ietf routing (and switching) update

52
Cisco Public © 2011 Cisco and/or its affiliates. All rights reserved. 1 Cisco Expo Cisco Expo 2011 IETF Routing (and Switching) Update Routing Protocols 25 years later. Josef Ungerman, CCIE #6167

Upload: others

Post on 11-Mar-2022

4 views

Category:

Documents


0 download

TRANSCRIPT

Cisco Public © 2011 Cisco and/or its affiliates. All rights reserved. 1 Cisco Expo

Cisco Expo 2011

IETF Routing (and Switching) Update Routing Protocols 25 years later.

Josef Ungerman, CCIE #6167

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2

•  Twitter www.twitter.com/CiscoCZ

•  Talk2cisco www.talk2cisco.cz/dotazy

•  SMS 732 488 666

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3

•  Technical Activities Update IETF Summary

•  Fast Convergence IGP LFA FRR PIM MoFRR BGP PIC & Path Diversity

•  New Protocols SIDR and RPKI MPLS-TP TRILL

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Presentation_ID 4

“The mission of the IETF is make the Internet work better by producing high quality, relevant technical documents that influence the way people design, use, and manage the Internet.”

H. Alvestrand RFC 3935 A Mission Statement for the IETF October 2004 http://www.ietf.org/rfc/rfc3935.txt

IP Networks

their network.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5

The IETF is organized into 8 areas:

General (chaired by the IETF Chair)

Applications

Internet

Operations and Management

Real-time Applications and Infrastructure

Routing

Security

Transport

...for a total of more than 125 working groups!!

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6

•  Routing Area bfd Bidirectional Forwarding Detection idr Inter-Domain Routing isis IS-IS for IP Internets ospf Open Shortest Path First IGP pim Protocol Independent Multicast rtgwg Routing Area Working Group l2vpn Layer 2 Virtual Private Networks l3vpn Layer 3 Virtual Private Networks mpls Multiprotocol Label Switching pwe3 Pseudowire Emulation Edge to Edge sidr Secure Inter-Domain Routing vrrp Virtual Router Redundancy Protocol

•  Internet Area lisp Locator/ID Separation Protocol (Internet Area) savi Source Address Validation Improvements softwire Softwires (like 6rd, 4rd) trill Transparent Interconnection of Lots of Links (Internet Area)

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7

•  6 WG’s – MPLS, PWE3, L2VPN, L3VPN, CCAMP, PCE MPLS WG: •  Defines MPLS architecture and protocols (LDP, RSVP-TE) •  Over 70 RFCs published to date •  Mature set of IP/MPLS specifications •  New proposed extensions (over 20 new drafts) to support transport

migration to packet switching •  MPLS Transport Profile (MPLS-TP) as major work area •  Four MPLS-TP RFCs published (MPLS Generic Associated Channel,

RFC 5586) MPLS Generic Associated Channel - RFC 5586 MPLS-TP Requirements - RFC 5654 An Inband DCN For MPLS-TP - RFC 5718 MPLS –TP OAM Requirements- RFC 5860

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8

•  In general, routing protocols are mature. Networks serve mission critical roles.

•  Convergence, Availability and Scalability Enhancements to routing protocols are now incremental and look to enhance Convergence, Availability and Scalability.

BFD, IP FRR, Loop Free Convergence, Path diversity for BGP PIC BGP Optional Attribute Error Handling and Advisory Message, BGP Bestpath Selection Criteria, BGP Graceful Shutdown BGP ADD_PATH, Virtual Aggregation, EIGRP DMVPN Scalability LISP – Internet routing hierarchy, scalability, geo independence

•  Security The network infrastructure’s security is being enhanced.

