Modules Index

  • Internet Routing Registry
  • Advanced IPv6 BGP Routing
  • IPv6 Foundations
  • IPv6 Transition Techniques
  • IPv6 Strategy & Planning
  • IPv6 Security
  • Building IPv6 Services
  • IPv6 Routing
  • INRM Foundations
  • MyAFRINIC & WHOIS database
  • IP Address Planning
  • Internet Routing Registry

This module helps ISPs to properly register their prefixes and specify their routing policy in the Internet Routing Registries. After concluding this module, you will be able to

  • Register your routing information in the a Routing Registry
  • Describe your routing policy with RPSL
  • Use the tool that creates prefix filters based on policy information 

Target Audience

  • Network engineers and architects
  • Network technicians and support staff
  • Systems administrators

Pre-requisites

  • Manipulating the Whois Database
  • IPv6 Routing module

Module outline

  • Benefits of using a Routing Registry (RR)
  • Understanding and creating a route6 object
  • Understanding routing policy
  • Writing our routing policy using RPSL
  • Configuring routers based on Routing Registry information
  • Generating prefix list filter from routing policy
Read More

Introduction

BGP is the protocol that essentially makes the Internet as we know it work. It is what combines the various autonomous routing domains out there into the entity called the Internet. If you are a service provider, or are an enterprise user that multi-homes or just want more granular control of how to connect to the rest of the world, you need more than basic BGP skills. Upon completing this module, participants will be able to...

  • Configure, test and verify BGP advanced filtering.
  • Configure, test and verify the manipulation of path path attributes for IPv6 NLRIs.
  • Configure, test and verify other advanced features of BGP specific to IPv6.

 

Target Audience

  • Network engineers and architects
  • Network technicians and support staff

 

Pre-requisites

 

Module outline

  • Quick overview of BGP session setup for IPv6
  • Filtering with prefix lists, community lists and route-maps
  • IPv6 NLRI path attribute manipulation
Read More

Introduction

This is the keystone foundation module for all our technical workshops. It gives the participants a solid understanding of IPv6's core concepts and is required for understanding all other IPv6 topics. On completion of this module you will be able to:

  • Identify, write and shorten IPv6 addresses
  • List the types of IPv6 addresses and their unique characteristics
  • Create an IPv6 address plan for a network
  • Identify and list the equivalent IPv4 key protocols in IPv6
  • Describe how NDP is used to deliver key IPv6 functions
  • Configure and verify basic IPv6 on hosts and routers

 

Target Audience

  • Network engineers and architects
  • Network technicians and support staff 

 

Pre-requisites

  • IPv4 Addressing and subnetting.
  • The OSI model and the various protocols that operate at each layer.
  • Intra-domain routing and OSPF.
  • How to use the command line interfaces of key routing platforms (e.g Cisco IOS)

 

Module outline

  • IPv4 address exhaustion - review, implications and consequences
  • IPv6 address basics - notation and representation
  • IPv6 addressing types
  • IPv6 address planning
  • IPv6 from an IPv4 perspective
  • Understanding ND and key IPv6 mechanisms
  • IPv6 address provisioning
    • Stateless Automatic Address Configuration (SLAAC)
    • Dynamic Host Configuration Protocol (DHCPv6)
  • Basic IPv6 address configuration and verification on equipment
  • Labs/Exercises
    • Planning IPv6 address pace for a given network
    • Configuring and verifying IPv6 on hosts (Windows, Mac OS X, Linux/Unix)
      • Static Configuration
      • Automatic Configuration
    • Configuring and verifying IPv6 on routers
    • Verifying IPv6 functioning using network packet captures (tcpdump, tshark etc) 
Read More

Introduction

Builds on the IPv6 Foundations and covers all aspects of IPv6 routing, from brief theoretical overview, difference from the IPv4, configuration, verification and troubleshooting. Upon completing this module you will be able to...

  • Describe the various scenarios in which transition techniques are required
  • Select a transition technique to fit various scenarios
  • Configure, test and verify dual stack operation
  • Configure, test and verify manual tunnels
  • Configure, test and verify 6rd tunnels
  • Describe how NAT64 works and when to use it

 

Target Audience

  • Network engineers and architects
  • Network technicians and support staff

 

Pre-requisites

 

