Previous Page
Next Page

Retrieving Information from Routers and Switches

You can retrieve information from IPv6 devices in many ways, and they are the same as for IPv4:

  • SNMP and MIBs

  • NetFlow or IPfix

  • Connection to the device and execution of locally available commands

  • Specific applications can provide additional information: ping, traceroute, and so on.

SNMP and MIBs

The Simple Network Management Protocol (SNMP) is a request-reply-based protocol running over UDP (ports 161 and 162), although TCP operation is also possible. SNMP is used by the NMS to access or modify data in the managed devices via objects called Management Information Bases (MIBs). A MIB is a hierarchy of information that describes an SNMP-manageable object. Each object is associated with a unique object identifier descriptor (OID). The MIB is organized as a tree; the leafs are the object instances representing a resource (interface address, interface name, event, and so on). MIBs are either standard (described in RFCs) or enterprise specific. Given the relatively slow progress of IPv6 MIB definitions, a large number of enterprise-specific MIBs have been published, including several Cisco ones.

SNMP is an asymmetric protocol, operating between a management station and an agent, the device being managed. Typically, the agent is a router or a switch that implements a few simple packet types and a generic get-or-set function on its MIB variables. The management station provides the user interface. Simple management stations can be built with UNIX command-line utilities. More complex (and expensive) ones collect MIB data over time and use graphical user interfaces (GUIs) to draw network maps.

An SNMP operation takes the form of a protocol data unit (PDU). Version 1 SNMP supports five possible PDUs:

  • GetRequest/SetRequest supplies a list of objects and, possibly, values they are to be set to.

  • GetResponse informs the management station of the results of a GetRequest or SetRequest.

  • GetNextRequest is used to perform table transversal.

  • Trap is the only PDU sent by an agent on its own initiative. It is used to notify the management station of an unusual event.

SNMP version 2 (SNMPv2) is an evolution of the SNMPv1. SNMPv2 introduces two new operations: GetBulk and Inform. The GetBulk operation is used to retrieve large blocks of data. The Inform operation allows two SNMP entities to exchange acknowledged information. SNMP version 3 (SNMPv3) adds security and remote-configuration capabilities.

There are two distinct aspects for supporting IPv6 SNMP: the transport of SNMP protocol over IPv6 and the IPv6 MIBs support.

SNMP over IPv6

Because SNMP runs over UDP, an SNMP over IPv6 implementation is mostly about UDP over IPv6 support (and in the router case, some configuration tweaks).

Cisco routers now support SNMP over IPv6. For SNMP GetRequest and SetRequest, which are initiated by the NMS, the router simply responds with the same transport protocol (UDP over IPv6, for instance) used by the incoming request. When sending an SNMP trap, the router needs to be configured with an IPv6 destination, as illustrated in the Example 10-1.

Example 10-1. SNMP Configuration Example

snmp-server community public RO
snmp-server enable traps syslog
snmp-server enable traps mpls ldp
snmp-server enable traps mpls traffic-eng
snmp-server enable traps mpls vpn
snmp-server host 2001:400::1 version 2c public

On the NMS side, most SNMP application programming interfaces (APIs) support SNMP over IPv6:

  • Sun's Java J2SDK/JRE 1.4

  • FreeBSD

  • Linux

  • Windows

Note

Running SNMP over IPv6 is required only for IPv6-only devices. In the most common case, IPv6-managed devices are dual stack, and need to report management data for both IPv4 and IPv6. Historically, these devices have been configured for IPv4 first and have IPv4 connectivity to the NMS: Enabling of IPv6 can and should be done without disturbing the existing NMS/device transport and configuration. Because the transport (UDP) and the content (MIBs) are independent of each other, you can keep the IPv4 transport to carry SNMP IPv6 data.


IPv6 MIBs

More than 100 MIBs are available to check for IPv6 support, and they can be classified as follows:

  • MIBs that do not have any address dependencies

  • MIBs where ipAddress should just be replaced by inetAddress

  • MIBs that require major redesign to handle both IPv4 and IPv6 protocols

  • MIBs that require a specific IPv6 version

RFC 3796 provides a survey of IPv4 address usage in existing IETF documents, including many MIBs.

