{"id":206,"date":"2021-04-30T15:52:31","date_gmt":"2021-04-30T07:52:31","guid":{"rendered":"https:\/\/choson.lifenet.com.tw\/?p=206"},"modified":"2023-03-29T16:55:48","modified_gmt":"2023-03-29T08:55:48","slug":"ipv6","status":"publish","type":"post","link":"https:\/\/choson.lifenet.com.tw\/?p=206","title":{"rendered":"IPv6"},"content":{"rendered":"\n<p>IPv6\u7bc0\u9ede\u4f7f\u7528\u672c\u5730\u93c8\u63a5\u5730\u5740\uff08\u524d\u7db4\u70baFE80 :: \/ 10\uff09\u5f15\u5c0e\uff0c\u4e26\u4f7f\u7528\u591a\u64ad\u8207DHCP\u670d\u52d9\u5668\u806f\u7e6b\u3002\u5b83\u5011\u4e0d\u540c\u65bcIPv4\u4e3b\u6a5f\uff0c\u5f8c\u8005\u4f7f\u7528\u9ed8\u8a8d\u5730\u5740\uff080.0.0.0\uff09\u5f15\u5c0e\u4e26\u4f7f\u7528\u5ee3\u64ad\uff08DHCP Discover\uff09\u8207DHCP\u670d\u52d9\u5668\u806f\u7e6b\u3002<br><img decoding=\"async\" src=\"https:\/\/ithelp.ithome.com.tw\/upload\/images\/20210429\/20132160luI7k5Hb5F.png\" alt=\"https:\/\/ithelp.ithome.com.tw\/upload\/images\/20210429\/20132160luI7k5Hb5F.png\"><br>-DHCPv4\u64cd\u4f5c\uff08\u4f86\u6e90\uff1a<a href=\"https:\/\/wiznet.pro\/study\/dynamic-host-configuration-protocol-dhcp\/\" target=\"_blank\" rel=\"noreferrer noopener\">WizNet<\/a>\uff09<\/p>\n\n\n\n<p>\u672c\u5730\u93c8\u63a5\u5730\u5740\u662f\u4f7f\u7528\u524d\u7db4FE80 :: \/ 10\u548c\u4fee\u6539\u5f8c\u7684EUI-64\u683c\u5f0f\u81ea\u52d5\u914d\u7f6e\u7684\u3002<br><img decoding=\"async\" src=\"https:\/\/ithelp.ithome.com.tw\/upload\/images\/20210429\/201321609xi8V8SYH7.png\" alt=\"https:\/\/ithelp.ithome.com.tw\/upload\/images\/20210429\/201321609xi8V8SYH7.png\"><br>-48\u4f4dMAC\u523064\u4f4dEUI-64\u5730\u5740\uff08\u4f86\u6e90\uff1a<a href=\"https:\/\/unix.stackexchange.com\/questions\/136674\/how-to-use-shell-to-derive-an-ipv6-address-from-a-mac-address\" target=\"_blank\" rel=\"noreferrer noopener\">StackExchange<\/a>\uff09<\/p>\n\n\n\n<p><img decoding=\"async\" src=\"https:\/\/ithelp.ithome.com.tw\/upload\/images\/20210429\/2013216076gSTOipyt.png\" alt=\"https:\/\/ithelp.ithome.com.tw\/upload\/images\/20210429\/2013216076gSTOipyt.png\"><br>-48\u4f4dMAC\u5730\u5740\u7684\u7d50\u69cb\uff08\u4f86\u6e90\uff1a<a href=\"https:\/\/en.wikipedia.org\/wiki\/MAC_address#Universal_vs._local_(U\/L_bit)\" target=\"_blank\" rel=\"noreferrer noopener\">Wikipedia<\/a>\uff09<\/p>\n\n\n\n<p>\u4ee5\u4e0b\u662f<a href=\"https:\/\/www.redbooks.ibm.com\/redpapers\/pdfs\/redp4776.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">IBM IPv6 Introduction and Configuration<\/a>\u7684\u6458\u9304\uff1a<br>IPv6\u5730\u5740\u5354\u8b70\u5728RFC 4291 \u2013 IPv6\u5730\u5740\u9ad4\u7cfb\u7d50\u69cb\u4e2d\u6307\u5b9a\u3002IPv6\u4f7f\u7528128\u4f4d\u5730\u5740\u800c\u4e0d\u662fIPv4\u768432\u4f4d\u5730\u5740\u3002\u5b83\u5b9a\u7fa9\u4e86\u4e09\u7a2e\u4e3b\u8981\u7684\u5730\u5740\u985e\u578b\uff1a\u55ae\u64ad\u5730\u5740\uff0c\u591a\u64ad\u5730\u5740\u548c\u4efb\u610f\u64ad\u5730\u5740\u3002IPv6\u4e2d\u6c92\u6709\u5ee3\u64ad\u5730\u5740\u3002<\/p>\n\n\n\n<p><strong>\u55ae\u64ad\u5730\u5740(Unicast