SIDR Origin Validation OSPFv2, IS-IS and EIGRP Authentication Keying and Authentication for Routing Protocols (KARP) WG

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9

•  Reuse of Routing Technology Reliable delivery of information to any node in the network, and the ability to calculate loop free paths is now being applied to solve non-traditional problems. Layer 2 Routing

IS-IS L2 Extensions, TRILL, OTV Service Discovery and Distribution

BGP flow-spec, bmp, OSPF Transport Instance, Advertising Generic Information in IS-IS, Proximity and Service Advertisement Framework

•  Application of MPLS technologies MPLS-TP (Transport Profile) MPLS-TP OAM (inc. BFD for LSP) MPLS evolution – mLDP, mLACP, Inter-AS, PBB+VPLS,…

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Presentation_ID 10

LFA (Loop-Free Alternate) Fast Reroute

aka. IPFRR (IP Fast Reroute)

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11

Edge POP (Intra-POP)

Core (Inter-POP)

Classical convergence Few min. Few 10 sec.

Fast Convergence <1s

“MPLS-VPN BGP local convergence” ISIS / OSPF Fast Convergence

Fast ReRoute (Prefix Independent) <100ms

BGP PIC Edge

LFA FRR (connection-less)

MPLS TE FRR (connection oriented)

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12

•  LSP/LSA generation is optimized

•  Flooding & passing is optimized

•  Support of incremental SPT and optimized for full SPT.

•  Prefix Prioritization Priority 1: IPTV sources Priority 2: High BGP next hop Priority 3: Other BGP next hop Priority 4: No customer traffic

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13

•  A natural extension to ISIS or OSPF FC behavior Boosts ISIS convergence - <25msec -  Prefix Independence -  No new protocol extension -  Per-hop behavior (no network-wide requirement)

If the topology does not allow to compute IPFRR LFA - ISIS / OSPF FC behavior

•  ISIS or OSPF per-Link or per prefix LFA FRR is are simple command

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14

S F

R1

D

Primary Path Backup Path

Route D (L:55) P NH: F, L: 33 B NH: R1, L: 66

R2

20

Route D (L:33) NH: F, L: 22

Route D (L:66) NH: F, L: 22

Route D (L:22) NH: D, L: pop

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15

S F

R1

D

Route D P NH: F, L22

B NH: no LFA

Route D NH: S

R2

20

Route D NH: R3

R3

20

10 10

10

BRKIPM-3000 (Advanced LFA - a simple protection technique for IP/MPLS networks )

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16

•  IGP FC: a fast IGP is one of the main building block for any FC deployments.

•  LFA FRR: is a intra POP natural extension for IGP FC.

•  MPLS TE FRR: is a inter POP natural extension for IGP FC.

PoP

PoP

PoP

PoP

PE

P

P

PoP

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17

•  PIM Pre-Signalling of two independent joins router is connected to the source via two disjoint branches (requires two

plane design)

•  Upon failure detection, switch-over from primary to backup branch IGP detection: order of x00msec local detection or passive heartbeat: 50msec RTP sequence monitoring: zeroloss

IPTV source

Pop1

Pop2 PopN

Cisco Confidential 18 © 2010 Cisco and/or its affiliates. All rights reserved.

•  Leverage IP/MPLS infrastructure tight-SLA technologies IGP Fast Convergence MPLS TE FRR IP FRR Loop Free Alternative (LFA)

•  Optimize L3 PE forwarding plane for fast convergence BGP Prefix Independent Convergence IP Multicast PIM Fast Convergence Multicast only Fast ReRoute (MoFRR)

