Solved

tunnel adapter local area connection

Posted on 2011-03-06
2
679 Views
Last Modified: 2012-05-11
Just did an IPCONFIG /ALL and saw a bunch of these...what I can gather is that they have something to do with IPV6 but was just wondering in an english answer what they are used for.  

Does having them on your system make it more vulnerable?

Are they created every time you connect to a different network?
0
Comment
Question by:AJJ36
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 12

Expert Comment

by:asidu
ID: 35045975
IPV6 is the newer protocol used for networks.
As the current IP address which support IPV4 are not able to provide more ip address for users.

At the present time back end network equipment support ipV4.
Slowly there would be a shift towards the use-age of IPV6.
 

<<Does having them on your system make it more vulnerable?>>
No

<<Are they created every time you connect to a different network?>>
If you use DHCP settings, new address will be created when you connect to a
different network.
0
 
LVL 35

Accepted Solution

by:
Ernie Beek earned 500 total points
ID: 35046234
When you type the netsh interface ipv6 show interface command for Windows Server 2003, Windows XP with SP2, or Windows XP with SP1, you see a list of all of the IPv6 interfaces:


Interface index 1 is a pseudo-interface that is used for loopback (named the Loopback Pseudo-Interface).
Interface index 2 is a pseudo-interface that is used for the Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) IPv6 transition technology (named the Automatic Tunneling Pseudo-Interface).
Interface index 3 is a pseudo-interface that is used for 6to4 tunneling (named the 6to4 Tunneling Pseudo-Interface).
Other interfaces are numbered sequentially in the order in which they are created. This order varies among computers.

With the exception of the Loopback Pseudo-Interface, your interfaces might be different. The link-local address of a LAN interface uses the IPv6 interface identifier derived from the Ethernet MAC address, as described in the "How is the link-local address derived?" question in this article.


IPv6 in Windows XP and Windows Server 2003 uses the "Automatic Tunneling Pseudo-Interface" for encapsulating IPv6 packets with an IPv4 header so that they can be sent across an IPv4 network. By default, IPv6 configures a link-local Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) address on the Automatic Tunneling Pseudo-Interface. The link-local ISATAP address has the form fe80::200:5efe:w.x.y.x or fe80::5efe:w.x.y.x, in which w.x.y.x is an IPv4 address assigned to the computer.

Got this from: http://technet.microsoft.com/en-us/network/cc987595.aspx
0

Featured Post

PeopleSoft Has Never Been Easier

PeopleSoft Adoption Made Smooth & Simple!

On-The-Job Training Is made Intuitive & Easy With WalkMe's On-Screen Guidance Tool.  Claim Your Free WalkMe Account Now

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Data center, now-a-days, is referred as the home of all the advanced technologies. In-fact, most of the businesses are now establishing their entire organizational structure around the IT capabilities.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Suggested Courses

717 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question