Wednesday, September 25, 2013

I am speaking at TechMentor in Las Vegas Sept. 30 - Oct. 4 on IPv6


For those of you who are Windows admins and interested in learning about IPv6 I am doing a 3 hour session at TechMentor in Las Vegas next week, September 30th through October 4th. You can still sign up for the event. The conference over all is an excellent chance to learn from some of the best in the community, Greg Shields, Don Jones, Mark Minasi and many others. The exciting part is the change that TechMentor has put in place for their format, it is all hands on labs and deep dive sessions so you really get to learn a lot. The presenters aren't trying to sprint through content and can take the time to explain things and have much more engaging discussions about topics of interest.

My session is Mastering IPv6 for the Inspiring Windows Sever Administrator and I will be taking you from the basics of IPv6 through to some practical advise and a demo or two. So please join me in Las Vegas, perhaps we can chat all about IPv6 and what is happening with it. If not, we can always talk PowerShell, Hyper-V, System Center and Azure!

My session description:
Have you been scratching your head wondering what this IPv6 thing is all about and how it might impact you? Have you seen an IPv6 address and wondered how in the world do I subnet that? The first part of the session is focused on explaining the basics of IPv6 and how it is both different and similar to IPv4. The second part is how to set up a basic working configuration, best practices and common problems you may run into in deploying IPv6. We also cover the default assumptions Microsoft has in place for IPv6 and how that impacts your decisions and how you should manage your environment.

Hope to see you in Vegas!
- Ed



Friday, September 20, 2013

IPv6 Unique Local Address or ULA - what are they and why you shouldn't use them

I am often asked interesting questions by fellow IT professionals about IPv6. Some are worthy of a blog post or two so here it is. The subject of IPv6 Unique Local Address or ULA (which is one of the unicast IPv6 address types) seems to be getting more attention now that IT professionals are actually looking at how to deploy IPv6. I thought I would share some brief information about ULA and follow up with my thoughts about it.

ULA is a unicast address type and is limited to the fc00::/7 prefix. This means the prefix has a fixed binary value of 1111 110x with ULA having the concept of a local flag bit (x) which is the 8th bit. This means the prefix is divided into fc00::/8 and fd00::/8. The local flag value of 0 hasn't been defined and therefore should not be used at all which eliminates the fc00:/8 prefix from being used. The local flag value of 1 indicates that the prefix is locally assigned. That means the only valid ULA addresses to use today are from the fd00::/8 prefix.

There have been a few interesting efforts to coordinate ULA prefix allocations. I have no idea why you would do this but you can check it out at SixXS's site. The reality is, fd00::/8 by definition is locally assigned and there is an algorithm defined in RFC 4193 that helps in generating a unique prefix out of that range to help avoid collisions or you can put your MAC address into the SixXS site and it will generate a prefix for you. You can find how the algorithm works in Section 3.2.2 if you want more details.

So what has sparked all this interest in ULA? I think it is happening because many IT organization think deploying IPv6 should be done in the same manner as IPv4. If you spend any time around IPv6 professionals you will quickly learn that IPv4 thinking doesn't apply when designing IPv6 networks. As an example, the role of NAT and address conservation are entirely thrown out the window. I think there is still a lot of confusion around the role of NAT and many IT professionals still consider NAT a security feature. NAT never was intended to be (and never functionally was) a security solution. All NAT provides is a way to conserve the use of public IPv4 addresses. If you disagree, I'm sorry, you are wrong.

Getting back on track, the analogy is often given that ULA is like IPv4 RFC 1918 address space. I believe this triggers people to think they should use ULA in the same way they are using RFC 1918 today. In other words, assign ULA everywhere on their internal network and run a NAT solution at their edge via a firewall or router. This looks exactly like what they do in IPv4. It also turns out that this is completely WRONG for IPv6.

It actually isn't accurate to say that ULA is like RFC 1918 address space. RFC 1918 address space was specifically set aside for the purpose of running NAT because of the shortage of public IPv4 addresses. There is no shortage of IPv6 address space and there will not be any within your lifetime, your children's lifetime or your grandchildren's lifetime or, well, you get the picture. So how is ULA like RFC 1918? The design of ULA was to have an IPv6 address space that would not route on the public IPv6 Internet - ever. In that capacity, ULA and RFC 1918 addresses are the same, neither was intended to be used on the public Internet at all. ULA was designed for labs or other resources (think secure military uses or maybe internal networks at power plants for example) that NEVER need to (or should ever) talk to the global Internet.

Let me repeat that, you use ULA when you never want to talk to anything on the Internet. I have seen many IT professionals say there should be NAT solutions in IPv6. There are some limited corner cases where solutions like NPTv6 (which is network prefix translation for IPv6) might solve some problems however I am not aware of any production ready implementations of NPTv6. In fact, the NPTv6 RFC is still in experimental status, see RFC 6296 and the former solution of NAT-PT has been moved to historical status, see RFC 4966 so really you have no robust NAT solution to date outside of server load balancing solutions like SLB66.