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Presentation_ID 19

BGP PIC & Path Diversity

Prefix Independent Convergence

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20

VPN 1 site B x.x.x.x/y

RD 1:1 RD 2:1

RD 3:1

RR1 RR2

RR4 RR3

PE1 PE2

PE3

CE2 CE1

VPN 1 site A

1.  link PE2-CE2 fails

If BGP PIC Edge implemented, then traffic goes PE1,PE2,PE3,CE2

BGP PIC Edge

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21

VPN 1 site B x.x.x.x/y

RD 1:1 RD 2:1

RD 3:1

RR1 RR2

RR4 RR3

PE1 PE2

PE3

CE2 CE1

VPN 1 site A

6.  PE1 deletes path via PE2, now going via PE3

5.  RR1 and RR3 propagate withdraws

3.  PE2 withdraws paths

4.  RR2 and RR4 propagate withdraws

1.  link PE2-CE2 fails

If BGP PIC Edge implemented, then traffic goes PE1,PE2,PE3,CE2

2. Fast External Fallover scans BGP table, calculating new bestpaths

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22

VPN 1 site B x.x.x.x/y

RD 1:1 RD 2:1

RD 3:1

RR1 RR2

RR4 RR3

PE1 PE2

PE3

CE2 CE1

VPN 1 site A

3.  PE1 withdraws paths

If BGP PIC Edge implemented, then traffic goes PE1,PE3,CE2

1.  link PE2 fails

2. The IGP does propagate the BGP NH failure

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24

Aggregators (RRs, [confed] border routers) should advertise backup paths

backup-path-RR

PE3

RR1

Z/p

PE1

PE2 Z/p ! PE2

Z/p ! PE1

Z/p ! PE1 Z/p ! PE2

backup-path-edge

PE3

RR1

PE1 Z/p PR1

PR2 No next-hop-self

PE2

Z/p ! PR1 Z/p ! PR2

Additional-path

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25

•  Initially BGP has been build to signal the best path only. For Fast Convergence, BGP need to signal multipath

and primary/backup path.

•  AF VPNv4 Unique RD: use Unique VPNv4 addresses. If using BGP policy (LP/MED, ...) then BGP Best External option allow to signalling the best eBGP learnt path (without withdrawing the received best internal path).

bgp advertise-best-external

•  AF IPv4 In some case BGP Add-path will be required

additional-paths {[receive][route-policy x]} + new Capability 69 in the BGP OPEN message

- 

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26

Why SIDR?

•  Resiliency – eg. YouTube prefix hijack case http://www.networkworld.com/news/2009/011509-bgp-attacks.html

•  IPv4 Exhaustion & prefix trading security eg. Microsoft to buy Nortel’s IP space (7.5m USD – cca 11 USD per IP address) http://www.bbc.co.uk/news/technology-12859585

Current SIDR Work

•  Origin authentication only (AS_PATH tbd)

•  The RIRs maintain a database of all known address assignments

Route Origination Authorizations, or ROAs RPKI defined – X.509 certificates containing the

assigned AS and a prefix block

•  Each edge (eBGP) router in the network connects to a local server (database distributed through rsync over ssh)

•  Through this, the router determines if each advertisement is valid or not (local cache)

RIR

X.509 ROA

rsync

Srv

r-R

tr P

roto

col

Srv

r-R

tr P

roto

col

Srv

r-R

tr P

roto

col

Srv

r-R

tr P

roto

col

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27

io_control thread Event thread Router thread

RPKI Cache

- Connection mgmt - Socket read/write - PDU processing and pfxv_table maintenance

Cache updates or Bestpath knob changes

- Event-driven prefix table walk to do validation + bestpath - Event-driven walk to calculate bestpath

- Update processing + in-line prefix validation

pfxv_table

bgp_pfxv_entry_t Key: <prefix/len>

bgp_pfxv_record_t Key: <prefix/len/maxlen> Sorted by maxlen

Prefix validation library

rpki-c2r library

Cache-to-router protocol Encoding / decoding routines

EFT/Beta available, tests show decent performance, ~10µs per prefix

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Presentation_ID 28

MPLS-TP

Transport Profile

Cisco Confidential 29 © 2010 Cisco and/or its affiliates. All rights reserved.

