112
Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the Master Degree in Communication Networks Engineering Examination Committee Chairperson: Prof. Paulo Jorge Pires Ferreira Supervisor: Prof. Ricardo Jorge Feliciano Lopes Pereira Member of the Committee: Prof. Artur Miguel do Amaral Arsénio October 2013

Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

  • Upload
    dokiet

  • View
    215

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

Process for IPv6 Migration in Large Organizations

Pedro Filipe Martins de Castro

Dissertation submitted to obtain the Master Degree in

Communication Networks Engineering

Examination Committee

Chairperson: Prof. Paulo Jorge Pires FerreiraSupervisor: Prof. Ricardo Jorge Feliciano Lopes Pereira

Member of the Committee: Prof. Artur Miguel do Amaral Arsénio

October 2013

Page 2: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the
Page 3: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

Abstract

The shortage of IP addresses has become the bottleneck for Internet development. IPv4 has no longer

the capacity to support the continuous growth of the Internet. For this reason, a new Internet protocol

was needed. However, the version 6 of the Internet protocol is not compatible with version 4, hence,

transition mechanisms must be used to ensure the transition from IPv4 to IPv6. Enterprises not prepared

for this transition will pay a high price. Since most of the enterprises around the globe have no IPv6

knowledge to create a decent road map towards IPv6, we present in this thesis a generic migration

process, which provides the necessary guidelines to reach a successful IPv6 migration. This process is

composed by 9 phases: analysis of the current situation, present a study focused on the migration impact

for the company, survey of the enterprise’s network, analyse IPv6 support from ISPs, estimate the costs

of migrating the company’s network, migration plan, testbed, identify problems and final implementation.

We then apply this process to a specific case.

Keywords: Migration, IPv6, Company, Plan, Process

i

Page 4: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the
Page 5: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

Resumo

A falta de endereços IP tornou-se o maior entrave ao desenvolvimento da Internet. O IPv4 não tem

capacidade para permitir que a Internet continue a crescer como até aqui. Por esta razão foi necessário

criar uma nova versão do protocolo IP. No entanto, a versão 6 do protocolo IP não é compatível com a

versão 4, por isso, é necessário utilizar mecanismos de transição para a transição de IPv4 para IPv6.

As empresas que não estejam preparadas para esta transição vão pagar um custo elevado, uma vez

que a maior parte das empresas espalhadas pelo mundo não tem qualquer conhecimento sobre IPv6

para criar um plano para a introdução de IPv6 nas suas redes. Por esta razão, apresentamos nesta

tese um processo genérico para a migração de uma rede empresarial de IPv4 para IPv6. Este plano

é composto por 9 fases: análise da situação atual, estudo sobre o impacto da migração na empresa,

análise da rede da empresa, análise do suporte IPv6 por parte dos ISPs, estimativa dos custos para

migrar a rede da empresa, plano de migração, testbed, identificação de problemas e implementação

final. Após a definição deste plano, vamos aplicá-lo a um caso prático.

Palavras-Chave: Migração, IPv6, Empresa, Plano, Processo

iii

Page 6: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the
Page 7: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

Acknowledgments

The realization of this thesis was only possible with the help of a numerous set of people who supported

me during the last year.

I want to express my gratitude to my supervisor, Prof. Ricardo Pereira, for his tremendous help and

support during the development of this work. I thank him for his availability, guidance and encouragement

over the whole year.

I am also grateful to both my co-advisors, Paulo Rio and Nassri Abokhalaf for their contribution for this

work. Their support and suggestions really helped me to improve my work.

I thank to Hewlett-Packard (HP) and Refer Telecom for giving me the opportunity to work on such a

fascinating theme. I also would like to thank to HP, for the paid internship.

I thank to Nuno Delgado from HP, who really helped me finding the right path to follow, when I was

starting my thesis.

I thank to my girlfriend Yesika Reinolds for always be there for me and for her endless support and

motivation.

For last but not least, I thank to my family, especially my mother Marcelina Castro, my father Manuel

Castro and my sister Ana Castro, for everything they do for me. Without their support I would not

achieve this goal.

v

Page 8: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the
Page 9: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

Contents

Abstract i

Resumo iii

Acknowledgments v

1 Introduction 1

1.1 Contextualization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

1.2 Dissertation Layout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2

2 Background 5

2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

2.2 IPv6 Advantages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

2.3 IPv6 Header . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

2.4 IPv6 Address Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

2.5 Domain Name System (DNS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

2.6 ICMPv6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

2.7 IPv6 Routing Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

2.8 Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

2.9 Migration Costs and Benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

3 State of the Art 15

3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

vii

Page 10: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

3.2 IPv6 Worldwide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

3.3 IPv6 in Portugal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

3.4 Transition Mechanisms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20

3.4.1 Dual Stack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

3.4.2 Tunnelling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

3.4.3 Translation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24

3.4.4 Evaluation of the Alternatives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26

4 Methodology for the Migration Process 29

4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

4.2 Generic Migration Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30

4.2.1 Anaysis of the Current Situation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

4.2.2 Present a Study Focused on the Migration Impact for the Company . . . . . . . . . 32

4.2.3 Survey of the Enterprise’s Network . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

4.2.4 Analyse IPv6 Capacity from ISPs . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33

4.2.5 Estimate the Costs of Migrating the Company’s Network . . . . . . . . . . . . . . . 33

4.2.6 Migration Plan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34

4.2.7 Testbed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36

4.2.8 Identify Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

4.2.9 Final Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

5 Practical Case 39

5.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39

5.2 Analysis of the Current Situation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39

5.3 Present a Study Focused on the Migration Impact for the Company . . . . . . . . . . . . 41

5.4 Survey of the Network Infrastructure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42

5.5 Estimate the Costs of Migrating the Company’s Network . . . . . . . . . . . . . . . . . . . 45

5.5.1 Backup and Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45

5.5.2 Virtualization and Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47

viii

Page 11: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

5.5.3 DNS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48

5.5.4 Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49

5.5.5 Linux . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50

5.5.6 Routers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50

5.5.7 Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51

5.5.8 Wireless . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52

5.5.9 FaxMail and SMS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52

5.6 Migration Plan for Refer Telecom . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53

5.6.1 Upgrading or Replacing Equipment Without IPv6 Support . . . . . . . . . . . . . . 56

5.6.2 Addressing Plan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56

5.6.3 Phased Deployment of IPv6 into the Network . . . . . . . . . . . . . . . . . . . . . 58

5.6.4 Treat Network’s Dependencies Without IPv6 . . . . . . . . . . . . . . . . . . . . . 61

5.6.5 Partial Decommissioning of IPv4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61

5.6.6 Decommissioning of IPv4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62

6 Experimental Validation 63

6.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63

6.2 Validation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63

6.2.1 IPv4 Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64

6.2.2 IPv6 Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67

6.2.3 Identification of Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74

7 Conclusion 77

Bibliography 79

Appendix 83

A Configurations 83

A.1 Router Configuration Part 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83

A.2 Router Configuration Part 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83

ix

Page 12: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

A.3 Vswitch VLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83

B Firewall 87

B.1 IPv4 Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87

B.2 IPv4 and IPv6 rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87

C Data Protector 91

C.1 Successful backup to the web server over IPv6 . . . . . . . . . . . . . . . . . . . . . . . . 91

C.2 Data Protector switching from IPv6 to IPv4 . . . . . . . . . . . . . . . . . . . . . . . . . . . 91

x

Page 13: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

List of Tables

2.1 IPv6 Address Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

2.2 IPv6 Routing Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

3.3 Top10 IPv6 allocations by country . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

3.4 Top 20 countries with more percentage of ASes with IPv6 prefixes . . . . . . . . . . . . . 17

3.5 Companies with IPv6 prefixes in Portugal . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

3.6 Comparing the transition mechanisms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26

5.7 Affected componenets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46

5.8 Services and equipment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54

5.9 Subnets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58

6.10 VMs used . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63

6.11 Different options to configure an IPv6 address in a host . . . . . . . . . . . . . . . . . . . 71

6.12 IPv4 vs IPv6 features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76

xi

Page 14: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the
Page 15: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

List of Figures

2.1 IPv4 and IPv6 header . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

3.2 Evolution of the percentage of ASes with IPv6 prefixes . . . . . . . . . . . . . . . . . . . . 17

3.3 IPv6 allocations in Portugal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20

3.4 6to4 mechanism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22

3.5 Teredo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

3.6 DS-Lite mechanism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24

3.7 DNS64/NAT64 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25

3.8 Transition Mechanisms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

5.9 Refer Telecom network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

5.10 Data centers network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

5.11 Data Protector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46

5.12 SMS per mail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52

5.13 FaxMail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53

5.14 Network to migrate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55

5.15 IPv4/IPv6 addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59

6.16 GNS topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65

6.17 Switch configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65

6.18 Implemented network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68

6.19 DNS resolutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70

6.20 DHCP pools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71

6.21 DHCPv6 messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72

xiii

Page 16: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

6.22 BIND forward lookup zone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74

6.23 IPv6 enabled network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75

A.24 Vswitch VLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84

A.25 Vswitch VLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85

A.26 Vswitch VLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86

B.27 IPv4 firewall rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88

B.28 Firewalls rules for a dual-stack network . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89

C.29 Successful backup to the web server over IPv6 . . . . . . . . . . . . . . . . . . . . . . . . 92