So what do you do? Simple, you reject your IPv4 ways of thinking and adopt the IPv6 way of thinking. You deploy global unicast IPv6 addresses throughout your network and use a stateful packet inspection firewall to control traffic and enforce security rules. You build good routing policies and leverage host based firewalls to enhance your security posture. In fact, you do all the same security measures you do for IPv4, you just happen to be using global unicast IPv6 address. Why? Because we have enough IPv6 addresses that we don't need NAT anymore.

What advantage do you gain by doing this? First, you don't break protocols that tend to embed address information in their session process. NPTv6 will still break protocols requiring firewalls and other network devices to try and do "fixups" or intelligent repairs on the fly to sessions. Why are we wasting time on that when if you simply use global unicast addresses with no network address translation then the protocol doesn't require any special handling.

Finally, it is easier to manage, complies with every design recommendation you will find out there on deploying IPv6 and reduces the chance you will have breakage for a service later (assuming your firewalls aren’t blowing it up – but at least you only have to look in one place for that issue).

So there you have it. In summary, ULA is appropriate for a lab, a proof of concept, a super secure network and maybe an out-of-band control network. Even then, I would still argue you could do all of those functions with global unicast addresses and simply put the correct routing and firewalls rules in place. ULA is designed to never be routed on the public IPv6 Internet and as a result you should not be assigning ULA to hosts in your network unless you have the correct use case. Otherwise, stick with global unicast IPv6 addresses. Do IPv6 right the first time so you don't have to go back and do it again. As a final thought I give you Andrew Yourtchenko's fun NAT YouTube video.


- Ed

Tuesday, September 17, 2013

Cricket Liu presenting on IPv6 at Dyn Geek Summer Camp

Cricket Liu who is the VP of Technology and Architecture at Infoblox recently gave a wonderful IPv6 presentation at Dyn's Geek Summer Camp that I encourage you to watch. I have embedded it in this post for your viewing pleasure. He has some great points about the issues with IPv4 depletion and what will be happening long term with IPv6 adoption.


- Ed

Tuesday, September 03, 2013

Network Field Day 6 - I am a delegate - look out

I've been pretty fortunate to get to know some wonderful people in the IT field over my career. Between Microsoft MVP's, IPv6 Task Force members, colleagues from the VAR/Integrator/Partner community and the tons of folks I have meet at IT conferences as both a speaker and a participant. Every one of them has expanded my horizons of what is happening in the IT field through their own lens of opinion.

With that said, some folks definitely stand out in terms of influence in the community and Stephen Foskett is one of them. It turns out his lens of influence and reach is more expansive then the vast majority I meet in IT. At the same time he is able to be laser focused on the important topics of the day. Really a remarkable feat IMHO. As a result, Stephen has attracted an army of individuals around him both socially and professionally that are doing interesting and exciting things. They have opinions worth listening too, blogs worth reading and ideas worth considering.

Stephen runs Gestalt IT and puts together the Tech Field Day events. His team reaches out to the community of "influencers" and if you are lucky enough you get invited to be a delegate for one of the Tech Field Day events. I consider myself lucky because I will be participating in Network Field Day 6 as a delegate happening the week of September 11-13, 2013 in Silicon Valley. I am excited to hear from the line up of sponsors for the event. They are:

http://techfieldday.com/wp-content/uploads/2012/08/Aruba_Networks_FullColor-SMALL-wpcf_100x27.png http://techfieldday.com/wp-content/uploads/2012/10/BigSwitch-wpcf_100x28.gif
http://techfieldday.com/wp-content/uploads/2013/04/nuage_VerticalLogo_print_CMYK_large-wpcf_100x48.png http://techfieldday.com/wp-content/uploads/2013/02/Plexxi-Logo-Final_PMS-432-1788-wpcf_100x36.jpg
http://techfieldday.com/wp-content/uploads/2012/08/solarwinds_RGB-300x84-wpcf_100x28.jpg http://techfieldday.com/wp-content/uploads/2012/08/spirentLogo-wpcf_100x40.gif
http://techfieldday.com/wp-content/uploads/2013/07/TE-Logo-Stacked-wpcf_84x60.png http://techfieldday.com/wp-content/uploads/2012/08/wp_logo-wpcf_100x27.png

As an engineer I find these sort of engagement opportunities to be of very high value. I like hearing what other bright and articulate individuals have to say about companies, products and markets and have those companies in the room participating interactively. I have learned a lot and had many interesting discussions from watching other Tech Field Day events that are available on the website. In addition, you can watch a live video stream of many of the presentations while they are happening. I encourage you to engage with all the delegates on Twitter, so feel free to bug me (@ehorley) while the Network Field Day 6 sponsors are presenting. I'm happy to ask questions or make comments on your behalf if one of the other delegates doesn't ask the question first! I believe we will be using the hashtag #NFD6 so please reach out and participate.

Also keep an eye out here on my blog as I will likely take some time to put down some thoughts about what I found interesting from the event. It might take me a bit of time since I am still writing my book (yes, I know, nothing but excuses!)
- Ed