> > > IPV6M Detailed outline

IPv6 for Managers (IPV6M)

Course Description Schedule Course Outline

Detailed Course Outline

IPv4 Review

  • This is needed to better understand the evolution from IPv4 to IPv6. This includes the IPv4 addresses and all the workaround, which have extended the life of IPv4 for 20 years.

IPv6 Header

  • The evolution of the Internet since IPv4.
  • IPv6 Header field by field.
  • IPv6 Header Extensions.

IPv6 Addresses

  • Introduction, representation, format, notation.
  • Unicast Addresses: Global Unicast, Unique Local Addresses,
  • Interface ID: EUI-64, Privacy Extension.
  • Multicast Addresses
  • Anycast Addresses.
  • Special addresses: loopback, unspecified, site-local deprecated and others
  • Addressing Hierarchy
  • Provider Aggregatable Versus Provider Independent
  • Multihoming: the issue and the solutions: Router based, Host based, NPT6
  • Autoconfiguration Stateful (dhcpv6) and Stateless


  • ICMPv6 Message format
  • Error Messages
  • Information Messages

Neighbor Discovery Protocol

  • MAC address resolution
  • Neighbor state machine
  • Neighbor Unreachability detection
  • Default Router Selection and FHRP if better performances needed
  • Autoconfiguration
  • Multicast Group Management

IPv6 Applications

  • DHCPv6
  • DNS Support for IPv6
  • IPv6 Routers and Network Management
  • Mobile IPv6, NEMO, MANET

Introduction to the supported Routing Protocols


Introduction to IPv6 Multicast

  • PIM-SM or ASM Versus PIM-SSM
  • MLD: Differences between MLDv1 and MLDv2
  • Strategies for RP: Static, Embedded RP, Anycast RP, PIM-BSR

Transition to IPv6

  • History of the Transition to IPv6 since the beginning of IPv6
  • Dual-Stack
  • Translation: NAT, NAT-PT, NAT64, NAT46, NAT444, NAT464
  • Tunnels: 6in4, 6to4, 6RD, GRE, DVMRP, DS-Lite, 6PE, 6VPE

QoS in IPv6 Networks

  • What is new with IPv6?
  • The Flow Label field

Introduction to Security in IPv6

  • What do we need to protect, deny or permit from the IPv6 Header?
  • Threats on Neighbor Discovery Protocol.
  • Secured Neighbor Discovery Protocol (SEND)
  • Introduction to IPSec
  • IPSec Authentication and Encryption
  • Use MD5 Authentication or IPSec to secure the Routing Protocols
  • Secure DNS: Introduction to DNSSEC
  • IPv6 Firewalls: Router based or Host Based ?

Accessing our website tells us you are happy to receive all our cookies. However you can change your cookie settings at any time. Find out more.   Got it!