Current IETF work is putting emphasis on MIB-2 MIBs (basic MIBs such as IP, UDP, TCP, ICMP) to support IPv6. Unfortunately, that work has been going on for quite a long time, because the initial approach of creating separate MIBs for IPv6 (with an ipv6Address) has evolved toward creating unified MIBs that cover both IPv4 and IPv6. Figure 10-2 illustrates that evolution.

Figure 10-2. IPv6 Basic MIB History


Two sets of basic MIBs are defined for supporting IPv6-related information. One set is based on RFC 2465 for textual convention of the IPv6 address (OCTET STRING [SIZE (16)]). The basic IPv6 MIBs supporting that textual convention are as follows:

  • IPV6-TC (RFC 2465)

  • IPV6-TCP-MIB (RFC 2452)

  • IPV6-UDP-MIB (RFC 2554)

  • IPV6-MIB (RFC 2465)

  • IPV6-ICMP-MIB (RFC 2466)

The second set is based on RFC 3291 for textual convention of both IPv4 and IPv6, through an inetAddress structure, which includes a type (1 for IPv4, 2 for IPv6) and an address. These MIBs are sometimes referred to as unified MIBs.

The basic IPv6 MIBs supporting that textual convention are as follows:

  • INET-ADDRESS-MIB (RFC 3291) (defines basic generic types for Internet address (IPv4, IPv6, DNS)

  • IP-MIB (draft-ietf-ipv6-rfc2011-update)

  • TCP-MIB (RFC 4022)

  • UDP-MIB (RFC 4113)

  • IP-FORWARD-MIB (draft-ietf-ipv6-rfc2096-update)

At the time of this writing, both the IP-MIB and the IP-FORWARD-MIB are in the IETF Editor Queue, as Proposed Standards, which means close to completion.

Although some network equipment (Hitachi, NEC, Juniper) and NMS (HP-OV) vendors currently support IPv6-specific MIBs (based on RFC 2465), others, including Cisco routers, support some version of the unified MIBs (based on RFC 3291). Because the latter are not yet published RFCs, the support remains private, and based on various version of the Internet Draft. Cisco, for example, implemented the draft version for "IP Forwarding Table MIB" and "IP MIB" as a private MIB (update-00). However, because the unified MIBs are becoming standard, Cisco actively works on their support, and it is expected that the NMSs (HP-OV and so on) will integrate them.

BGP and Other MIBs

The BGP IPv6 MIBs are lagging behind the needs of today's networks. The BGP multiprotocol extensions (MP-BGP) enable BGP to exchange routing information for different types of address families (for instance, IPv6), identified by an Address Family Identifier (AFI) and Subsequent Address Family Identifier (SAFI). RFC 1657 describes BGP4 MIBs, without the multiprotocol bits required to report information about IPv6 and VPNv6 (as well as VPNv4 and multicast). An update of RFC 1657 is currently in the IETF RFC queue (draft-ietf-idr-bgp4-mib), but it also fails to provide MP-BGP information (still uses ipAddress).

On the other end, an MP-BGP MIB (draft-ietf-idr-bgp4-mibv2) is revising RFC 1657 with much larger ambitions. For several significant capabilities, such as BGP communities (RFC 1997), autonomous system confederation (RFC 3065), BGP multiprotocol extensions (RFC 2858), and route reflection (RFC 2796), the document proposes object types to manage those extended capabilities and their operation. As far as BGP IPv6 (AFI:IPv6, SAFI:Unicast), 6PE (AFI:IPv6, SAFI:label), and VPNv6 (AFI:IPv6, SAFI:VPN), the support of BGP multiprotocol extensions, which relies on inetAddress will be an important first step toward managing these features.