Module outline

  • Introduction Transition Mechanisms
  • The problem that transition mechanisms solve.
  • Dual stack
    • Infrastructural Elements
    • How it Works
    • Typical Use Case
    • Configuration, Verification and Troubleshooting
  • Manual Tunnels
    • Infrastructural Elements
    • How it Works
    • Typical Use Case
    • Configuration, Verification and Troubleshooting
  • 6to4 and 6RD
    • Infrastructural Elements
    • How it Works
    • Typical Use Case
    • Configuration, Verification and Troubleshooting (6RD Only)
  • 6PE and 6VPE
    • Infrastructural Elements
    • How it Works
    • Typical Use Case
    • Configuration, Verification and Troubleshooting
  • NAT64 & DNS64
    • Infrastructural Elements
    • How it Works
    • Typical Use Case
    • Configuration, Verification and Troubleshooting
  • SLB664
    • Infrastructural Elements
    • How it Works
    • Typical Use Case
    • Configuration, Verification and Troubleshooting
  • DS-Lite
    • Infrastructural Elements
    • How it Works
    • Configuration, Verification and Troubleshooting
Read More

Introduction

Widespread IPv6 adoption can only come when those who make key decision regarding the strategy, resources, processes and people in and organisation (i.e. its executives) understand at a strategic and business perspective the importance of IPv6. This module aims to close that knowledge gap and give executives actionable advise on how to evaluate IPv6 strategically as well as support their technical people in deploying it.

This module is part of our strategy to reduce the dissonance between the organisation's technical core and the executive/managerial apex. The objectives of this module are as follows:

  • Educate high level execs on non-tech importance of IPv6
  • Helping drive IPv6 adoption from the executive/managerial top
  • Help governments to produce IPv6 strategic plans/roadmaps

 

Upon completing this module, you will be able to :

 

  • Describe the implications of IPv4 address exhaustion for your organisation
  • Describe the alternatives for continued growth of the Internet
  • Create a high level IPv6 strategy for your organisation
  • Understand the key metrics to look for in your technical team with respect to IPv6 deployment

 

Target Audience

  • Executives and managers
  • Government regulators
  • IT advisors to government officials

 

Pre-requisites

  • An open mind
  • A willingness to keep your organisation technologically relevant 

 

Module outline

  • How the Internet works 
  • The Internet number resource management system
  • Understanding IPv4 Address Exhaustion and Implications for your organisation
  • The Strategic opportunities and business case for IPv6 for your organisation
  • Understanding and managing the risks around IPv6
  • Understanding the impact of IPv6 on technology, processes and people
  • Driving IPv6 adoption in your organisation
  • Managing the costs of IPv6 adoption
  • Creating an IPv6 implementation plan for your organisation
  • Case studies
Read More

Introduction

Better security frequently features as one of the selling points of IPv6. While debatable, the need to secure IPv6 networks is not in doubt. This module will give the you the necessary theoretical framework for understanding, planning and implementing security on IPv6 networks. Upon completion of this module, you will be able to...

  • List the security issues raised by IPv6
  • Configure, test and verify various aspects of IPv6 security

 

Target Audience

  • Network engineers and architects
  • Network technicians and support staff
  • Systems administrators

 

Pre-requisites

 

Module Outline

  • IPv6 security overview - capabilities, pros and cons
  • IPv6 threats & mitigation
    • Internet edge
    • Network perimeter
    • LAN Security
  • Securing Transition mechanisms
  • Protocol security vulnerabilities
  • Monitoring IPv6 security 
Read More

Introduction

A good network is only as useful as the services or applications that run on it. This module covers how to set up and run the most common services expected of any network - DHCP , DNS , Web and Mail. After concluding this module, participants will be able to...

  • Verify any application for IPv6 capability
  • Configure and test an dual stack DNS server
  • Configure and verify a dual stack DHCP server
  • Configure and verify a dual stack web server
  • Configure and verify a dual stack Mail server

 

Target Audience

  • Systems Administrators 

 

Pre-requisites

  • IPv6 Foundations (including all its pre-requisites)
  • Competence with building and maintaining existing services in IPv4

 

Module outline

  • IPv6 Status of Popular Enterprise Applications
  • Planning and deploying IPv6 DNS Servers
    • Brief overview of the DNS protocol
    • Infrastructural elements of DNS and how DNS works
    • IPv6 status of popular DNS server implementations
    • Configuring BIND for dual stack operation
  • Planning and deploying IPv6 Web Servers
    • Brief overview of the HTTP protocol
    • Infrastructural elements of HTTP and how it works
    • IPv6 status of popular web server implementations
    • Configuring Apache & IIS for dual stack operation
    • Adding IPv6 support to existing servers that don't support IPv6
  • Planning and deploying IPv6 Mail Servers
    • Brief overview of the IMAP, SMTP and POP protocols
    • Infrastructural elements of Internet mail and how it works
    • IPv6 status of popular mail server implementations
    • Configuring Exim for dual stack operation
  • Planning and deploying an IPv6 Network Management Server
    • Network management overview
    • Challenges in IPv6 network monitoring
    • Configuring and testing Nagios
Read More

Introduction

Builds on the IPv6 Foundations and covers all aspects of IPv6 routing, from brief theoretical overview, difference from the IPv4, configuration, verification and troubleshooting. Upon completing this module, participants will be able to...