Working LSP

PE PE

Protect LSP

NMS for Network Management Control *

Client node Client node

MPLS-TP LSP (Static or Dynamic) Pseudowire

Client Signal

e2e and segment OAM Section Section

*Can use dynamic control plane (G.MPLS)

Connection Oriented, pre-determined working path and protect path Transport Tunnel 1:1 or 1+1 protection, switching triggered by in-band OAM, NMS for static provisioning, optional control plane for routing and signaling

Cisco Confidential 30 © 2010 Cisco and/or its affiliates. All rights reserved.

MPLS-TP Standards Update !  11 IETF RFCs published

!  17 Working Group Drafts (4 in IETF editor’s Queue)

!  35 Individual Drafts Active 2008

History of T-MPLS and MPLS-TP

T-MPLS/PTN is not a standard!

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31

IP/MPLS MPLS-TP T-MPLS/PTN Data Plane MPLS Forwarding MPLS Forwarding, with

- Bi-directional LSP - No PHP as default -  No ECMP -  Label 13 for OAM

Control Plane MPLS, Routing, TE & GMPLS

- Static provisioning - NMS -  GMPLS Control Plane

Static Only

OAM MPLS OAM Tools: - BFD (proactive) - LSP Ping (reactive) - VCCV

Extended MPLS OAM tools - New: AIS/RDI/LDI - New: Perforrmance Monitoring

Recovery Routing Protocols

MPLS-TE Fast Reroute

1+1, 1:1 and 1:n Path/Segment, Linear & Ring protection

Protection triggered by OAM

Based on ITU-T SONET/SDH-style Automatic Protection Switching

IP/MPLS MPLS-TP T-MPLS/PTN Compatibility with IP/MPLS YES YES NO

Compatibility with MPLS-TP YES YES NO

Easy migration to MPLS-TP or IP/MPLS YES YES NO

LTE suitable YES YES NO

Operational Impact:

Protocol Comparisons:

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32

G-ACH OAM

Payload

GAL G-ACH OAM

Payload

GAL Label Label

G-ACH OAM

Payload

GAL Label

End-to-end LSP OAM

G-ACH OAM

Payload

Label PW Label

G-ACH OAM

Payload

Label

G-ACH OAM

Payload

Label Pseudowire OAM

PW Label PW Label

G-ACH OAM

Payload

GAL G-ACH OAM

Payload

GAL G-ACH OAM

Payload

GAL MPLS Section OAM

G-ACH OAM

Payload

GAL G-ACH OAM

Payload

GAL Label Label

MEP-to-MIP LSP OAM (TTL exp)

TTL=2 TTL=1

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33

Function Description Tool

Continuity Check Checks ability to receive traffic BFD (Cisco CPT – 3.3ms hello)

Connectivity Verification Verifies that a packet reaches expected node BFD (proactive), LSP Ping (reactive)

Diagnostic Tests General diagnostic tests (e.g. looping traffic) New Route Tracing Discovery of intermediate and end points LSP Ping

Lock Instruct Instruct remote MEPs to lock path (only test/OAM traffic allowed) New

Lock Reporting Report a server-layer lock to a client-layer MEP New

Alarm Reporting Report a server-layer fault to a client-layer MEP New

Remote Defect Indication Report fault to remote MEP BFD

Client Failure Indication Client failure notification between MEPs PW Status

Packet Loss Measurement Ratio of packets not received to packets sent New

Packet Delay Measurement One-way / two-way delay (first bit sent to last bit received) New

!  Some functions require extensions to existing tools (e.g. BFD, LSP Ping)

!  Many proposals published as work group items yet

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34

Multiservice Core"Aggregation" Edge" Core"Static MPLS-TP Access

IP/MPLS “Lite” Access

Ethernet Access

IP/MPLS “Lite” IP/MPLS IP/MPLS

L3 IP + Services Placement Circuit Emulation + Ethernet

Aggregation" Edge" Core"

Ethernet Access Static/Dynamic MPLS-TP IP/MPLS IP/MPLS

Static MPLS-TP Access

L3 IP + Services Placement

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35

Next Generation

MWR

ME 3800X

ME 3600X

7600 ASR 9000

CPT50

CPT600

CPT200

UPD

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Presentation_ID 36

TRILL

Transparent Interconnection of Lots of Links

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37

•  Branches of trees never interconnect (no loop!!!)

