Routing Per<strong>for</strong>mance: RIPE-TTM viewIn this Section we use an existing <strong>IPv6</strong> per<strong>for</strong>mance measurement <strong>to</strong>ol, the RIPE Test TrafficMeasurement service, <strong>to</strong> illustrate the relative per<strong>for</strong>mance <strong>for</strong> end-<strong>to</strong>-end response time <strong>for</strong> <strong>IPv4</strong>and <strong>IPv6</strong> paths between identical end servers deployed between sample <strong>6NET</strong> partner sites.The RIPE TTM service is described in detail in D6.2.4.In this section we show the results of the ‘Last 30 day’ plots <strong>for</strong> <strong>IPv4</strong> and <strong>IPv6</strong> packet delay, delayvariation, valid packets and packet loss between four <strong>6NET</strong> partner sites and the TTM server at theUniversity of Southamp<strong>to</strong>n (UK). The Southamp<strong>to</strong>n server is natively connected <strong>to</strong> its campusnetwork, and from there <strong>to</strong> its regional network (LeNSE) and <strong>to</strong> JANET (the UK academicbackbone).Note that the (native) hop count from the Southamp<strong>to</strong>n TTM server <strong>to</strong> the regional MAN is 12 hops<strong>for</strong> <strong>IPv4</strong> and only 9 hops <strong>for</strong> <strong>IPv6</strong>, due <strong>to</strong> the <strong>IPv6</strong> path taking a ‘VLAN shortcut’ across thecampus. Thus the <strong>IPv6</strong> hop counts in the plots in this Section will generally be shorter <strong>for</strong> <strong>IPv6</strong>.There may also be variations in <strong>to</strong>pology at the sending nodes (the RIPE TTM data collectstraceroutes over time, but these are not included here).The overall pattern <strong>for</strong> the four plot pairs shown below is that the packet delay variation is less <strong>for</strong><strong>IPv6</strong> than it is <strong>for</strong> <strong>IPv4</strong>, and that the path is reported as being generally more stable <strong>for</strong> <strong>IPv6</strong> (thevariation in hop count, shown by the red line in the <strong>to</strong>p left plots, is less). The scatter of the delaysin the <strong>to</strong>p left image gives a visual overview the packet variation.The plot pairs show that general packet delay, and thus round trip time, is equivalent <strong>for</strong> <strong>IPv4</strong> and<strong>IPv6</strong> <strong>for</strong> each sample plotted.There is only one significant <strong>IPv6</strong> outage, on the NIIF-Southamp<strong>to</strong>n link, that caused severe packetloss <strong>for</strong> two days, while the <strong>IPv4</strong> link was unaffected.We also report on plots <strong>for</strong> IIJ, a Japanese ISP, <strong>for</strong> interest, although IIJ is not involved in <strong>6NET</strong>.Here, the delays are equivalent, but the delay variation is greater <strong>for</strong> <strong>IPv6</strong> rather than <strong>IPv4</strong>. Thus itis not likely <strong>to</strong> simply be volume of <strong>IPv6</strong> traffic (<strong>IPv6</strong> congestion) that is affecting the delayvariation.There are no US-based TTM servers <strong>to</strong> make <strong>IPv6</strong> comparisons against; the Internet 2 communityuses a different set of measurement <strong>to</strong>ols. It would be worthwhile <strong>to</strong> collaborate in deploying <strong>to</strong>olsbetween the communities <strong>to</strong> measure <strong>IPv4</strong> and <strong>IPv6</strong> per<strong>for</strong>mance.Note we are not measuring throughput in these plots, just the ‘basic’ network characteristics.However, they show an encouraging picture <strong>for</strong> the quality of the <strong>IPv6</strong> service in the NRENs.50


IST-2001-32603Deliverable D 2.2.45.1. SURFnet (NL) <strong>to</strong> University of Southamp<strong>to</strong>n (UK)5.1.1. <strong>IPv4</strong>5.1.2. <strong>IPv6</strong>In this example, the <strong>IPv6</strong> path <strong>to</strong> the TTM server in SURFnet has a lower hop count, less variationin packet delays, and greater stability in the path.51


IST-2001-32603Deliverable D 2.2.45.2. University of Vienna (AT) <strong>to</strong> University of Southamp<strong>to</strong>n (UK)5.2.1. <strong>IPv4</strong>5.2.2. <strong>IPv6</strong>In this example, again the <strong>IPv6</strong> hop count is lower, the stability in the path is greater <strong>for</strong> <strong>IPv6</strong>, andthe variation in packet delay lower <strong>for</strong> <strong>IPv6</strong>. There appears <strong>to</strong> have been an improvement <strong>to</strong> theVienna-Southamp<strong>to</strong>n path in the first week of January 2005 that has improved per<strong>for</strong>mance.52