  • Configure, test and verify intra-domain routing with OSPFv3
  • Configure, test and verify inter-domain routing with BGPv4
  • Configure, test and verify IPv6 route redistribution
  • Configure, test and verify IPv6 route summarisation

 

Target Audience

  • Network engineers and architects
  •  Network technicians and support staff

 

Pre-requisites

  • IPv6 Foundations module (including all its pre-requisites)

 

Module outline

  • Fundamentals of routing in IPv6
  • Static routing
  • Intra-domain routing with OSPFv3
  • Inter-domain routing with BGP
  • Route Redistribution
  • Route Summarisation
  • Securing IPv6 Routing Protocols
Read More

Introduction

We are first and foremost the Internet Registry for Africa and as such our main mandate is to ensure that IP number resources are effectively managed in the region. This module introduces you how we work, what services we offer and how to interact and request resources from AfriNIC. After concluding this workshop, participant will be able to...

  • Describe what services are available from AfriNIC
  • Apply for IP number resources from AfriNIC
  • Explain the importance of the policy development process and how to take part in it.
  • Query the whois database

 

Target Audience

  • Network engineers and architects
  • Network technicians and support staff 

 

Pre-requisites

  • IP Addressing and subnetting.
  • The OSI model and the various protocols that operate at each layer.
  • IP routing
  • Ability to run programs on the command line

 

Module outline

  • Understanding Internet Resources & how they are managed
    • Introduction and types of Internet resources (IP addresses, ASNs, FQDNs).
    • Key organisations involved in managing the Internet (ICANN, NRO, IETF, RIRs)
    • How IP resources are managed globally (structure and principles)
  • About AfriNIC and what we do
    • Company information
    • The services we offer to the community
    • Our community work 
  • Number Resource Policies in Africa
    • About the AfriNIC Policy Development Process.
    • How policies affect you.
    • How to get involved.
  • IPv4 depletion - facts, timelines and implications
  • IP Address Planning
    • Why NAT is not a solution to the problem of IPv4 exhaustion (aka Why NAT is evil)
    • Understanding CIDR and how it features in your IPv4 address plans
    • Estimating your IPv4 addressing needs
    • Estimating your IPv6 addressing needs
  • Interacting with AfriNIC
    • Becoming an AfriNIC member.
    • Specifications of key documentation required.
    • About the RSA and how to fill it.
  • Introduction to WHOIS Database (Objects, querying and uses)
  • Introduction to MyAfriNIC
    • What is MyAfriNIC
    • What can be done with MyAfriNIC?
    • How to do various tasks using MyAfriNIC 
Read More

Introduction

The whois database is at the core of what AfriNIC does and all number resources managed for the region are in the database. This module delves into the details of manipulating objects in the database.Upon completing this module you will be able to...

  • Create objects in the whois database
  • Modify and delete objects 
  • Secure objects using PGP keys

 

Target Audience

  • Network engineers and architects
  • Network technicians and support staff

 

Pre-requisites

  • IP Addressing and subnetting.
  • The OSI model and the various protocols that operate at each layer.
  • IP routing
  • Ability to run programs on the command line

 

Module outline

  • Overview of the whois database - structure, objects, and attributes
  • Understanding object inter-relationships
  • Creating objects
  • Modifying objects
  • Security objects
Read More

Introduction

Whether rolling our a new network or extending and existing one, planning for the IP addresses required is an often overlooked endeavour. This module addresses that need. Upon completing this module, participants will be able to...

  • Calculate the exact IPv4 and IPv6 address space that they need
  • Request such address space from AfriNIC

Target Audience

  • Network engineers and architects
  • Network technicians and support staff

Pre-requisites

  • TCP/IPv6 knowledge and skills 
  • IPv6 Foundations module (including all its pre-requisites)

Module outline

  • Overview of IPv4 subnetting, CIDR and summary routes
  • IPv6 subnetting and summary routes
  • VLSM and calculating IPv4 address needs 
  • Calculating IPv6 address needs
  • Carving out and allocating your IP space
  • About NAPT - where might it make sense?
Read More

Introduction

This module helps ISPs to properly register their prefixes and specify their routing policy in the Internet Routing Registries. After concluding this module, you will be able to:

  • Register your routing information in the a Routing Registry
  • Describe your routing policy with RPSL
  • Use the tool that creates prefix filters based on policy information 

 Target Audience

  • Network engineers and architects
  • Network technicians and support staff
  • Systems administrators 

Pre-requisites

Module outline

  • Benefits of using a Routing Registry (RR)
  • Understanding and creating a route6 object
  • Understanding routing policy
  • Writing our routing policy using RPSL
  • Configuring routers based on Routing Registry information
  • Generating prefix list filter from routing policy
Read More

создать сайт