Sparx-5 Family of L2/L3 Enterprise 25G Ethernet Switches

Total Page:16

File Type:pdf, Size:1020Kb

Sparx-5 Family of L2/L3 Enterprise 25G Ethernet Switches SparX-5 Family of L2/L3 Enterprise 25G Ethernet Switches Introduction The SparX-5 Enterprise Ethernet switch family provides a rich set of Enterprise switching features such as advanced TCAM-based VLAN and QoS processing enabling delivery of differentiated services, and security through TCAM- based frame processing using versatile content aware processor (VCAP). IPv4/IPv6 Layer 3 (L3) unicast and multicast routing is supported with up to 18K IPv4/9K IPv6 unicast LPM entries and up to 9K IPv4/3K IPv6 (S,G) multicast groups. L3 security features include source guard and reverse path forwarding (uRPF) tasks. Additional L3 features include VRF-Lite and IP tunnels (IP over GRE/IP). The SparX-5 switch family features a highly flexible set of Ethernet ports with support for 25G aggregation links, QSGMII, USGMII, and USXGMII. The device integrates a powerful 1 GHz dual-core ARM® Cortex®-A53 CPU enabling full management of the switch and advanced Enterprise applications. The SparX-5 switch family targets managed Layer 2 and Layer 3 equipment in SMB, SME, and Enterprise where high port count 1G/2.5G/5G/10G switching with 25G aggregation links is required. The SparX-5 switch family consists of following SKUs. VSC7552 SparX-5-128 supports up to 128 Gbps of bandwidth with the following primary port configurations. • 12 × 10G • 6 x 10G + 2 x 25G • 16 × 2.5G + 8 × 10G • 48 × 1G + 8 × 10G VSC7556 SparX-5-160 supports up to 160 Gbps of bandwidth with the following primary port configurations. • 16 × 10G • 10 × 10G + 2 × 25G • 16 × 2.5G + 10 × 10G • 48 × 1G + 10 × 10G VSC7558 SparX-5-200 supports up to 200 Gbps of bandwidth with the following primary port configurations. • 20 × 10G • 8 × 25G In addition, the device supports one 10/100/1000/2500/5000 Mbps SGMII/SerDes node processor interface (NPI) Ethernet port. Features This section lists the key device features and benefits. • Layer 2 and Layer 3 Forwarding – IEEE®802.1Q switch with 4K VLANs and 32K MAC table entries – Push/pop/translate up to three VLAN tags on ingress and egress – RSTP and MSTP support © 2021 Microchip Technology Inc. Datasheet DS00003823C-page 1 and its subsidiaries – Fully nonblocking wire-speed switching performance for all frame sizes – Link aggregation and DRNI per IEEE 802.1AX – External bridge port extender role per IEEE 802.1BR – IPv4/IPv6 unicast and multicast Layer 2 switching with up to 32K groups and 2K port masks – IPv4/IPv6 unicast and multicast Layer 3 forwarding (routing) with reverse path forwarding (RPF) support – IGMPv2, IGMPv3, MLDv1, and MLDv2 support – IPv4 tunnels including GRE, 6to4, 6rd, 6over4, ISATAP, and 6in4 – Energy Efficient Ethernet (EEE) (IEEE 802.3az) • Quality of Service – Four megabytes of integrated shared packet memory – Two megabytes of integrated shared packet memory – Eight QoS classes with a pool of up to 32K queues – TCAM-based classification with pattern matching against Layer 2 through Layer 4 information – Dual-rate policers selected by VCAP IS2, eight dual-rate priority policers per port, and four single-rate port policers for each port – Flexible 4K ingress QoS mappings and 8K egress QoS mappings for VLAN tags and DSCP values – 4K egress VLAN tag operations – Low latency cut-through forwarding mode – Priority-based flow control (PFC) (IEEE 802.1Qbb) • Security – Versatile content aware processor (VCAP™) packet filtering engine using ACLs for ingress and egress packet inspection with four ingress lookups per frame and two egress lookups per egress frame copy – Hierarchical VLAN ACLs and router ACLs – Storm controllers for flooded broadcast, flooded multicast, and flooded unicast traffic – Per-port, per-address registration for copying/redirecting/discarding – 64 single-rate policers for ingress ACLs – 64 single-rate policers for egress ACLs • Management – VCore-IV™ CPU system with integrated dual-core 1 GHz ARM Cortex-A53 CPU with MMU and DDR3/ DDR4 SDRAM controller – Integrated ARM Cortex-M3 CPU core for dedicated PCIe bootup and POE management. – PCIe 1.x/2.0/3.0 CPU interface – CPU frame extraction (eight queues) and injection (two queues) through DMA, which enables efficient data transfer between Ethernet ports and CPU/PCIe – JTAG CPU debug interface – Configurable 32-bit data plus 8-bit ECC-capable DDR3/DDR4 SDRAM interface supporting up to eight gigabytes (GB) of memory – eMMC flash interface – Sixty-four pin-shared general-purpose I/Os: • Serial GPIO and two LED controllers controlling up to 32 ports with four LEDs each • Triple PHY management controller (MIIM) • Dual UART • Dual built-in two wire serial interface multiplexer • External interrupts • SFP loss of signal inputs – External access to registers through PCIe, SPI, MIIM, or through an Ethernet port with inline versatile register access protocol (VRAP) – Per-port counter set with support for the RMON statistics group (RFC 2819) and SNMP interfaces group (RFC 2863) – Support for CPU modes with internal CPU only, external CPU only, or dual CPU © 2021 Microchip Technology Inc. Datasheet DS00003823C-page 2 and its subsidiaries • Applications – Enterprise L2 managed and L2/L3 (L3-Lite) managed – Enterprise edge – WiFi aggregation – High-end SMB/net café – Embedded and control plane switches – Security appliances – Base stations and baseband processor interconnect – Service provider CPEs © 2021 Microchip Technology Inc. Datasheet DS00003823C-page 3 and its subsidiaries Table of Contents Introduction.....................................................................................................................................................1 Features.................................................................................................................................................. 1 1. Port Configurations................................................................................................................................. 7 2. Product Parameters................................................................................................................................ 8 3. Functional Overview..............................................................................................................................10 3.1. Frame Arrival in Ports and Port Modules................................................................................... 12 3.2. Basic Classification.................................................................................................................... 13 3.3. Enterprise Ethernet Flows..........................................................................................................13 3.4. Security and Control Protocol Classification.............................................................................. 14 3.5. Policing.......................................................................................................................................14 3.6. Layer 2 Forwarding.................................................................................................................... 15 3.7. Layer 3 Forwarding.................................................................................................................... 16 3.8. Shared Queue System and Hierarchical Scheduler...................................................................17 3.9. Egress Security Classification....................................................................................................18 3.10. Rewriter and Frame Departure...................................................................................................18 3.11. CPU Port Module....................................................................................................................... 19 3.12. CPU Subsystem.........................................................................................................................19 4. Functional Descriptions.........................................................................................................................20 4.1. Register Notations......................................................................................................................20 4.2. Frame Headers.......................................................................................................................... 21 4.3. Port Numbering and Mappings...................................................................................................33 4.4. SERDES.....................................................................................................................................45 4.5. DEV2G5 Port Module.................................................................................................................47 4.6. DEV5G Port Module...................................................................................................................55 4.7. DEV10G Port Module.................................................................................................................67 4.8. DEV25G Port Module.................................................................................................................79 4.9. Assembler.................................................................................................................................. 94 4.10. Versatile Content-Aware Processor (VCAP™)........................................................................... 98 4.11. Pipeline Points..........................................................................................................................113 4.12. Analyzer....................................................................................................................................117