IST-2001-32603Deliverable D 2.2.45.3. NORDUnet (SE) <strong>to</strong> University of Southamp<strong>to</strong>n (UK)5.3.1. <strong>IPv4</strong>5.3.2. <strong>IPv6</strong>In this case, there is a small volume of errors on the NTP synchronization, which affects <strong>IPv4</strong> and<strong>IPv6</strong> moni<strong>to</strong>ring equally. Again, the <strong>IPv6</strong> traffic is on a shorter path, more stable and has lesspacket delay variation than <strong>IPv4</strong>.53


IST-2001-32603Deliverable D 2.2.45.4. NIIF/Hungarnet (HU) <strong>to</strong> University of Southamp<strong>to</strong>n (UK)5.4.1. <strong>IPv4</strong>5.4.2. <strong>IPv6</strong>As with the plots above, in the case of NIIF-Southamp<strong>to</strong>n, the <strong>IPv6</strong> moni<strong>to</strong>ring shows a lower pathcost, less delay variation and greater overall stability. However, there was one major problem onthe <strong>IPv6</strong> path only <strong>for</strong> two days that resulted in high packet loss between the servers. This wasshortly after a change in <strong>to</strong>pology that had improved per<strong>for</strong>mance (on January 6 th 2005).54


IST-2001-32603Deliverable D 2.2.45.5. GRnet (GR) <strong>to</strong> University of Southamp<strong>to</strong>n (UK)5.5.1. <strong>IPv4</strong>5.5.2. <strong>IPv6</strong>This plot highlights an ongoing NTP synchronization issue, which is independent of the IPmoni<strong>to</strong>ring, but which needs <strong>to</strong> be addressed <strong>to</strong> allow all packet probes <strong>to</strong> contribute <strong>to</strong> the resultgathering. The <strong>IPv6</strong> path is shorter, has more stability, and with the exception of one day in thepast month, has less packet delay variation.55


IST-2001-32603Deliverable D 2.2.45.6. IIJ (Japan) <strong>to</strong> University of Southamp<strong>to</strong>n (UK)5.6.1. <strong>IPv4</strong>5.6.2. <strong>IPv6</strong>These plots show that both <strong>IPv4</strong> and <strong>IPv6</strong> paths are equally stable, with the <strong>IPv4</strong> hop count greater.The <strong>IPv6</strong> delay variation is much greater (unlike the other plots above), and the two main pathvariations (on January 14 th and 21 st , 2005) were coincident <strong>for</strong> both pro<strong>to</strong>cols.(Note that the IIJ endpoint is not on a <strong>6NET</strong> partner site; the plot is included <strong>for</strong> interest.)56


