Home > ADDER > Extender > ADDERLink Digital ipeps Manual

ADDERLink Digital ipeps Manual

    Download as PDF Print this page Share this page

    Have a look at the manual ADDERLink Digital ipeps Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 78 ADDER manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							
    
    
    
    
    
    40
    Serial port configuration
    This page allows you to configure the baud rate of the Digital iPEPS s\
    erial port 
    that is used to control power switch devices. A full range of standard b\
    aud rates 
    are available.
    To get here
    1 Using VNC viewer or a browser, log on as the ‘admin’ user.
    2 Click the ‘Configure’ button in the top right corner.
    3 Click the ‘Serial port Configuration’ option.
    Baud Rate
    Determines the communication speed of the OPTIONS port when the above 
    setting is configured to ‘Power Control’. The other communicatio\
    n settings are 
    fixed as: No parity, 8 bit word, 1 stop bit.   
    						
    							
    
    
    
    
    
    41
    Host configuration
    This page provides the opportunity to configure various details for ea\
    ch of the 
    host systems that may be connected to the Digital iPEPS. Each entry can \
    be 
    configured with a name, the permitted users, the hot key combinations \
    required 
    to switch to it and, if required, appropriate power control commands.
    To create a new host entry
    1 Click one of the host entries to reveal a Host configuration dialogue.\
     
     Name
      Enter the name that will be displayed in the viewer window when you 
    click the Host button.
    Users
     Select the users that will be permitted to connect to this host. Either \
    enter * to allow all users or a list of users separated by commas.
    KVM Switch Macro
     Declare the hot key sequence, or Adder Port Direct address that will 
    cause the KVM switch to link with the required host system. Adder Port 
    Direct addresses must be entered within square brackets. See Appendix 
    10 - Hotkey sequences and Adder Port Direct for details.
    Hotkey Host Number 
     Declare the numeric sequence that is pressed together with the VNC 
    viewer hotkeys (usually Ctrl + Alt) to select this host system, which \
    is the 
    same value as the KVM port number. 
    Power On
     Enter the code required to make an attached power control unit apply 
    power to the host. See Power switching configuration for details.
    Power Off
     Enter the code required to make an attached power control unit remove 
    power from the selected host. 
    Reboot
     Enter the code required to make an attached power control unit remove 
    power and then re-apply it a few seconds later. 
    2 Enter the required information in each field.
    3 Click the OK button.
    To get here
    1 Using VNC viewer or a browser, log on as the ‘admin’ user.
    2 Click the ‘Configure’ button in the top right corner.
    3 Click the ‘Host Configuration’ option.
    Add entry for unrecognised host
     When selected, any systems visited that are not specified in the Hosts\
     list, will 
    be added to the list. 
    Sort
     Allows you to reorder the list of hosts either alphabetically or by entr\
    y number. 
    Erase Host Configuration
     Removes all hosts from the list.    
    						
    							
    
    
    
    
    
    42
    Power switching configuration
    Power switch configuration comprises two main steps:
    •	 Configure	the	OPTIONS serial port to the same speed as used by the power 
    switch box(es), using the Serial port configuration menu. 
    •	 Configure	power	ON	and	OFF	strings	for	each	relevant	host	computer.
    For each power port there needs to be a valid ‘Power ON string’ an\
    d similarly an 
    appropriate ‘Power OFF string’. In each case, the strings are a sh\
    ort sequence of 
    characters that combine a port address and a power on or off value. 
    If a particular computer has more than one power input (and thus requir\
    es an 
    equivalent number of power ports to control them), collections of strin\
    gs can be 
    combined to switch all of the required ports together as a group.
    To configure the power sequences for each host computer
    1 Using VNC viewer or a browser, log on as the ‘admin’ user.
    2 Click the ‘Configure’ button in the top right corner.
    3 Click the ‘Host configuration’ option.
    4 Click a host entry to display a Host configuration dialogue:
    5 If necessary, configure other parameters (Name, Users, Hot Keys - MORE).
    Power control sequences
    Notes: The settings given below are for Adder power switches model numbe\
    rs 
    PSU-8SLAVE and PSU-1GUARD - other power switches may require different 
    settings. Please refer to your power switch documentation for details ab\
    out 
    codes required by other power switches. 
    The structure of each power sequence (OFF, ON or Reboot) is as follows\
    :
    /Pxy=z\0D 
     Where: 
    x is the switch box number,
    y is the power port number,  
    z is ‘0’ for OFF or ‘1’ for ON
    r is for Reboot, and
    \0D represents Enter (or Carriage return).
    Example 1 
    To switch ON port 5 of switch box 2, the code would be as follows:
    •	 Power	sequence:		 P25=1\0D
    Example 2 
    To switch OFF port 8 of switch box 3, the code would be as follows:
    •	 Power	sequence:		 P38=0\0D
    For details about operating this feature, see Power switching control within 
    the Operation chapter.
    To control two or more ports simultaneously
    You	can	control	up	to	four	power	ports	using	a	single	sequence.	This	is	done	
    using the same command structure as shown above, plus a delay command, 
    for each port. Immediately following a port command, insert the characte\
    rs ‘\*’ 
    before the next port command, and so on up to four ports. For instance, \
    to 
    switch on ports 1 and 2 in the first power switch, the command line wo\
    uld be:
     P11=1\0D\*P12=1\0D
    6  Enter the Power control sequences in the Power On, Power Off and Reboot 
    fields 
    7  Click OK to close the dialogue and then click the Save button in the mai\
    n 
    Host Configuration window to store the details.   
    						