Recommended publications
  • Ipv6 Multicast Layer 3 Features
    Chapter 13 IPv6 Multicast Support Prerequisites for IPv6 Multicast 13 IPv6 Multicast Support • Prerequisites for IPv6 Multicast, page 13-1 • Restrictions for IPv6 Multicast, page 13-1 • Information About IPv6 Multicast Support, page 13-2 • How to Configure IPv6 Multicast Support, page 13-4 • Verifying the IPv6 Multicast Layer 3 Configuration, page 13-4 Tip For additional information about Cisco Catalyst 6500 Series Switches (including configuration examples and troubleshooting information), see the documents listed on this page: http://www.cisco.com/en/US/products/hw/switches/ps708/tsd_products_support_series_home.html Participate in the Technical Documentation Ideas forum Prerequisites for IPv6 Multicast None. Restrictions for IPv6 Multicast • The PFC and DFCs provide hardware support for the following: – Completely switched IPv6 multicast flows – IPv6 PIM-Sparse Mode (PIM-SM) (S,G) and (*,G) forwarding – Multicast RPF check for IPv6 PIM-SM (S,G) traffic using the NetFlow table – Rate limiting of IPv6 PIM-SM (S,G) traffic that fails the multicast RPF check – Static IPv6 multicast routes – SSM Mapping for IPv6 (PIM-SSM) – IPv6 multicast forwarding information base (MFIB) using the NetFlow table – IPv6 distributed MFIB (dMFIB) using the NetFlow table – Link-local and link-global IPv6 multicast scopes – Egress multicast replication with the ipv6 mfib hardware-switching command – Ingress interface statistics for multicast routes (egress interface statistics not available) – RPR and RPR+ redundancy mode (see Chapter 9, “Route Processor Redundancy
    [Show full text]
  • Guidelines for the Secure Deployment of Ipv6
    Special Publication 800-119 Guidelines for the Secure Deployment of IPv6 Recommendations of the National Institute of Standards and Technology Sheila Frankel Richard Graveman John Pearce Mark Rooks NIST Special Publication 800-119 Guidelines for the Secure Deployment of IPv6 Recommendations of the National Institute of Standards and Technology Sheila Frankel Richard Graveman John Pearce Mark Rooks C O M P U T E R S E C U R I T Y Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 December 2010 U.S. Department of Commerce Gary Locke, Secretary National Institute of Standards and Technology Dr. Patrick D. Gallagher, Director GUIDELINES FOR THE SECURE DEPLOYMENT OF IPV6 Reports on Computer Systems Technology The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITL’s responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in Federal computer systems. This Special Publication 800-series reports on ITL’s research, guidance, and outreach efforts in computer security and its collaborative activities with industry, government, and academic organizations. National Institute of Standards and Technology Special Publication 800-119 Natl. Inst. Stand. Technol. Spec. Publ. 800-119, 188 pages (Dec. 2010) Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately.
    [Show full text]
  • Dual-Stack Architecture with Ipv6
    Concepts & Examples ScreenOS Reference Guide Dual-Stack Architecture with IPv6 Release 6.3.0, Rev. 02 Published: 2012-12-10 Revision 02 Copyright © 2012, Juniper Networks, Inc. Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other countries. JunosE is a trademark of Juniper Networks, Inc. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Products made or sold by Juniper Networks or components thereof might be covered by one or more of the following patents that are owned by or licensed to Juniper Networks: U.S. Patent Nos. 5,473,599, 5,905,725, 5,909,440, 6,192,051, 6,333,650, 6,359,479, 6,406,312, 6,429,706, 6,459,579, 6,493,347, 6,538,518, 6,538,899, 6,552,918, 6,567,902, 6,578,186, and 6,590,785. Copyright © 2009, Juniper Networks, Inc. All rights reserved. Revision History December 2012—Revision 02 Content subject to change. The information in this document is current as of the date listed in the revision history. SOFTWARE LICENSE The terms and conditions for using this software are described in the software license contained in the acknowledgment to your purchase order or, to the extent applicable, to any reseller agreement or end-user purchase agreement executed between you and Juniper Networks.