Address)<\/strong><br>\u55ae\u64ad\u5730\u5740\u662f\u5206\u914d\u7d66\u55ae\u500b\u63a5\u53e3\u7684\u6a19\u8b58\u7b26\u3002\u767c\u9001\u5230\u8a72\u5730\u5740\u7684\u6578\u64da\u5305<br>\u50c5\u50b3\u905e\u5230\u8a72\u63a5\u53e3\u3002\u7279\u6b8a\u7528\u9014\u7684\u55ae\u64ad\u5730\u5740\u5b9a\u7fa9\u5982\u4e0b\uff1a<br>\u2013\u74b0\u56de\u5730\u5740\uff08:: 1\uff09<br>\u2013\u672a\u6307\u5b9a\u5730\u5740\uff08\uff1a:)<br>\u2013\u93c8\u63a5\u672c\u5730\u5730\u5740<br>\u2013\u7ad9\u9ede\u672c\u5730\u5730\u5740<br>\u2013 IPv4\u517c\u5bb9\u5730\u5740\uff08\uff1a:)<br>\u2013 IPv4\u6620\u5c04\u7684\u5730\u5740\uff08\uff1a \uff1aFFFF \ud83d\ude42<\/p>\n\n\n\n<p><strong>\u5ee3\u64ad\u5730\u5740(Multicast Address)<\/strong><br>\u591a\u64ad\u5730\u5740\u662f\u5206\u914d\u7d66\u591a\u500b\u4e3b\u6a5f\u4e0a\u7684\u4e00\u7d44\u63a5\u53e3\u7684\u6a19\u8b58\u7b26\u3002<br>\u767c\u9001\u5230\u8a72\u5730\u5740\u7684\u6578\u64da\u5305\u5c07\u50b3\u905e\u5230\u8207\u8a72\u5730\u5740\u5c0d\u61c9\u7684\u6240\u6709\u63a5\u53e3\u3002<br>IPv6\u4e2d\u6c92\u6709\u5ee3\u64ad\u5730\u5740\uff0c\u5176\u529f\u80fd\u5df2\u88ab\u591a\u64ad\u5730\u5740\u53d6\u4ee3\u3002<br>\u6307\u793a\u591a\u64ad\u7bc4\u570d\u76844\u4f4d\u503c\u3002\u53ef\u80fd\u7684\u503c\u70ba\uff1a<br>0\u4fdd\u7559\u3002<br>1\u50c5\u9650\u65bc\u672c\u5730\u7bc0\u9ede\uff08node-local\uff09\u4e0a\u7684\u63a5\u53e3\u3002<br>2\u50c5\u9650\u65bc\u672c\u5730\u93c8\u63a5\uff08link-local\uff09\u4e0a\u7684\u7bc0\u9ede\u3002<br>5\u9650\u65bc\u672c\u5730\u7ad9\u9ede\u3002<br>8\u50c5\u9650\u65bc\u7d44\u7e54\u3002<br>E\u5168\u7403\u7bc4\u570d\u3002<br>F\u4fdd\u7559\u3002<\/p>\n\n\n\n<p><strong>\u4efb\u64ad\u5730\u5740\uff08Anycast Address\uff09<\/strong><br>\u4efb\u64ad\u5730\u5740\u662f\u4e00\u7a2e\u7279\u6b8a\u985e\u578b\u7684\u55ae\u64ad\u5730\u5740\uff0c\u5206\u914d\u7d66<br>\u591a\u500b\u4e3b\u6a5f\u4e0a\u7684\u63a5\u53e3\u3002\u767c\u9001\u5230\u8a72\u5730\u5740\u7684\u6578\u64da\u5305\u5c07\u88ab\u767c\u9001\u5230\u5177\u6709<br>\u8a72\u5730\u5740\u7684\u6700\u8fd1\u63a5\u53e3\u3002\u8def\u7531\u5668\u6839\u64da\u5176\u8ddd\u96e2\u7684\u5b9a\u7fa9\u4f86\u78ba\u5b9a\u6700\u8fd1\u7684\u63a5\u53e3\uff0c\u4f8b\u5982\uff0c\u5728RIP\u60c5\u6cc1\u4e0b\u662f\u8e8d\u9ede\uff0c\u5728OSPF\u60c5\u6cc1\u4e0b\u662f\u93c8\u8def\u72c0\u614b\u3002<br>\u4efb\u64ad\u5730\u5740\u4f7f\u7528\u8207\u55ae\u64ad\u5730\u5740\u76f8\u540c\u7684\u683c\u5f0f\uff0c\u4e26\u4e14\u8207\u5b83\u5011\u6c92\u6709\u5340\u5225\u3002<br>RFC 4291 \u2013 IPv6\u5730\u5740\u9ad4\u7cfb\u7d50\u69cb\u7576\u524d\u5c0d<br>\u4efb\u64ad\u5730\u5740\u898f\u5b9a\u4e86\u4ee5\u4e0b\u9650\u5236\uff1a<br>-\u4efb\u64ad\u5730\u5740\u4e0d\u5f97\u7528\u4f5c\u6578\u64da\u5305\u7684\u6e90\u5730\u5740\u3002<br>-\u4efb\u4f55\u4efb\u64ad\u5730\u5740\u90fd\u53ea\u80fd\u5206\u914d\u7d66\u8def\u7531\u5668\u3002<\/p>\n\n\n\n<p>\u53c3\u8003<br>.&nbsp;<a href=\"https:\/\/tools.ietf.org\/html\/rfc2450\" target=\"_blank\" rel=\"noreferrer noopener\">RFC 2450\uff1a\u64ec\u8b70\u7684TLA\u548cNLA\u5206\u914d\u898f\u5247<\/a><br>.&nbsp;<a href=\"https:\/\/tools.ietf.org\/html\/rfc2373\" target=\"_blank\" rel=\"noreferrer noopener\">RFC 2737\uff1aIP\u7248\u672c6\u5c0b\u5740\u67b6\u69cb<\/a><br>.