IPv6 deployment – irc.ox.ac.uk and ntp6.oucs.ox.ac.uk complete

Our targets for the IPv6 deployment for this week have been mostly successful

  • Enabling IPv6 to first half and now the second half of the OUCS server room has been completed, we’ve had no complaints of disruption from other teams so this appears successful.
  • All our development hosts are now IPv6 enabled. These were the first hosts enabled which was useful for setting up our configuration management systems handling of IPv6.
  • Two of our four IPv4 stratum 3 NTP servers are now IPv6 enabled, providing a live service currently at ntp6.oucs.ox.ac.uk. In months to come I suspect we’ll add AAAA records for ntp.oucs.ox.ac.uk however for now we’re being cautious.
  • At IT support staff request the IRC service at irc.ox.ac.uk has been IPv6 enabled ahead of schedule. This was more rushed than I would have liked but we were able to test on a development host and the change was completed with the service live without downtime or disconnections. Sadly the jabber/xmpp service which is present on the same physical server received less testing and wasn’t successfully IPv6 enabled, AAAA records for this service have been removed until time can be set aside for proper testing and deployment. For this service (which is mainly used by IT Support Staff) we decided to add AAAA records for the normal service address (rather than use, say, irc6.ox.ac.uk) but haven’t seen any reported issues yet.
  • Our teams main database server has been IPv6 enabled, this is not a direct service to IT support staff but provides information to many of the tools and backend processes.

The following were originally planned for this morning but are behind schedule:

  • IPv6 enabling the webcache service – this simply hasn’t had time set to it due to other demands. It’s reasonably straightforward (a little Squid configuration, some ip6tables work, some testing) but I don’t believe the migration should be done live like the irc.ox.ac.uk service was and although little used nowadays it has a larger number of users than the irc service.
  • Outside the IPv6 project the migration of one of the university main DNS servers to new hardware will be delayed. It was ready on time this morning but I’d like to do more testing before deploying, I wasn’t comfortable that it had been tested enough.

So my work for the next four days is

  1. Testing the replacement DNS server with the aim to deploying in next weeks Tuesday slot instead (21st September)
  2. Planning/preparation for IPv6 enabling the webcache in the same slot
  3. IPv6 enabling the host that provides our team website IT support staff use for internal network facilities, this is also a IPv4 NTP stratum 3 host so we can add it to the ntp6.oucs.ox.ac.uk service once enabled.
  4. Ahead of schedule, adding the network monitoring system host itself to IPv6 as it’s also a IPv4 stratum 3 NTP host, but probably not doing any work on monitoring via IPv6 until the planned date due to time.
Posted in IPv6 | 1 Comment

IPv6 and related work over the next month

We’ve a timeline of work for the IPv6 deployment for the next month which might be of interest to some and at the same time we’ve work updating the hardware and operating systems for certain core services. There’s other services that will also need to support IPv6 but I don’t want to plan at an operational level for much more than a month ahead since unexpected additional tasks tend to crop up and skew the dates.

In brief we’re enabling IPv6 to our server room and starting the first core service upgrades, in some cases mixing the migration in with a standard hardware/software refresh (where combining the tasks makes the migration simpler rather than harder). The dates reflect the weekly JANET at risk period for maintenance, Tuesday 7:00am-9:00am.

Date Project Work
7th September IPv6
  • Enabling IPv6 to first half of the OUCS server room
  • Make all networks team development hosts IPv6 enabled
14th September IPv6/Servers
  • Enabling IPv6 to the last half of the OUCS server room
  • Make ntp.oucs.ox.ac.uk accessible via IPv6
  • Make the webcache service accessible via IPv6
  • Migrate one authoritative and one resolver to new hardware/software
21st September IPv6
  • Make the comms.oucs.ox.ac.uk utilities website for IT support staff accessible via IPv6
28th September IPv6/Servers
  • Make authoritative and resolver DNS available via IPv6
  • Migrate network monitoring host (monitors services) to new hardware/software and IPv6 enable
5th October IPv6/Servers
  • Migrate database host to new hardware/software and IPv6 enable
12th October Servers
  • Migrate DHCP service to new hardware/software
19th October Servers
  • Migrate DNS master to new hardware/software
20th October and relax…
  • update the blog about what our IPv6 plans are for the next month

You might think that we could enable core services faster however the above is one persons work from a four man team – we will have normal duties and other projects underway during this period (the team manages 22 public services and about 13 internal services (physical network monitoring, telecoms integration etc).

