Virtualisation of Critical Network Services – Best Practice Document

,

, IPv6, Networking

This document describes a way to virtualise the number of network servers that are required for the operation of a large campus network. These servers provide services, including DHCP, DNS, VPN, email, network monitoring, and radius. Most of these services are so important that the network must operate two or … Read More

Pavel KislingerVirtualisation of Critical Network Services – Best Practice Document

Behaviour of various operating systems during SLAAC, DAD, and ND

IPv6, Monitoring, Networking

This post contains the report from the study phase of the behaviour of various operating systems during SLAAC and DAD analysis for our paper called “A New Approach for Detection of Host Identity in IPv6 Networks”, which will be presented at DCNET 2013. This post also contains PCAP files that … Read More

Libor PolčákBehaviour of various operating systems during SLAAC, DAD, and ND

Optimizing network tracking tool for management of BUT campus network

Monitoring, Networking

This article describes optimization of the database structure in Zabbix monitoring tool using automatic partitioning. With this optimization we achieved a decrease of the processor utilization on the Zabbix server and a significant decrease in the growth of data on its hard drive. Last Updated: 27th of May, 2014. Introduction … Read More

Peter DrienkoOptimizing network tracking tool for management of BUT campus network

Security challenges in IPv6 from the campus perspective

IPv6, Networking @Oslo, NORDUnet 2012 Conference

Growing number of IPv6 devices in the network would bring new security challenges. Are there any security improvements comparing to IPv4 or IPv6 brings some new security threads. IPv6 have been developed for more than 15 years so far and presentation tries to find the answer if IPv6 provides better … Read More

Tomas PodermanskiSecurity challenges in IPv6 from the campus perspective

IPv6 RA flood DoS attack in Windows 8

IPv6, Networking, Security

RA flood attack is known for a few years. It appeared in many operating systems. Some vendors have already fixed the issue. Unfortunately Microsoft Windows product are still vulnerable including the latest version of Windows 8. Following video demonstrates the flood attack on on the latest version Windows 8 using thc-ipv6 toolkit.

Tomas PodermanskiIPv6 RA flood DoS attack in Windows 8

Deploying IPv6 – practical problems from the campus perspective

, ,

, , IPv6, Monitoring, Networking, Security @TNC 2012, Reykjavik, IS

On February 2011, IANA has run out of IPv4 addresses. On April 2011, APNIC pool reached the final /8 IPv4 address block. Projected address pool exhaustion for other RIRs varies from the beginning of the 2012 to the end of 2014. This situation pushes organizations to think about transition to IPv6. Unfortunately IPv4 and IPv6 are incompatible protocols that make the transition more difficult and raise new security issues. This paper shares experiences of deploying IPv6 in the university campus network, describes the most significant troubles that we have been faced with and describes the best practices in the practical IPv6 deployment. The article discusses differences in IPv6 and IPv4 networks with focus on the first hop security, autoconfiguration (SLAAC, DHCP, DHCPv6) and different client’s support.

Tomas PodermanskiDeploying IPv6 – practical problems from the campus perspective

Analysis of tunneled traffic

IPv6, Monitoring, Networking @Campus network monitoring workshop

Traditional firewall techniques usually permit traffic according to IP addresses or port numbers. More advanced firewalls inspect even packet’s payload – e.g. http traffic. However, neither of these techniques is sufficient when dealing with IPv6 transition techniques. An attacker can easily avoid a security policy in a network by using … Read More

Matej GregrAnalysis of tunneled traffic

Flow Based Monitoring of IPv6

, ,

, , IPv6, Monitoring, Networking @Campus network monitoring workshop

Protocol IPv6 puts new challenges for network administrators in the context of user identification. Unlike IPv4, an IPv6 address no longer uniquely identifies a user or PC. IPv6 address can be randomly generated and keeps changing in time. The presentation describes the system developed at the Brno University of Technology, … Read More

Tomas PodermanskiFlow Based Monitoring of IPv6

User Identification in IPv6 Network

, ,

, , IPv6, Monitoring, Networking @IP Networking 1 -- Theory and Practice

Users in IPv4 networks typically use only one IP address per interface configured either statically or dynamically via DHCPv4 server. Several techniques can be used to detect violation of that policy. However, IPv6 protocol brings new techniques and possibilities to obtain an IPv6 address. New concepts – autoconfiguration, multiple IPv6 addresses per interface or temporary IPv6 addresses providing privacy for end users introduce new challenges for users identification. Network administrators have to collect additional information for user identification from more sources, e.g. DHCPv6 log, routers neighbor cache, Radius logs, syslog etc. This paper presents analysis of IPv6 address assignment used in current networks together with guidelines how to identify a user in IPv6 networks.

Tomas PodermanskiUser Identification in IPv6 Network

Deploying IPv6 in University Campus Network – Practical Problems

,

, IPv6, Monitoring, Networking, Security @JRES 2011 "Journées Réseaux" - Toulouse, FR

IPv4 addresses are still running out. Global IPv4 address pool administered by IANA organization is depleted together with IPv4 pool of APNIC Routing Registry. This situation pushes organizations to think about IPv6 transition. Unfortunately IPv4 and IPv6 are incompatible protocols which raise new security issues and problems with user monitoring and accounting. The article shares experiences of deploying IPv6 on the university campus network and describes the most significant troubles that we have been faced with. It describes and compares differences in first hop security in IPv6 and IPv4 networks. Issues connected with user addressing, accounting and monitoring are also discussed. The experience is mainly based on the deployment of IPv6 on the campus network at Brno University of Technology which is one of the biggest universities in the Czech Republic.

Tomas PodermanskiDeploying IPv6 in University Campus Network – Practical Problems