Application-Aware Flow Monitoring

Total Page:16

File Type:pdf, Size:1020Kb

Application-Aware Flow Monitoring Masaryk University Faculty of Informatics Application-Aware Flow Monitoring Doctoral Thesis Petr Velan Brno, Spring 2018 Declaration Hereby I declare that this paper is my original authorial work, which I have worked out on my own. All sources, references, and literature used or excerpted during elaboration of this work are properly cited and listed in complete reference to the due source. Petr Velan Advisor: doc. Ing. Pavel Čeleda, Ph.D. i Acknowledgement I would like to thank my advisor, colleagues, and fellow researchers for their input and insights that helped to shape my research and this thesis. Furthermore, I could have hardly finished this work without the relentless support of my friends and family. They have my eternal gratitude. iii Abstract The Internet has become a crucial medium for business, entertainment, communication, learn- ing, access to information, and other human endeavours. As the society becomes increasingly dependent upon the availability and security of online services, the revenue from disrupting the normal operation of these services increases as well. Gaining unauthorised access, disrupting functionality, stealing and selling confidential data, and impersonation are only a few examples of these disruptions. Various systems, such as firewalls and anti-virus software, are intended to thwart these attacks and reduce the associated risks. To protect users on their networks, admin- istrators often deploy network monitoring systems to detect and mitigate the threats. Network flow monitoring is an instrument which allows observing traffic passing through given point in the network and gathering aggregated information about the observed network connections. The aggregated nature of provided information allows to scale the flow monitoring to high-speed networks and monitor traffic rates up to and including hundreds of gigabits per second. Flow data is mainly used for security purposes. However, due to its versatility, it is often used for network management tasks, such as capacity planning and accounting, as well. As both network communication protocols and attack vectors are becoming increasingly sophisticated, the flow monitoring needs to evolve as well. The current trends for flow monitoring arethe extraction of supplementary information from application protocols, identification of encrypted traffic, and monitoring of high-speed networks. This thesis contributes to the progression of flow monitoring by exploring the possibilities unlocked by extending the flow data with application-specific information. We show howthe construction of flows is affected by the addition, present the benefits to traffic analysis andassess the inevitable performance loss. To compensate for the lost performance several novel optimisa- tion techniques are proposed for the flow monitoring process. Recognizing that the increasing deployment of encryption is going to limit the benefits of application flow monitoring, we per- form a survey of methods for measurement of encrypted traffic. The thesis is concluded byan outlook towards future possibilities for flow monitoring advancement. The first contribution of this thesis is a revised definition of flow that attempts toimproveand update currently used definitions so that it better matches current flow monitoring practices. A formal definition of flow, together with algorithms for flow construction based on this definition is provided as well. We demonstrate that the revised flow definition allows for use cases that were not covered by NetFlow v9 and IPFIX definitions, such as monitoring of traffic containing fragmented packets. Using the revised terminology and definitions, we focus on application flow monitoring, which is one of the current trends in flow monitoring. Firstly, an overview of the state ofap- plication flow monitoring is provided. Secondly, practical definitions of application flowand application flow record are given to circumscribe application flow monitoring. Thirdly, anex- perimental study on the design of an HTTP application protocol parser is presented. The study quantifies how application flow monitoring increases the demand for computational resources and decreases the performance of the flow monitoring system. The application flow monitoring provides new data for traffic analysis. We study several