    							
    
    
    
    
    
    43
    Logging and status
    This screen provides various details about the user activity on the Digi\
    tal iPEPS 
    unit. 
    To get here
    1 Using VNC viewer or a browser, log on as the ‘admin’ user.
    2 Click the ‘Configure’ button in the top right corner.
    3 Click the ‘Logging and Status’ option.
    To copy and paste the log
    You	can	copy	the	information	listed	within	the	log	and	paste	it	into	another	
    application.
    1 While viewing the log screen, press Ctrl and C, to copy the data into th\
    e 
    clipboard.
    2 In a text application (i.e. Word, WordPad, Notepad) press Ctrl and V, \
    or right 
    mouse click and ‘Paste’.
    Date and time the event occurred
    Type of event, user name and access method or remote IP address
    Click to clear all log entriesClick to refresh the list
    Click to return to the main menu
    Optionally enter an IP address to which the status log should be sent
    Syslog Server IP Address 
    Logging information can optionally be sent, as it occurs, to a separate \
    system 
    using the standard Syslog protocol. Enter the IP address of a suitable s\
    ystem in 
    the field provided.
    For further details
    •	 For	details	of	the	Syslog	protocol	(RFC	number:	3164) 
    http://www.ietf.org/rfc.html   
    						
    							
    
    
    
    
    
    44
    LDAP configuration
    The Digital iPEPS can optionally use the industry standard LDAP (Lightw\
    eight 
    Directory Access Protocol) to allow user authentication to occur in con\
    junction 
    with an externally held database. This screen allows you to configure \
    details 
    related to the creation of an LDAP link to an external directory service\
    , such as 
    an Active Directory server.
    To get here
    1 Using VNC viewer or a browser, log on as the ‘admin’ user.
    2 Click the ‘Configure’ button in the top right corner.
    3 Click the ‘LDAP Configuration’ option.
    Use LDAP 
    Tick this option to enable the Lightweight Directory Access Protocol fea\
    tures of 
    the unit.
    Host Address 
    Enter the IP address of the LDAP server that holds the required director\
    y service.
    Host Port 
    The standard port address for LDAP links is 389 and this should not need\
     to be 
    changed unless special circumstances exist.
    Base DN 
    This field allows you to enter the top level of the LDAP directory tre\
    e at 
    which to start an LDAP search. An example Base DN value might be: 
    “dc=catxip1000,dc=com” 
    User field 
    Enter the LDAP database field that will be used to match each user nam\
    e 
    against. The details entered here will depend on the specific LDAP dat\
    abase 
    being used - ‘uid’ or ‘cn’ are commonly used values.  
    Anonymous Bind 
    If left unchecked then bind requests are sent with username (Base DN) \
    and 
    password (more suitable for Active Directory applications).
    If checked, bind requests are anonymous (more suitable for Linux LDAP 
    implementations).
    Admin Password and LDAP Support
    Even if LDAP authentication is enabled, the ‘admin’ user is still \
    authenticated 
    locally, using the traditional authentication technique of matching to a\
     locally 
    sorted password.
    Active Directory authentication process
    Typically, Active Directory deployments are not configured for anonymo\
    us 
    binding. Hence, in our implementation of LDAP and Active Directory suppo\
    rt for 
    the Digital iPEPS we have opted have a single username and password to b\
    ind to 
    the directory and authenticate.
    In order to use the ARQ3 LDAP with Active Directory ensure that “Anon\
    ymous 
    bind” is not checked in the LDAP configuration menu.
    The process of authentication and associated LDAP transactions are as fo\
    llows. 
    A user enters the username and password in the VNC viewer  authenticatio\
    n 
    dialogue. This username and password is used as the “binddn” and “\
    bindpw” 
    in the “simple bind request” sent to the Active Directory server. \
    Upon binding 
    to the directory successfully, a LDAP search is performed  for the same \
    username 
    under the specified User Field in the specified Base DN . If the the\
     search is 
    successful then the authentication is performed  using the password ente\
    red 
    by the user. If the password is accepted by the Active Directory server,\
     then 
    the process of authentication is completed and the user is unbound from \
    the 
    directory.
    Linux LDAP authentication process
    In order to use the Digital iPEPS LDAP with Linux LDAP ensure that “A\
    nonymous 
    bind” is checked in the LDAP configuration menu.
    The process of authentication and associated LDAP transactions are as fo\
    llows. 
    A user enters the username and password in the VNC viewer  authenticatio\
    n 
    dialogue. An anonymous “simple bind request” is then sent to the L\
    DAP server. 
    No username or password is sent at this stage. On binding to the directo\
    ry 
    successfully, a LDAP search is performed  for the username, under the sp\
    ecified 
    User Field and in the specified Base DN. If the the search is successf\
    ul then the 
    authentication is performed using the password entered by the user. If t\
    he 
    password is accepted by the LDAP server, then the process of authenticat\
    ion is 
    completed and the user is unbound from the directory.   
    						
    							
    
    
    
    
    
    45
    Appendix 5 - Networking issues
    Thanks to its robust security the Digital iPEPS offers you great flexi\
    bility in how 
    it integrates into an existing network structure. The Digital iPEPS is d\
    esigned to 
    reside either on an internal network, behind a firewall/router or alte\
    rnatively 
    with its own direct Internet connection. 
    Positioning Digital iPEPS in the network
    Every network setup is different and great care needs to be taken when 
    introducing a powerful device such as the Digital iPEPS into an existing\
     
    configuration. A common cause of potential problems can be in clashes \
    with 
    firewall configurations. For this reason the Digital iPEPS is design\
    ed to be 
    intelligent, flexible and secure. With the minimum of effort the Digit\
    al iPEPS 
    can reside either behind the firewall or alongside with its own separa\
    te Internet 
    connection.
    Placing Digital iPEPS behind a router or firewall
    A possible point of contention between the Digital iPEPS and a firewal\
    l can 
    occasionally arise over the use of IP ports. Every port through the fi\
    rewall represents 
    a potential point of attack from outside and so it is advisable to minim\
    ise the 
    number of open ports. The Digital iPEPS usually uses two separate port n\
    umbers, 
    however, these are easily changeable and can even be combined into a sin\
    gle port.
    IMPORTANT: The correct configuration of routers and firewalls requires advanced 
    networking skills and intimate knowledge of the particular network. Adde\
    r Technology 
    cannot provide specific advice on how to configure your network devi\
    ces and strongly 
    recommend that such tasks are carried out by a qualified professional.\
    Port settings
    As standard, the Digital iPEPS uses two ports to support its two types o\
    f viewer: 
    •	Port 80 for users making contact with a web browser, and 
    •	Port 5900 for those using the VNC viewer.
    When these port numbers are used, VNC viewers and web browsers will loca\
    te 
    the Digital iPEPS correctly using only its network address. The firewa\
    ll/router 
    must be informed to transfer traffic, requesting these port numbers, t\
    hrough to 
    the Digital iPEPS. 
    When a web server is also on the local network
    Port 80 is the standard port used by web (HTTP) servers. If the Digita\
    l iPEPS is situated 
    within a local network that also includes a web server or any other devi\
    ce serving port 
    80 then, if you want to use the web browser interface from outside the local netw\
    ork 
    environment, the HTTP port number of the Digital iPEPS must be changed.
    When you change the HTTP port to anything other than 80, then each remote 
    browser user will need to specify the port address as well as the IP add\
    ress. For 
    instance, if you set the HTTP port to ‘8000’ and the IP address is\
     ‘192.168.47.10’ 
    then browser users will need to enter: 
    http://192.168.47.10:8000 
    (Note the single colon that separates the IP address and the port numbe\
    r). 
    The firewall/router would also need to be informed to transfer all tra\
    ffic to the 
    new port number through to the Digital iPEPS.
    If you need to change the VNC port number
    If you change the VNC port to anything other than 5900, then each VNC viewer 
    user will need to specify the port address as well as the IP address. Fo\
    r instance, 
    if you set the VNC port to ‘11590’ and the IP address is ‘192.1\
    68.47.10’ then 
    VNC viewer users will need to enter: 
    192.168.47.10::11590
    (Note the double colons that separate the IP address and port number). 
    The firewall/router would also need to be informed to transfer all tra\
    ffic to the 
    new port number through to the Digital iPEPS.
    Internet
    ADDERLINK
    ADDER®
    Internet
    ADDERLINK
    ADDER®
    Digital iPEPS situated behind the firewall
    KVM link to host system
    KVM link to host system
    Firewall/router
    Digital iPEPS situated alongside the firewall
    Firewall/router
    Local network connection
    Local network connection
    IMPORTANT: When the Digital iPEPS is accessible from the public Internet\
     or dial 
    up connection, you must ensure that sufficient security measures are employed.   
    						