C.30 Data Protector switching from IPv6 to IPv4 . . . . . . . . . . . . . . . . . . . . . . . . . . . 92

xiv

Page 17: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

List of Acronyms

ARP Address Resolution Protocol

ASes Autonomous Systems

ANACOM Autoridade Nacional de Comunicações

CGN Carrier-Grade NAT

CoS Class of Service

CIDR Classless Inter-Domain Routing

CPE Costumer-Premises Equipment

DMZ Demilitarized Zone

DoS Denial of Service

DDNS Dynamic DNS

DNS Domain Name System

DHCP Dynamic Host Configuration Protocol

DHCPv6 Dynamic Host Configuration Protocol version 6

EGP Exterior Gateway Protocols

FCCN Fundação para a Computação Científica Nacional

GPRS General Packet Radio Service

GSM Global System for Mobile Communications

GSM-R Global System for Mobile Communications - Railway

HP Hewlett-Packard

ICMP Internet Control Message Protocol

ICMPv6 Internet Control Message Protocol version 6

IGP Interior Gateway Protocols

IETF Internet Engineering Task Force

IHL Internet Header Length

xv

Page 18: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

IP Internet Protocol

IPAM IP Address Management

IPv4 Internet Protocol version 4

IPv6 Internet Protocol version 6

ISP Internet Service Provider

ISATAP Intra-Site Automatic Tunnel Addressing Protocol

LIR Local Internet Register

MTU Maximum Transmission Unit

MIPv6 Mobile IPv6

MPLS Multi Protocol Label Switching

NDP Neighbor Discovery Protocol

NAT Network Address Translation

CNGI Next Generation Internet Project

NBMA Non-Broadcast Multiple Access

OS Operating System

PMTU Path Maximum Transmission Unit

PDH Plesiochronous Digital Hierarchy

QoS Quality of Service

RIR Regional Internet Register

RIPE NCC Reseaux IP Europeens Network Coordination Centre

RTT Round Trip Time

SMTP Simple Mail Transfer Protocol

SLAAC Stateless Address Autoconfiguration

SIIT Stateless IP/ICMP Translation

SDH Synchronous Digital Hierarchy

xvi

Page 19: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

TTL Time to Live

TLD Top-Level Domain

TCP Transmission Control Protocol

ToS Type of Service

UMTS Universal Mobile Telecommunication System

UDP User Datagram Protocol

VM Virtual Machine

VoIP Voice over IP

WAN Wide Area Network

xvii

Page 20: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the
Page 21: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

Chapter 1

Introduction

1.1 Contextualization

The growth of the Internet in the last two decades has shown the potential that the Internet has to

disclose and improve different areas such as education, businesses or entertainment. No one predicted

that World Wide Web would become by now a worldwide communication channel, so it was thought

that the number of addresses provided by the version 4 of the Internet Protocol was more than enough.

However, with the rapid development of new services, the rise of new business and the growing of

Internet users, Internet needs a larger address space. For this reason the Internet Engineering Task

Force (IETF) developed IPv6 in the mid 1990s. Since there was the need to create a new version of

the Internet Protocol to increase the address space, IETF took this opportunity to improve some of the

functionalities of IPv4, like routing efficiency, header format, Quality of Service (QoS), mobility, security

and auto-configuration [1]. With these changes IPv6 has the capacity to build a much more powerful

Internet.

Although IPv6 was standardized 17 years ago, its adoption is yet very limited [2]. This happened due

to the use of Classless Inter-Domain Routing (CIDR) and Network Address Translation (NAT), which

disguised the limitations of IPv4 in the last years. CIDR ended the huge waste of addresses caused by

the previous addressing architecture, which was based on classes. And NAT made possible the sharing

of the same IP address by different users, ending one of the Internet principals: every IP address must

be unique. However, NAT is not a perfect solution, quite the opposite. It has some drawbacks like

the break of end-to-end communications, its complexity and lack of scalability as well as reachability

problems.

With the depletion of IPv4 addresses in the Asia-Pacific region in the last year and now in Europe, IPv6

1

Page 22: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

2 CHAPTER 1. INTRODUCTION

has become the best option to ensure the continuous growth of the Internet. If we look to concepts like

Internet of Things, intelligent houses or smart grids, which can take communications to a whole new

level, we realize that IPv4 can no longer respond to their demands. To allow the emergence of new

concepts like the ones presented, it is mandatory to proceed with the transition to IPv6. It is important to

realize that this transition will not happen from day to night. Instead IPv6 and IPv4 will operate in parallel

for many years as already happens. It is expected that the protocol takes at least one decade to spread

across the entire Internet [3]. Even after this time, some services may still be available through IPv4.

IPv6 will be the future of the Internet. With the depletion of IPv4 addresses, IPv6 migration is the only

feasible option to allow the continuous growth of the Internet. The question now is how much time

the transition will last. Many companies like Google, Facebook or Yahoo already gave the first step in

order to start this transition by providing their services through IPv6. It will be interesting to see how

organizations all around the globe are going to react to the imminent end of IPv4 addresses. Initiatives

like the one from the U.S Government, which is making an effort to have all its agencies web sites and

services available through IPv6 will put them far ahead of organizations and countries that are waiting to

see what will happen. Therefore migration mechanisms must be studied and analyzed by organizations

and governments to find the best approach to meet their needs. However, people are still very reluctant

to invest in IPv6 due to the huge investment needed, the lack of IPv6 knowledge and awareness and the

fact that NAT still gets the job done.

Sooner or later IPv6 will be present in every network around the globe, so, in order to minimize the costs

and to simplify the transition to IPv6, this thesis defines a generic migration process that can be used by

network administrators as a reference/guideline to introduce IPv6 in their networks. Then, we apply this

process to a small part of the Refer Telecom’s network. Thus, we will be able to validate our migration

process in a real scenario.

1.2 Dissertation Layout

This document describes the research and work developed and it is organized as follows:

• Chapter 2 provides a background on IPv6, identifying major changes and additions to IPv6 as well

as its benefits and problems

• Chapter 3 presents the state of the art for IPv6, showing its state worldwide and analyzing existing

transition mechanisms

• Chapter 4 describes the migration process elaborated

Page 23: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

1.2. DISSERTATION LAYOUT 3

• Chapter 5 describes the implementation of the migration process in a subset of Refer Telecom’s

network

• Chapter 6 presents a simulation of a real migration for the subset of Refer Telecom’s network

• Chapter 7 summarizes the work developed and future work.

Page 24: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the
Page 25: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

Chapter 2

Background

2.1 Introduction

The evolution of today’s networks to IPv6 in the next years is a fact. Due to the use of CIDR and NAT

the emergence of IPv6 was delayed more than expected. However now that the last IPv4 prefixes are

allocated both in Europe and in Asia, migration won an increased importance.

It is necessary to understand what is going to change with IPv6 and what kind of benefits it is bringing to

the world. Organizations around the world must be ready for this change as well as operating systems,

softwares and applications.

2.2 IPv6 Advantages

The following list contains some of the most important changes and additions introduced by IPv6 [4]:

Increased number of addresses - The major problem with IPv4 is the lack of address space. IPv6

eliminated this problem by proving an address space with a length of 128 bits instead of the 32 bits of

IPv4. Therefore, IPv6 addresses aren’t likely to exhaust in a foreseen future. With this improvement,

IPv6 solves the scalability issues present in IPv4.

Better support for Non-Unicast Addressing - IPv6 has a new kind of addressing: anycast. Anycast

addressing routes a packet to the nearest or more accessible member of a group where every node is

identified by the same destination address.

Multicasting has been improved and broadcast was withdrawn from IPv6 since this function could easily

overload a network.

5

Page 26: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

6 CHAPTER 2. BACKGROUND

Renumbering - It is easier to renumber the IP addresses in networks and sub networks. It is also possible

to renumber a router address.

Auto configuration - IPv6 uses Stateless Address Autoconfiguration (SLAAC) [5], which enables a host

to automatically generate an IPv6 address when it is turned on. Using this address, called Link-Local

Address, a host can communicate within its local network without a Dynamic Host Configuration Protocol

(DHCP) server. If there is an IPv6 router, an IPv6 host within the local network can have a global unicast

address assigned by this router, automatically allowing access to the Internet. With SLAAC we can have

a "plug and play" network which means that a computer will have an IP address as soon as it connects

to the network.

Datagram Format - A new header format was created for IPv6 to make routing more efficiency. Section

2.2 analyses IPv6 header in detail.

QoS - The new header also has QoS related fields: traffic class and flow label. It allows classification of

packets.

Improved fragmentation - In IPv4, fragmentation was performed by the routers on the path between

the source and destination nodes. Now with IPv6 the fragmentation is performed by the source node

through the use of Internet Control Message Protocol version 6 (ICMPv6). This way the workload on

routers is reduced [6] because routers do not have to waste time analyzing the Maximum Transmission

Unit (MTU) in the link where they will send a packet and fragmenting it if necessary.

Mobility - In IPv6, mobility support is mandatory through the use of Mobile IPv6 (MIPv6). Through the

use of extension headers, which added powerful capabilities to Mobile IPv6 and its enormous address

space, IPv6 enhanced Mobile IP features. The following list [7] shows some of this improvements when

compared to Mobile IPv4:

• Route optimization is a built-in feature for Mobile IPv6, whereas in Mobile IPv4 it is added on as an

optional set of extensions that may not be supported by all nodes. This procedure helps to avoid

triangular routing.

• Address Auto-configuration and Neighbor Discovery allow mobile nodes to work in any location

without the need of special routers (foreign agents).

• Mobile IPv6 takes advantages of the IPv6 protocol itself. It uses the routing header instead of IP

encapsulation, therefore it reduces the overhead present in Mobile IPv4.

• In order to avoid the ingress-filtering problem present in Mobile IPv4, the correspondent node uses

the care-of address as the source address.

• Utilization of IPSec for all security requirements.

Page 27: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

2.3. IPV6 HEADER 7

End-to-End communication - In IPv4 this semantics was lost due to the use of NAT. IPv6 brings back

end-to-end communications ensuring full network transparency. True end-to-end communication makes

it easier to maintain a network and may enable the appearance of new services [8].

Throughput - IPv6 can reach higher throughputs and a Round Trip Time (RTT) than IPv4 under the same

circumstances [9].

2.3 IPv6 Header

There were some significant changes in the IPv6 header when compared to the IPv4 header. IPv6

header was designed to: simplify the header format, thus reducing the header overhead [10], improve

routing efficiency and add QoS capabilities as well as authentication and privacy capabilities among

others [6].

It is important to realize that IPv4 and IPv6 are not interoperable; in fact the point of this thesis is to find

a way to disguise this lack of interoperability so we can have an operational network with both protocols.

When we look at both headers (Figure 2.1) we can see that the following fields were removed from IPv6

header: IHL, identifier, flag, fragment, header checksum and options. Less important information and

options field were moved in IPv6 header to the extension headers. This is what happens to the identifier,

flag and fragment fields, which are moved to the fragment extension header. Header checksum was

removed since, this function is provided by the upper layers [6].

In IPv6 header there are 5 new fields:

The traffic class, which provides Class of Service (CoS) support as Type of Service (ToS) field in IPv4

header does.

The flow label field allows labeling sequences of packets that require special treatment such as real-

time services.

The next header field, which identifies the type of header following the IPv6 header. The next header

can be either the Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) header or an

extension header if provided.

Payload length, as the name states only defines the length of the payload whereas the total length field

in IPv4 header represents the total length of the packet including the header.

Time to Live (TTL) was renamed in IPv6 to Hop Limit so it can describe better its function, since a

packet don’t have "time to live" but a limited number of hops.

Page 28: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

8 CHAPTER 2. BACKGROUND

Figure 2.1: IPv4 and IPv6 header

As already mention the source and destinations addresses fields now have 128 bits each instead of the

32 bits of IPv4.

IPv6 introduced also a new mechanism to replace the options field: extension headers. In order to

improve routing efficiency, when a packet is sent to its destination no one but the destination node

analyzes the extension headers in that packet. The only exception is the hop-by-hop extension, which

has to be analyzed by every router on its path. With this change, IPv6 reduces the processing load of

the routers when compared to IPv4, since with IPv4 every node on the network has to analyze the entire

IPv4 header resulting in processing overload. There are 6 different types of extension headers:

Hop-by-hop header - used to carry information that every node along its path must analyze.

Routing header - When a packet must visit predetermined nodes across its path, this header must be

used to specify which nodes to visit.

Destination header - used to carry additional information that can only be seen by the destination node

Fragment header - used when a package size is bigger than the Maximum MTU for that link. The

fragmentation of the packet occurs at the source node as opposed to IPv4 where the fragmentation is

performed by the routers along the packet delivery path.

Authentication header - used to provide message authentication and integrity

Encapsulating security payload header - this header provides message integrity and confidentiality.

Page 29: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

2.4. IPV6 ADDRESS TYPES 9

2.4 IPv6 Address Types

Like in IPv4 there are rules for the attribution of addresses. There are addresses to be used on the

Internet (public addresses), addresses used on local networks and addresses reserved for different

usages. IETF is the entity in charge for this function. Table 2.1 contains the list of addresses types and

the respective network prefixes1.

Table 2.1: IPv6 Address Types

IPv6 notation is very different from the one used in IPv4. Instead of expressing the addresses in decimal

format as in IPv4, IPv6 expresses them in hexadecimal. The bits are grouped into groups of 16 bits and

are separated by ":". Although this notation is not very pleasant due to the extension of the addresses, it

is possible to compress zeros in order to make the writing of addresses easier. This syntax was created

because in IPv6 addresses, the appearance of long strings of zero bits is common. For example the

address:

2001:0d34:0000:0000:0000:0000:3653:62bc1https://www.ripe.net/lir-services/resource-management/allocations-and-assignments/

request-ipv6/ipv6addresstypes.pdf (last accessed October 1st, 2013)

Page 30: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

10 CHAPTER 2. BACKGROUND

can be compressed to

2001:d34::3653:62bc

Regarding the text representation of address prefixes, these are written in CIDR just like in IPv4. Anyway,

even with the capability of compressing zeros, IPv6 addresses are not "user friendly". IPAM tools like

the ones from Blue Coat 1 and Infoblox 2 can be used to combat this problem since they automate and

simplify the management of IP addresses.

2.5 DNS

DNS is one of the main components of the Internet since it provides a way to resolve websites names

like www.ipv6.com into IP addresses. The guidelines that allow the DNS to handle IPv6 requests are

defined in RFC 3596 [11]. The way DNS handles IPv6 queries is very similar to the way it handles

queries in IPv4. Instead of using the A resource record type, DNS uses a new type of record for IPv6

- AAAA - which stores an IPv6 address. The main difference with the introduction of IPv6 is that, now

all the queries that were made for type A records have to be performed for type A and type AAAA. A

DNS server will always have to do this, since it has no way of knowing if the requesting node is using

IPv4 or IPv6. Nodes that implement dual stack must have a mechanism to choose which type of records

they will use in cases where both record types are found. However, most of the operating systems give

priority to IPv6 and only if the connection fails (timeout) IPv4 is used. This is a big problem because if

the IPv6 connection has issues the user will have an unnecessary delay in his connection. To solve this,

IETF published the Happy Eyeballs algorithm [12]. This algorithm performs both queries simultaneously

and uses the one that is returned first (IPv6 is still prefer). This way users do not have to disable IPv6

due to delays in the network.

It is also defined a special domain to look up a record corresponding to an IPv6 address. This provides

a way to map an IP address to a host name. The special domain is rooted at IP6.ARPA.

2.6 ICMPv6

Internet Control Message Protocol (ICMP) was modified for IPv6 in order to provide additional functions.

It still provides functions like ping and destination unreachable that were important in IPv4, but now

has new capabilities like Neighbor Discovery and Path Maximum Transmission Unit (PMTU). Neighbor

1http://www.ip-performance.co.uk/bluecatipambuiltright_15.php (last accessed October 1st, 2013)2http://www.infoblox.com/en/solutions/technology-solutions/ip-address-management.html (last ac-

cessed October 1st, 2013)

Page 31: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

2.7. IPV6 ROUTING TYPES 11

Discovery Protocol (NDP) replaces the Address Resolution Protocol (ARP) and enhances it. It is respon-

sible for address auto-configuration of nodes, discovery of other nodes on the link, duplicate address

detection, finding available routers and DNS servers and removing the link-local broadcast traffic gener-

ated by ARP [13]. With these changes it also solves the problem of out dated ARP caches.

In IPv6 all links must support at least packets with 1280 bytes, but the minimum recommended is 1500,

whereas in IPv4 the MTU is only 576 bytes. This difference results in higher efficiency since there is

no need to process extra headers. Another advantage of PMTU is the fact that a source node uses

ICMPv6 to determine the PMTU in order to fragment the packet if needed. As already explained, in

IPv6, fragmentation can only be performed by the sources nodes, thus routing efficiency is increased.

Although ICMPv6 has new capabilities, which allow for greater network efficiency, it suffers from some

security problems [14] that must be dealt with.

2.7 IPv6 Routing Types

As in IPv4, IPv6 has 2 types of routing: static and dynamic. Static routing follows exactly the same

principles as in IPv4. Dynamic routing still has two types of protocols: Interior Gateway Protocols (IGP)

and Exterior Gateway Protocols (EGP) and as in IPv4 uses the longest-prefix match routing algorithm.

All the main routing protocols used in IPv4 have their own version for IPv6 (Table 2.2 ) [15].

Table 2.2: IPv6 Routing Protocols

2.8 Security

Most of the vulnerabilities present in IPv4 are still present in IPv6, furthermore, IPv6 brings new security

problems due to the changes made to IPv4. The following list shows some of these issues:

Extension headers - It is possible in IPv6 to create a chain of extension headers, meaning that an

attacker can manipulate an IPv6 header and point one extension header to another indefinitely because

there is no limit for the number of extension headers contained by an IPv6 header.

Page 32: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

12 CHAPTER 2. BACKGROUND

Auto-configuration - SLAAC allows a node to get a global unicast address using ICMPv6 messages

without any approval. If an attacker can connect to a network using SLAAC, it is possible for him to send

router advertisements and respond to node solicitations, as well as performing Denial of Service (DoS)

attacks among others.

DNS Updates - With SLAAC all nodes are required to update DNS entries, not only the DHCP servers

as it happens in IPv4. This can introduce scalability problems for the Dynamic DNS (DDNS) security

mechanisms.

Multiple Addresses - In IPv6 an interface can have multiple addresses, therefore firewalls and access

control lists have a more complex job.

ICMPv6 - Since the use of ICMP in IPv4 was not essential, network administrators often blocked ICMP

messages to secure the network. However ICMPv6 is fundamental for IPv6. NDP, PMTU and SLAAC

use ICMPv6 massages for example. Thus, block ICMPv6 messages is no longer a solution, therefore it

must be handled differently.

Besides the issues present above, we must take into account the vulnerabilities caused by the use of

transition mechanisms. Additional mitigation measures are needed to guarantee network’s security.

2.9 Migration Costs and Benefits

With the transition to IPv6, organizations can enhance their business models in several ways. Network

management can became much easier for network administrators due to IPv6’s ability to configure itself;

therefore the costs of internal network management will be lower. Beyond that, new opportunities will

emerge, so we will have new ways of making money.

There are some aspects in IPv6 that can really change the way a enterprise works, for example the

mandatory support for mobility allows mobile teams to be constantly interconnected; the abundance of

IP addresses renders private addresses unnecessary, thus it is no longer necessary to manage NATs.

Although the elimination of NAT brings back the transparency of the networks, it plays an important

role on the security of users located behind a NAT box, since it is not possible for a machine to initiate

communication with a host located behind a NAT box. Therefore enterprises stop having a single entry

point for their network. However, the use of NAT is not the only way to achieve this, proxies can be use

with the same purpose.