use cases for which the application flow monitoring can be applied in detail. The first oneuses information from HTTP headers to detect new classes of attacks on the application layer. The second one shows how the additional information can be used to analyse utilisation of IPv6 transition mechanisms. Then, we show that adding geolocation information to flow records can be used for advanced traffic analysis. And last, a method for characterising network trafficis described. It allows comparing multiple network traces and searching for similarities. The monitoring of high-speed networks is one of the current trends in flow monitoring. Firstly, we describe the state-of-the-art in this area. Secondly, we identify and propose multi- iv ple optimisations including those that rely on programmable network interface cards. Some of these optimisations are then used to build and demonstrate a high-density flow monitoring system capable of processing sixteen 10 Gb links in a single box. Classification of encrypted traffic and identification of applications using encryption has become a widely researched topic in the last decade. A survey of methods for measurement of encrypted traffic is, therefore, one of the contributions of this thesis. We show that surprisingly detailed information can be obtained using these methods. In specific cases, even the content of the encrypted connection can be established. This work concludes with a vision for the future of the flow monitoring. We identify sev- eral directions of future research of flow monitoring and a novel approach to monitoring of tunnelled traffic and application layer is proposed. We believe that the perception of thewhole application flow monitoring should be revised to facilitate future demands for more complete and better-structured data. v Keywords network, monitoring, measurement, flow, application flow, NetFlow, IPFIX, encryption, perfor- mance, 100 Gbps vi Contents 1 Introduction 1 1.1 Problem Statement . .1 1.1.1 Application Layer Information . .2 1.1.2 Growing Network Speeds . .2 1.1.3 Traffic Encryption . .2 1.2 Research Goals . .3 1.3 Contributions . .3 1.4 Thesis Structure . .4 2 Network Flow Monitoring 5 2.1 Flow Monitoring Basics . .6 2.1.1 History of Flow Monitoring . .6 2.1.2 Related Technologies . .9 2.2 Flow Definition . 10 2.3 Flow Monitoring Architecture . 14 2.3.1 Terminology . 15 2.3.2 Flow Monitoring Deployment . 17 2.4 Flow Monitoring Process . 20 2.4.1 Packet Capture . 20 2.4.2 Packet Processing . 22 2.4.3 Flow Creation . 22 2.4.4 Flow Export . 25 2.5 Flow Data Processing . 26 2.5.1 Flow Collection . 26 2.5.2 Flow Storage . 29 2.5.3 Flow Processing . 30 2.6 Common Issues . 31 2.6.1 Visible Data Loss . 31 2.6.2 Unobserved Data Loss . 31 2.6.3 Other Issues . 33 2.7 Summary . 34 3 Application Flow Monitoring 35 3.1 Motivation . 36 3.2 Related Work . 36 3.2.1 Application Parsers . 36 3.2.2 Application Flow Exporters . 37 3.3 Application Flow Definition . 38 3.4 Creating Application Flow . 40 3.4.1 Packet Processing . 40 3.4.2 Flow Creation . 41 3.4.3 Flow Export . 42 3.5 Design of an HTTP Parser: A Study . 43 3.5.1 Related Work . 43 3.5.2 Parser Design . 44 3.5.3 Evaluation Methodology . 45 3.5.4 Parser Evaluation . 47 vii 3.5.5 Conclusions . 50 3.6 Summary . 51 4 Traffic analysis using Application Flow Monitoring 53 4.1 Security Monitoring of HTTP Traffic Using Extended Flows . 55 4.1.1 Related Work . 56 4.1.2 Measurement Tools and Environment . 56 4.1.3 Results . 57 4.1.4 Discussion . 63 4.1.5 Conclusion . 66 4.2 An Investigation Into Teredo and 6to4 Transition Mechanisms: Traffic Analysis . 66 4.2.1 Related Work . 67 4.2.2 Investigated IPv6 Transition Mechanisms . 67 4.2.3 Methodology and Measurement Setup . 68 4.2.4 Characteristics of IPv4 Tunnel Traffic . 70 4.2.5 Duration and Size of Flows . 73 4.2.6 IPv6 Tunneled Traffic Analysis . 74 4.2.7 Evaluation of IPv6 Adoption . 76 4.2.8 Conclusion . 78 4.3 Large-Scale Geolocation for NetFlow . 78 4.3.1 Related Work . 79 4.3.2 Exporter-Based Geolocation . 79 4.3.3 Collector-Based Geolocation . 80 4.3.4 Prototype Deployment . 81 4.3.5 Use Cases . 82 4.3.6 Conclusions . 86 4.4 Network Traffic Characterisation Using Flow-Based Statistics . 86 4.4.1 Related Work . 87 4.4.2 Methodology . 88 4.4.3 Results . 90 4.4.4 Conclusions . 95 4.5 Summary . 96 5 Flow Monitoring Performance 99 5.1 Measuring Flow Monitoring Performance . 100 5.1.1 Measuring Overall Throughput . ..
Recommended publications
  • A Review and Qualitative Analysis of Ipv6 and Ipv4 Interoperability Technologies
    A Review and Qualitative Analysis of IPv6 and IPv4 Interoperability Technologies Antti Maula Helsinki University of Technology [email protected] Abstract structured as follows: section 2 contains descriptions of ex- isting solutions and their main technical features. Section 3 Deployment of IPv6 has been delayed even though the stan- presents some discussion about the state of the technologies dard has existed for over ten years and the number of free and section 4 presents the required future work and the final IPv4 addresses is decreasing fast. Some obstacles in deploy- conclusions are drawn in section 5. ment are economic but also technical issues remain. The Internet cannot be converted to IPv6 overnight, thus a transi- tion period is required during which both protocols co-exist 2 Related technologies and work together seamlessly. There is a vast amount of in- teroperability technologies available and this paper presents This section presents the existing IPv6 and IPv4 interop- proposed solutions to operate IPv6-only network segments erability technologies and their technical details. Interop- in cooperation with IPv4-only network segments. erability technologies include techniques which allow use of isolated IPv6 subnets in mostly IPv4 based Internet and KEYWORDS: IPv6, IPv4, interoperability, technology re- all of these technologies are intended to be used only dur- view, qualitative analysis ing the transition period and they should automatically stop working when underlying network infrastructure has imple- mented full IPv6 support. Some of the methods presented 1 Introduction here are implemented only by software while others re- quire additional hardware to function. These two models IP protocol version 4 (IPv4), which is currently used in most are namely “End-host” and “Middlebox” architectures, in parts of the internet, is becoming outdated.
    [Show full text]
  • Vol.11, No. 2, 2011
    Applied Computing Review 2 SIGAPP FY’11 Semi-Annual Report July 2010- February 2011 Sung Y. Shin Mission To further the interests of the computing professionals engaged in the development of new computing applications and to transfer the capabilities of computing technology to new problem domains. Officers Chair – Sung Y. Shin South Dakota State University, USA Vice Chair – Richard Chbeir Bourgogne University, Dijon, France Secretary – W. Eric Wong University of Texas, USA Treasurer – Lorie Liebrock New Mexico Institute of Mining and Technology, USA Web Master – Hisham Haddad Kennesaw State University, USA ACM Program Coordinator – Irene Frawley ACM HQ Applied Computing Review 3 Notice to Contributing Authors to SIG Newsletters By submitting your article for distribution in this Special Interest Group publication, you hereby grant to ACM the following non-exclusive, perpetual, worldwide rights. • To publish in print on condition of acceptance by the editor • To digitize and post your article in the electronic version of this publication • To include the article in the ACM Digital Library • To allow users to copy and distribute the article for noncommercial, educational, or research purposes. However, as a contributing author, you retain copyright to your article and ACM will make every effort to refer requests for commercial use directly to you. Status Update SIGAPP's main event for this year will be the Symposium on Applied Computing (SAC) 2011 in Taichung, Taiwan from March 21-24 which will carry the tradition from Switzerland's SAC 2010. This year's SAC preparation has been very successful. More details about incoming SAC 2011 will follow in the next section.
    [Show full text]
  • Ipv6 – from Assessment to Pilot
    IPv6 – From Assessment to Pilot James Small CDW Advanced Technology Services Session Objectives State of Things Business Case Plan Design Implement Security & Operations Current Trends Depletion replaced by Growth Population penetration Geoff Huston’s IPv4 Address Report Multiple mobile device penetration The Internet of Things – M2M The Internet of Everything Current Trends Global growth: Penetration doubling every 9 months US penetration: IPv6 Deployment: 24.76% Prefixes: 40.78% Transit AS: 59.48% Content: 47.72% Google’s global IPv6 statistics graph Users: 3.92% Relative Index: 6.2 out of 10 Global IPv6 growth Graphs from Cisco Live Orlando 2013 – PSOSPG 1330 • US Growth/Penetration is Double the Global Rate • Critical mass in US next year (10% penetration) Opinions on Action Gartner – Enterprises must start upgrading their Internet presence to IPv6 now Deloitte – In short, we recommend starting (v6 deployment) now “Starting sooner can give organizations enough lead-time for a deliberate, phased roll-out, while waiting could lead to a costly, risky fire drill.” Roadmap State of things Business Case Plan Design Implement Security & Operations New Trends IPv6-Only Data Centers and Networks (especially mobile ones) on the rise Internet-of-Things – many key protocols are IPv6 only (IPv4 doesn’t have necessary scale) Many new trends are IPv6-Only (e.g. IoT) Smart Factories/Buildings/Cities/Grid Intelligent Transportation System General Business Case 65% of Cisco Enterprise Technology Advisory Board members will have IPv6 web sites by the end of this year (2013) Top drivers for IPv6 BYOD Globalization Internet Evolution/Internet Business Continuity (B2B/B2C) Legal Business Cases Mobile (Tablets/Smartphones) LTE/4G an IPv6 technology Multinational Firms – Europe far down the IPv6 path, where are you compared to your counterparts? Federal – Goal for full IPv6 deployment by 2014 with some trying to eliminate IPv4 by years end (VA) Legal Business Cases IPv6 Critical mass is coming next year (2014) – B2B, B2C, M2M, and other innovation will follow.