In addition, draft-ietf-idr-bgp4-mibv2 allows transport-independent address indices consistent with the AFI and SAFI mechanisms of that extension. Some router vendors implement this MIB as a private MIB. Cisco implements another BGP MIB (CISCO-BGP4-MIB), which also handles multiprotocol BGP, with a different format. The following excerpt shows the SAFI support in this MIB:

CbgpSafi ::= INTEGER {
        unicast(1),
        multicast(2),
        unicastAndMulticast(3),
        vpn(128)
        }

In theory, nothing prevents the MIB (and the corresponding address, defined as OCTET STRING(SIZE[0..255]), from supporting IPv6 and VPNv6 addresses. In practice, at the time of this writing, the Cisco SNMP agent does not expose the IPv6, 6PE, and VPNv6 BGP information.

Some other MIBs, such as IP Tunnel MIB, are not yet at a point where they are ready for publication.

Many MIBs require further study, although they would be useful for managing IPv6 networks:

  • OSPFv3 MIB

  • Tunnel MIBs (including BGP tunnels such as 6PE and 6VPE)

  • The VPN MIB

  • Cisco Express Forwarding MIBs

IPv6 MIB Example

Using one of the numerous MIB browsers available, you can obtain MIB-2 content from a Cisco router. In the following example, the CISCO-IETF-IP-FORWARD-MIB is loaded into the MIB browser. Example 10-2 shows an excerpt of the MIB for the route entry:

Example 10-2. CISCO-IETF-IP-FORWARD-MIB Route-Entry Example

CInetCidrRouteEntry ::= SEQUENCE {
        cInetCidrRouteInstance     Unsigned32,
        cInetCidrRouteDestType     InetAddressType,
        cInetCidrRouteDest         InetAddress,
        cInetCidrRoutePfxLen       InetAddressPrefixLength,
        cInetCidrRouteNextHopType  InetAddressType,
        cInetCidrRouteNextHop      InetAddress,
        cInetCidrRouteIfIndex      InterfaceIndex,
        cInetCidrRouteType         INTEGER,
        cInetCidrRouteProto        IANAipRouteProtocol,
        cInetCidrRouteAge          Integer32,
        cInetCidrRouteNextHopAS    InetAutonomousSystemNumber,
        cInetCidrRouteMetric1      Integer32,
        cInetCidrRouteMetric2      Integer32,
        cInetCidrRouteMetric3      Integer32,
        cInetCidrRouteMetric4      Integer32,
        cInetCidrRouteMetric5      Integer32,
        cInetCidrRouteStatus       RowStatus
    }

Using the MIB browser, you can execute a (series of) GET-NEXT and display the resulting tree, as shown in Figure 10-3.

Figure 10-3. MIB Example Using a MIB Browser


For a better understanding of the MIB browsing result, it is possible to execute the show ipv6 cef command on the router. The resulting output, shown in Figure 10-3, contains details about the router forwarding table that relate directly to the MIB-2 content.

For example, CAFE:10::/64 appears in the MIB with the ASN.1 notation as follows:

  • Prefix202.254.0.16.0.0.0.0.0.0.0.0.0.0.0.0

  • Length64

  • If index13 (Loopback0)

Note

The unified MIB-2 MIBs are defined for both IPv4 and IPv6. In theory, the devices should respond to SNMP queries with values for both protocols. However, current Cisco implementations retrieve only IPv6 (type 2) addresses for the MIB-2, although the IPv4-only MIBs must be used to retrieve IPv4 data.


NetFlow

Cisco IOS NetFlow provides network administrators with access to information concerning IP flows within their data networks. NetFlow includes three key components that perform the following functions:

  • Flow caching collects IP data flows entering router or switch interfaces and prepares data for export. It enables the accumulation of data on flows with unique characteristics, such as IP addresses, application, and class of service (CoS). When enabled for IPv6 traffic, flow caching can record IPv6 flows, and aggregate them according to the configured aggregation policy. The flows captured on the routers are then exported to a flow collector.

  • Flow collector and data analysis captures exported data from multiple routers, filters and aggregates the data according to customer policies, and then stores this summarized or aggregated data.