The enabling of the first part of the OUCS server room this morning (and the background research/testing as well as the notes this section is based on) was done by another team member however the essential features are that we’re providing IPv6 to the server room with router advertisements disabled, meaning dual stacked servers run by other teams won’t suddenly obtain an IPv6 address automatically. We can get on and IPv6 enable our teams services with a statically configured address without disrupting others. The configuration on a cisco device looks like

ipv6 nd ra suppress
ipv6 nd prefix default 2592000 604800 no-autoconfig

The Cisco IPv6 command reference for nd is available online. In the example above ignore the numbers which are just defaults for valid-lifetime and preferred-lifetime in seconds (normally for a specific network prefix, which we do not need in this case) via router advertisement. The important part is the ‘suppress’ and ‘no-autoconfig’.

The first line tells the router that for ipv6 neighbour discovery it should suppress periodic router advertisements. The second line instructs the router that if asked it should tell the client not to use autoconfiguration for the network. In technical terms, when it gets a request from a client it will respond but in the Prefix Option (see RFC2461) the A-bit is cleared, meaning that the client must not use autoconfiguration for that prefix.

For further information see this c-nsp thread on RA/RS messages and also this other thread.

Posted in IPv6 | Comments Off on IPv6 and related work over the next month

Implementing Spanning Tree

Some of the IT support staff have taken the recently published IPv6 trial conditions quite seriously and we’ve already had two queries with regards to the spanning tree requirement. These queries aren’t disputing it but rather asking about specific behaviour that will occur when implementing it.

This is a slightly tricky article to write as

  1. In our immediate team we tend to have spanning tree present on networks from the beginning
  2. We use predominantly Cisco products on the backbone however college or department IT staff may be using any vendor, so please excuse any Cisco specific terminology – your vendors implementation should be roughly similar.

But lets dive in

1. Look at your network

Specifically do you have mix of vendors? Know in advance that although they can work together it’s possible to encounter some unexpected issues (I believe we’ve some investigative work planned in this area to assist).

You should have a login to your managed switches and complete list/inventory of the switch devices on your network. If not then perhaps you’ve inherited a network as part of a new position and some detective work is required to audit the network before you proceed. Cisco CDP, the IEEE LLDP or your vendors equivalent may be of assistance.

Draw a network diagram of your core network to help you visualise the network and speed up troubleshooting.

2. Decide on the type of spanning tree

Spanning tree is a great help, but depending on the age of your switch hardware and software you may have the opportunity to deploy rapid spanning tree (RSTP – IEEE 802.1w), which has benefits discussed below. You may also have the opportunity to use one of the implementations of per VLAN rapid spanning tree which you may decide to use if able and your network uses VLANs.

Dipping into the CCNA ICND2 Exam Certification Guide by Wendell Odom, Cisco Press we can save a lot of time and steal the following table from p88 which illustrates the features offered by the three main per VLAN spanning tree options on Cisco devices.

Option Implemented via STP/802.1d Implmented via RSTP/802.1w Configuration Effort Only one Instance Required for Each Redundant Path
PVST+ Yes No Small No
PVRST No Yes Small No
MIST (MST) No Yes Medium Yes

I’ve altered the column title of the second (and third columns) in the above table from the original of ‘supports STP’ to make it clear that although the implementation may not use standard spanning tree it will co-exist with it. A network of rapid spanning tree switches can co exist with normal spanning tree and the switches will do the right thing in order to work together.

Don’t change the timing values of spanning tree when configuring it, leave these at the defaults. If you disagree with this then you’re probably excessively familiar with spanning tree and the advice in this article isn’t aimed at your level.

Mentions of spanning tree from this point onwards will tend to be generic unless otherwise stated and hence refer to whichever implementation you have chosen.

3. Plan – What will I see when I first implement it?

Firstly, standard spanning tree takes roughly 50 seconds to converge after a change, rapid spanning tree may be between 2-10 seconds. Convergence may be noticeable to your users as a delay, so perform the introduction out of standard working hours. If you have an at risk period, such as JANET’s Tuesday 7:00-9:00am period which has been widely adopted, then use this period.

In everyday use, if a link were to go down then with traditional spanning tree you might expect a reconvergence time to a redundant link of perhaps 30 to 50 seconds since any minor topology change might not result in a full network spanning tree reconvergence (e.g. it happens faster if you only have 3 switches instead of 30).  Those with a fascination for detailed scenario explanations should take a look at Cisco press “CCNP Switch 642-813 Official Certification Guide” by David Hucaby, p142 onwards.

I’d start by enabling spanning tree on your core switch e.g. the switch closest to the centre of your network (or one of them if you have more than one). It will initially assume it is the spanning tree root bridge until it decides otherwise from spanning tree traffic it receives. You can manually change the bridge priority to make the switch become the root bridge in any spanning tree election. Manually picking the root bridge will mean spanning tree topology should take reasonably expected paths in a more complex network. After this is done enable spanning tree on all your other switches.

If you’re unsure, the above paragraph seems confusing and you can count all your switch devices on a few fingers and toes then simply turn on spanning tree on all your switches. The switches will elect a root bridge without your involvement and should do the right thing.

With standard spanning tree as you enable it you might lose contact with switches for 20 seconds as the links start in spanning tree blocking mode then transition to forwarding (taking 20 seconds to do so), this is normal.

You might see some links go down and yet the network still functions – perhaps you didn’t know you had a redundant link (loop) on your network. Imagine you have the three switches – with a cable connecting them together in a triangle: with spanning tree two links would be up, the other would be disabled (connecting ports put into a blocking state), preventing a loop. If one of the live links was broken the disabled link would be made live automatically.

End users workstation ports connected to a switch running standard spanning tree will see a delay of roughly 30 seconds or more from connection to usability. This is noticeable to users and may result in odd complaints such as that “your DHCP server is too slow” or similar. You can configure “portfast” (I’m told on HP equipment this is the edge-port feature) on these ports to keep the port in a spanning tree forwarding state and make the delay vanish, which is good. The minor risk is that someone will plug in a switch that doesn’t do spanning tree to this port and another port, creating a bridging loop. Use BDPU guard (or your vendors equivalent) on ports you have portfast enabled on to protect against these ports being accidentally connected to another spanning tree enabled switch [this section may be expanded upon in the future].

4. Aftermath

Everything should be fine, but there would be a lot less IT positions if equipment always did what it should. Double check your network is functional (perhaps you have a Nagios,Zabbix or equivalent).

Look at what links (if any) spanning tree has disabled, and compare it to your network diagram. Did you know these redundant links were present?

You can now add intended redundant paths between your switches (e.g extra cables) for fault tolerance without impacting your network. Spanning Tree will automatically disable (connecting ports put into a blocking state) the redundant link when you plug it in and start using it when the usual link is broken.

Make yourself a cup of tea, smile to yourself and realise that you will have a reduced workload and less odd confusing issues with your network. When you hunger for more read more about STP, PortFast and BDPU Guard. Perhaps you might channel bond where you have dual links between switches and one is currently disabled by spanning tree. You might consider deploying Netdisco.

Finally don’t forget to drop our team an email to state you’re ready to take part in the IPv6 trials.

Posted in Best Practices, IPv6 | 1 Comment

Machine Room IPv6 and checklist for early IPv6 adopters

We’ve made some progress, we’ve reached agreement with the security team that we can enable IPv6 on the OUCS machine room hardware starting 7th September, which means we will be able to start making our core network services IPv6 capable. We’ve already had the political approval for this so this week we’re testing before the change.

I’m currently working on a hardware refresh of the core DNS/DHCP service so there’s a good chance that when the new DNS servers come online they will be able to handle queries over IPv6. The other core network services might not take long to follow as we’ve already done a lot of the background work needed. By the time this is done we can start deploying IPv6 to units that are interested in early testing.

I did an IPv6 talk today for roughly 40-50 of those not able to make the recent talk at the IT support staff conference. I gave a handout to anyone interested in taking part in early testing, a copy of which is below. It’s important to remember that the university is made up of roughly 200 politically independent units, most of which have their own local IT support staff. There’s a lot of variety in skill sets/specialities and this is compounded when either managers or IT staff could be the audience so it’s sometimes tricky to get the technical level right in the handout.

So the following are steps we are asking units to have taken before taking part in the IPv6 early adopters/testers.

1. Are you running Spanning Tree?

Please deploy Spanning Tree Protocol (STP) on your switches. This prevents network loops in your network, symptoms of which will be any of

  • excessive broadcast traffic

  • unexpected traffic arriving at interfaces

  • lower than expected network throughput

This is important because network loops are a fundamental issue in a complex network which STP resolves. Your switch vendor support channels may refuse to assist you with other issues you raise while looping is evident on your network.

Rapid Spanning Tree Protocol (RSTP) can be viewed as a newer implementation of STP, this is also fine and will give a much shorter ‘repair’ time (convergence) to repatching if your switches support it.

This isn’t our only switching advice but it’s the bare minimum you should have for a sane network.

Links:

http://packetlife.net/blog/2009/oct/15/stp-your-friend/

2. Do you have a helpdesk ticketing system?

You should be able to track a users open issues, track new issues, see what work has been done on troubleshooting an issue and who is dealing with it. If there is some dispute or re-occurrence and a user queries what happened to their previous issue, you can then look it up and see what the last correspondence was and why it was resolved.

If you don’t have one of these the ‘RT’ system is recommended and widely used.

Links:

http://bestpractical.com/rt/

[edit] I should have noted in the original handout that NSMS can offer RT as a hosted service to units, they have price details online.

3. Do you have a network diagram?

You should have or be able to produce a physical and logical network diagram for your network. It doesn’t have to have every workstation you own but you should be able to diagram your core infrastructure.

This will save you time when planning network changes and IPv6 deployment. It may save expensive (man-hours or equipment) design mistakes.

Ask another team member to independently check the diagram or separately produce their own to test it is correct.

4. Do you have a central documentation system for the IT team?

Can your IT staff record information about a service, server or similar that other staff can then look up? It could be a wiki or a content management system like Plone or even a shared folder full of MS Word documents (not a recommendation but better than nothing), as long as it’s actually usable. Does your team find it easy to use, are they using it?

This is important because it reduces duplication of effort. Odd corner cases and workarounds are troubleshooted/discovered and documented once, from then on staff need only implement the solution that was previously found, no matter if the staff member is ill, has left or worse.

If server/service X goes down then the documentation should let junior members of staff bring it back up.

5. Are your hosts time synchronised?

You can use the NTP servers that make up ntp.ox.ac.uk and ntp.oucs.ox.ac.uk. These means that when you are troubleshooting you can know for sure that the time period from logs on one server match that on another. At least have your servers and key network devices (firewalls etc) synchronised with a working NTP service.

6. Are you on top of your IT in general?

1) Check your unit doesn’t have unhandled security blocks on hosts pre-dating 2010

[internal only link, sorry] https://networks.oucs.ox.ac.uk/webauth/blocks

If it does, chase each one up with security@oucs.ox.ac.uk , investigate and clear them up.

2) Check your units university firewall webserver exemption details are correct and don’t include dead hosts or unexpected internal webservers, unexpected items of critical network infrastructure that happen to have a web interface and similar.

[internal only link] https://networks.oucs.ox.ac.uk/webauth/firewall?showog=http_servers

To change entries email networks@oucs.ox.ac.uk

3) Look at your internal helpdesk queue, are you coping? If you can’t tell what is going on, or there’s more than perhaps 30 open tickets per supporting staff, then it might be time for some form of intervention.

The aim of the above wasn’t to put up barriers to adoption but to ensure that a basic level of network sanity was present in those networks taking part. I could have made the list longer (ideas welcome in the comments) however some of the above are quite large projects to undertake for a small unit currently without and facing a 10% budget cut plus employment freeze. Aside from IPv6 perhaps our team could produce a best practise recommendation checklist for units that they can self audit themselves against (and keep the results to themselves) if they wish.

Posted in IPv6 | 1 Comment

Relaxing the DNS CNAME rules (a little)

In the University we have a web tool which allows IT Staff to update parts of the DNS covering their own unit. It’s a simple tool which we hope one day to replace, but serves well enough for most cases for the time being.

One restriction coded into the tool is that when creating a CNAME, the alias itself and also the target of the alias must both be within the IT Officer’s own ox.ac.uk subdomain(s). For example, assuming we are an Engineering Science IT Officer:

test1.eng --> www.eng   OK
test2.eng --> www.chem  FAIL

However a good number of units in the University are collaborating on, sharing or leasing IT services from other units, often requiring cross-unit CNAMEs to be in place. IT Officers email Hostmaster to ask for such records to be created, and my team does that for them. However we’re aware that we add no value to this process, as we’re not checking the validity of the CNAME target other than that it’s within the ox.ac.uk domain. If we add no value to a process as humans, it’s a good candidate for automating away!

Therefore we’ve recently rolled out a change to the DNS web admin tool that allows the target of a CNAME to be the name of any other A record within the University. The CNAME itself must still be within the IT Officer’s permitted DNS subdomains, but now they are free to point at any other A record’s name in ox.ac.uk:

test1.eng --> www.eng   OK
test2.eng --> www.chem  OK

I hope this proves welcome from those collaborating within the University!

p.s. In the web tool, as above in the examples, you omit the ox.ac.uk from host names just to save effort. However when configuring your hosts don’t forget that the fully-qualified name does include .ox.ac.uk on the end!

Posted in DNS, Productivity | Comments Off on Relaxing the DNS CNAME rules (a little)

The State of the IPv6 Deployment

At the ICT conference I gave a talk alongside Bob Franklin from Cambridge. Bob covered IPv6 in general and then I covered a deployment case study using our teams deployment plans but trying to make it as general as possible so that I’m describing

  • a connection to the internet
  • having services you run
  • having customers you serve

…which should hopefully make it applicable to Oxford or Cambridge and any subunit.

This is a rough text version of the talk, I didn’t speak from a script so it may differ slightly and in the talk I did skip a few minor ideas that Bob and I had accidentally overlapped on.

Note that you could make a start on these steps today, you do not need a IPv6 connection as your first step. A working connection is actually quite a late step in the preparation.

1) Perform a network device audit

In roughly 2008 we started an audit of all switch, router and firewall hardware on the backbone to record hardware and software versions.

The resulting list was then compared to what the vendor said the device could do. Some devices might have no IPv6 support, others might be partial, others might support it but purely in software as opposed to hardware. For a firewall supporting IPv6 in software might mean that the device can deal with multi Gb/sec rates of IPv4 traffic but only 80Mb/sec of IPv6 which is not workable.

When looking to replace items you may decide some devices might not need IPv6 support in their lifetime – it might be operating as a simple switch with no access controls nor management via IPv6.

