|
|
|
|
|
|
|
|
|
|
|
 |
|
 |
|
|
|
|
|
|
07.30 |
WELCOME, REGISTRATION AND COFFEE |
|
|
|
 |
|
Chairman
Latif Ladid, IPv6 Forum |
|
|
|
|
|
|
|
|
|
|
|
|
Opening Session |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
08.30 |
 |
|
Market Viability of IPv6 - Revisited
John Curran,
President and CEO,
ARIN |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
09.00 |
 |
|
A Holistic IT approach to IPv6
Yanick Pouffary,
Global IPv6 Development,
HP |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
09.30 |
 |
|
The Case for IPv6: IPv4 Address Depletion Shouldn't Be the Only Argument
Mohsen Souissi,
Board Member, G6
AFNIC |
|
|
|
|
|
|
|
|
|
|
|
10.00 |
 |
|
Keynote Address
Mark Townsley, Cisco Fellow |
|
|
|
10.30 |
COFFEE BREAK |
|
|
|
SESSION I
International Test Events |
|
|
|
|
|
|
|
|
|
|
11.00 |
 |
|
From World IPv6 Day to World IPv6 Deployment - What's Next?
Describing the results of World IPv6 Day, it's longer term impacts, and what are the next steps needed in the Internet community to move forward with IPv6 deployment.
Phil Roberts, Isoc |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11.30 |
 |
|
The BoundV6 Initiative
Discussing the Boundv6 network which aim is to create a permanent multi-vendor network environment connecting initially IPv6 Ready Logo approved labs and USG approved labs where the community can test IPv6 enabled applications and devices in meaningful test scenarios.
Timothy Winters, Executive Manager, UNH-IOL |
|
|
|
|
|
|
|
|
|
12.00 |
LUNCH |
|
|
14.00 |
PANEL USE CASES
Are Enterprises Ready for the Transformation? |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
 |
|
Chairperson
Yanick Pouffary,
Global IPv6 Development,
HP |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Participants
Microsoft
Todd Thorson
Google
Gonzalo Palacios
Generali Deutschland
Ludwig Paßen
DREN
Ron Broersma, Chief Engineer of the Defense Research and Engineering Network
Heise Online
Johannes Endres, Editor in Chief, Heise Netze
CERN
Edoardo Martelli, Responsible for IPv6 Deployment
Belgian Federal Governement
Bart Hanssens
KULeuven University
Wim Vandersmissen
Aeronautic industry representant (TBD)
Automotive industry representant (TBD) |
|
|
|
|
|
|
|
|
|
15.00 |
COFFEE BREAK |
|
|
|
SESSION II
Security & Management |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
15.30 |
 |
|
Deploying IPv6 Securely
IPv6 deployment has begun, largely driven by IPv4 address exhaustion. Even though IPv6 is very similar architecturally with IPv4, it has it's own security issues. The talk will review IPv6's security issues and make recommendations on how to deploy IPv6 securely.
Bob Hinden, Check Point Software Fellow |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
15.50 |
The Layer-2 Insecurities of IPv6 and the Mitigation Techniques |
|
|
|
|
|
|
|
 |
|
Neighbor Discovery Protocol was specified without security in mind and before the IPv4 ARP/DHCP spoofing attacks existed, hence, NDP suffers from the same default of ARP. The most well-known attack against NDP is the rogue-RA (quite often caused by misconfiguration). Detailing the different attacks, the work done at the IETF at the SAVI working group and the implementation on existing switches.
Eric Vyncke, Cisco |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
16.10 |
Designing Security During IPv6 Deployment
As the IPv6 network grows, possible attacks based on IPv6 are a concern among service providers. Operators are deploying different migration technologies in which the security aspect should be considered. What are the guidelines for designing security features during IPv6 deployment? Perils of introducing NAT on network architecture, a look at alternative approaches. Review the approaches for multicast support during IPv4-IPv6 transition.
Suman Choudhary, Chief Engineer of Network Product Line, Huawei |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
16.30 |
Development of a Short IPv6 Plugin for the Detection of Attacks on the Neigbhor Discovery Protocol |
|
|
|
|
|
|
|
|
|
 |
|
Describing the implementation and use of a preprocessor module for the popular Open Source Intrusion Detection System Snort that detects attacks against the IPv6 Neighbor Discovery Protocol.
The developed module is aimed at the detection of suspicious activity in local IPv6 networks and can detect misconfigured network elements, as well as malicious activities from attackers on the network.
Thomas Scheffler, University of Applied Sciences Berlin |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
16.50 |
The Role of Network Automation in IPv6 Migration Projects
The move from IPv4 to IPv6 will need a new way of managing the IP address space and related core network services like DNS and DHCP. Discussing this evolution and explaining the role of Network Automation in IPv6 migration projects, including IP Address Management and Network Change Management.
Jan Ursi, Technical Director, Infoblox |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
17.10 |
NAT or NOT?
IPv6 offers us the chance to ask this question. Considering the facts and myths about NAT in search for answers.
Andrew Yourtchenko, Technical Leader, Cisco |
|
|
|
|
|
|
|
|
|
|
|
17.30 |
ROUND TABLE
Challenges that Enterprises Face when Introducing IPv6 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Chairman
Eric Vyncke, Cisco
Participants
Ron Broersma, Chief Engineer of the Defense Research and Engineering Network, DREN
Todd Thorson, Microsoft
Gonzalo Palacios, Google
Jacques Babot, IPv6 Team Leader, European Commission - DG INFSO
Jeff Carrell, Network Conversions
Silvia Hagen, President, Swiss IPv6 Council, CEO, Sunny Connection AG
Tara Van Unen, Director of Market Development, Ixia |
|
|
|
|
|
|
|
|
|
|
19.00 |
END OF CONFERENCE DAY ONE |
|
|
|
|
|
|
|
|
|
|
|