Automated and Secure IPv6 Configuration in Enterprise Networks
#1

Abstract
Over the last decade, IPv6 has established itself as the most mature network protocol for the future Internet. Its recent deployment in core networks of operators, its availability to end customers of multiple ISPs together with the availability of native access to large services like Google assess the increasing penetration of IPv6. While its deployment from the inside of the network leading to the edges is successful, the transition remains an issue today for many enterprises which see it as a tedious and error prone task for network administrators. To fill this gap, we present the necessary algorithms and provide the supporting tools to enable this transition to become automatic. Based on a model of an IPv4 network, we describe the algorithms to build an optimized IPv6 adressing scheme and to automatically generate the adequate security plan as well as the corresponding configurations for the different devices in the network.
I. INTRODUCTION
IP networks are widely spread and used in many different applications and domains. Their growth continues at an amazing rate sustained by its high penetration in both the home networks and the mobile markets. Although often postponed thanks to tricks like NAT, the exhaustion of available addresses, and other scale issues like routing tables explosion will occur in a near future. IPv6 [1] was defined with a bigger address space (128 bits) and comes along with new built-in services (address autoconfiguration [2], native IPSec, routes aggregation, simplified header...). Despite its slow start, IPv6 is today more than ever the most mature network protocol for the future Internet. To faster its acceptance and deployment, it has however to offer capabilities reducing and often eliminating the man in the loop. We are convinced that such features are also required for the evolutionary aspects of an IP network, the transition from IPv4 to IPv6 being an essential one. Many network administrators are indeed reluctant to deploy IPv6 because they do not fully master the protocol itself and because they do not have sufficiently rich algorithmic support to seamlessly manage the transition from their IPv4 networks to IPv6. To address this issue, we investigate, design and aim at implementing a transition framework with the objective of making it selfmanaged. The contributions of this paper are : 1) a set of algorithms that automate the generation of the IPv6 addressing scheme for an IPv4 enterprise network that can be enriched with on-the fly administrator constraints; 2) an algorithm that generates the security configuration of firewalls for the newly created IPv6 addressing plan; 3) the description of a fully operational, openly available and extensively tested in real environments transition engine that also propagates on-demand the configuration to the devices. The structure of the paper is as follows. In Section II, we describe the network modeling we used and the algorithms we defined to enable an automatic addressing and configuration of an IPv6 network. Section III focuses on the security aspects, where the security plan of the new IPv6 network is automatically derived. We evaluate and validate in Section IV our transition engine implementation through various scenarios. Section V reviews related work on IPv6 deployment. In Section VI we conclude this paper.
II. IPV6 ADDRESSING
We address enterprise networks as defined in [3], i.e. networks that have multiple internal links, one or more routers interconnections to one ore more Internet Service Providers (ISP). We assume that the IPv6 network has to be built without direct mapping from IPv4 to IPv6 addressing. A. Network Model The network topology is modeled by an oriented graph where a vertex consists of a router or a network (end-user or interconnection). An edge connects either two routers via a point-to-point network or a router to a network. This graph provides a logical view of the network to be deployed. The root of the graph is the border router connected to the IPv6 Internet. There will be as many graphs as border routers that are connected to an ISP. The interconnection between a border router and the IPv6 provider is not considered in our model. We only consider this interconnection from the filtering point of view, as firewall rules will be set at the border to protect the network. Inside the network, the IPv6 connection is seen as native.


Download full report
http://googleurl?sa=t&source=web&cd=1&ve...466223.pdf&ei=sGVbTvyHCMyIrAfW7MSMCA&usg=AFQjCNE67UmgX3ZMnMLq6F9k44IFXORRmQ
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: ba management technology and enterprise, a seminar report on ipv4 and ipv6, assigning r and s configuration to fischer projections, ipv4 and ipv6 seminor, secure data sharing enterprise, self configuration and autoconfiguration in mesh networks ppt, ipv6 dns server configuration in linux,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Voice Based Automated Transport Enquiry System seminar class 2 3,181 05-10-2016, 09:34 AM
Last Post: ijasti
  DESIGN AND IMPLEMENTATION OF GOLAY ENCODER AND DECODER computer science crazy 2 23,565 26-08-2016, 03:46 PM
Last Post: anasek
  WORMHOLE ATTACK DETECTION IN WIRELESS ADHOC SENSOR NETWORKS seminar class 7 19,024 17-08-2016, 09:23 AM
Last Post: jaseela123d
  IMAGE CAPTURE AUTOMATED TOLL GATE smart paper boy 3 2,983 11-07-2015, 01:43 PM
Last Post: Guest
  Micro controller based automated irrigation system Electrical Fan 28 20,995 29-01-2015, 05:32 PM
Last Post: Guest
  Measuring the Performance of IEEE 802.11p Using ns-2 Simulator for Vehicular Networks smart paper boy 3 2,569 07-10-2014, 06:34 PM
Last Post: seminar report asees
  SECURE ATM BY IMAGE PROCESSING seminar class 6 9,887 06-04-2014, 05:49 PM
Last Post: Guest
  AUTOMATED TRAFFIC SIGNAL CONTROLLER full report project topics 7 10,287 02-09-2013, 10:40 PM
Last Post: Guest
  ANTI THEFT ALERT AND AUTO ARRESTING SYSTEM FOR MUSEUMS AND JEWELRY SHOPS project report helper 11 14,584 12-08-2013, 09:57 AM
Last Post: computer topic
  AUTOMATED TOLL COLLECTION AND ALCHCOL DETECTION USING PSOC full report project topics 6 7,348 08-04-2013, 03:28 PM
Last Post: computer topic

Forum Jump: