Automated and Secure IPv6 Configuration in Enterprise NetworksReport as inadecuate

Automated and Secure IPv6 Configuration in Enterprise Networks - Download this document for free, or read online. Document in PDF available to download.

1 MADYNES - Management of dynamic networks and services INRIA Lorraine, LORIA - Laboratoire Lorrain de Recherche en Informatique et ses Applications 2 Cisco Systems

Abstract : Over the last decade, IPv6 has established itself as the most mature network protocol for the future Internet. Its recent deployment in core networks of operators, its availability to end customers of multiple ISPs together with the availability of native access to large services like Google assess the increasing penetration of IPv6. While its deployment from the inside of the network leading to the edges is successful, the transition remains an issue today for many enterprises which see it as a tedious and error prone task for network administrators. To fill this gap, we present the necessary algorithms and provide the supporting tools to enable this transition to become automatic. Based on a model of an IPv4 network, we describe the algorithms to build an optimized IPv6 adressing scheme and to automatically generate the adequate security plan as well as the corresponding configurations for the different devices in the network.

Author: Frédéric Beck - Olivier Festor - Isabelle Chrisment - Ralph Droms -



Related documents