Sciweavers

Share
CNSM
2010

Automated and secure IPv6 configuration in enterprise networks

9 years 9 months ago
Automated and secure IPv6 configuration in enterprise networks
Over the last decade, IPv6 has established itself as the most mature network protocol for the future Internet. Its recent deployment in core networks of operators, its availability to end customers of multiple ISPs together with the availability of native access to large services like Google assess the increasing penetration of IPv6. While its deployment from the inside of the network leading to the edges is successful, the transition remains an issue today for many enterprises which see it as a tedious and error prone task for network administrators. To fill this gap, we present the necessary algorithms and provide the supporting tools to enable this transition to become automatic. Based on a model of an IPv4 network, we describe the algorithms to build an optimized IPv6 adressing scheme and to automatically generate the adequate security plan as well as the corresponding configurations for the different devices in the network.
Frederic Beck, Olivier Festor, Isabelle Chrisment,
Added 01 Mar 2011
Updated 01 Mar 2011
Type Journal
Year 2010
Where CNSM
Authors Frederic Beck, Olivier Festor, Isabelle Chrisment, Ralph E. Droms
Comments (0)
books