IPv6 can facilitate the "Internet of Things" emergence[8]. This concept refers to a network interconnect-

ing common objects equipped with intelligence modules, so it is not possible for "Internet of Things" to

grow within an IPv4 network due to its lack of address space and scalability.

Page 33: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

2.9. MIGRATION COSTS AND BENEFITS 13

Many economic sectors could profit with IPv6 adoption like: entertainment, leisure, gaming, transporta-

tion, health care and education [8].

IPv6 can also facilitate the emergence of smart grids, which use information and communications tech-

nology in an automated manner to allow communication schemes for monitoring and managing the

generation, transmission and distribution of electricity. Finally, IPv6 can allow the appearance in higher

numbers of intelligent houses, since these houses require a considerable number of addresses to inter-

connect all the devices in them.

The benefits that IPv6 can bring to this sectors are obvious. So, what is holding back the migration?

Here are some of the main reasons:

• The huge investment needed to upgrade existent equipment or acquire new equipment with IPv6

capacity;

• Compatibility problems between the two protocols;

• NAT;

• The experience with this new protocol is limited;

• Some security problem may arise;

• Must exist an interoperability with hardware and software used;

• The business return on such an investment is uncertain.

Even if enterprises do not want to spend time and money to make their services available through IPv6

right now, they should at least prepare for this scenario. There will be costs for companies that do not

prepare themselves for IPv6:

• By being reactive instead of proactive the costs with the transition will be much higher because

there will be no time to prepare a proper migration plan.

• If a company that is already planning the migration has to buy new equipment and services, they

can ensure that the equipment bought is compatible with IPv6. Other companies may waste money

on equipment that must be replaced in a couple of years because they do not have IPv6 support.

• With the exhaustion of IP addresses in Asia, IPv6 is the only solution to allow new users in that

area to access the Internet. Therefore, exists here, a new market waiting to be explored.

• Companies not prepared for IPv6 can hurt their reputation if their rivals are already prepared for

IPv6. For example if a service is made available through IPv6 and Company A cannot provide this

Page 34: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

14 CHAPTER 2. BACKGROUND

service, because they did not prepare themselves for IPv6, they may loose clients to companies

that already support IPv6.

Page 35: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

Chapter 3

State of the Art

3.1 Introduction

People and companies around the world already realized that IPv6 will be the future of modern Internet.

In this section we try to show the state of IPv6 worldwide and analyze the existing transition mechanisms

to better understand how they can facilitate the transition to IPv6.

3.2 IPv6 Worldwide

People and companies around the world already realized that IPv6 will be the future of modern Internet.

We can see that by the number of acquired IPv6 prefixes worldwide. United States is the country with

most IPv6 prefixes (3233), this is explain by 2 factors: the first one is its size when compared to other

countries, but the most important one is related with the demand of U.S. government to assure that all

federal agencies should had their services available through IPv6 until September 2012 [16]. Although,

only 11% of U.S federal agencies fulfilled this deadline, whereas 54% showed no progress in IPv6

adoption. By the time of this writing IPv6 enabled domains had increased to 25% while IPv6 services

are already supported by 45% of agencies 1. It is expected by the U.S government that in 2014 all

agencies will be fully IPv6 operational and able to communicate with external networks using IPv6 [16].

With this measures, U.S government contributed decisively for the United States position in this ranking.

The 2 countries that complete the Top 3 are Brazil and Germany with 1207 and 889 IPv6 allocations

respectively. Table 3.3 provides the Top 10 countries with more IPv6 allocations 2.

1http://fedv6-deployment.antd.nist.gov/snap-all.html (last accessed October 1st, 2013)2http://www.ipv6actnow.org/info/statistics/allocations-and-assignments/ (last accessed October 1st,

2013)

15

Page 36: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

16 CHAPTER 3. STATE OF THE ART

Table 3.3: Top10 IPv6 allocations by country

Governments from countries like Australia [17] and China are also decided to take advantage of early

IPv6 deployment. China for example has a five-year plan called Next Generation Internet Project (CNGI)

that aims to have a prominent position in IPv6 network. This plan started in 2008 at the Olympics in

Beijing where China used IPv6 to transmit and manage the competition [16].

Nowadays the number of Local Internet Registers (LIRs) with IPv6 allocations is above 6100, and already

surpassed the number of LIRs without IPv6 (slightly above 3400) 1 in the Reseaux IP Europeens Network

Coordination Centre (RIPE NCC) service region. By default Regional Internet Registers (RIRs) assign

/32 prefixes to LIRs. LIRs for their turn assign by default a /48 to their clients [18]. These values can be

changed to better adjust to each case.

Looking at the data provided by RIPE NCC 2 about the adoption of IPv6 in Autonomous Systems (ASes)

all around the world, it is possible to assume that organizations realized that IPv6 cannot be delayed

much longer. A large number of ASes already took the first step towards migration by acquiring at least

one IPv6 prefix. In Norway the percentage of ASes with at least one IPv6 prefix attributed is 58,75%

already, which corresponds to 94 ASes from a total of 160. The second country in this list is Netherlands,

where 48,26% of ASes in the country have at least one IPv6 prefix. The Top 20 countries with the higher

percentage of ASes with IPv6 prefixes are present in Table 3.4. In the top 10 there are 7 countries from

RIPE NCC region, which shows that Europe is one step ahead when compared to the rest of the world.

IPv6 is available for more than a decade, but only in 2009 was possible to notice a significant increase

in the allocation of addresses in the ASes worldwide. Looking at Figure 3.2 we can verify that from

2004 to 2009 the percentage of ASes with IPv6 prefixes increased from 2.37% to 4% only. However

from 2009 to September of 2013 this percentage raised from 4% to 16.62%. As we can see the trend is

for the percentage of ASes with IPv6 prefixes to keep growing in the next years, and this tendency will

probably increase now that Asia and Europe regions exhausted their address spaces.

1https://labs.ripe.net/statistics-information/ipv6members1210.png (last accessed October 1st, 2013)2http://v6asns.ripe.net/v/6?s=_ALL;s=NO;s=NL;s=MY;s=JP;s=SE;s=DE (last accessed October 1st, 2013)

Page 37: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

3.2. IPV6 WORLDWIDE 17

Table 3.4: Top 20 countries with more percentage of ASes with IPv6 prefixes

Figure 3.2: Evolution of the percentage of ASes with IPv6 prefixes

Page 38: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

18 CHAPTER 3. STATE OF THE ART

Internet has 318 Top-Level Domains (TLDs). By September of 2013, 263(89%) supported IPv6 access

to their domain name servers. If we look at the data provided by RIPE about K-root 1, one of the 13

Root Name Servers of the Internet, there are about 1000 queries/s from IPv6 nodes and about 16000

queries/s from IPv4 nodes. The number of queries almost quadruple in just two year, representing now

6,25 % of the total queries in this DNS server. If we now look at the data from reverse DNS servers 2,

we can see that 48.9% are reachable via IPv6. The same data shows us that the percentage of reverse

DNS servers where IPv6 is as fast or faster than IPv4 is 78,4%.

To have a better perception of IPv6 availability let’s check the top 1000000 accessed sites over the inter-

net 3. From this 1000000 sites only 59026 have a direct IPv6 address, which represents a percentage

of 5.9%.

All the information present here shows us that the world is getting ready for IPv6, but how many people

use IPv6 nowadays? If we look at the data form Cisco 4, we can see that Switzerland has the highest

percentage of IPv6 users(8,9%) followed by Romania (7,69%) and France(5,07%). To have a real per-

ception of the percentage of IPv6 users worldwide let’s check the traffic that passes through Google 5.

The percentage of users that access Google over IPv6 more than double in just one year and it is now

above 2%. This traffic is generated without the use of tunnels, in fact the use of tunnels to connect IPv6

devices represents only 0.01% of Google traffic.

3.3 IPv6 in Portugal

There are 60 IPv6 allocations in Portugal 6, this number more than double in the last year. In the next

few years this number should increase, since Portugal’s trend is to continue to grow, as shown in Figure

3.3. In the last year this percentage decreased a bit but this happend because Portugal has a really low

number of ASes, so if a new AS appear and only has IPv4, this will have a big impact in any statistic.

Another important thing to retrieve from this figure is the position of Portugal, which is far ahead in the

percentage of ASes with at least one IPv6 prefix when compared to the world average. However if we

look to the Top 3 European countries, Portugal is still a bit behind. It has 13 ASes with at least one IPv6

prefix from a total of 64 ASes. The list of IPv6 allocations in Portugal until September 2013, can be seen

in table 3.5.

1http://k.root-servers.org/statistics/ROOT/monthly/ (last accessed October 1st, 2013)2http://bgp.he.net/ipv6-progress-report.cgi (last accessed October 1st, 2013)3http://www.alexa.com/topsites (last accessed October 1st, 2013)4http://6lab.cisco.com/stats/ (last accessed October 1st, 2013)5http://www.google.com/intl/en/ipv6/statistics.html#lab=per-country-ipv6-adoption(last accessed

October 1st, 2012)6http://www-public.it-sudparis.eu/~maigron/RIR_Stats/RIPE_Allocations/IPv6/ByNb/PT.html (last

accessed October 1st, 2013)

Page 39: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

3.3. IPV6 IN PORTUGAL 19

Table 3.5: Companies with IPv6 prefixes in Portugal

Page 40: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

20 CHAPTER 3. STATE OF THE ART

Figure 3.3: IPv6 allocations in Portugal

All this networks have /32 prefixes. The National Research and Education Network (NREN) from Portu-

gal (Fundação para a Computação Científica Nacional (FCCN)) for example uses its /32 to provide /48

prefixes to each university connected to its network. Other companies like Optimus, ZON or PT can use

their prefixes to provide IPv6 access to their clients when they request so. To do this they just have to

create subnets from their /32 prefix. These telecommunication companies already support native IPv6

in their backbone and are starting to offer IPv6 solutions to their enterprise costumers 1 2 3.

