2014
DOI: 10.17487/rfc7381
|View full text |Cite
|
Sign up to set email alerts
|

Enterprise IPv6 Deployment Guidelines

Abstract: Enterprise network administrators worldwide are in various stages of preparing for or deploying IPv6 into their networks. The administrators face different challenges than operators of Internet access providers and have reasons for different priorities. The overall problem for many administrators will be to offer Internetfacing services over IPv6 while continuing to support IPv4, and while introducing IPv6 access within the enterprise IT network. The overall transition will take most networks from an IPv4-only… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 27 publications
0
8
0
Order By: Relevance
“…Given a set of hosts, our strategy is to use DNS names as the basic connective tissue between hostnames, IPv4 addresses, and IPv6 addresses. One reason for this approach is that "DNS is one of the main anchors in an enterprise [IPv6] deployment, since most end hosts decide whether or not to use IPv6 depending on the presence of IPv6 AAAA records..." [14]. Each host H x in our dataset contains three sets of labels that represent H x : H x N is the set of names, H x 4 is a set of IPv4 addresses and H x 6 is a set of IPv6 addresses.…”
Section: A Developing Target Listsmentioning
confidence: 99%
See 2 more Smart Citations
“…Given a set of hosts, our strategy is to use DNS names as the basic connective tissue between hostnames, IPv4 addresses, and IPv6 addresses. One reason for this approach is that "DNS is one of the main anchors in an enterprise [IPv6] deployment, since most end hosts decide whether or not to use IPv6 depending on the presence of IPv6 AAAA records..." [14]. Each host H x in our dataset contains three sets of labels that represent H x : H x N is the set of names, H x 4 is a set of IPv4 addresses and H x 6 is a set of IPv6 addresses.…”
Section: A Developing Target Listsmentioning
confidence: 99%
“…Standards and deployment guides (e.g., [14], [23], [26], [32]) have been urging operators to apply firewall rules and access control lists for IPv6 in parity with IPv4 as part of their deployment of IPv6. Unfortunately, security researchers as well as RFC authors have lamented that in practice: "networks tend to overlook IPv6 security controls: [often] there is no parity in the security controls [between] IPv6 and IPv4" [5], and "in new IPv6 deployments it has been common to see IPv6 traffic enabled but none of the typical access control mechanisms enabled for IPv6" [15].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Second, we do not have ground-truth in order to determine whether the periphery we discover is indeed the last hop before a destination endhost. While various, and at times conflicting, guidance exists regarding the size of delegated prefixes [10,19,25] discovery of unique /64s is strongly indicative of discovering the periphery. Additionally, the periphery addresses we find are frequently formed using EUI-64 addresses where we can infer the device type based on the encoded MAC address (see §4.5).…”
Section: Limitationsmentioning
confidence: 99%
“…Such operational insight is interesting with respect to published best common operating practice guidelines, 11,[17][18][19] which recommend the following, for instance: dedicating the first or last /48 per region to number infrastructure, numbering point-to-point interfaces out of /64 prefixes, not subnetting on non-nibble boundaries, and creating subnet prefixes of equal size. We find distinct evidence in practice of both adherences to, and deviations from, these recommendations.…”
Section: Introductionmentioning
confidence: 99%