!  Spanning Tree Protocol (STP) uses the same approach to build loop-free L2 logical topology

!  Over-subscription ratio exacerbated by STP algorithm

11 Physical Links (or Link Bundles)

5 Logical Links (or Link Bundles)

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38

•  Assigned switch addresses to all TRILL/FabricPath enabled switches automatically (no user configuration required)

•  Compute shortest, pair-wise paths •  Support equal-cost paths between any TRILL/FabricPath

switch pairs

Plug-N-Play L2 IS-IS is used to manage forwarding topology

L1 L2

S1 S2 S3 S4

S11 S12 S42

L3

L4

FabricPath Routing Table

Switch IF

S1 L1

S2 L2

S3 L3

S4 L4

S12 L1, L2, L3, L4

… …

S42 L1, L2, L3, L4

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39

•  TRILL/FabricPath header is imposed by the ingress switch •  Addresses assigned to ingress and egress switches are used

to make “Routing” decision •  No MAC learning required inside the L2 Fabric

Encapsulation to creates hierarchical address scheme

A C

S11 S42

C

A

DATA

C

A

DATA

TRILL/FabricPath

Header

Ingress Switch

S11

S42

Egress Switch

S11 " S42 TRILL/FabricPath Routing

L2 Bridging

A " C A " C

A " C

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40

•  Support more than 2 active paths (up to 16) across the Fabric •  Increase bi-sectional bandwidth beyond port-channel •  High availability with N+1 path redundancy

Forwarding decision based on ‘TRILL/FabricPath Routing Table’

A

L1 L2

S1 S2 S3 S4

S11 S12 S42

L3

L4

C

Switch IF

… …

S42 L1, L2, L3, L4

MAC IF

A 1/1

… …

C S42 1/1

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41

•  Several ‘Trees’ are rooted in key location inside the fabric •  All Switches in L2 Fabric share the same view for each ‘Tree’ •  Multicast traffic load-balanced across these ‘Trees’

Forwarding through distinct ‘Trees’

A C

Root for Tree #1

Root for Tree #2

Root for Tree #3

Root for Tree #4

Ingress switch for TRILL/ FabricPath decides which “tree” to be used and add tree number in the header

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42

•  NHDA & NHSA are MAC addresses used to cross a legacy Ethernet Cloud

•  V = Version

•  R = Reserved

•  M = Multi-destination

•  Opl = Option Length

•  Hop_Count = TTL

•  Egress Nickname = ODA

•  Ingress Nickname = OSA

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43

•  FabricPath bridges support multiple logical topologies over a single physical network, for example, by assigning different cost sets to the links

encoded Egress Bridge Nickname (ODA)

encoded Ingress Bridge Nickname (OSA) • Switch ID: Unique ID of each L2 Fabric device • Sub-Switch ID: to identify vPC+ pair (MC-LAG) • Tree ID: Unique ID of each distribution “Tree”

Tree ID = topology selector

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44

TRILL FabricPath SPB (802.1aq ) OTV A-VPLS

Standard Yes (IETF, end 2010)

No (Cisco pre-standard TRILL)

Yes (IEEE, end 2011) IETF IETF

Data Plane VLAN + TRILL header

VLAN-like header (upgradable to

TRILL)