The percentage of IPv6 users in Portugal is just 0,71%4 but this number will keep increasing in the

next months/years just like in the rest of the world. Another relevant point to better understand the

development of IPv6 in Portugal is to look at the data provided by FCCN. According to the data from

January 2013, 12,6 % of daily consults in the primary ns.dns.pt were made using IPv6 already 5.

3.4 Transition Mechanisms

In order to have a successful transition, compatibility between IPv4 and IPv6 must be assure. For this

reason IETF has been working in specific mechanisms to allow a smooth transition between IPv4 and

IPv6. The transition should be transparent to the end-users, in other words a normal Internet user will

not have any idea that this transition is happening.

It is important to remember that the mechanisms used to assure the transition must be used for several

1http://www.zon.pt/institucional/PT/Media/Documents/3%206%202011%20ZON%20anuncia%20IPv6_PR.pdf (last accessed October 1st, 2013)

2http://www.optimus.pt/Main/SobreAOptimus/PressReleases/2011/6/6/3440151 (last accessed October1st, 2013)

3http://www.telecom.pt/ipv6/migrar-redes.html (last accessed October 1st, 2013)4http://6lab.cisco.com/stats/ (last accessed October 1st, 2013)5https://www.dns.pt/sondas-evolucao-anual-ipv6;jsessionid=545CF84010801D343115671902B52344.

jvm2 (last accessed October 1st, 2013)

Page 41: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

3.4. TRANSITION MECHANISMS 21

years until IPv6 is fully deployed. There are three different types of transition mechanisms: dual stack,

tunnelling and translation.

3.4.1 Dual Stack

With this mechanism a network node maintains both protocol IPv4 and IPv6 stacks. This way any dual

stack node will use an IPv4 address obtained by DHCP to communicate with an IPv4 node and will use

an IPv6 address obtained by DHCPv6 or SLAAC to communicate with an IPv6 node. If dual stack is

implemented in a network, an application can choose which version of the IP Protocol to use depending

on the requirements of the application. This is the most direct way to perform the transition from IPv4 to

IPv6.

Since an IPv4/IPv6 host must be able to communicate directly with IPv4 and IPv6 nodes, DNS servers

must be capable of handling A records and AAAA records, because the DNS server that got the request

has no way to know the capabilities of the requesting node [19]. A node with a dual-stack implementation

can operate in three different manners: IPv4 stack enabled, IPv6 stack enabled and both stacks enabled.

With IPv4 stack enabled a node can only communicate using IPv4, with IPv6 stack enabled it can only

communicate using IPv6 and with both stacks enabled it can communicate using IPv4 or IPv6.

Dual stack assures higher throughputs and lower RTTs when compared to tunnelling mechanisms [9]

but unlike tunnelling, requires a big investment to buy new equipment or upgrade the existing ones. Not

only routers/switches and hosts must be upgraded, applications and services in the network like Simple

Mail Transfer Protocol (SMTP) or DNS must also support both versions of the IP protocol.

3.4.2 Tunnelling

Another technique is the use of tunnels. This is used to allow IPv6 nodes to communicate through an

IPv4 network. Routers and hosts that implement both IPv4 and IPv6 protocols can create point-to-point

tunnels to transmit IPv6 datagrams through an IPv4 network. To accomplish this, routers/hosts that will

send the datagram are able to encapsulate the IPv6 datagram in an IPv4 datagram. The encapsulation

consists in adding an IPv4 header to the IPv6 packet. The node at the end of the tunnel is responsible

for removing IPv4 header and forwarding the packet to its destination.

The most common type of tunnelling is router-to-router since the end points must be configured. These

routers must be dual stack and are the boundary between IPv6 islands and the IPv4 network. Tunnels

can be created manually at end-points or automatically. Automatic tunnelling includes 6to4, Toredo,

ISATAP, Tunnel Brokers and 6rd mechanisms.

Page 42: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

22 CHAPTER 3. STATE OF THE ART

6to4 specifies an encapsulation mechanism to transmit IPv6 packets between IPv6 islands using a well-

known prefix over IPv4 network. 6to4 hosts use a common IPv6 prefix (2002::/16) followed by its IPv4

public address. To communicate with other 6to4 hosts, 6to4 routers are used at the networks edges.

6to4 hosts can also connect to native IPv6 host but in this case it is necessary the use of 6to4 relay

routers [20] as shown in Figure 3.4 1. Therefore 6to4 does not need to configure explicit tunnels.

6rd utilizes the same encapsulation and base mechanisms as 6to4 [21] and can be seen as an improve-

ment of 6to4 [20]. This mechanism does not advertise a common IPv6 prefix like 6to4, instead it uses

the IPv6 prefix of an Internet Service Provider (ISP), which eliminates some problems that are caused

by the use of a well-known IPv6 prefix. For example if a 6to4 relay router belonging to one ISP starts

advertising the prefix 2002::/16, this will provide open services not only for the ISP costumers but to

every other user aswell. To control access to their services an ISP can add rules in its relay router to

filter incoming packets. The problem emerges when a client from a different ISP near the 6to4 relay

router from the first ISP tries to send a packet. This packet will be forwarded to the 6to4 router and the

router will drop the packet, creating a black hole [20].

6rd also allows the use of private addresses (6to4 only works with public addresses), the only place

where an IPv4 public address is needed is at the border relay router.

ISATAP specifies a Non-Broadcast Multiple Access (NBMA) interface type to transmit IPv6 packets

over IPv4 networks. ISATAP is meant to be used within a site, enabling isolated IPv6 hosts within an

IPv4 network to communicate using tunnels. For this to work a link-local address is generated from

an IPv4 address. ISATAP interfaces configure IPv6 link-local addresses, which encapsulate an IPv4

address assigned to an underlying IPv4 interface within the IPv6 link-local prefix "fe80::/10" [22]. This

mechanism is designed to be used in networks where IPv4 is the dominant protocol. By implementing

1http://en.wikipedia.org/wiki/File:6to4.svg (last accessed October 1st, 2013)

Figure 3.4: 6to4 mechanism

Page 43: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

3.4. TRANSITION MECHANISMS 23

ISATAP it is possible to achieve slightly better throughputs and lower RTTs than 6to4 [9].

Teredo suppresses one of the 6to4 problems. 6to4 requires that the tunnel end-points have a public

IPv4 address. Although ISATAP already solves this problem, it does not work across NATs. Well, with

the actual state of Internet this is a problem since NAT is present almost everywhere. Teredo solves

this problem by tunneling packets over UDP, with the help of Teredo servers and Teredo relays (both of

them must be dual stack). UDP was chosen because TCP and UDP are the only protocols guaranteed

to cross the majority of NAT devices [23] and if the choice was TCP, it would result in a poor quality of

service. Figure 3.5 shows the architecture of Teredo.

If a Teredo client located behind a NAT box wants to send a message to an IPv6 host he must follow the

following procedure [24]:

1. The Teredo Client sends an IPv6 ping to the remote interface through its Teredo server (encapsu-

lated in UDP and IPv4).

2. The Teredo server decapsulates and forwards the ping.

3. The ping reply goes to a Teredo relay.

4. The ping reply goes to the Teredo server.

5. The Teredo server tells the Teredo client what Teredo relay to use.

6. The Teredo client sends normal (encapsulated) traffic to the Teredo relay.

7. The Teredo client receives normal (encapsulated) traffic from the Teredo relay.

Figure 3.5: Teredo

Tunnel Brokers require the deployment of a tunnel broker server, which has to be dual stack [25].

The tunnel broker server is responsible for creating and managing the tunnel between the client and

Page 44: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

24 CHAPTER 3. STATE OF THE ART

the tunnel server. Tunnel Brokers are a good way for individual hosts to connect to IPv6 sites. The

procedure followed by this mechanism is as follows:

1. The Client connects to the tunnel broker web interface and request a tunnel (after registering in

the broker system).

2. The broker sends the remote endpoint configuration to the tunnel server

3. Broker returns configuration to client system to create the tunnel

4. Tunnel is established

Dual-Stack Lite as the name states this mechanism uses the same approach as dual stack, but while

dual stack implementations force a node to have an IPv4 and an IPv6 public address, in ds-lite the IPv4

address may be private [26]. The Costumer-Premises Equipment (CPE) distributes private addresses to

the LAN clients, and then instead of performing NAT to communicate with the outside, CPE encapsulates

the IPv4 packet inside an IPv6 packet. This packet will be sent through IPv6 to the Carrier-Grade

NAT (CGN)(Figure 3.6 1). Then CGN uses its global IPv4 address to communicate with the IPv4

network. In order for this to work CGN must record the CPE public IPv6 address, the private IPv4

address and TCP/UDP port numbers.

Figure 3.6: DS-Lite mechanism

3.4.3 Translation

Dual stack mechanisms require a huge investment to update current equipment and invest in new ones.

On the other hand, tunnelling mechanisms connect IPv6 islands but are unable to allow the connection

between the IPv4 realm and IPv6 realm. So translation is needed to allow resource migration and coex-

istence between both protocols while the migration occurs. Also, services that are available through IPv4

1http://en.wikipedia.org/wiki/File:DSLite.svg (last accessed October 1st, 2013)

Page 45: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

3.4. TRANSITION MECHANISMS 25

may not be available in IPv6. In these cases translation is the only solution. As the name states, transla-

tion enables direct communication between IPv4 and IPv6 hosts. Examples of translation mechanisms

are: DNS64, NAT64,Stateless IP/ICMP Translation (SIIT) and IVI.