    							
    
    
    
    
    
    46
    Internet
    ADDERLINK
    ADDER®
    Addressing
    When the Digital iPEPS is situated within the local network, you will ne\
    ed to give 
    it an appropriate local IP address and IP network mask. This is achieved\
     most 
    easily using the DHCP server option which will apply these details autom\
    atically. 
    If a DHCP server is not available on the network, then these details nee\
    d to be 
    applied manually in accordance with the network administrator.
    The firewall/router must then be informed to route incoming requests t\
    o port 
    5900 or port 80 (if available) through to the local address being used\
     by the 
    Digital iPEPS.  
    To discover a DHCP-allocated IP address
    Once a DHCP server has allocated an IP address, you will need to know it\
     in 
    order to access the Digital iPEPS via a network connection. To discover \
    the 
    allocated IP address:
    1 Within Network configuration,	set	the	‘Use	DHCP’	option	to	‘Yes’	and	
    select ‘Save’. Once the page is saved, the Digital iPEPS will cont\
    act the DHCP 
    server and obtain a new address.
    2 Re-enter the same ‘Network configuration’ screen where the new I\
    P address 
    and network mask should be displayed. 
    DNS addressing
    As with any other network device, you can arrange for your Digital iPEPS\
     to be 
    accessible using a name, rather than an IP address. This can be achieved\
     in two 
    main ways:
    •	 For	small	networks	that	do	not	have	a	DNS	(Domain	Name	System)	server,	
    edit the ‘hosts’ files on the appropriate remote systems. Using \
    the hosts file, 
    you can manually link the Digital iPEPS address to the required name.
    •	 For	larger	networks,	declare	the	IP	address	and	required	name	to	the	DNS	
    server of your local network. 
    The actual steps required to achieve either of these options are beyond \
    the 
    scope of this document.       
    Digital iPEPS has a local address and net mask, i.e. 
    IP address: 192.168.0.3
    Net mask: 255.255.255.0
    Remote user with VNC viewer accesses IP address: 129.7.1.10 and automatically uses port 5900. 
    Firewall/router address:129.7.1.10The firewall routes the request from the VNC viewer on port 5900 through to the Digital iPEPS at local address 192.168.0.3
        
    						
    							
    
    
    
    
    
    47
    Placing Digital iPEPS alongside the firewall
    Digital iPEPS is built from the ground-up to be secure. It employs a sop\
    histicated 
    128bit public/private key system that has been rigorously analysed and f\
    ound 
    to be highly secure (a security white paper is available upon request f\
    rom 
    Adder Technology Ltd). Therefore, you can position the Digital iPEPS alongside\
     
    the firewall and control a computer that is also IP connected within t\
    he local 
    network.
    IMPORTANT: If you make the Digital iPEPS accessible from the public Inte\
    rnet, 
    care should be taken to ensure that the maximum security available is ac\
    tivated. 
    You are strongly advised to enable encryption and use a strong password.\
     
