HP 6125XLG R2306-HP 6125XLG Blade Switch Layer 3 - IP Services Configuration G - Page 165

Configuring tunneling, Overview, IPv6 over IPv4 tunneling, Implementation

Page 165 highlights

Configuring tunneling Overview Tunneling is an encapsulation technology. One network protocol encapsulates packets of another network protocol and transfers them over a virtual point-to-point connection. The virtual connection is called a tunnel. Packets are encapsulated at the tunnel source end and de-encapsulated at the tunnel destination end. Tunneling refers to the whole process from data encapsulation to data transfer to data de-encapsulation. Tunneling supports the following technologies: • Transition techniques, such as IPv6 over IPv4 tunneling, to interconnect IPv4 and IPv6 networks. • VPN, such as IPv4 over IPv4 tunneling, IPv4/IPv6 over IPv6 tunneling, GRE, DVPN, and IPsec tunneling. • Traffic engineering, such as MPLS TE to prevent network congestion. Unless otherwise specified, the term tunnel in this document refers to IPv6 over IPv4, IPv4 over IPv4, IPv4 over IPv6, and IPv6 over IPv6 tunnels. IPv6 over IPv4 tunneling Implementation IPv6 over IPv4 tunneling enables isolated IPv6 networks to communicate, as shown in Figure 67. The devices at the ends of an IPv6 over IPv4 tunnel must support the IPv4/IPv6 dual stack. Figure 67 IPv6 over IPv4 tunnel The IPv6 over IPv4 tunnel processes packets in the following steps: 1. A host in the IPv6 network sends an IPv6 packet to Device A at the tunnel source. 2. After determining according to the routing table that the packet needs to be forwarded through the tunnel, Device A encapsulates the IPv6 packet with an IPv4 header and forwards it through the physical interface of the tunnel. In the IPv4 header, the source IPv4 address is the IPv4 address of the tunnel source, and the destination IPv4 address is the IPv4 address of the tunnel destination. 3. Upon receiving the packet, Device B de-encapsulates the packet. 157

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230

157
Configuring tunneling
Overview
Tunneling is an encapsulation technology. One network protocol encapsulates packets of another
network protocol and transfers them over a virtual point-to-point connection. The virtual connection is
called a tunnel. Packets are encapsulated at the tunnel source end and de-encapsulated at the tunnel
destination end. Tunneling refers to the whole process from data encapsulation to data transfer to data
de-encapsulation.
Tunneling supports the following technologies:
Transition techniques, such as IPv6 over IPv4 tunneling, to interconnect IPv4 and IPv6 networks.
VPN, such as IPv4 over IPv4 tunneling, IPv4/IPv6 over IPv6 tunneling, GRE, DVPN, and IPsec
tunneling.
Traffic engineering, such as MPLS TE to prevent network congestion.
Unless otherwise specified, the term
tunnel
in this document refers to IPv6 over IPv4, IPv4 over IPv4, IPv4
over IPv6, and IPv6 over IPv6 tunnels.
IPv6 over IPv4 tunneling
Implementation
IPv6 over IPv4 tunneling enables isolated IPv6 networks to communicate, as shown in
Figure 67
. The
devices at the ends of an IPv6 over IPv4 tunnel must support the IPv4/IPv6 dual stack.
Figure 67
IPv6 over IPv4 tunnel
The IPv6 over IPv4 tunnel processes packets in the following steps:
1.
A host in the IPv6 network sends an IPv6 packet to Device A at the tunnel source.
2.
After determining according to the routing table that the packet needs to be forwarded through the
tunnel, Device A encapsulates the IPv6 packet with an IPv4 header and forwards it through the
physical interface of the tunnel. In the IPv4 header, the source IPv4 address is the IPv4 address of
the tunnel source, and the destination IPv4 address is the IPv4 address of the tunnel destination.
3.
Upon receiving the packet, Device B de-encapsulates the packet.