NAT64/DNS64 These two mechanisms combined enable an IPv6-only client to initiate communication

with an IPv4-only server/client (Figure 3.7 1). DNS64 is a mechanism for synthesizing AAAA records

from A records when AAAA records are not found. The first part of the IPv6 addresses returned by the

DNS64 points to a NAT64 translator and the second part contains the IPv4 address of the A record. In

order to be able to perform IPv6-IPv4 translation, NAT64 requires a state that keeps information about

the binding of IPv6 addresses to IPv4 addresses [27].

These mechanisms are extremely useful for companies that are not yet prepared for IPv6. If a company’s

network does not have IPv6 support and wants their web servers to be available for IPv6 users, they

can use these mechanisms. This is not a definitive solution but can help companies to be present in the

IPv6 world while their infrastructures are not yet ready for IPv6. Many enterprises and service providers

already use this kind of solutions provided by A10 Networks and Infoblox 2.

Figure 3.7: DNS64/NAT64

SIIT is an effort to replace NAT-PT (also a translation mechanism), which was moved to historical status

by IETF, due to numerous problems [28]. This mechanism specifies a way to translate between IPv6

headers and IPv4 headers (and ICMP headers). It uses a specific IPv6 address pool to represent IPv4

systems.

IVI has three types of address translation: stateless 1:1 translation, stateless 1:N translation and stateful

translation. Stateless 1:1 translation is used when there is an IPv4 public address for each host. State-

less 1:N in the other hand is used when the IPv4 address pool is not enough for every host. In this case

several IPv6 addresses are translated into one IPv4 address. To make this possible IVI uses portcodind

[29]. Basically IPv6 addresses generated by the same IPv4 address will use different TCP or UDP ports.

1http://en.wikipedia.org/wiki/File:NAT64.svg (last accessed October 1st, 2013)2http://www.a10networks.com/resources/solutionsheets-Infoblox.php (last accessed October 1st, 2013)

Page 46: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

26 CHAPTER 3. STATE OF THE ART

In stateful translation, addresses are translated dynamically, which has much more computational and

memory costs, on the other hand, in stateless transition address mapping is statically configured.

3.4.4 Evaluation of the Alternatives

Dual stack, tunneling and translation mechanisms give us different ways to ensure a smooth transition.

It is important to realize that these three mechanisms are complementary, and the three should be use

during the transition depending on each case.

At first sight, we would say that the perfect solution is to deploy dual stack in every piece of network

equipment on the world. However, this is not as easy as it may seem. The costs for massive deployment

of dual stack equipment would be too big for some companies to handle. In a time of recession like the

one we live in, companies are not willing to spend fortunes unless they are obligated to do so. This is just

one of the reasons why the penetration of IPv6 is so low. Money could be seen as the obvious reason

for not deploying dual stack everywhere, but there are others even more relevant. Protecting a network

against attacks/intrusions is not an easy task, since all the potential security problems in IPv4 will also

exist in IPv6 alongside with new vulnerabilities exclusive to IPv6. So if we add IPv6 to the networks,

network engineers would have much more work to assure that the network stays safe. However from my

point of view the problem with the implementation of dual stack worldwide is the lack of IPv4 addresses.

Companies which possess IPv4 public addresses or are located in areas where there are still IPv4

public addresses to be acquired can easily implement this solution, whereas companies with no IPv4

public addresses located for example in Asia are obligated to find other alternatives. These alternatives

are exactly tunneling and translation techniques. With the exhaustion of IPv4 address in Asia, IPv6

became the only solution. So, in order to allow companies and Internet users with IPv6 addresses to

communicate with the rest of the world, both tunneling and translation mechanisms are required or else

IPv6 users in Asia would only be able to communicate among themselves. This would result in an IPv6

island without the capacity to communicate with the IPv4 Internet or even with IPv6 islands on other

parts of the globe.

Companies which already have IPv4 public addresses allocated are clearly better positioned for IPv6

Table 3.6: Comparing the transition mechanisms

Page 47: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

3.4. TRANSITION MECHANISMS 27

transition since they can profit from the advantages of the two worlds, IPv4 and IPv6. By implementing

dual-stack, companies are picking a solution that will enable them to communicate with both worlds in

the next 2 or 3 decades (until the last IPv4 station shuts down). At the end of this time they can turn off

IPv4 and communicate using only IPv6.

So why are companies with dual stack implementations better positioned? The reason is simple, trans-

lation and tunneling techniques have costs and these costs are the delay provoked in the network by the

tunneling of packets and the translation of IPv4 to IPv6 addresses. The consequences of using each

one of the transition mechanisms are expressed in Table 3.6.

Page 48: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

28 CHAPTER 3. STATE OF THE ART

Figure 3.8: Transition Mechanisms

Page 49: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

Chapter 4

Methodology for the Migration

Process

4.1 Introduction

Usually when we read something about IPv6 on the Internet or in a book we get the sensation that the

transition to IPv6 is an easy and simple procedure. People who believe in this idea have a very limited

notion of what is an IP network nowadays. Every single component in a network is connected to one or

multiple devices, each one with their own dependencies and limitations. Taking one device and enabling

IPv6 in it without consider its dependencies and devices connected to it, is not feasible. Nowadays most

of the network components require other services to work, for example: enabling IPv6 in our web server

is useless if DNS is not prepared to handle AAAA records (IPv6 records). Still, making DNS able to

resolve these records is not enough if the network itself cannot handle IPv6: routing equipment must be

able to handle IPv6 traffics, desktops need to have IPv6 enabled, DHCPv6 must be configured to give

IPv6 addresses to desktops (SLAAC and static configuration can also be used) and so on. Thus, the

network must be seen as a whole and not as the sum of all components. If this point is not respected,

we probably will end with connectivity issues and security breaches in the network.

There is not a simple and straight way to perform the migration from IPv4 to IPv6. As we have seen, the

dependencies between components in the network will determine and hamper the migration path that

must be followed.

29

Page 50: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

30 CHAPTER 4. METHODOLOGY FOR THE MIGRATION PROCESS

4.2 Generic Migration Process

The purpose of this section is to create a migration process, which can serve as a reference/guideline for

a team of engineers responsible for migrating their company’s network to IPv6. However each network

has its own specifications, therefore a specific migration plan must be created for each case. In some

cases this plan will be identical to the one proposed here, but in others cases may be necessary some

modifications depending on the type of network and its requirements. We can look at these steps and

view them as a generic set of steps for a transition towards IPv6. The plan proposed aims to ensure 5

objectives:

An IPv6 enabled network - obviously this is the main objective of the migration plan

Minimize costs - One of the main reasons for the low penetration of IPv6 worldwide is the costs asso-

ciated with its transition. As we all know, the world’s economy already had better days, so do not expect

that the majority of companies will spend thousands or millions of euros in this subject until it is strictly

necessary. Therefore it is essential to design a plan taking this into account.

Minimize the risk associated with the migration to IPv6 - There are risks when performing something

as complex as a transition from IPv4 to IPv6. In a task like this one it is extremely easy to miss something

and leave the network vulnerable. The team of engineers responsible for this task must pay special

attention to security and connection problems that may arise. It is fundamental to create a testbed

before the actual implementation, to assure that all services in the network and the network itself can

run with no failures, or else a company may do a huge investment in IPv6 only to find out that some

services do not work and some places of the network are not reachable.

Ensure the smoothness of the process - The process should occur in a smooth and manageable

manner. It is important that the migration plan is well structured and covers all aspects of the transition.

Go unnoticed - If possible the transaction towards IPv6 should be transparent to network users. Efforts

should be made to minimize possible disruptions on the network.

The migration process presented below was based on the RFC 4057 [30] and 4852 [31], who already

define some points to be taken into account when performing a migration to IPv6. It has 9 phases:

1. Analysis of the current situation

(a) Enterprise business

(b) Technological maturity of company

(c) Critical applications for the business

2. Present a study focused on the migration impact for the company

Page 51: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

4.2. GENERIC MIGRATION PROCESS 31

3. Survey of the enterprise’s network

(a) Network

(b) Equipment

(c) Applications

(d) Services

4. Analyse IPv6 support from ISPs

5. Estimate the costs of migrating the company’s network

6. Migration plan

(a) Upgrading or replacing equipment without IPv6 support

(b) Addressing plan

(c) Phased deployment of IPv6 into the network

(d) Treat network’s dependencies without IPv6

(e) Partial decommissioning of IPv4

(f) Decommissioning of IPv4

7. Testbed

8. Identify problems

9. Final implementation

In the remainder of this chapter we will present each phase in greater detail.

4.2.1 Anaysis of the Current Situation

The business of the company must be analysed, to better understand the consequences that IPv6 can

have on the enterprise. It is easy to realize that some businesses rely on networks more than others.

To propose a migration from IPv4 to IPv6 in a small company with a very limited network is an entirely

different thing than creating a migration plan for a big company. If we are creating a migration plan for

a company with multiple branches, we must take into account the interconnections between all of these

branches. It is probably not a good idea to create a migration plan for just one part/branch of a company,

because there will probably exist dependencies from other points of the company’s network. This could

result in a company being able to migrate its central office to IPv6 and communicate with the outside

but being unable to communicate with other points of its own network, because these points were not

Page 52: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

32 CHAPTER 4. METHODOLOGY FOR THE MIGRATION PROCESS

considered in the migration plan. For the same reason, clients that want to access services located

outside of the central office will not be successful. Therefore a migration plan should only be established

if a "full picture" of the company’s network is available. If, for some reason it is not possible to fulfill this

requirement, the migration plan should be delayed.

The list of requirements will be different for every company, not only based on their size and business

but also in their technological maturity. Other major concern should be the applications and services

that the company uses and it depends on. If a critical service or application for the company does not

support IPv6, a solution must be found.