    [Show full text]
  • Netsh Interface Ipv6
    IPv6 Startup ARIN XVI Los Angeles, US October, 2005 Miguel Angel Díaz ([email protected]) César Olvera ([email protected]) Jordi Palet ([email protected]) Alvaro Vives ([email protected]) - 1 Agenda 1. IPv6 setup in several Platforms (Windows XP/2003, Linux, BSD) 2. Basic Configuration, Stateless/Stateful Autoconfiguration, Privacy, Static Routes 3. Transition Mechanisms Configuration 4. Examples of Applications - 2 Part 1 IPv6 Setup in several Platforms (Windows XP/2003, Linux, BSD) - 3 IPv6 Setup: XP/2003 (1) • In a DOS Prompt: – ipv6 install to install IPv6 as Network Protocol • ipconfig or ipv6 if to check if IPv6 was installed - 4 IPv6 Setup: XP/2003 (2) • Another option to check if IPv6 was installed – Network Connections > Local Area Connection > Properties • Also it is possible to install/uninstall IPv6 from here - 5 IPv6 Setup: XP/2003 (3) In a Command Prompt: – ipv6 uninstall to delete IPv6 as Network Protocol • ipconfig or ipv6 if to check if IPv6 was uninstalled - 6 IPv6 Setup: Linux (1) • To check if IPv6 is installed: #test -f /proc/net/if_inet6 && echo “Current Kernel supports IPv6“ • Module Installation: #modprobe ipv6 • Module check: #lsmod |grep -w 'ipv6' && echo “IPv6 module loaded" • Automatic Load/Unload of Module (/etc/modules.conf o /etc/conf.modules ): alias net-pf-10 ipv6 #enables load on demand alias net-pf-10 off #disables load on demand - 7 IPv6 Setup: Linux (2) # ifconfig to check eth0 Link encap:Ethernet HWaddr 00:E0:81:05:46:57 inet addr:10.0.0.3 Bcast:10.0.0.255
    [Show full text]
  • D3.2 Analysis of Ipv4-Ipv6
    Ref. Ares(2021)1534648 - 28/02/2021 Alternative Bearers for Rail (AB4Rail) Ref. Ares 2020)3856873 - 22/07/2020 Alternative Bearers for Rail (AB4Rail) D3.2 Analysis of IPv4-IPv6 Document Manager Alessandro Vizzarri (RDL) Programme S2R-OC-IP2-02-2020 Project Name Alternative Bearers for Rail Project acronym: AB4RAIL Grant agreement no: 101014517 Project Coordinator RADIOLABS (RDL) WP leader RDL Deliverable ID: AB4Rail-WP3-D3.2-RDL-PU-v0.0-Analysis of IPv4-IPv6 Title: Analysis of IPv4-IPv6 Work Package: WP3 WP Duration (in months): 18 Actual submission date: 28 Feb. 2021 Dissemination level: PU Approval Status Romeo Giuliano (USGM), Prepared by: Alessandro Vizzarri (RDL), Franco Mazzenga (RDL) Approved by (WP Leader): Alessandro Vizzarri (RDL) Approved by Technical and Project Manager: Alessandro Vizzarri (RDL) Approved by (Project Coordinator): Franco Mazzenga (RDL) Alternative Bearers for Rail (AB4Rail) Ref. Ares 2020)3856873 - 22/07/2020 CONTRIBUTING PARTNERS Name Company/Organization Role/Title Romeo Giuliano Università degli Studi Document Manager/main drafter Guglielmo Marconi (USGM) Franco Mazzenga Radiolabs (RDL) Contributor Alessandro Vizzarri Radiolabs (RDL) Contributor REVISION TABLE Revision Date Modified pages Modified Sections Comments 0.0 28 Feb. 2021 DISTRIBUTION LIST Name Company/Organization Role/Title Franco Mazzenga RDL Project Coordinator Gorazd Marinic Shif2Rail Shif2Rail Programme Officer Disclaimers This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 101014517. The information and views set out in this document are those of the author(s) and do not necessarily reflect the official opinion of Shift2Rail Joint Undertaking. The JU does not guarantee the accuracy of the data included in this article.