Be prepared to test a sample device with the software version you are planning to run – as fairly new implementations IPv6 commands may have defects or simply fail to run. You might need to upgrade your device vendors operating system on the device or raise a support case with them. It’s usual to upgrade the software for security issues however it’s typical to stay on a release that it known to be stable so you may uncover the need to upgrade as you test your intended IPv6 deployment.

Rather than spending money to replace a large quantity of equipment, plan to replace devices during normal hardware maintenance cycles. That is, if a non IPv6 capable device is up for replacement in a year, then perhaps you can wait until this time to purchase new hardware that is ensure to support IPv6. Ask the vendor for a sample before you purchase many units and test it. Complain with technical detail if you find flaws while attempting your planned IPv6 commands.

For other equipment you may decide it’s necessary to make a short term purchase in order to keep your deployment plans moving.

2) Perform an audit of services

The public services offered by our team were fairly easy to enumerate (DNS, NTP, SMTP etc), for each we recorded the software version and research the IPv6 capability. Where it was lacking the expected native IPv6 release version/date was recorded.

Slightly more tricky is enumerating the tools we offer that provide a service to our customers (in our case IT support staff), such as web interface that take an IPv4 address as the query in order to show DHCP reservations, or anywhere an IPv4 address is entered to register a device. In each case the tool needs to be rewritten to support IPv6 (which might be minor or major code changes depending on the tool) or needs to be planned to be replaced.

Then lastly behind the scenes we have all the scripts that ‘glue’ together the services; cron jobs that retrieve database data, scripts that update service configuration, backup and restoration scripts. We have roughly 150 of these, and an audit needs to be done to find places for instance with regular expressions looking for IPv4 addresses, replacing them with a regular expression library of some sort that can match either IPv4 or IPv6. I’d suggest using a regular expression library that can do this is better than having to write two separate scripts, or a script full of twice the logic decisions.

3) Build an IPv6 test network

We built a IPv6 only test network and deployed the same production services we run on IPv4 but entirely in the IPv6 test network

We documented any differences in configuration syntax and behaviour for setting up the service under IPv6

We also documented minor aspects, changes in utility names (e.g. ping6 instead of ping, ip6tables instead of iptables) since this step is also important in getting staff experienced in the configuration under IPv6 and also root out any surprises

Note that you do not need a functional IPv6 connection to any external network to undertake these steps.

4) Write a formal deployment plan

Can be peer reviewed, helps to straighten out all the minor aspects of deployment that might not have been considered.

The plan can then be shown to management and other teams to make them aware of the situation

We then approached a unit (e.g. customers) we knew to be technically able and constructive to work with (for a department this equivalent might be a research group or similar subset of users), asking if they would like earlier than normal access to an IPv6 connection supplied to their unit in return for feedback from them and under the understanding that this was not a production service – there might be some unforeseen consequences during development.

Having had a good experience with the first, we approached two other customers but I had made a mistake in our planning. We’d considered all the technical aspects of deployment but not the political aspects. The questions included:

  • Can you prove that the university isn’t about to demand our IPv4 space back?
  • Can you prove when the last IPv4 space will be given out in the university?
  • Is the University making any money available to the units for the change?
  • The supplied IPv6 connection has to be a fully production service with no issues

By this point we’d also joined the Cisco IPv6 deployment council so that we could give feedback on what IPv6 feature development we wanted from our current switch vendor. It’s under a Non Disclosure Agreement so I’ll not go further into this other than to say it’s technically valuable to us.

5) Produce a formal IP addressing Policy

It took longer than expected to produce the addressing policy, the main concerns being of making mistakes at this point in time that would be impossible to fix without severe disruption later and hence inflicted upon generations to come.

We used advice from technical sources including Southampton and Loughborough Universities as well as our switch vendor.

6) Where are we now?