4.2.2 Present a Study Focused on the Migration Impact for the Company

Some companies already are fully aware of the need to migrate to IPv6, making this step a courtesy or

even unnecessary. However a large percentage of companies worldwide do not know why they have

to migrate to IPv6 or the advantages that this new version of the Internet Protocol can bring. For those

companies this is an early but crucial point. If the managers of the company are not convinced that they

will gain something by migrating to IPv6, they will not spend money in this project, at least for now. So

one must present a study that shows the benefits that an early IPv6 adoption can bring to the company.

4.2.3 Survey of the Enterprise’s Network

An exhaustive analysis of the enterprise network is needed to better understand what has to be done

in order to proceed with the migration. This is one of the most important aspects in a migration plan

because in order to obtain a fully functional IPv6 network, the topology of the network must be fully

analysed to guarantee that the right decisions are taken. It is not possible to create a good migration

plan for an enterprise if we do not have full knowledge of their network. One must have knowledge

of every component of the network and its dependencies to establish a secure and reliable transition.

Network topology is just one of the things to be taking into account when we are analyzing a network.

Every component in the network should be analysed, like:

• Routers and switches

• Services

• Applications

• Firewalls

• Routing protocols

Page 53: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

4.2. GENERIC MIGRATION PROCESS 33

• Printers and other devices

4.2.4 Analyse IPv6 Capacity from ISPs

Not all ISPs are prepared for IPv6. Some of them did not even start to plan their transition to IPv6 [32],

so the ISP or ISPs of the company must be contacted in order to understand which type of services are

they offering through IPv6. After that, one can analyse the different offers and decide which ISP(s) has

the better offer and is more reliable. It is important to ear the ISP’s plans for IPv6 because a migration

plan done now can be put in practice only in a few years. By then an ISP that is not offering IPv6

connectivity right now, can have their services fully operational through IPv6.

4.2.5 Estimate the Costs of Migrating the Company’s Network

After the analysis to the company’s network and to ISPs responsible for providing Internet and other

services to the company, it is a good idea to estimate the costs of this operation, using the information

obtained in the preceding steps. The equipment and services that must be upgraded or replaced must

be specified. Alternative solutions should be presented for replacing these services and equipment with

no support for IPv6.

In this phase one must know what type of approach the company wants to follow. There are four different

paths for the company to follow:

• Upgrade entire network to IPv6 - This will result in a mass implementation of dual stack equip-

ment, providing the network with the capability to communicate regardless of the protocol used.

While this is the best solution, since all the others are just temporary, it is also the most expensive.

It will be necessary to configure, upgrade or replaced every single network equipment and service

in the network.

• Upgrade some parts of the network to IPv6 - by upgrading only parts of the network it will be

necessary to have dual stack equipment on the edges dividing IPv6 from IPv4 networks, tunneling

mechanisms to tunnels IPv6 packets through the IPv4 network and translation mechanisms if the

company desires to have communications between IPv6 and IPv4 users and services.

• Create a new network - If a company wants to create a new network, it has to decide between

a dominant IPv6 network and an IPv4 dominant network. The best approach would be creating

a full dual stack network, allowing communications using both version of the Internet Protocol.

Some restrictions exist here, it is necessary to understand if there are still IPv4 public addresses

available, if not, an IPv6 network is the only solution.

Page 54: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

34 CHAPTER 4. METHODOLOGY FOR THE MIGRATION PROCESS

• Keep an IPv4 network able to communicate with IPv6 users - A company may prefer to keep

their network as it is and simply add translation mechanisms to allow the access to some of their

services like the web portal.

With all this in mind and taking into account the choices of the company it is possible to do a feasible

estimation of the costs involved in this operation.

4.2.6 Migration Plan

With the information obtained in the preceding phases, a migration plan can start to be defined. In order

to proceed with the migration plan it is essential that the costs for migrating to IPv6 have already been

estimated. If the document with the costs estimation is not elaborated, it is necessary to perform, in this

step, the analysis of the network equipment and to choose which type of migration the company wants:

upgrade the entire network to IPv6, upgrade some parts of the network to IPv6, create a new network

or keep an IPv4 network that is able to communicate with IPv6 users.

As soon as the migration plan gets an approval by the company’s administration it is time to start the

actual migration. This plan should include all the proceedings that must be followed in order to achieve

a successful migration, starting with the training of IT staff and ending with the IPv4 shutdown.

Before starting the transition to IPv6, there are some things that must be done first:

• Every department in the company is informed about the IPv6 migration.

• Give IPv6 training to the IT staff (or else they are not able to migrate the infrastructure and maintain

it).

• All software developed inside the company takes IPv6 into consideration

• All software and hardware acquired from that moment on must support IPv6. If the equipment

needed does not have IPv6 support and no feasible alternatives are available, the equipment’s

suppliers should be questioned about their road map for IPv6. If there is none, the equipment can

be acquired but the company will have to use mechanisms like NAT64 to allow its use in an IPv6

only network.

• Acquire an IPv6 address block from its LIR.

• Define a lab environment to make some experiences with IPv6. This way, there is no risk to disrupt

the services.

• Learn with others mistakes. If possible analyze similar IPv6 migrations in other companies to avoid

mistakes and problems that may have occurred.

Page 55: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

4.2. GENERIC MIGRATION PROCESS 35

With all that done, we can proceed to the implementation of IPv6 in the network. However this process

should be done carefully and divided into different stages:

1. Upgrading or replacing equipment without IPv6 support

All the information needed for this task is present in the document elaborated about the estimation

of costs.

2. Addressing Plan

Since the address format in IPv6 is different from IPv4, a company has to make an all-new ad-

dressing plan. This procedure must be done carefully, so that the available pool of IP addresses is

not wasted and it is distributed accordingly to the different departments in the company. There are

rules that should be followed when designing an addressing plan, just like in IPv4. Due to the size

of the IPv6 addresses, it is very important to follow these rules because with such a large space of

addresses to use, the probability of the address plan becoming a mess is too high. Before doing

the address plan the company should acquire an address space from its ISP or its RIR (if we are

talking about an ISP). However if for some reason the company still does not have an address

block attributed, it is possibly to design an addressing plan without having an address space at-

tributed. If this happens, the plan just has to be adapted to the range of addresses acquired by the

company.

3. Phased deployment of IPv6 into the network

After having an addressing plan we can start to migrate the company’s infrastructure to IPv6. To

achieve a successful migration we should enable IPv6 in the following order:

• Routers, firewalls and switches

• Basic network services

• Workstations

• Servers

If the company has a Demilitarized Zone (DMZ) to protect the internal network from unwanted

accesses, we should enable IPv6 in the internal network and only after should we proceed to

enabling IPv6 in the DMZ. Therefore we can mitigate network problems created with the use of

IPv6 in the network and correct them before proceeding with the migration in the DMZ. When we

refer to network problems, we are mostly speaking about security problems arising from enabling

IPv6. Security is a major concern because it is not feasible to migrate to IPv6 if that means less

security in the network. For this reason we should pay special attention to the security rules and

policies in the network and guarantee that the transition to IPv6 will not compromise the network.

Page 56: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

36 CHAPTER 4. METHODOLOGY FOR THE MIGRATION PROCESS

It is important to realize that IPv6 brings new security problems that need to be handled. Besides

that a transition to IPv6 means in most cases that the network will operate in dual stack, therefore

the security problems will double: the ones from IPv4 will still exist and the same ones will be

created for IPv6. Thus new security rules and policies must be created to ensure the network’s

safety. These rules are not just to replicate the existing rules to IPv6, we must pay special attention

to possible failures in the network caused by the IPv6 protocol.

Other aspects that we need to take into account are for example the routing protocols to use with

IPv6. It is necessary to understand if the routing protocols in use have a correspondent version for

IPv6 and if they are still the best option, because the versions for IPv6 can have slightly differences

(in performance for example) which justify the change in the network protocol. Configuration of

hosts should require an analysis for understanding which type of configuration should be used.

For routers and servers, manual configuration is clearly the best option but what about hosts?

Should we use DHCP as in IPv4 or use SLAAC and take advantage of "plug and play networks"?

It is even possible to use a mix of both; therefore these questions should be analysed and then

answered.

4. Treat network’s dependencies without IPv6

There may exist some services that cannot be upgraded or even replaced to support IPv6. In

these cases, we must find plausible alternatives. If there is no viable alternative we may try to use

a solution like NAT64/DNS64 allowing these services to communicate with IPv6 devices.

5. Partial decommissioning of IPv4

When the use of IPv4 has reduced drastically and is no longer relevant we should decommissioning

IPv4 from workstations and servers and use DNS64 and NAT64 to allow existing IPv4 users to

communicate with the rest of the network.

6. Decommissioning of IPv4 With the end of IPv4 traffic we are finally able to turn off IPv4. All the

monitoring and management over IPv4 can be decommissioning. Translation services like DNS

64 and NAT64 can also be decommissioning. IPv4 addresses are returned to the respective LIR.

4.2.7 Testbed

The IT department should create a platform to test a scenario as close to the real one as possible. This

step is essential because a migration plan is much more reliable if it is based on a carefully defined

testbed. The testbed and the migration plan may be elaborated together, this way it is possible to realize

almost immediately if the recommendations written are viable or should be replaced.

Page 57: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

4.2. GENERIC MIGRATION PROCESS 37

4.2.8 Identify Problems

In the Testbed all possible situations should be tested in order to discover potential limitations. All the

problems encountered like connectivity issues must be registered in this phase, so that problems like

these are eliminated when the implementation starts.

4.2.9 Final Implementation

With a migration plan defined and tested we can finally perform the migration to IPv6 according to the

migration plan created.