    [Show full text]
  • ETSI White Paper on Ipv6 Best Practices, Benefits, Transition
    ETSI White Paper No. 35 IPv6 Best Practices, Benefits, Transition Challenges and the Way Forward First edition – August 2020 ISBN No. 979-10-92620-31-1 ETSI 06921 Sophia Antipolis CEDEX, France Tel +33 4 92 94 42 00 [email protected] www.etsi.org Contributing organizations and authors CAICT Zhiruo Liu China Telecom Chongfeng Xie, Cong Li Cisco Patrick Wetterwald, Pascal Thubert, Francois Clad Hewlett-Packard Enterprise Yanick Pouffary Huawei Giuseppe Fioccola, Xipeng Xiao, Georgios Karagiannis, Shucheng(Will) Liu KPN Eduard Metz Luxembourg University Latif Ladid PT Telecom Jose Cananao, Jose Palma Post Luxembourg Sébastien Lourdez Telefonica Luis M. Contreras IPv6 Best Practices, Benefits, Transition Challenges and the Way Forward 2 Contents Contributing organizations and authors 2 Contents 3 Executive Summary 6 1 Background 8 1.1 Why should IPv6 become a priority again? 8 1.2 Goals of this White Paper 9 2 IPv6 progress in the last 5 years 10 2.1 Devices supporting IPv6 10 2.2 Content (web sites, cloud services) supporting IPv6 11 2.3 Networks supporting IPv6 12 2.4 Number of IPv6 users 12 2.5 Amount of IPv6 traffic 13 2.6 IPv6 standardization progress 14 3 IPv6 service design for Mobile, Fixed broadband and enterprises 14 3.1 IPv6 transition solutions from operator perspective 15 3.1.1 For IPv6 introduction 16 3.1.2 For IPv6-only service delivery 17 3.2 IPv6 prefix and address assignment at the CPEs 22 3.2.1 For MBB UEs 23 3.2.2 For FBB RGs 23 3.2.3 For Enterprise CPEs 23 3.3 IPv6 Packet Transport 24 3.4 IPv6 deployment inside enterprise
    [Show full text]
  • Global Mobile Ipv6 Addressing Using Transition Mechanisms
    Global Mobile IPv6 Addressing using Transition Mechanisms Edgard Jamhour , Simone Storoz and Carlos Maziero Graduate Program in Applied Computer Science, Pontifical Catholic University of Paraná, Brazil. [email protected] [email protected] [email protected] Abstract and cellular networks) [2]. However, in order to provide connectivity to the global Internet, one must consider the The adoption of the Internet Protocol in mobile and shortage of IP version 4 (IPv4) addresses. The use of private wireless technologies has considerably increased the IPv4 addresses [4] was considered a temporary solution to number of hosts that can potentially access the global the IPv4 address shortage problem until a new addressing Internet. IPv6 is considered the long term solution for the scheme, IPv6, would be adopted [5]. Private addresses are IPv4 address shortage problem, but the transition from not considered a final solution because they are not IPv4 to IPv6 is supposed to be very gradual. Therefore, uniquely addressable. That is, a host with a private IPv4 there will be a long time during which both protocol address can start a session with a host with a public address, versions will coexist. To facilitate transition, the IETF using an address translation mechanism such as Network has set up a work group called NGTRANS (Next Address Translation (NAT), but not the contrary [6]. Generation TRANSition) which specifies mechanisms for supporting interoperability between IPv4 and IPv6. This IPv6 solves this problem by offering a virtually unlimited paper describes a new approach for implementing mobile address space. However, there is expected to be a long networks with global Internet connectivity using transition period during which it will be necessary for IPv4 transition mechanisms.
