|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
07.30 |
WELCOME, REGISTRATION AND COFFEE |
|
|
|
|
|
Chairman
Latif Ladid, IPv6 Forum |
|
|
|
|
|
|
|
|
|
|
|
|
Opening Session |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
08.30 |
|
|
Market Viability of IPv6 - Revisited
John Curran,
President and CEO,
ARIN |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
08.50 |
|
|
A Holistic IT approach to IPv6
Yanick Pouffary,
Global IPv6 Development,
HP |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
09.10 |
|
|
The Case for IPv6: IPv4 Address Depletion Shouldn't Be the Only Argument
Mohsen Souissi,
Board Member, G6
AFNIC |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
09.30 |
|
|
Upside Down: IPv4 as a Legacy Service
Alain Durand
IETF Softwires Co-chair
Juniper Networks |
|
|
|
|
|
|
|
|
|
|
|
09.50 |
|
|
Keynote Address
Mark Townsley, Cisco Fellow |
|
|
|
10.20 |
COFFEE BREAK |
|
|
|
SESSION I
International Test Events |
|
|
|
|
|
|
|
|
|
|
10.50 |
|
|
From World IPv6 Day to World IPv6 Deployment - What's Next?
Describing the results of World IPv6 Day, it's longer term impacts, and what are the next steps needed in the Internet community to move forward with IPv6 deployment
Phil Roberts, Isoc |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11.20 |
|
|
The BoundV6 Initiative
Discussing the Boundv6 network which aims to create a permanent multi-vendor network environment connecting initially IPv6 Ready Logo approved labs and USG approved labs where the community can test IPv6 enabled applications and devices in meaningful test scenarios.
Timothy Winters, Executive Manager, UNH-IOL |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11.50 |
|
|
Getting IPv6 Address Space: the Easy Part of your Deployment
Presenting the current state of IPv4 depletion worldwide and the different Regional Internet Registries policies on getting IPv6 address space.
Nathalie Trenaman, RIPE NCC Trainer |
|
|
|
12.10 |
LUNCH |
|
|
14.00 |
PANEL USE CASES
Are Enterprises Ready for the Transformation? |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Chairperson
Yanick Pouffary,
Global IPv6 Development,
HP |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Participants
Microsoft
Todd Thorson
Google
Irena Nikolova
Airbus Industries
Christophe Regouby
DREN
Ron Broersma, Chief Engineer of the Defense Research and Engineering Network
Heise Online
Johannes Endres, Editor in Chief, Heise Netze
CERN
Edoardo Martelli, Responsible for IPv6 Deployment
Belgian Federal Governement
Bart Hanssens
KULeuven University
Wim Vandersmissen
Continental Automotive GmbH
Mark Richter, Head of Infrastructure Network & Voice |
|
|
|
|
|
|
|
|
|
15.00 |
COFFEE BREAK |
|
|
|
SESSION II
Security & Management |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
15.30 |
|
|
Deploying IPv6 Securely
IPv6 deployment has begun, largely driven by IPv4 address exhaustion. Even though IPv6 is very similar architecturally with IPv4, it has it's own security issues. The talk will review IPv6's security issues and make recommendations on how to deploy IPv6 securely.
Bob Hinden, Check Point Software Fellow |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
15.50 |
The Layer-2 Insecurities of IPv6 and the Mitigation Techniques |
|
|
|
|
|
|
|
|
|
Neighbor Discovery Protocol was specified without security in mind and before the IPv4 ARP/DHCP spoofing attacks existed, hence, NDP suffers from the same default of ARP. The most well-known attack against NDP is the rogue-RA (quite often caused by misconfiguration). Detailing the different attacks, the work done at the IETF at the SAVI working group and the implementation on existing switches.
Eric Vyncke, Cisco |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
16.10 |
Designing Security During IPv6 Deployment
As the IPv6 network grows, possible attacks based on IPv6 are a concern among service providers. Operators are deploying different migration technologies in which the security aspect should be considered. What are the guidelines for designing security features during IPv6 deployment? Perils of introducing NAT on network architecture, a look at alternative approaches. Review the approaches for multicast support during IPv4-IPv6 transition.
Suman Choudhary, Chief Engineer of Network Product Line, Huawei |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
16.30 |
Development of a Snort IPv6 Plugin for the Detection of Attacks on the Neighbor Discovery Protocol |
|
|
|
|
|
|
|
|
|
|
|
Describing the implementation and use of a preprocessor module for the popular Open Source Intrusion Detection System Snort that detects attacks against the IPv6 Neighbor Discovery Protocol.
The developed module is aimed at the detection of suspicious activity in local IPv6 networks and can detect misconfigured network elements, as well as malicious activities from attackers on the network.
Thomas Scheffler, Beuth Hochschule |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
16.50 |
The Role of Network Automation in IPv6 Migration Projects
The move from IPv4 to IPv6 will need a new way of managing the IP address space and related core network services like DNS and DHCP. Discussing this evolution and explaining the role of Network Automation in IPv6 migration projects, including IP Address Management and Network Change Management.
Anton Holleman, Senior Consulting SE , Infoblox |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
17.10 |
|
|
NAT or NOT?
IPv6 offers us the chance to ask this question. Considering the facts and myths about NAT in search for answers.
Andrew Yourtchenko,
Technical Leader,
Cisco |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
17.30 |
ROUND TABLE
Challenges that Enterprises Face when Introducing IPv6 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Chairman
Eric Vyncke, Cisco
Participants
Ron Broersma, Chief Engineer of the Defense Research and Engineering Network, DREN
Todd Thorson, Microsoft
Irena Nikolova, Google
Jacques Babot, IPv6 Team Leader, European Commission - DG INFSO
Jeff Carrell, Network Conversions
Silvia Hagen, President, Swiss IPv6 Council, CEO, Sunny Connection AG
Yanick Pouffary, Global IPv6 Development, HP
Eddie Arrage, Ixia |
|
|
|
|
|
|
|
|
|
|
19.00 |
END OF CONFERENCE DAY ONE |
|
|
|
|
|
|
|
|
|
|
|