IST-2001-32603Deliverable D 2.2.46. ConclusionsThis cookbook has presented a summary of <strong>IPv6</strong> transition <strong>to</strong>ols and case studies applicable <strong>to</strong> theNREN scope in Europe. By far the most common method <strong>for</strong> introduction of production quality(<strong>to</strong> the level of existing <strong>IPv4</strong> networks) <strong>IPv6</strong> services is via transition <strong>to</strong> dual-stack networking onthe national networks. As the core network also becomes dual-stack, the deployment issues <strong>for</strong><strong>IPv6</strong> are then pushed <strong>to</strong> the edge (and these issues are discussed in the site/university cookbook,[<strong>6NET</strong>-D234]).We have shown four examples of dual-stack <strong>IPv4</strong>-<strong>IPv6</strong> NREN deployments in this cookbook, andother NRENs have already followed suit with their own dual-stack deployments (see the casestudies in Section 4, and the NREN survey in D2.2.3). Other transition methods may be used in asmall number of cases in the shorter term, but these are expected <strong>to</strong> be replaced by dual-stack in thelonger term. <strong>IPv6</strong> over MPLS (6PE) may be used also where hardware upgrades are otherwiserequired <strong>to</strong> deliver <strong>IPv6</strong> over multi-gigabit links, as shown by the SURFnet case study in Section 4.A parallel infrastructure is also possible, as shown by the 6WiN case study in D2.3.3, but this is theonly known case of such a deployment in the <strong>6NET</strong> partner NRENs.The selection of routing pro<strong>to</strong>col in the NRENs is not so clear-cut, though IS-IS <strong>for</strong> both <strong>IPv4</strong> and<strong>IPv6</strong> is generally considered the better technical solution, and has been implemented (<strong>for</strong> example)by GÉANT, NORDUnet and UNINETT. However, running a different pro<strong>to</strong>col <strong>for</strong> each IPversion is also possible (see [<strong>6NET</strong>-D312]).In the early <strong>to</strong> middle transition phase NRENs can be expected <strong>to</strong> offer supporting services whereuniversities have not yet deployed them. Two examples would be the provision of a tunnel brokerand a 6<strong>to</strong>4 service (a relay). These are both discussed in Section 3, and in some of the case studiesof Section 4. Other services should also be considered, e.g. <strong>IPv6</strong> transport <strong>for</strong> the <strong>to</strong>p-levelacademic DNS domains, <strong>IPv6</strong> accessibility <strong>to</strong> common NREN services (e.g. FTP mirrors, newsfeeds). Network management and moni<strong>to</strong>ring is also very important, but these aspects are coveredin [<strong>6NET</strong>-D633]. Similarly <strong>IPv6</strong> Multicast is reported in [<strong>6NET</strong>-D312]. Security is an importantissue, and is covered in detail in [<strong>6NET</strong>-D622].<strong>Final</strong>ly, in this release of the cookbook we have shown via a sample RIPE-TTM server observationthat the <strong>IPv4</strong> and <strong>IPv6</strong> per<strong>for</strong>mance (in terms of ‘basic’ network properties) <strong>for</strong> end-<strong>to</strong>-endconnectivity compares favourably. Site-specific transition <strong>to</strong>ol per<strong>for</strong>mance will be reported inD2.3.4-bis in May 2005.With <strong>IPv6</strong> now a production service in many NRENs, aided significantly by the <strong>6NET</strong> project, thefocus now is in encouraging wider adoption in the university and campus sites.The edi<strong>to</strong>r (Tim Chown) welcomes feedback via email <strong>to</strong> tjc@ecs.so<strong>to</strong>n.ac.uk.57


IST-2001-32603Deliverable D 2.2.47. References[<strong>6NET</strong>] The <strong>6NET</strong> Project, http://www.6net.org/[<strong>6NET</strong>-D211] “Backbone network transition scoping report”, <strong>6NET</strong> Project deliverable D2.1.1,http://www.6net.org/publications/deliverables/D2.1.1.pdf[<strong>6NET</strong>-D221] “NREN network transition scoping report”, <strong>6NET</strong> Project deliverable D2.2.1,http://www.6net.org/publications/deliverables/D2.2.1.pdf[<strong>6NET</strong>-D222] “Initial <strong>IPv4</strong> <strong>to</strong> <strong>IPv6</strong> migration <strong>Cookbook</strong> <strong>for</strong> organisational/ISP (NREN) andbackbone networks”, <strong>6NET</strong> Project deliverable D2.2.2,http://www.6net.org/publications/deliverables/D2.2.2.pdf[<strong>6NET</strong>-D223] “Updated <strong>IPv4</strong> <strong>to</strong> <strong>IPv6</strong> migration <strong>Cookbook</strong> <strong>for</strong> organisational/ISP (NREN) andbackbone networks”, <strong>6NET</strong> Project deliverable D2.2.3,http://www.6net.org/publications/deliverables/D2.2.3.pdf[<strong>6NET</strong>-D233] “Updated <strong>IPv4</strong> <strong>to</strong> <strong>IPv6</strong> transition <strong>Cookbook</strong> <strong>for</strong> end site networks/universities”,<strong>6NET</strong> Project deliverable D2.2.2,http://www.6net.org/publications/deliverables/D2.3.3.pdf[<strong>6NET</strong>-D234] “<strong>Final</strong> <strong>IPv4</strong> <strong>to</strong> <strong>IPv6</strong> transition <strong>Cookbook</strong> <strong>for</strong> end site networks/universities”,<strong>6NET</strong> Project deliverable D2.3.4 (in production), final version will be available fromhttp://www.6net.org/publications/deliverables/D2.3.4.pdf[<strong>6NET</strong>-D312] “<strong>IPv6</strong> cookbook <strong>for</strong> routing, DNS, intra-domain multicast, inter-domain multicastand security, 2 nd Version”, <strong>6NET</strong> Project deliverable D3.1.2,http://www.6net.org/publications/deliverables/D3.1.2v2.pdf[<strong>6NET</strong>-D623] “Operational procedures <strong>for</strong> secured management with transition mechanisms”,<strong>6NET</strong> Project deliverable D6.2.2,http://www.6net.org/publications/deliverables/D6.2.2.pdf[<strong>6NET</strong>-D624] “<strong>Final</strong> report on <strong>IPv6</strong> management <strong>to</strong>ols, developments and tests”,<strong>6NET</strong> Project deliverable D6.2.4,http://www.6net.org/publications/deliverables/D6.2.4.pdf[<strong>6NET</strong>-D633] “<strong>Final</strong> report on <strong>IPv6</strong> management and moni<strong>to</strong>ring architecture design, <strong>to</strong>ols, andoperational procedures - Recommendations”, <strong>6NET</strong>Project deliverable D6.3.2, http://www.6net.org/publications/deliverables/D6.3.3.pdf[D9.3] GÉANT Deliverable D9.3: “<strong>IPv6</strong> Testing”, http://www.dante.net/tf-ngn/D9.3.pdf58