    [Show full text]
  • NIST SP 800-119, Guidelines for the Secure Deployment of Ipv6
    Special Publication 800-119 Guidelines for the Secure Deployment of IPv6 Recommendations of the National Institute of Standards and Technology Sheila Frankel Richard Graveman John Pearce Mark Rooks NIST Special Publication 800-119 Guidelines for the Secure Deployment of IPv6 Recommendations of the National Institute of Standards and Technology Sheila Frankel Richard Graveman John Pearce Mark Rooks C O M P U T E R S E C U R I T Y Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 December 2010 U.S. Department of Commerce Gary Locke, Secretary National Institute of Standards and Technology Dr. Patrick D. Gallagher, Director GUIDELINES FOR THE SECURE DEPLOYMENT OF IPV6 Reports on Computer Systems Technology The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITL’s responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in Federal computer systems. This Special Publication 800-series reports on ITL’s research, guidance, and outreach efforts in computer security and its collaborative activities with industry, government, and academic organizations. National Institute of Standards and Technology Special Publication 800-119 Natl. Inst. Stand. Technol. Spec. Publ. 800-119, 188 pages (Dec. 2010) Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately.
    [Show full text]
  • The Evolution of Ipv6 Transition Technologies Apipv6tf, APNIC 35
    The evolution of IPv6 transition technologies APIPv6TF, APNIC 35 Innovative solutions for tomorrow’s challenges Jouni Korhonen Renesas Mobile Corporation The evolution of IPv6 transition technologies 27 February 2013 1 ©2012 Renesas Mobile Corporation. All rights reserved. Overview § IETF has worked on a plethora of IPv6 transition mechanisms. § The activity is still ongoing trying to address different types on deployment scenarios. § There is still need to provide IPv4 access and extend IPv4 lifetime when ISPs deploy IPv6 in their backbone. § This presentation goes through recent IPv6 transition activities in IETF. We do not repeat the existing technologies.. 2 ©2012 Renesas Mobile Corporation. All rights reserved. Evolution of IPv6 transition technologies in IETF This “roadmap” lacks tools from Ongoing.. the mobility and security camps: MAP-DHCP MAP DSMIPv6, PMIPv6, (MOB)IKE etc.. MAP-DEPLOYMENT ~Done and running code ~Done and running code IVI dIVI dIVI-pd MAP-T NAT64 XLAT464 MAP-E SAM 4rd NAT-PT Public 4over6 4rd-(H,U) NAT464 DS-lite Lightweight 4over6 Remember PNAT & BIH? Stateless DS-lite Done and deployable.. A+P Ongoing.. 6to4 (RFC3056) 6rd (RFC5969) Configured tunnels RFC1933 Automatic tunnels 6over4 ISATAP Tunnel brokers Done and deployed.. Teredo BGP tunnels Softwire mesh 6PE 6VPE Original picture modified with the permission of Ole Troan 3 ©2012 Renesas Mobile Corporation. All rights reserved. Common trends for recent work @ IETF § Offer IPv4 end user service over IPv6(-only) ISP backbone. § Assume dual-stack service for customers. § IPv4 lifetime extension either using A+P or making end user IPv4 number “insignificant”. § Push (NAT44) state at the customer edge.
