610 likes | 765 Views
Implementing IP Addressing Services. Accessing the WAN – Chapter 7. Objectives. Configuring DHCP in an enterprise branch network Configuring NAT on a Cisco router Configure new generation RIP (RIPng) to use IPv6. BOOTP and DHCP Differences.
E N D
Implementing IP Addressing Services Accessing the WAN– Chapter 7
Objectives • Configuring DHCP in an enterprise branch network • Configuring NAT on a Cisco router • Configure new generation RIP (RIPng) to use IPv6
Using DHCP Relay when server and client are not on the same segment
NAT OVERLOAD http://www.firewall.cx/nat-overload-part1.php
Verifying and troubleshoot NAT and NAT overload configurations
Configure New Generation RIP (RIPng) to use IPv6 Based on figures as recent as January 2007, about 2.4 billion of the available IPv4 addresses are already assigned to end users or ISPs. That leaves roughly 1.3 billion addresses still available from the IPv4 address space. Despite this seemingly large number, IPv4 address space is running out.
Where Are the IP Addresses Going? • Population growth • Mobile users • Transportation • Consumer electronics
IPsec • From Wikipedia, the free encyclopedia • Internet Protocol Security (IPsec) is a protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. IPsec also includes protocols for establishing mutual authentication between agents at the beginning of the session and negotiation of cryptographic keys to be used during the session. • IPsec is an end-to-end security scheme operating in the Internet Layer of the Internet Protocol Suite. It can be used in protecting data flows between a pair of hosts (host-to-host), between a pair of security gateways (network-to-network), or between a security gateway and a host (network-to-host).[1] • Some other Internet security systems in widespread use, such as Secure Sockets Layer (SSL), Transport Layer Security (TLS) and Secure Shell (SSH), operate in the upper layers of the TCP/IP model. Hence, IPsec protects any application traffic across an IP network. Applications do not need to be specifically designed to use IPsec. The use of TLS/SSL, on the other hand, must be designed into an application to protect the application protocols. • IPsec is a successor of the ISO standard Network Layer Security Protocol (NLSP). NLSP was based on the SP3 protocol that was published by NIST, but designed by the Secure Data Network System project of the National Security Agency (NSA). • IPsec is officially specified by the Internet Engineering Task Force (IETF) in a series of Request for Comment documents addressing various components and extensions. It specifies the spelling of the protocol name to be IPsec.[2]
IPv6 Addressing • IPv6 Global Unicast Address • range of addresses that start with binary value 001 (2000::/3), which is 1/8 of the total IPv6 address space and is the largest block of assigned addresses. • Reserved Addresses • represent 1/256th of the total IPv6 address space. • Private Addresses • Site-local addresses (these addresses start with "FEC", "FED", "FEE", or "FEF“) • Link-local addresses (these addresses start with "FE8", "FE9", "FEA", or "FEB“) • Loopback Addresses (loopback address is 0:0:0:0:0:0:0:1) or (::1) • Unspecified Address (0:0:0:0:0:0:0:0) or (“”)is named the "unspecified" address