    Security may be further improved by restricting client IP addresses, usi\
    ng a non-
    standard port number for access.  
    Ensuring sufficient security
    The security capabilities offered by the Digital iPEPS are only truly ef\
    fective when 
    they are correctly used. An open or weak password or unencrypted link ca\
    n 
    cause security loopholes and opportunities for potential intruders. For \
    network 
    links in general and direct Internet connections in particular, you shou\
    ld carefully 
    consider and implement the following:
    •	 Ensure	that	encryption is enabled. 
    •	 Ensure	that	you	have	selected	secure passwords with at least 8 characters 
    and a mixture of upper and lower case and numeric characters.
    •	 Reserve	the	admin	password	for	administration	use	only	and	use	a	non-
    admin user profile for day-to-day access.  
    •	 Use	the	latest	Secure	VNC	viewer	(this	has	more	in-built	security	than	is	
    available	with	the	Java	viewer).	
    •	 Use	non-standard	port numbers. 
    •	 Restrict	the	range	of	IP	addresses	that	are	allowed	to	access	the	Digital	iPEPS	
    to only those that you will need to use. To restrict IP access.
    •	 Do	NOT	Force	VNC	protocol	3.3.
    •	 Ensure	that	the	computer	accessing	the	Digital	iPEPS	is	clean	of	viruses	and	
    spyware and has up-to-date firewall and anti-virus software loaded tha\
    t is 
    appropriately configured. 
    •	 Avoid	accessing	the	Digital	iPEPS	from	public	computers.
    Security can be further improved by using the following suggestions:
    •	 Place	the	Digital	iPEPS	behind	a	firewall	and	use	port	the	numbers	to	route	
    the VNC network traffic to an internal IP address.
    •	 Review	the	activity	log	from	time	to	time	to	check	for	unauthorised	use.	
    •	 Lock	your	server	consoles	after	they	have	been	used.		
    A security white paper that gives further details is available upon requ\
    est from 
    Adder Technology Limited. 
    Ports 
    In this configuration there should be no constraints on the port numbe\
    rs 
    because the Digital iPEPS will probably be the only device at that IP ad\
    dress. 
    Therefore, maintain the HTTP port as 80 and the VNC port as 5900.
    Addressing
    When the Digital iPEPS is situated alongside the firewall, it will req\
    uire a public 
    static IP address (i.e. one provided by your Internet service provider)\
    .
    More addressing information:
    Discover DHCP-allocated addresses
    DNS addressing    
    						
    							
    
    
    
    
    