IST-2001-32603Deliverable D 2.2.4[D9.6] GÉANT Deliverable D9.6: “Report on <strong>IPv6</strong> Experiments and Status”,http://www.dante.net/tf-ngn/D9.6-<strong>IPv6</strong>_test.pdf[Lind01] “Scenarios and Analysis <strong>for</strong> Introducing <strong>IPv6</strong> in<strong>to</strong> ISP Networks”, IETF InternetDraft, draft-ietf-v6ops-isp-scenarios-analysis-03, June 2004, Work in Progress[Martini01] “Transport of Layer 2 Frames Over MPLS”, L. Martini et al., IETF Internet Draft,draft-martini-l2circuit-trans-mpls-14, June 2004, Work in Progress.[Martini02] “Encapsulation Methods <strong>for</strong> Transport of Layer 2 Frames Over IP and MPLSNetworks”, L. Martini et al., IETF Internet Draft, draft-martini-l2circuit-encap-mpls-08, September 2004, Work in Progress.[Martini03] “Encapsulation Methods <strong>for</strong> Transport of ATM Cells/Frame Over IP and MPLSNetworks”, L. Martini et al., IETF Internet Draft, draft-martini-atm-encap-mpls-01,June 2002.[Ooms01] J. DeClercq, D. Oooms, S. Prevost, F. Le Faucheur, “Connecting <strong>IPv6</strong> Islands over<strong>IPv4</strong> MPLS using <strong>IPv6</strong> Provider Edge Routers (6PE)”, IETF Internet Draft,draft-ooms-v6ops-bgp-tunnel-04, Oc<strong>to</strong>ber 2004, Work in Progress.[RFC1483] “Multipro<strong>to</strong>col Encapsulation over ATM Adaptation Layer 5”, J. Heinanenm, IETFRFC, July 1993[RFC1772] “Application of the Border Gateway Pro<strong>to</strong>col in the Internet”, Y. Rekhter, P.Gross,IETF RFC, 1995.[RFC2373] “IP Version 6 Addressing Architecture”, R. Hinden, S. Deering, IETF RFC, 1998.[RFC2492] “<strong>IPv6</strong> over ATM Networks”, G. Armitage, P. Schulter, M. Jork,IETF RFC, Jan 1999.[RFC2547] “BGP/MPLS VPNs”, E. Rosen, Y. Rekhter, IETF RFC, 1999.[RFC2784] “Generic Routing Encapsulation (GRE)”, D. Farinacci, T. Li, S. Hanks, D. Meyer, P.Traina ,IETF RFC, 2000.[RFC2796] “BGP Route Reflection – An Alternative <strong>to</strong> Full Mesh IBGP”, T. Bates, R. Chandra,E. Chen, IETF RFC, 2000.[RFC2858] “Multipro<strong>to</strong>col Extensions <strong>for</strong> BGP-4”, T. Bates, Y. Rekhter, R. Chandra, D. Katz,IETF RFC, 2000.[RFC2893] “<strong>Transition</strong> Mechanisms <strong>for</strong> <strong>IPv6</strong> Hosts and Routers”, R. Gilligan, E. Nordmark,IETF RFC, 2000, under update as draft-ietf-v6ops-mech-v2-02, February 2004.[RFC3056] “Connection of <strong>IPv6</strong> Domains via <strong>IPv4</strong> Clouds”, B. Carpenter, K. Moore, IETF RFC,February 2001[RFC3107] “Carrying Label In<strong>for</strong>mation in BGP-4”, Y. Rekhter, E. Rosen, IETF RFC, 2001.[SEEREN] SEEREN IST project, http://www.seeren.org/[SEEREN-V] SEEREN VNOC, http://admin.seeren.org/[V6OPS] IETF <strong>IPv6</strong> Operations WG, http://www.ietf.org/html.charters/v6ops-charter.html59

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!