  • Flow analyzer displays and analyzes NetFlow data collected from flow collector files. This allows users to complete near real-time visualization or trending analysis of recorded and aggregated flow data.

Figure 10-4 highlights these three components in the network.

Figure 10-4. NetFlow Architecture


Typical flow information found in a NetFlow data record includes the following:

  • Source and destination IPv6 address

  • Source and destination TCP/UDP ports

  • Type of service (ToS)

  • Packet and byte counts

  • Start and end time stamps

  • Input and output interface numbers

  • TCP flags and encapsulated protocol (TCP/UDP)

  • Routing information (next-hop address, source autonomous system number, destination autonomous system number, source prefix mask, destination prefix mask)

The basic output of NetFlow is a flow record. Several different formats for flow records have evolved as NetFlow has matured. The most recent evolution of the NetFlow flow-record format is known as version 9. IPv6 flows can only be reported under that version. The distinguishing feature of the NetFlow v9 format is that it is template based. Table 10-1 lists the IPv6-specific NetFlow fields that can be collected and exported.

Table 10-1. IPv6 NetFlow Fields

Field Type

Value

Length (Bytes)

Description

IPV6_SRC_ADDR

27

16

IPv6 source address

IPV6_DST_ADDR

28

16

IPv6 destination address

IPV6_SRC_MASK

29

1

Length of the IPv6 source mask in contiguous bits

IPV6_DST_MASK

30

1

Length of the IPv6 destination mask in contiguous bits

IPV6_FLOW_LABEL

31

3

IPv6 flow label as per RFC 2460 definition

IP_PROTOCOL_VERSION

60

1

Internet Protocol version set to 4 for IPv4, set to 6 for IPv6 (If not present in the template, version 4 is assumed.)

DIRECTION

61

1

Flow direction: 0ingress flow; 1egress flow

IPV6_NEXT_HOP

62

16

IPv6 address of the next-hop router

BPG_IPV6_NEXT_HOP

63

16

Next-hop router in the BGP domain

IPV6_OPTION_HEADERS

64

4

Bit-encoded field identifying IPv6 option headers found in the flow


The IPv6 option headers are reported into a 32-bit field, as shown in Table 10-2, only when the router is configured to do so. This is because this recording can impact the router performances; to obtain the option headers in the IPv6 packet, the router's forwarding component has to scan the complete chain of headers, although only the first one is usually looked at in a transit node. This scanning might lead certain hardware routers to punt the IPv6 packets to a software path, with some performance consequences.

Table 10-2. NetFlow Encoding of IPv6 Option Header

Bit

Option

Option Header Value

1

Fragmentation header (not first fragment)

44

2

Routing header

43

3

Fragmentation header (first fragment)

44

4

Cannot reach layer 4

No readable value

6

Hop-by-hop option header

0

7

Destination option header

60

8

Payload compression header

108

9

Authentication header

51

10

Encrypted Security Payload

50


Table 10-2 shows how the field IPV6_OPTION_HEADERS is encoded.

Example 10-3 shows how to configure option header reporting on the Cisco router.

Example 10-3. NetFlow Option Header Reporting Configuration

interface Ethernet3/0
 no ip address
 ipv6 address 2001:100::/64 eui-64
 ipv6 flow ingress
 ipv6 flow mask options-headers 0x24

In this example, the option headers for routing header and hop-by-hop header are recorded.

There are many ways to operate NetFlow on the routers:

  • You could capture raw flows and store them in the IPv6 NetFlow cache before exporting them to the collector. The following configuration example shows how to configure the raw IPv6 NetFlow cache on a Cisco router and export v9 records.

    Example 10-4. NetFlow Configuration for Raw Flow Capture

    interface Ethernet3/0
     ip address 100.1.1.2 255.255.255.0
     ipv6 address 2001:100::2/64
     ipv6 flow ingress
     ipv6 flow egress 
    !
    ip flow-export version 9
    ipv6 flow-export source FastEthernet0/0
    ipv6 flow-export destination 172.18.102.245 10000

    With a configured frequency, the NetFlow routers export the raw data to the NetFlow Collector (in this example, 172.18.102.245). The collector can then aggregate the flows and produce statistics and alerts. Several IPv6 NetFlow Collectors, including Cisco NFC, are reviewed in the section "Flow Analysis Using NetFlow."

  • Flows can be aggregated on the NetFlow routers before they are exported to the collector. A specific aggregation cache is then created on the router and mapped onto the chosen aggregation scheme. Example 10-5 illustrates how this can be done.

    Example 10-5. NetFlow Configuration with Flow Aggregation

    ipv6 flow-aggregation cache bgp_nexthop
      cache entries 100000
      export version 9
      enabled
    ipv6 flow-export source FastEthernet0/0
    ipv6 flow-export destination 172.18.102.245 10000

    On the router, a distinct aggregation cache is created for each IPv6 aggregation scheme (autonomous system, BGP next hop, protocol port, source prefix, destination prefix, prefix). Table 10-3 lists fields set for each of the IPv6 aggregation caches.

    Table 10-3. NetFlow Aggregation Schemes

    Field/Aggregation Scheme

    Autonomous System

    BGP Next Hop

    Protocol Port

    Source Prefix

    Destination Prefix

    Prefix

    Protocol Version

    [*]

    [*]

    [*]

    [*]

    [*]

    [*]

    Direction

    [*]

    [*]

    [*]

    [*]

    [*]

    [*]

    Source Prefix

       

    [*]

     

    [*]

    Destination Prefix

        

    [*]

    [*]

    Protocol

      

    [*]

       

    Source Port

      

    [*]

       

    Destination Port

      

    [*]

       

    Source Interface

    [*]

    [*]

     

    [*]

     

    [*]

    Destination Interface

    [*]

    [*]

      

    [*]

    [*]

    Source BGP Autonomous System

    [*]

    [*]

     

    [*]

     

    [*]

    Destination BGP Autonomous System

    [*]

    [*]

      

    [*]

    [*]

    Source Prefix Mask

       

    [*]

     

    [*]

    Destination Prefix Mask

        

    [*]

    [*]

    BGP Next Hop

     

    [*]

        

    Next Hop

        

    [X]

    [X]

    OR'd TCP Flags

      

    [X]

       


    [*] : fields recorded and part of the aggregated record key

    [X] : fields recorded but not part of the key

  • A third option, useful in testing phases but not recommended in real-life deployments, is to obtain router statistics and counters via the router command-line interface (CLI). Example 10-6 shows the detailed output of the show NetFlow command.

    Example 10-6. NetFlow Cache Display

    Router#show ipv6 flow cache
    IP packet size distribution (10761 total packets):
       1-32   64   96  128  160  192  224  256  288  320  352  384  416  448  480
       .000 .280 .307 .377 .034 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000
        512  544  576 1024 1536 2048 2560 3072 3584 4096 4608
       .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000
    IP Flow Switching Cache, 475168 bytes
      25 active, 4071 inactive, 3324 added
      53962 ager polls, 0 flow alloc failures
      Active flows timeout in 30 minutes
      Inactive flows timeout in 15 seconds
    IP Sub Flow Cache, 33928 bytes
      0 active, 1024 inactive, 0 added, 0 added to flow
      0 alloc failures, 0 force free
      1 chunk, 1 chunk added
    SrcAddress     InpIf DstAddress     OutIf Prot SrcPrt DstPrt Packets
    2001:400::2    Local 2001:400::1    Et3/0 0x3A 0x0000 0x8100 5
    2001:300::2    Local 2001:300::1    Et3/0 0x3A 0x0000 0x8100 5
    2001:200::2    Local 2001:200::1    Et3/0 0x3A 0x0000 0x8100 5
    2001:300::1    Et3/0 FF02::1:FF00:2 Local 0x3A 0x0000 0x8700 2
    2001:400::1    Et3/0 FF02::1:FF00:2 Local 0x3A 0x0000 0x8700 2
    2001:400::1    Et3/0 2001:400::2    Local 0x06 0x2B00 0x0017 88
    2001:400::2    Local 2001:400::1    Et3/0 0x06 0x0017 0x2B00 38
    2001:300::2    Local 2001:300::1    Et3/0 0x06 0x0017 0x2B01 29
    2001:300::1    Et3/0 2001:300::2    Local 0x06 0x2B01 0x0017 70
    2001:500::72A  Et7/0 2001:800::25C  Eth8/00x06 0x2B01 0x0017 123

Out of the three methods reviewed, the first one (export raw data) should be preferred, as long as the interface for exporting the data can handle the overhead of massive flow export. If it cannot, aggregating flows on the router before exporting them will reduce this overhead while using router resources. Accessing NetFlow counters via a router's CLI should be reserved to testing and troubleshooting situations.

Note

With the current version of Cisco NetFlow, the v9 records containing the raw or aggregated IPv6 fields are currently sent over IPv4 UDP.


Note

Unlike IPv4, the IPv6 main cache (with no aggregation configured on the router) can aggregate addresses based on a configured mask length. This capability was required with IPv6 because of the larger address space. Flows that differ only by a source or destination within the same prefix range (bounded by the configured mask length) are aggregated at capture time. The following example shows how this can be configured.

Example 10-7. NetFlow Mask-Length Configuration

Router#show running
interface Ethernet3/0
 no ip address
 ipv6 address 2001:100::/64 eui-64
 ipv6 flow ingress
  ipv6 flow mask destination maximum 64
  ipv6 flow mask source maximum 64 
end

For performance reasons, it is recommended to turn this option on, unless there is a good reason for recording full prefixes.

Note that flows with unrecorded option headers are also aggregated at capture time.


IPfix

The IPfix protocol defines how IP flow information can be exported from routers, measurement probes, and other devices. It is intended to provide this information as input for various applications. IPfix is a general data-transport protocol, easily extensible to suit the needs of different applications.

IPfix is currently being defined at the IETF in the Internet Draft draft-ietf-ipfix-protocol. It has all provisions to support IPv6 addresses and all flexibility to fit future IPv6 needs. When available, it will possibly replace NetFlow as the next-generation flow-analysis tool. However, at the time of this writing, no production implementation of IPfix was yet available, and the Internet Draft has not yet established standards.

Service-usage accounting is one of the major applications for which the IPfix protocol has been developed. IPfix data provides fine-grained measurements (for example, flow records include details such as IP addresses, packet and byte counts, time stamps, type of service [ToS], and application ports) for highly flexible and detailed resource-usage accounting.

Internet service providers (ISPs) can use this information to migrate from single-fee, flat-rate billing to more flexible charging mechanisms based on time of day, bandwidth usage, application usage, quality of service (QoS), and so forth. Enterprise customers can use this information for departmental chargeback or cost allocation for resource usage.

For accounting purposes, it would be advantageous to have the ability to use IPfix flow records as accounting input in an authentication, authorization, and accounting (AAA) infrastructure. AAA servers could provide the mapping between user and flow information.

The IPfix protocol specification has been designed to be transport protocol independent (TCP, UDP, SCTP). However, only SCTP (Stream Control Transmission Protocol) transport is mandated by the specification, because it is the only reliable transport protocol that includes congestion-avoidance mechanisms. There should be no problem in reporting IPv6 data with IPfix, provided only that the transport protocol being used to carry IPfix is running on the IPv6 network.

Other Protocols (Telnet/SSH/RSH/TFTP/FTP)

There exists a collection of well-known protocols that can be used to extract management information from routers. They do not define the format of what is being uploaded (or downloaded), but they provide access to devices where specific commands can be executed. Similar to the other retrieval tools, even when they connect to the router over IPv4, they have the ability to retrieve IPv6 information.

Here is a list of the most common such protocols, with a status of their IPv6 support on Cisco routers.

  • Telnet Telnet can be used to log in to a device, such as a router, to obtain console access. Using the local user interface, one can then obtain device data and/or configure it. The data can be, for instance, a configuration file, local counters, local cache, link status, and so on.