    [Show full text]
  • Área De Ingeniería Telemática Dpto. Automática Y Computación Soluciones
    Transición a IPv6 Área de Ingeniería Telemática Dpto. Automática y Computación http://www.tlm.unavarra.es/ Soluciones ‣ Doble pila ‣ Dispositivos con IPv4 e IPv6 ‣ Túneles ‣ Comunicar IPv6 a través de zonas IPv4 ‣ Traducción ‣ Comunicar hosts IPv6 con IPv4 IPv6 Dual stack Área de Ingeniería Telemática Dpto. Automática y Computación http://www.tlm.unavarra.es/ Dual stack (Doble pila) ‣ Hosts con pila IPv4 e IPv6 ‣ Las aplicaciones deciden: PF/AF_INET o PF/AF_INET6 ‣ Si manejan direcciones pueden elegir ‣ Si manejan nombres según que devuelva el DNS ‣ RFC para elegir según reglas Dual stack ‣ Primero IPv6 ‣ Primero IPv4? ‣ Elegir según reglas? IPv6 Túneles Área de Ingeniería Telemática Dpto. Automática y Computación http://www.tlm.unavarra.es/ Tunel manual ‣ Cualquier protocolo de VPN/tunnel que soporte IPv6 sobre paquetes IPv4 ‣ Tuneles IPv6 sobre IPv4 (RFC 4213) proto=41 ‣ GRE (RFC 2473) ‣ OpenVPN, socat o similares ‣ … ‣ Túneles estáticos (entre IPs conocidas) ‣ Túneles dinámicos? ‣ De un cliente en cualquier IP a un proveedor? ‣ road-warriors, clientes residenciales con IP dinámica… Tuneles semi-automáticos/dinámicos ‣ Un lado se mantiene conectado a un proveedor ‣ AICCU (Automatic IPv6 Connectivity Client Utility) ‣ Tuneles ‣ 6in4 IPv6 sobre IPv4 ‣ 6in4 con heartbeat (el proveedor deshabilita el túnel si no le llegan heartbeats) ‣ AYIYA (anything in anything) para IPv6 sobre UDP para poder saltar NATs ‣ Tunnel brokers Tunnel broker Túneles automáticos ‣ Configurar tuneles automaticamente para que hosts en islas IPv6 se puedan comunicar
    [Show full text]
  • Exploring Search Engine Optimization (SEO) Techniques for Dynamic Websites
    Master Thesis Computer Science Thesis no: MCS-2011-10 March, 2011 __________________________________________________________________________ Exploring Search Engine Optimization (SEO) Techniques for Dynamic Websites Wasfa Kanwal School of Computing Blekinge Institute of Technology SE – 371 39 Karlskrona Sweden This thesis is submitted to the School of Computing at Blekinge Institute of Technology in partial fulfillment of the requirements for the degree of Master of Science in Computer Science. The thesis is equivalent to 20 weeks of full time studies. ___________________________________________________________________________________ Contact Information: Author: Wasfa Kanwal E-mail: [email protected] University advisor: Martin Boldt, PhD. School of Computing School of Computing Internet : www.bth.se/com Blekinge Institute of Technology Phone : +46 455 38 50 00 SE – 371 39 Karlskrona Fax : +46 455 38 50 57 Sweden ii ABSTRACT Context: With growing number of online businesses, Search Engine Optimization (SEO) has become vital to capitalize a business because SEO is key factor for marketing an online business. SEO is the process to optimize a website so that it ranks well on Search Engine Result Pages (SERPs). Dynamic websites are commonly used for e-commerce because they are easier to update and expand; however they are subjected to indexing related problems. Objectives: This research aims to examine and address dynamic websites indexing related issues. To achieve aims and objectives of this research I intend to explore dynamic websites indexing considerations, investigate SEO tools to carry SEO campaign in three major search engines (Google, Yahoo and Bing), experiment SEO techniques, and determine to what extent dynamic websites can be made search engine friendly on these major search engines.