    [Show full text]
  • Junos® OS Attack Detection and Prevention User Guide for Security Devices Copyright © 2021 Juniper Networks, Inc
    Junos® OS Attack Detection and Prevention User Guide for Security Devices Published 2021-09-22 ii Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks, the Juniper Networks logo, Juniper, and Junos are registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered marks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Junos® OS Attack Detection and Prevention User Guide for Security Devices Copyright © 2021 Juniper Networks, Inc. All rights reserved. The information in this document is current as of the date on the title page. YEAR 2000 NOTICE Juniper Networks hardware and software products are Year 2000 compliant. Junos OS has no known time-related limitations through the year 2038. However, the NTP application is known to have some difficulty in the year 2036. END USER LICENSE AGREEMENT The Juniper Networks product that is the subject of this technical documentation consists of (or is intended for use with) Juniper Networks software. Use of such software is subject to the terms and conditions of the End User License Agreement ("EULA") posted at https://support.juniper.net/support/eula/. By downloading, installing or using such software, you agree to the terms and conditions
    [Show full text]
  • CITC Ipv6 Tunnel Broker
    CITC IPv6 Tunnel Broker Arun Natarajan S, Senior System Administrator CITC Internet operations center [email protected] +966 56 2804268 Copyright @2012 Communications and Information Technology Commission Target audience and why § CITC work to promote IPv6 deployments in the Kingdom § Still, some providers only give IPv4 service § End hosts are usually IPv6 capable, but network infrastructure is not necessarily configured (last mile) § CITC want to promote it as a free national service 29 April 2012 Copyright @2012 Communications and Information Technology Commission 1 1 Objectives § Creating an open source tunnel server that would encourage IPv6 deployments § Building local knowledge and experience § In addition to CITC having a tunnel broker, any DSP/ISP can deploy the tunnel broker for minimal cost using CITC IPv6 tunnel broker § Encourage end users and engineers to experiment with IPv6 29 April 2012 Copyright @2012 Communications and Information Technology Commission 2 2 Tunnel broker background and history § Developed by CITC in cooperation with NXme consultancy services § Assignment: ‘Figure out how to provide IPv6 to anyone who wants it. It must provide user authentication and be free; in other words open source’ § The project began in July/August 2010 § Please see http://www.ipv6.sa/tunnelbroker/ for more information on downloading, installation etc. 29 April 2012 Copyright @2012 Communications and Information Technology Commission 3 3 Evaluation – thinking cap § How does the rest of the world do it? § Many solutions: • TIC, TSP, AYIYA, protocol 41, 6to4, 6over4, GRE, Teredo § Many potential customers also are behind NAT § We could not find any free server software, so we decided to write our own 29 April 2012 Copyright @2012 Communications and Information Technology Commission 4 4 Design criteria..
    [Show full text]
  • Ipv6 Panel Discussion
    IPv6 Panel Discussion IETF 54 Plenary Brian D. Zill [email protected] Our Background in v6 IPv6 stack implementer Implementation started in 1996 in Microsoft Research (by myself and Richard Draves) Multiple web releases in subsequent years, targeting NT 4 and (later) Windows 2000. Implementation moved to Windows Networking group in 2000. Couple of web releases targeting Windows 2000. Shipped IPv6 stack in Windows XP. More background Public 6to4 relay operator Established first relay. OS services developer Internet Explorer, ftp, telnet, RPC were all IPv6−enabled in XP release. IPv6−enabled IIS, File and Print sharing, Media Server, more, are under development for this years .NET Server release. Implemented, used Stateless address auto−config (It just works). DDNS registration of AAAA records Temporary (aka privacy) addresses Off by default in server product. Site−local address support Needed scoped address support for link−local. Additional work for site−locals was small. Anycast especially useful for service discovery. Customers like site boundary feature. Implemented, used ISATAP for automatic tunneling inside corporate network environments Router Discovery impacted by DNS config. 6to4 for automatic tunneling in the Internet portproxy a cross−protocol TCP port forwarder. Implemented, used less 6over4 ISATAP serves similar purpose, but doesnt require multicast−enabled IPv4 network. Configured tunnels 6to4 is easier to set up and use. IPsec Current IPv6 implementation doesnt yet support IKE, requires manual keying. We consider this important, plan to fully support IPsec for IPv6 in future release. Prototype implementations NAT−PT, SIIT Mobile IPv6 Not implemented Stateful address autoconf (via DHCPv6) DSTM A6 / DNAME Routing protocols / Router renumbering Considering / Underway Multicast DNS Prefix delegation Not clear which solution to implement.
    [Show full text]