  • We’ve deployed a dedicated server to handle IPv6 traffic in and out of the university in place of passing it through the main university firewall, the later being capable of IPv6 in software only. When the next maintenance purchasing cycle is due this will be replaced with dedicated hardware.
  • We’re aiming to supply IPv6 connectivity to our machine room in a controlled fashion (to avoid unexpected impact on other teams), once done we can start IPv6 enabling the core network services.
  • The first unit will be supplied with an IPv6 connection as part of the initial trial once our security team is content that they are ready to handle dealing with security incidents on IPv6 based hosts (we’re expecting this to be probably within a couple of months).
  • Our current university DNS/DHCP interface for IT support staff cannot handle IPv6 but the implementation of the replacement in the Oxford environment is a little complex. The replacement was hoped to be ready for mid August but this now looks impossible (this is a large project so I’ll do a separate post to cover this).
Posted in IPv6 | 3 Comments

Visitor Network Account Management (enhancements update)

Note: this post relates to a private service for University of Oxford IT Support Staff.

Some time back I published a list of proposed updates to the Visitor Network account management web tool, and asked for feedback. Based on that article the first major phase of work is now complete, so I’m pleased to say that you’ll now find the tool has these improvements:

  • A note about there being a max. of 300 accounts when auto/bulk generating
  • Auto-generated account names have leading zeros so they can sort correctly in a list
  • Password generation rules tweaked so they don’t begin or end with a symbol (non-alphanum) or have repeating symbols
  • The 14 day one-off account lifetime-limit now really is 14 days (and not 13d 45m)
  • There is a confirmation dialog box when deleting a group containing still-valid accounts
  • IP accounting fixed so we have byte counts both in and out once again
  • Ability to upload a list of visitor names when bulk generating accounts (as alternative to auto-generated names)
  • Ability to download comma separated list of the account names and credentials within a custom group
  • The default end time for groups and users is now one day in the future
  • Freedom to use any characters in the text fields of the form
  • Clicking enable/disable/delete remembers your place in the tool when the action is complete
  • A calendar date-picker widget to ease selection of start/end dates
  • Improved auditing shows who last edited a group, and we keep 90 days’ logs of admin tool activity

In addition, we’ve set up a RADIUS service hosting the Visitor Network account credentials. This means you can use the Visitor Network accounts and web admin tool simply as a back-end to your own log-in portal or other authentication system, as you wish. For further information please see our registration tool.

I hope you’ll find these enhancements as welcome as I do personally! Please let me know via networks@oucs.ox.ac.uk if you spot any bugs.

Posted in Services, Wireless | Comments Off on Visitor Network Account Management (enhancements update)

OWL and Eduroam

There seems to be a little confusion out there about how OWL relates to Eduroam so this is a overview to help clarify the situation.

We have deployed Eduroam using WPA enterprise. Briefly from the users perspective this means that instead of the domestic use of WPA whereby a single password would be used for the whole wireless network, a username and password are used and authenticated to the home university (to a RADIUS server). Each person has a different username and password and, thanks to the Eduroam network between institutions, these credentials will work at remote sites at other universities and similar that have deployed Eduroam. Eduroam is a better user experience than OWL once configured on the users device for reasons I’ll explain below.

OWL is an unencrypted network that provides a captive portal system for visitors and access to a VPN system for university members. Why didn’t we deploy WPA Enterprise for this? The answer is to do with time – OWL was deployed in (I believe) 2003 (with OWL visitor added on in 2005) when WEP was  just about becoming widely supported on users devices and WPA was sadly not. Captive portal for university members was not a good idea since the traffic would be unencrypted. WEP campus wide would have meant a single password for the entire campus and plus the WEP protocol was fundamentally broken (it was/is trivial to crack). We couldn’t deploy WPA as there were barely any devices supporting the standard. Hence we used a unencrypted network with clients making a (encrypted) VPN tunnel back to a dedicated VPN server (a concentrator). This supports any client that can run the Cisco VPN software (or if the user is technically self-supportive – any VPN software that supports xauth). OWL-Visitor and OWL-VPN were originally separate SSID’s but are combined into one SSID of just ‘OWL’ on recent deployments alongaside Eduroam and where possible are combined at suitable maintenance windows on exiting dual SSID installations.