    48
    Appendix 6 - An introduction to IPv6 
    During the initial design of the Internet, 4.3 billion seemed like an im\
    possibly 
    large number of device addresses, possibly more than would ever be neede\
    d. 
    It took nearly forty years, but finally the last remaining vacant addr\
    ess blocks 
    within the current Internet Protocol scheme (called IPv4) were assigned in 
    February 2011.
    The Internet Protocol is a crucial element of Internet operation and the\
     eventual 
    exhaustion of unique addresses was predicted and acted upon many years 
    ago. The replacement for IPv4 is known as IPv6 and was defined in December 
    1998. Since then its uptake has been slow (reportedly used for less tha\
    n 1% of 
    Internet traffic in 2008) although this will increase rapidly as plac\
    es within the 
    incumbent system are exhausted.
    Vastly increased address space
    The most notable feature of IPv6 is the size of its address space, put s\
    imply: It’s 
    massive. By using 128 bits to define each IPv6 address (rather than t\
    he 32 bits 
    used in IPv4), there are now 340 x 1036 unique addresses (that’s 340 trillion 
    trillion trillion or as it is correctly known, 340 undecillion).
    The larger address size of IPv6 requires a different manner of notation.\
     Instead 
    of the four decimal numbers separated by dots used for IPv4 (e.g. 192.1\
    68.0.1), 
    IPv6 addresses consist of eight groups of four hexadecimal digits that a\
    re 
    separated by colons (e.g. 2002:00a2:67be:0000:0000:0e82:8723:a144) – 
    each group of four digits represents 16 bits of the address. By necessit\
    y, IPv6 
    addresses are quite long and so there are a couple of techniques to help\
     reduce 
    this in certain cases:
    •	 Where	a	group	has	one	or	more	leading	zeroes,	these	can	be	omitted.	In	the	
    above example 00a2 and 0e82 can be written a2 and e82, respectively.
    •	 Where	one	or	more	consecutive	groups	consist	solely	of	zeroes,	they	can	
    be replaced with a double colon (::). In the above example, the fourth and 
    fifth groups could be replaced with the double colon, so that the whol\
    e line 
    could be reduced to: 2002:a2:67be::e82:8723:a144. It is easy to return any 
    such shortened address to the full version by replacing the double colon\
    s 
    with sufficient groups of zeroes until the total number of groups is r\
    eturned 
    to eight. For this to work it is essential that only one set of consecut\
    ive zero 
    groups within an address are replaced with a double colon.
    Standard subnet size
    Thanks to the new huge address space, IPv6 does not need to wring every \
    last drop out of each address range and so it handles address allocation\
     in a 
    different manner than its predecessor. Whereas IPv4 uses subnets of vary\
    ing 
    sizes (using the Subnet Mask entry to define the size of each subnet)\
    , IPv6 
    subnets are (almost) all set to a standard size. A full 64 bits are us\
    ed to define 
    each subnet, which means that every standard IPv6 subnet has use of an a\
    ddress 
    space that is the square of the entire IPv4 address space (that’s 1.\
    8 x 1019 
    addresses per subnet). In those subnets, all addresses are valid host l\
    ocations; 
    gone are special address formats for particular uses, such as broadcast \
    traffic. 
    Also, now that all standard subnets are the same size, the subnet mask i\
    s 
    another item that is made redundant under IPv6.
    Address allocation
    Every device attached to an IPv6 network usually has more than one addre\
    ss 
    type. The two most common types are called a link-local address and a global 
    address and these can be assigned in a number of ways. 
    In IPv4, device addresses are most commonly assigned either manually or \
    by 
    using a Dynamic Host Configuration Protocol server (DHCP). IPv6 also\
     offers 
    manual addressing and DHCP (now called DHCPv6 and fully supported by th\
    e 
    Digital iPEPS unit), but also allows devices to automatically configu\
    re their own 
    addresses using a series of steps defined as StateLess Address AutoConfiguration 
    (or SLAAC). The key parts of the SLAAC procedure occur roughly as follows:
    •	 The	IPv6	compliant	device	creates	a	tentative local identifier which is usually 
    derived from its fixed unique hardware identifier (or MAC address)\
    . The 
    local identifier is 64 bits in length (the lower half of the full 128\
     bit address) 
    and this is one of the advantages of having a fixed subnet size; it is\
     very 
    straightforward to automatically figure out the boundaries and content\
    s of 
    the local network. This is exactly what the device does next with its te\
    ntative 
    local identifier. 
    •	 The	device	uses	the	Neighbor Discovery Protocol (part of the Internet Control 
    Message Protocol suite – IMCPv6) to check within the local network whether 
    its tentative local identifier is being used by any other device. If i\
    t is, then 
    the device will create a new one and start the process again. If the loc\
    al 
    identifier is unique within the local network, it is then combined wit\
    h the 
    standard link-local prefix (fe80::) to form a valid link-local address. At this 
    stage the address is valid only for communication within the local netwo\
    rk. 
    The next stage is to replace the link-local prefix with a global prefi\
    x and 
    then carry out a similar procedure in order to prevent address duplicati\
    on, 
    resulting in a validated global address.
    continued   
    						
    							
    
    
    
    
    
    49
    Mixing IPv4 and IPv6  
    Although IPv6 is based upon, and shares a number of similarities with IP\
    v4, 
    there are great differences in their address spaces and other key detail\
    s which 
    mean that they are not directly compatible. This means that while comput\
    ers 
    and their operating systems can support both types, IPv4 and IPv6 networ\
    ks exist 
    essentially as two parallel, independent entities with numerous cross ov\
    er points 
    (known as relay routers). For the foreseeable future, while both versions coexist, 
    exchanging traffic between them will require many relay routers and va\
    rious 
    transition techniques. 
    One such technique involves IPv4-mapped IPv6 addresses. These are used in 
    operating systems and applications that transparently support both IP fo\
    rmats. 
    In such cases IPv6 will be the native format with IPv4 fully supported w\
    henever 
    necessary. When an IPv4 address must be incorporated, it is placed into \
    a special 
    IPv6 address that has its first 80 bits set to zero and the next 16 bi\
    ts set to one. 
    The remaining 32 bits are where the IPv4 address is embedded. When writt\
    en, 
    the address is an amalgam of the two network types - ::ffff:192.0.2.128 \
        
    						
    All ADDER manuals Comments (0)

    Related Manuals for ADDERLink Digital ipeps Manual