skip to main content
10.5555/1986282.1986290guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Monitoring of tunneled IPv6 traffic using packet decapsulation and IPFIX

Published: 27 April 2011 Publication History

Abstract

IPv6 is being deployed but many Internet Service Providers have not implemented its support yet. Most of the end users have IPv6 ready computers but their network doesn't support native IPv6 connection so they are forced to use transition mechanisms to transport IPv6 packets through IPv4 network. We do not know, what kind of traffic is inside of these tunnels, which services are used and if the traffic does not bypass security policy. This paper proposes an approach, how to monitor IPv6 tunnels even on high-speed networks. The proposed approach allows to monitor traffic on 10Gbps links, because it supports hardwareaccelerated packet distribution on multi-core processors. A system based on the proposed approach is deployed at the CESNET2 network, which is the largest academic network in the Czech Republic. This paper also presents several statistics about tunneled traffic on the CESNET2 backbone links.

References

[1]
INVEA-TECH a.s., FlowMon exporter, cited {30.09.2010}, http://www.invea-tech.com/products-and-services/flowmon/flowmon-probes.
[2]
Narten, T., Draves, R., Krishnan, S.: RFC 4941, Privacy Extensions for Stateless Address Autoconfiguration in IPv6 (September 2007).
[3]
Shen, W., Chen, Y., Zhang, Q., et al.: Observations of IPv6 traffic. In: CCCM, vol. 2, pp. 278-282 (2009) ISBN 978-1-4244-4247-8.
[4]
Karpilovsky, E., Gerber, A., Pei, D., Rexford, J., Shaikh, A.: Quantifying the Extent of IPv6 Deployment. In: Moon, S.B., Teixeira, R., Uhlig, S. (eds.) PAM 2009. LNCS, vol. 5448, pp. 13-22. Springer, Heidelberg (2009).
[5]
Malone, D.: Observations of IPv6 addresses. In: Claypool, M., Uhlig, S. (eds.) PAM 2008. LNCS, vol. 4979, pp. 21-30. Springer, Heidelberg (2008).
[6]
Savola, P.: Observations of IPv6 Traffic on a 6to4 Relay. ACM SIGCOMM CCR 35(1), 23-28 (2005).
[7]
Huitema, C.: Teredo: Tunneling IPv6 over UDP through Network Address Translations (NATs). RFC 4380 (February 2006).
[8]
Carpenter, B., Moore, K.: Connection of IPv6 Domains via IPv4 Clouds. RFC 3056.
[9]
Templin, D.T.F., Gleeson, T.: Intra-Site Automatic Tunnel Addressing Protocol (ISATAP). RFC 5214 (March 2008).
[10]
Nordmark, E., Gilligan, R.: Basic Transition Mechanisms for IPv6 Hosts and Routers. RFC4213 (October 2005).
[11]
Thomson, S., Narten, T., Jinmei, T.: IPv6 Stateless Address Autoconfiguration. RFC4862 (September 2007).
[12]
Warfield, H.M.: Security Implication of IPv6, Internet Security Systems (2003).
[13]
Krejčí, R.: Network Traffic Collection with IPFIX Protocol, cited {2010-10-04}, http://is.muni.cz/th/98863/fi_m/xkrejc14_dp.pdf

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
TMA'11: Proceedings of the Third international conference on Traffic monitoring and analysis
April 2011
196 pages
ISBN:9783642203046
  • Editors:
  • Jordi Domingo-Pascual,
  • Yuval Shavitt,
  • Steve Uhlig

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 27 April 2011

Author Tags

  1. 6to4
  2. FlowMon
  3. IPFIX
  4. IPv6
  5. IPv6 tunnel
  6. ISATAP
  7. Teredo
  8. network monitoring

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 06 Jan 2025

Other Metrics

Citations

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media