Yes ,there are limitations to the Cisco VPN client, especially prior to the recent Anyconnect client. ICT (another support team in Oxford) handle the support of the clients and took the decision to support one common client. We do provide information for 3rd party clients but ICT can’t claim to have knowledge of all these. They’ve drawn a line as to what they can support based on their workload, budget and available staff.

We were one of the very early adopters of Eduroam using WPA Enterprise (in the beginning using WPA1 as the majority of devices lacked support for WPA2 at the time) and we were able to deploy this starting in approximately May 2006. In that period there were client issues that meant OWL was kept. WPA enterprise supplicant for Mac was initially downloadable software, Windows XP support was bearable and GUIs to handle WPA Enterprise in Linux were somewhat sparce compared to today. Add to this a minor army of mobile devices that usually supported WEP at best.  Occasionally we still get someone with a new mobile device that can’t handle WPA Enterprise. This includes the iPhone when it first came out and certain Android devices. The later actually do support it underneath the user interface but the manufacturer only provided a user interface for WPA personal at launch time (on some devices).

So which is better? Eduroam is the better modern service because it’s based on WPA. The user can walk between (correctly overlapping) access points without noticing a transition and without loss of open connections. In OWL-VPN the VPN connection over the unencrypted network is much more sensitive to the disruption and will disconnect. It’s of course possible to run the VPN when connected to Eduroam in which case the VPN will survive roaming between access points.

So in summary – why wasn’t the original install of OWL in 2003 based on WPA? Because at the time we would have had a wall of complaints due to barely any devices supporting it. OWL-VPN immediately supported a wide range of clients and there wasn’t another good alternative at the time. It still exists at present but isn’t meant to be a competitor to Eduroam, it simply adds utility for those with older devices and some units aren’t yet prepared (due to local lack of time/staff) to migrate from OWL to OWL/Eduroam.

Posted in Services, Wireless | Comments Off on OWL and Eduroam

More Visio-fu thanks to Etherealmind guy

My recent post about Visio focussed on navigating around the user interface and knowing the content of its toolbox.

If you want some great tips for network diagrams, and actually laying stuff out on the page so it’s clear, check out this series of posts by Greg Ferro, on diagramming, over at Etherealmind.

Posted in Documentation, Productivity | Comments Off on More Visio-fu thanks to Etherealmind guy

Update to our IPv6 Allocation Scheme

After gaining some experience in configuring IPv6 networks, and also receiving feedback from others, I’ve revised our IPv6 Allocation Scheme. This is the document which lays out how we intend to allocate networks to departments and colleges, and other services within the University.

The main difference is a change from using /112 networks for router-to-router linknets to /64. Yes, this is horribly wasteful, or at least it feels like it coming from an IPv4 world, but we learned a few things about compatibility with actual implementations of IPv6 which made the /64 seem simpler, for now. There is nothing preventing us moving back to /112 or another size later on.

Also the way in which site-wide service networks such as OWL and Eduroam are allocated has changed, as we have moved their location within our IPv6 space up to the top /46. Other than that, there is not a lot which would affect departments and colleges – the changes are mostly to aid the roll-out by the OUCS Networks team.

Over the next weeks I will be lighting up more IPv6 in the backbone network, and working on our Linux firewall/gateway server (which exists until we have a proper hardware appliance in place). We’re not yet ready to offer a customer service to departments and colleges, and work on the DNS/DHCP system has our attention through to the summer, but after that I hope we can start to have some services hosted on IPv6.

Posted in Backbone Network, Documentation, IPv6 | Comments Off on Update to our IPv6 Allocation Scheme