In earlier versions, such as xp,2003, IPv6 addresses could not be manually configured in the property configuration of network Connections, and only netsh configurations could be used. The configuration method is as follows:
First, install the IPV6 protocol, IPv6 install
The second step is to view the current local connection information used:
As shown above, my "local connection 3", in turn, executes the following command:
C:documents and Settingsadministrator>netsh
PCinstallation IPV6 protocol and enableC:\>netsh Interface ipv6 InstallAre you sure.C:\>netshNetsh>interface IPv6netsh interface ipv6>show interfacequerying Active status ...Index Met MTU Status name---- ---- ----- ------------ -----8 0 Connected Local connection 67 0 The local connection has been disconnected 56 0 Switch off wi-Fi 25 0 Connected VirtualBox host-only Network4 2 tunneling disconnected Teredo
Detailed explanation of VPN technology (in)
Lu Xiaopo
Tunneling Technology Basics
Tunneling is a way of passing data between networks through the use of the Internet infrastructure. Data (or payload) that is passed through a tunnel can be a data frame of a different protocol (this word is incorrect) or a package. The tunneling protocol encapsulates the data
+ Default Gateway .............: A the Wireless LAN Adapter WLAN: + - connect a specific DNS suffix ....: DHCP HOST $Local Link IPV6 address ... : fe80::9c84:419c:e3af:89dd%11 $IPV4 Address ............:192.168.0.106 -Subnet Mask ............:255.255.255.0 - the >>:d ir -Default gateway ............. : 192.168.0.1Wuyi the Ethernet Adapter Bluetooth network connection: - Wu Media status ............: media is disconnected - connection-specific DNS suffix .......: About $Tunnel Adapter
subnet mask to use, IPV6 also uses the concept of a subnet, but the subnet ID is embedded directly in the address. In IPv6, the first 48 digits represent the network prefix, followed by the 16-bit subnet ID, and the last 64 bits are the interface IDs, the interface ID or the device ID. BITS reserved for device IDs can be borrowed to represent additional subnet masks, if needed, but are usually unwanted because 16-bit subnets and 64-bit device IDs can provide up to 65,536 subnets.
7, IPv6 still
IPV4 = BitsIPV6 = Bits650) this.width=650; "src=" http://s2.51cto.com/wyfs02/M02/7D/C5/wKiom1bvlDqhJZIcAAAZqs_dUrQ469.jpg "title=" 31111. JPG "alt=" wkiom1bvldqhjzicaaazqs_durq469.jpg "/>IPV6 addresses are represented by:-Preferred notation, expressed in 32-bit 16-digit notation16 binary, such as: FE08 ....4 numbers in one set (16bits), intermediate: separated, such as: 2001:12FCExample: 2001:0410:0000:0001:0000:0000:0000:45ff-Compression notation: Compressed bit compression for 0, at the beginn
-4C230975B9C7}: Media status ............: Media has been disconnected from a specific DNS suffix ....: Tunnel adaptationDevice Teredo Tunneling Pseudo-Interface: Media status ............: media disconnected specific DNS suffix ...: Tunnel adapter isatap.{ D0057A4F-D19D-4EF4-A6DC-F7F75E7100A6}: Media status ............: media disconnected specific DNS suffix ...: Tunnel adapter ISATAP . {3870eff9-2086-4f9
C:\users\k>ipconfig
Windows IP Configuration
Ethernet Adapter Local Area Connection:
connection-specific DNS suffix .......:
local link IPv6 address . . . . . . . . : fe80::f051:594f:4009:7a11%11
IPv4 Address ...: 192.168.1.116
subnet mask .... ......... ...: 255.255.255.0
default gateway ...: 192.168.1.1
Tunnel Adapter isatap.{., ...... DE550165-F6BF-4D81-A22C-FA4BFEB8339E}:
Media state ............: Media has disconnected
the specific DNS suffix .... :
Tunnel Adap
Detailed explanation of VPN technology (next)
Lu Xiaopo
(Immediately medium)
Data transfer phase
Once this 4-phase negotiation is complete, PPP begins forwarding data between the connecting peers. Each transmitted datagram is encapsulated within the PPP header, which is removed after it arrives at the receiving party. If you choose to use data compression in Phase 1 and you have completed the negotiation in Phase 4, the data will be compressed between transfers. Similarly, if you have chosen
Today, almost all mainstream operating systems and embedded operating systems provide support for the IPv6 protocol stack. in Windows XP, you can use the IPv6 install command to start the IPv6 protocol stack, in the default Linux environment, you can use modprobe IPv6 to load the IPv6 protocol stack as a module. This article only introduces the IPv6 protocol stack configuration commands under Linux. More detailed Linux and Windows transition mechanisms will be introduced in the future, such as 6
.............: Tunnel adapter isatap. {D173F109-522F-4D59-BCB4-4C230975B9C7}: Media status ............: The media has been disconnected from the specified DNS suffix .......: Tunnel adapter Teredo Tunneling Pseudo-Interface: Media status ............: The media has been disconnected from the specified DNS suffix .......: Tunnel adapter isatap. {D0057A4F-D19D-4EF4-A6DC-F7F75E7100A6}: Media status .........
technologies are UDP holes and stun. In addition, there are turn, ice, ALG, and SBC.Nat penetration
* Session traversal utilities for NAT (Stun)* Traversal Using relay NAT (turn)* NAT-T negotiation of NAT-traversal in the IKE* Teredo tunneling uses NAT traversal to provide IPv6 connectivity.* Session Border controller (SBC)* UDP hole punching)* TCP hole punching)
[Zookeeper] Nat penetration is based on
A few days ago there is a network topology, the server needs to configure multiple network cards to communicate multiple services. After configuring multiple IP addresses, you can only access the primary IP address, and the secondary IP configuration to another network port can not ping another network segment. After testing with a PC, it is possible to suspect that the server is not very good at identifying multiple gateways (but the PC is ok ...). )。 The route add command is used to add a stat
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.