&nbsp;<a href=\"https:\/\/www.redbooks.ibm.com\/redpapers\/pdfs\/redp4776.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">IBM IPv6\u7c21\u4ecb\u548c\u914d\u7f6e<\/a><br>.&nbsp;<a href=\"https:\/\/www.apricot.net\/apricot2013\/assets\/apricot2013-ipv6-introduction_1361675466.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">IPv6\u7c21\u4ecb<\/a><br>.&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Link-local_address\" target=\"_blank\" rel=\"noreferrer noopener\">\u93c8\u63a5\u672c\u5730\u5730\u5740<\/a><br>.&nbsp;<a href=\"https:\/\/www.cisco.com\/c\/en\/us\/support\/docs\/ip\/ip-version-6-ipv6\/113328-ipv6-lla.html\" target=\"_blank\" rel=\"noreferrer noopener\">\u4e86\u89e3IPv6\u93c8\u63a5\u672c\u5730\u5730\u5740<\/a><br>.&nbsp;<a href=\"https:\/\/community.cisco.com\/t5\/networking-documents\/understanding-ipv6-eui-64-bit-address\/ta-p\/3116953\" target=\"_blank\" rel=\"noreferrer noopener\">\u4e86\u89e3IPv6 EUI-64\u4f4d\u5730\u5740<\/a><br>.&nbsp;<a href=\"http:\/\/mars.tekkom.dk\/w\/index.php\/EUI-64\" target=\"_blank\" rel=\"noreferrer noopener\">EUI-64<\/a><br>.&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/MAC_address#Universal_vs._local_(U\/L_bit)\" target=\"_blank\" rel=\"noreferrer noopener\">MAC\u5730\u5740<\/a><br>.&nbsp;<a href=\"https:\/\/www.ieee802.org\/1\/files\/public\/docs2014\/New-pannell-MAC-Address-Issues-in-802dot1-1114-v1.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">IEEE 802.1\u4e2d\u7684MAC\u5730\u5740\u554f\u984c<\/a><\/p>\n\n\n\n<p>\u8cc7\u6599\u4f86\u6e90\uff1a\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/wentzwu.com\/2021\/03\/04\/cissp-practice-questions-20210305\/\" target=\"_blank\">Wentz Wu QOTD-20210305<\/a><\/p>\n\n\n\n<p>PS:\u6b64\u6587\u7ae0\u7d93\u904e\u4f5c\u8005\u540c\u610f\u520a\u767b \u4e26\u4e14\u6388\u6b0a\u53ef\u4ee5\u7ffb\u8b6f\u6210\u4e2d\u6587<\/p>\n","protected":false},"excerpt":{"rendered":"<p>IPv6\u7bc0\u9ede\u4f7f\u7528\u672c\u5730\u93c8\u63a5\u5730\u5740\uff08\u524d\u7db4\u70baFE80 :: \/ 10\uff09\u5f15\u5c0e\uff0c\u4e26\u4f7f\u7528\u591a\u64ad\u8207DHCP\u670d\u52d9\u5668\u806f\u7e6b\u3002\u5b83\u5011\u4e0d\u540c\u65bc [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":true,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-206","post","type-post","status-publish","format-standard","hentry","category-cisspcertified-information-systems-security-professional"],"_links":{"self":[{"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/206","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=206"}],"version-history":[{"count":2,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/206\/revisions"}],"predecessor-version":[{"id":2893,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/206\/revisions\/2893"}],"wp:attachment":[{"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=206"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=206"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=206"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}