    Cisco routers support both IPv6 Telnet client and server connections. A vty interface and password must be created to enable Telnet access to an IPv6 router. The following configuration illustrates how to enable the IPv6 Telnet server on a Cisco router.

    Example 10-8. IPv6 Telnet Configuration

    Router#show running
    ipv6 host sophia 2001:100::1
    line vty 0 4
      password mypassw
      login

    A Telnet client can connect using telnet Router and execute a local command (for instance, to retrieve interface statistics), as shown in Example 10-9.

    Example 10-9. Displaying Router Statistics over a Telnet Session

    Router#show interfaces accounting
    FastEthernet0/0
    ProtocolPkts InChars In Pkts Out Chars Out
    IP     232      13920      13179    1055192
    ARP    0        0          2        120
    CDP    1295     488215     1295     624190
    IPv6   87       7343       10821    1154992
    Serial3/0
    ProtocolPkts InChars In Pkts Out Chars Out
    IP       1032152  172480455    971046    99846637
    CDP      11848    4703656      11851     4633741
    IPv6     72565    6178060      72582     6304396

  • SSH Secure Shell can be handy for connecting to a device over a secure connection and retrieving information. On Cisco routers, configuring SSH for IPv6 is not different from its configuration for IPv4. It requires the following:

    - An IPsec (Data Encryption Standard [DES, 3DES] or AES) encryption-software Cisco router image.

    - A host name and host domain must be configured.

    - A Rivest, Shamir, and Adelman (RSA) key pair, which automatically enables SSH, must be generated for the router.

  • RSH Remote Shell enables users to execute commands remotely. Remote Copy (RCP) enables users to copy files to and from a file system residing on a remote host or server on the network. Example 10-10 illustrates an IPv4 RSH configuration that enables IPv6 command execution on the server side (Router-B). The example also shows an IPv6 command executed on the client side (Router-A) to display interface status.

    Example 10-10. Configuring a Server for RSH and Executing Commands Remotely

    Router-B#show running | include ip rcmd
    ip rcmd rcp-enable
    ip rcmd rsh-enable
    ip rcmd remote-host Router-A 50.1.1.1 Router-A enable
    
    Router-A#rsh 50.1.1.2 /user Router-A show ipv6 interface brief
    Ethernet0/0                [up/up]
        FE80::A8BB:CCFF:FE01:F600
        2001:100::72B
    Ethernet1/0                [up/up]
        unassigned
    Loopback0                  [up/up]
        FE80::A8BB:CCFF:FE01:F600
        2001:101::123

    Note that although Example 10-10 shows how to configure RSH over an IPv4 transport, RSH over an IPv6 transport is not yet supported on Cisco IOS routers at the time of this writing.

  • TFTP It can be used to download or upload files to/from a device such as a router. On Cisco routers, IPv6 supports TFTP file downloading and uploading using the copy EXEC command. The copy EXEC command accepts a destination IPv6 address or IPv6 host name as an argument and saves the running configuration of the router to an IPv6 TFTP server, as follows:

    Router#copy running-config tftp://[2001:100::1]/running-config
  • FTP FTP can also be used to upload/download information to/from devices. Although FTP runs over TCP, having IPv6 TCP support is not enough to get FTP working over IPv6. FTP messages include a host address, and the initial FTP specification assumed network addresses of 32 bits in length. RFC 2428 specifies FTP extensions for IPv6. On Cisco routers, at the time of this writing, FTP over IPv6 is not yet supported.

In many cases, Looking Glass can be set up to enable authorized users to access IPv6-enabled devices from a web interface and to run specific commands. Looking Glass typically uses Telnet, SSH, or RSH to execute the request on the device. The IPv6 information can be acquired over IPv4 or IPv6. The example illustrated in Figure 10-5 shows one of these Looking Glass outputs used on the regional Picardie (France) IPv6 network.

Figure 10-5. IPv6 Looking Glass



Previous Page
Next Page