MAC Learning (QinQ, MAC-in-

MAC) IP MPLS PW

over IP

Outer MAC swapping hop-by-hop hop-by-hop end-to-end hop-by-

hop end-to-

end

Loop Avoidance TTL TTL, RFP RPF TTL, RPF TTL, RPF

Control Plane ISIS ISIS ISIS ISIS, PIM LDP, Mac Learning

Implementation 2011? 2010 2012? 2010 2011

IXP, Supercomputing MAN? DCI DCI

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45

32 Chassis

16 Chassis

16-way ECMP

8,192 10GE user ports per System 512 10GE FabricPath ports per box

256 10GE FabricPath Ports

160 Tbps System Bandwidth (8K end-user 10GE ports)

Open I/O Slots for connectivity

Spine Switch

Edge Switch 16-port Etherchannel

Nexus 7000 (32x TGE – F1 modules)

HPC Requirements

•  HPC Clusters require high-density of compute nodes

•  Minimal over-subscription

•  Low server to server latency

FabricPath Benefits for HPC

!  FabricPath enables building a high-density fat-tree network

!  Fully non-blocking with FabricPath ECMP & port-channels

!  Minimize switch hops to reduce server to server latencies

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46

Nexus 7000 or Nexus 5500

IXP Requirements !  Layer 2 Peering enables multiple

providers to peer their internet routers with one another

!  10GE non-blocking fabric

!  Scale to thousands of ports

FabricPath Benefits for IXP !  Transparent Layer 2 fabric

!  Scalable to thousands of ports

!  Bandwidth not limited by chassis / port-channel limitations

!  Simple to manage, economical to build

Provider A Provider B

Provider C Provider D

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47

3.3S FEATURES

•  AS-PATH transparency

•  MED transparency

•  Next Hop transparency

•  IPv4 and IPv6 support

•  Unicast/Multicast support

•  4 bytes ASN support

•  HA (GR, SSO, ISSU) support (hardware: ASR1000 – 4/8/16GB DRAM)

•  Per customer policy support with per customer's policy dedicated RIBs

•  BFD for peer's liveness

•  CLI and XML support

•  All standard IOS BGP functionality, monitoring and debugging

AS1

AS2

AS3

AS4

AS5

AS6

BR

BR

BR

BR

BR

BR

Route Server eBGP

IXP

RS

neighbor <ipv4 | ipv6> route-server-client [context <x>]

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48

•  More than 10 IETF WGs produced significant routing protocol work this last year.

•  Trends Convergence, Availability and Scalability

IGP LFA FRR PIM MoFRR BGP PIC & Path Diversity (LISP)

Security SIDR

Reuse of Routing Technology TRILL

Evolution of MPLS MPLS-TP (Transport Profile)

•  What should the future bring?

Cisco Confidential 49 © 2010 Cisco and/or its affiliates. All rights reserved.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50

Prosíme, ohodno!te tuto p"edná#ku.

Kód p"edná#ky

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51

•  Zájemci si mohou vyzkou!et dual-stack p"ístup na Internet

•  P"ipojte se k SSID CiscoExpov6 (otev"en# p"ístup) B$%né OS dostanou IPv6 adresu automaticky pomocí SLAAC a zjistí IPv6 adresy web& p"es b$%né DNS (Win7, Vista, MacOS, Linux, nov$j!í verze iPhone iOS, Android, Symbian)

•  Jak zjistím, %e mi IPv6 funguje? www.whatismyipv6.net - jaká je moje IPv6 adresa? www.kame.net - vidíte tan'ící %elvi'ku? Bez DNS: http://[2001:200:dff:fff1:216:3eff:feb1:44d7]

ShowIP add-on pro Firefox – uká%e IPv6 adresu serveru z DNS (AAAA záznam) Terminál: ping6 ipv6.google.com, ping6 2a00:1450:8002::6a

•  Co d$lat na IPv6 Internetu? www.v6.facebook.com - napi!te si status update po IPv6 ipv6.google.com - n$co si najd$te po IPv6 Zkoukn$te co se d$je – ipv6.novinky.cz, ipv6.lupa.cz, root.cz, ipv6.cnn.com,... Dal#í IPv6 tipy – mapy.cz, justice.cz, ietf.org, nic.cz, he.net, ipv6day.org

www.ipv6.cisco.com