Technical data
8.9.2
Reverse Zone File ........................................................ 8–8
8.9.3
Loopback Interface Files ................................................ 8–9
8.9.4
Hints File .................................................................. 8–9
8.10
BIND Resolver ................................................................ 8–9
8.10.1
Default Domain .......................................................... 8–9
8.10.2
Search List ................................................................ 8–9
8.10.3
Name Servers ............................................................. 8–9
9IPv6
9.1
Understanding IPv6 .......................................................... 9–1
9.1.1
Mobile IPv6 ............................................................... 9–1
9.2
Understanding How Tunnels Work ........................................ 9–3
9.3
Developing an Implementation Plan ...................................... 9–4
9.3.1
Intranet Scenario ........................................................ 9–4
9.3.2
Intranet-to-
Internet Scenario ..........................................
9–7
9.3.3
Intranet-to-Internet-to-Intranet Scenario ............................ 9–8
9.4
Porting Existing IPv4 Applications ........................................ 9–9
9.5
Obtaining IPv6 Addresses ................................................... 9–9
9.6
Installing IPv6-Capable Routers ........................................... 9–10
9.7
Configuring Domain Name System/BIND (DNS/BIND) Servers ...... 9–10
9.8
Configuring IPv6 Routers ................................................... 9–11
9.9
Configuring IPv6 Hosts ...................................................... 9–11
Glossary
Index
Figures
1–1
The TCP/IP Model ............................................................ 1–2
2–1
Comparison of OpenVMS and UNIX ...................................... 2–2
2–2
Comparison of UNIX Directory and OpenVMS Directory
Hierarchies .................................................................... 2–4
9–1
Routing IPv6 Traffic from Host A to Host F .............................. 9–5
9–2
Routing I
Pv6 Traffic from Host A to Host I ...............................
9–6
9–3
Routing IPv6 Traffic from Host I to Host A ............................... 9–7
9–4
Routing IPv6 Traffic from Host A to Host J .............................. 9–8
9–5
Routing IPv6 Traffic from Host A to Host K .............................. 9–9
Tables
2–1
Directory Hierarchy Differences ............................................ 2–3
2–2
File Specification Differences ............................................... 2–5
2–3
Absolute and Relative File Specification Differences ................... 2–6
2–4
File Specification Differences ............................................... 2–6
2–5
Case-
Sensitivity Differences ................................................
2–7
2–6
File Type Differences ......................................................... 2–7
2–7
Version Number Differences ................................................ 2–7
2–8
Link Files Differences ........................................................ 2–8
2–9
File Structure Differences ................................................... 2–8
2–10
File Ownership Differences ................................................. 2–9
2–11
Comparison of File Protection .............................................. 2–9
vi Contents