    [Show full text]
  • Annex I: List of Internet Robots, Crawlers, Spiders, Etc. This Is A
    Annex I: List of internet robots, crawlers, spiders, etc. This is a revised list published on 15/04/2016. Please note it is rationalised, removing some previously redundant entries (e.g. the text ‘bot’ – msnbot, awbot, bbot, turnitinbot, etc. – which is now collapsed down to a single entry ‘bot’). COUNTER welcomes updates and suggestions for this list from our community of users. bot spider crawl ^.?$ [^a]fish ^IDA$ ^ruby$ ^voyager\/ ^@ozilla\/\d ^ÆÆ½âºóµÄ$ ^ÆÆ½âºóµÄ$ alexa Alexandria(\s|\+)prototype(\s|\+)project AllenTrack almaden appie Arachmo architext aria2\/\d arks ^Array$ asterias atomz BDFetch Betsie biadu biglotron BingPreview bjaaland Blackboard[\+\s]Safeassign blaiz\-bee bloglines blogpulse boitho\.com\-dc bookmark\-manager Brutus\/AET bwh3_user_agent CakePHP celestial cfnetwork checkprivacy China\sLocal\sBrowse\s2\.6 cloakDetect coccoc\/1\.0 Code\sSample\sWeb\sClient ColdFusion combine contentmatch ContentSmartz core CoverScout curl\/7 cursor custo DataCha0s\/2\.0 daumoa ^\%?default\%?$ Dispatch\/\d docomo Download\+Master DSurf easydl EBSCO\sEJS\sContent\sServer ELinks\/ EmailSiphon EmailWolf EndNote EThOS\+\(British\+Library\) facebookexternalhit\/ favorg FDM(\s|\+)\d feedburner FeedFetcher feedreader ferret Fetch(\s|\+)API(\s|\+)Request findlinks ^FileDown$ ^Filter$ ^firefox$ ^FOCA Fulltext Funnelback GetRight geturl GLMSLinkAnalysis Goldfire(\s|\+)Server google grub gulliver gvfs\/ harvest heritrix holmes htdig htmlparser HttpComponents\/1.1 HTTPFetcher http.?client httpget httrack ia_archiver ichiro iktomi ilse
    [Show full text]
  • Ipv6 at Home
    IPv6 at Home Jeremy Duncan 20 November 2014 tachyondynamics.com © Tachyon Dynamics – Confidential 1 11-5-23 Overview • IPv6 and the residential service providers • IPv6 residential deployment scenarios • Hurricane Electric • SixXs • GoGo6 • Tunnel providers to never use • Demo with Hurricane Electric and PFSense © Tachyon Dynamics – Confidential 2 Service Provider Status • Comcast • Verizon FiOS • Cox • Time Warner • Mobile • Anyone else? © Tachyon Dynamics – Confidential 3 Comcast • The largest IPv6 residential deployment in the world to date • Information page: http://www.comcast6.net/ • Provides an extensive set of tools for IPv6 • Can test IPv6 capability: http://test- ipv6.comcast.net/ • Can test IPv6 speed using custom Ookla on native XFINITY speed test site: http://speedtest.comcast.net/ © Tachyon Dynamics – Confidential 4 Comcast © Tachyon Dynamics – Confidential 5 Comcast © Tachyon Dynamics – Confidential 6 Verizon FiOS “Verizon is rolling out IPv6 address space in a "dual stack" mode … The upgrades will start in 2013 and the first phase will include Verizon FiOS customers who have a dynamic IP address. Unless there is a need to enter an IP address directly, these changes will generally be transparent our customers” • Some limited commercial deployments, no residential – very far behind • Virtually no communication – no roadmap © Tachyon Dynamics – Confidential 7 Verizon FiOS Moving to new Greenwave G110 • 802.11ac (1.3 Gbps WiFi), Zigbee, IPv6 © Tachyon Dynamics – Confidential 8 Verizon FiOS ActionTech - MI424WR-GEN3I © Tachyon
    [Show full text]
  • Google Overview Created by Phil Wane
    Google Overview Created by Phil Wane PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Tue, 30 Nov 2010 15:03:55 UTC Contents Articles Google 1 Criticism of Google 20 AdWords 33 AdSense 39 List of Google products 44 Blogger (service) 60 Google Earth 64 YouTube 85 Web search engine 99 User:Moonglum/ITEC30011 105 References Article Sources and Contributors 106 Image Sources, Licenses and Contributors 112 Article Licenses License 114 Google 1 Google [1] [2] Type Public (NASDAQ: GOOG , FWB: GGQ1 ) Industry Internet, Computer software [3] [4] Founded Menlo Park, California (September 4, 1998) Founder(s) Sergey M. Brin Lawrence E. Page Headquarters 1600 Amphitheatre Parkway, Mountain View, California, United States Area served Worldwide Key people Eric E. Schmidt (Chairman & CEO) Sergey M. Brin (Technology President) Lawrence E. Page (Products President) Products See list of Google products. [5] [6] Revenue US$23.651 billion (2009) [5] [6] Operating income US$8.312 billion (2009) [5] [6] Profit US$6.520 billion (2009) [5] [6] Total assets US$40.497 billion (2009) [6] Total equity US$36.004 billion (2009) [7] Employees 23,331 (2010) Subsidiaries YouTube, DoubleClick, On2 Technologies, GrandCentral, Picnik, Aardvark, AdMob [8] Website Google.com Google Inc. is a multinational public corporation invested in Internet search, cloud computing, and advertising technologies. Google hosts and develops a number of Internet-based services and products,[9] and generates profit primarily from advertising through its AdWords program.[5] [10] The company was founded by Larry Page and Sergey Brin, often dubbed the "Google Guys",[11] [12] [13] while the two were attending Stanford University as Ph.D.
    [Show full text]
  • Bing: New Features Relevant to Webmasters
    New Features Relevant to Webmasters June 1, 2009 Bing Webmaster Center Team, Microsoft® Table of contents What is Bing? ..................................................................................................... 3 Why make changes? ............................................................................................................... 3 The new SERP with Bing .................................................................................... 4 The Explore Pane ................................................................................................................... 5 Quick Tabs ............................................................................................................................ 7 Related Searches ................................................................................................................... 8 Search History ....................................................................................................................... 8 Categorized results ................................................................................................................ 9 Result types improvements .................................................................................................. 11 Standard results .................................................................................................................. 11 Best Match .......................................................................................................................... 11 Best Match with
    [Show full text]
  • Ipv6 Tunnel Brokers How to Setup an Ipv6 Tunnel Using a Public Tunnel Broker and Windows
    IPv6 Tunnel Brokers How to Setup an IPv6 Tunnel Using a Public Tunnel Broker and Windows Matt Ryanczak Network Operations Manager What is an IPv6 Tunnel? • IPv6 encapsulated in another protocol – Usually IPv4 but other protocols work too • Common implementations – 6in4 (RFC3056) – Protocol 41 (RFC2893 & RFC1933) – Anything in Anything (AYIYA) (http://www.sixxs.net/tools/ayiya) IPv6 in IPv4 Tunnel What is a Tunnel Broker? • A provider of IPv6 tunneling services • At least 12 public tunnel brokers • Use various provisioning techniques – Static – Dynamic (via helpers) • Some provide /48s, reverse DNS, BGP • Most are FREE List of Tunnel Brokers Provider Website Region Hurricane Electric http://www.tunnelbroker.net US (Global) SixXS http://www.sixxs.net Europe (Global) Go6 (Hexago) http://www.go6.net Canada (Global) IIJ http://www.iij.ad.jp/en/service/IPv6/ Japan index.html IPv6Now http://www.ipv6now.com.au/ Australia Renater http://tunnel-broker.renater.fr/ France Setting up a Tunnel with Go6 Why Go6? • Easy to setup client for many Oses • Supports clients behind NATs • Provides /48 networks • Support forum 3 Easy Steps 1. Create Account 2. Download and Install Software 3. Run Software Create an Account Create an Account • Enter Your Information • Required Fields: - Name - Username - E-mail - Password You are automatically signed in once you submit the form Download Go6 Client Install Go6 Client Run the Go6 Client Works out of the box if: - You have public IP address - No Filters / Firewalls Notice that: - Configured for anonymous access
    [Show full text]
  • ETSI White Paper on Ipv6 Best Practices, Benefits, Transition
    ETSI White Paper No. 35 IPv6 Best Practices, Benefits, Transition Challenges and the Way Forward First edition – August 2020 ISBN No. 979-10-92620-31-1 ETSI 06921 Sophia Antipolis CEDEX, France Tel +33 4 92 94 42 00 [email protected] www.etsi.org Contributing organizations and authors CAICT Zhiruo Liu China Telecom Chongfeng Xie, Cong Li Cisco Patrick Wetterwald, Pascal Thubert, Francois Clad Hewlett-Packard Enterprise Yanick Pouffary Huawei Giuseppe Fioccola, Xipeng Xiao, Georgios Karagiannis, Shucheng(Will) Liu KPN Eduard Metz Luxembourg University Latif Ladid PT Telecom Jose Cananao, Jose Palma Post Luxembourg Sébastien Lourdez Telefonica Luis M. Contreras IPv6 Best Practices, Benefits, Transition Challenges and the Way Forward 2 Contents Contributing organizations and authors 2 Contents 3 Executive Summary 6 1 Background 8 1.1 Why should IPv6 become a priority again? 8 1.2 Goals of this White Paper 9 2 IPv6 progress in the last 5 years 10 2.1 Devices supporting IPv6 10 2.2 Content (web sites, cloud services) supporting IPv6 11 2.3 Networks supporting IPv6 12 2.4 Number of IPv6 users 12 2.5 Amount of IPv6 traffic 13 2.6 IPv6 standardization progress 14 3 IPv6 service design for Mobile, Fixed broadband and enterprises 14 3.1 IPv6 transition solutions from operator perspective 15 3.1.1 For IPv6 introduction 16 3.1.2 For IPv6-only service delivery 17 3.2 IPv6 prefix and address assignment at the CPEs 22 3.2.1 For MBB UEs 23 3.2.2 For FBB RGs 23 3.2.3 For Enterprise CPEs 23 3.3 IPv6 Packet Transport 24 3.4 IPv6 deployment inside enterprise
    [Show full text]
  • Microsoft® Official Academic Course: Networking Fundamentals, Exam
    Microsoft® Official Academic Course Networking Fundamentals, Exam 98-366 VP & PUBLISHER Barry Pruett SENIOR EXECUTIVE EDITOR Jim Minatel MICROSOFT PRODUCT MANAGER Microsoft Learning SENIOR EDITORIAL ASSISTANT Devon Lewis TECHNICAL EDITOR Ron Handlon CHANNEL MARKETING MANAGER Michele Szczesniak CONTENT MANAGEMENT DIRECTOR Lisa Wojcik CONTENT MANAGER Nichole Urban PRODUCTION COORDINATOR Nicole Repasky PRODUCTION EDITOR Umamaheswari Gnanamani COVER DESIGNER Tom Nery COVER PHOTO: © shutterstock/wavebreakmedia Copyright © 2017 by John Wiley & Sons, Inc. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc. 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030-5774, (201) 748-6011, fax (201) 748-6008. To order books or for customer service, please call 1-800-CALL WILEY (225-5945). Microsoft, Active Directory, AppLocker, Bing, BitLocker, Hyper-V, Internet Explorer, Microsoft Intune, Microsoft Office 365, SQL Server, Visual Studio, Windows Azure, Windows, Windows PowerShell, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Other product and company names mentioned herein may be the trademarks of their respective owners. The example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious.
    [Show full text]