Page 58: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the
Page 59: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

Chapter 5

Practical Case

5.1 Introduction

In this chapter we will use the migration process we just defined(with some modifications) to migrate a

subset of the data centers’ network of Refer Telecom to IPv6. We will use just a subset of the network

because i had to sign a Non-Disclosure Agreement and Refer Telecom choose to keep confidential many

of the information regarding its network. However this is not the only reason, the size and dimension of

this network makes it impossible to produce a migration process in such a small period of time.

From the migration process defined there is one point that will be suppressed. We will not analyze

the IPv6 support from Refer Telecom’s ISPs. First of all, Refer Telecom is already an ISP and second

we cannot analyze the ISPs to which Refer Telecom has direct connections, because that information

was not provided since it is out of the Refer Telecom’s interests for this work. The phase 3 of the

migration process (Survey of the enterprise’s network) will focus only on the network infrastructure of

Refer Telecom and its data centers, so we will call it "survey of the network infrastructure". The detailed

analysis to equipment, services and applications will be performed in phase 5 (Estimate the costs to

migrate the company’s network).

5.2 Analysis of the Current Situation

Refer Telecom was founded in 2000 and has Refer as sole shareholder. One of the main objectives of

the company is the management and exploitation of the telecommunication infrastructure integrant of

the national railway network. It is licensed by Autoridade Nacional de Comunicações (ANACOM) as a:

fixed telephone service provider, public network operator within Portugal, registered data transmission

39

Page 60: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

40 CHAPTER 5. PRACTICAL CASE

and Internet Service Provider, VoIP Service Provider and Global System for Mobile Communications -

Railway (GSM-R) Service Provider.

Refer Telecom is a railway telecommunications operator and a regular telecommunications operator

which provides specialized telecommunications and IT service. With this information we can divide the

business areas in two components: management of railway telecommunications and the supply of IT

services to the business sector.

The company counts on 167 employees and it has a business volume valued in 23,1 million euros(2012

data). From this value, 51.5% (11.9 million euros) are associated to the railway component, whereas

the remaining 48.5% (11,2 million euros) come from the competitive market. Regarding the investment

made, Refer Telecom invested in the last year approximately 5,5 million euros. This investment level

should be maintained or increased in the next years in order to proceed with the IPv6 transition in its

data centers. According to the financial report from 2012 the Refer Telecom strategy is focused on:

"to ensure an effective management of the telecommunication infrastructures concession by the share-

holder, guaranteeing excellent services, as well as the optimization of all resources, through specialized

offers to the remaining markets". Concerning the services provided, as explained before, they are di-

vided in two components. In the railway telecommunication area, Refer Telecom provides the following

services:

• Operational telephony service - fixed over VoiP and mobile over Trunk and GSM-R

• Data transmission services - wireline network over IP/Multi Protocol Label Switching (MPLS),

Synchronous Digital Hierarchy (SDH)/Plesiochronous Digital Hierarchy (PDH) and wireless net-

work using GSM-R/General Packet Radio Service (GPRS), Global System for Mobile Communi-

cations (GSM)/Universal Mobile Telecommunication System (UMTS), WiFi

• Supervision and monitoring of infrastructures

• Traction remote control

• Video surveillance

• Videoconferencing

• Passenger information and public address system

• Time Synchronization

• Railway telematics solutions

• Consultancy

Page 61: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

5.3. PRESENT A STUDY FOCUSED ON THE MIGRATION IMPACT FOR THE COMPANY 41

The TI and communications area is directed to the business sector and emerged from the necessity to

monetize the existing network infrastructure. Its most relevant services are:

• Dark fiber rental

• Fiber optical networks and international connection

• Internet access and virtual private networks

• Leased lines and Ethernet connections

• Storage

• Disaster Recovery

• Voice

• Faxmail

• Email

• Background Hosting

• Online help desk

• Creation, management and monitoring of virtual environments

Most of the services presented above rely on the network protocol in use. If we remove this protocol

the chances that something (or everything) will fail is huge. This is because even if the network and its

services support an alternative protocol (IPv6), it is not configured. With the emergence of IPv6, it is

necessary to ensure that all the services listed above will still work if we decide to use IPv6 instead of

IPv4 as the network protocol. However, since IPv4 will stay with us for many years our objective should

be assuring the proper functioning of the network and all of its services regardless of the protocol in use.

5.3 Present a Study Focused on the Migration Impact for the Com-

pany

While IPv4 is coming to its end, it is necessary that telecommunication operators, companies and gov-

ernments are ready to respond to the challenges brought by IPv6.

The telecommunications industry is the Internet’s backbone, and so it has an intermediary role between

all information that flows across the Internet. By being a telecommunication operator, Refer Telecom

Page 62: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

42 CHAPTER 5. PRACTICAL CASE

should be able to answer their clients’ necessities as well as creating new partnerships and businesses,

taking advantage of its unique position.

By being proactive instead of reactive in the transition to IPv6, the company will have more time to

find the most suitable migration plan for it. The elaboration of a timely migration plan will avoid bad

investments in equipment. For example without a migration plan and no concerns regarding IPv6, a

company that needs to buy equipment will not take IPv6 into consideration when is making a purchase.

So in a couple of years, the company will have to replace a perfectly good and new machine just because

they did not check its IPv6 compatibility.

With the end of IPv4 addresses there are already users that can only access the Internet over IPv6. This

just happens in Asia for now, but in a couple of years the same thing may happen in Europe. There is

here a niche market waiting to be explored by pioneering companies. To corroborate this affirmation let’s

look at Google data about IPv6: about 2% of Google users already use IPv6 to reach Google servers.

This percentage will keep growing until the point where IPv4 traffic will just disappear. Just in the last 10

months the IPv6 traffic doubled, so we can expect that in a few years we will have here a huge market

to be explored. Taking this into consideration, it is obvious that companies ready for IPv6 are one step

ahead of the remaining. They can provide its contents and services to all clients and potential clients

over IPv4 and IPv6.

Refer Telecom already gave the first step into the IPv6 World when they enabled IPv6 in their Wide Area

Network (WAN). The technique used to do so, was dual stack. Therefore the entire WAN network is able

to work with both versions of the Internet Protocol. However, this effort must now be propagated to the

remaining network, specifically the data centers. By enabling IPv6 in the data centers, Refer Telecom

makes sure that all the services and content offered by them, are available to all clients over IPv4 and

IPv6.

As it is known, Refer Telecom intends to build a new data center in Lisbon, due to the limitations of the

existing one. So it is fundamental that all equipment acquired to the new data center has IPv6 support.

Not only the IPv6 support should be taken into account, the performance of equipment using IPv6 is

very important as well. Regarding the performance, we may look for certifications possessed by the

equipment to see if it has the necessary requirements.

5.4 Survey of the Network Infrastructure

The network of Refer Telecom is structured according to figure 5.9. The access to the data centers

is made through IPv4 regardless of the type of access. All accesses for monitoring and management

from the Direction of Information and Technology (DTI), as well as accesses from internal and external

Page 63: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

5.4. SURVEY OF THE NETWORK INFRASTRUCTURE 43

clients can only be made through the WAN network (data network). All data centers possess redundant

connections between them, so that Refer Telecom can fulfill all its SLAs in cases of malfunction or loss of

connection. All data centers are also connected over fiber channel for storage purposes (not presented

in the figure). The WAN network of Refer Telecom already has IPv6 enabled, so if we want employees

of the different departments of Refer Telecom (internal clients) and its clients (external clients) to have

access to the services in the data centers over IPv6 we need to migrate all the equipment in these data

centers to IPv6. Since all the network between the internal clients and the data centers is IPv6 enabled

there is nothing else to do besides migrating all the equipment and services available in the data centers.

For the internal clients they just need to have IPv6 enabled computers. Regarding external clients, it will

depend on the type of solution acquired by them. If they have solutions that already take IPv6 into

account, perfect, otherwise they will need to discuss with Refer Telecom what type of changes need to

be made to the connection. These changes might be more or less complex depending on the type of

network.

With the migration of the data centers to IPv6 it will be possible for the Direction of Information Technol-

ogy to perform the maintenance, monitoring and management of the data centers over IPv4 and IPv6

since they are part of the internal clients of Refer Telecom.

Taking into account the associated costs and the fact that we are talking about an ISP, the best approach

is based on dual-stack. Other type of approaches like tunneling and translation are not definitive solu-

tions and create unnecessary delays due to the modifications that need to be made in the IP packets.

Therefore we can guarantee that any user in the network can reach the services in the data centers

using both versions of the IP protocol. However, in some cases we may have services or equipment that

cannot be upgraded to IPv6 or replaced. In these cases we should consider other type of solutions like

the ones mention above.

Figure 5.10 shows the internal structure of one of the three data centers of Refer Telecom. The services

that can be accessed from the Internet, like DNS or the website, are located in the DMZ. This way, they

are separated from the internal network, avoiding that a possible attack to a server in the DMZ can be

propagated to the internal network.

In the next section we will present a survey of the existing services, applications, routing and firewalls

equipment regarding their IPv6 support. The reason of this survey is to find and identify which devices

must be upgraded or replaced in order to enable IPv6 in the data centers.

Page 64: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

44 CHAPTER 5. PRACTICAL CASE

Figure 5.9: Refer Telecom network

Figure 5.10: Data centers network

Page 65: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

5.5. ESTIMATE THE COSTS OF MIGRATING THE COMPANY’S NETWORK 45

5.5 Estimate the Costs of Migrating the Company’s Network

The transition from IPv4 to IPv6 is not as simple as it may seem because all network components are

interconnected. We cannot replace a device without the risk of compromising all the ones connected to

it. For example if we replace a DNS server and the changes are not correctly advertised into the network,

the whole network will collapse. Therefore all equipment and services dependencies must be known, in

order to ensure a successful transition. This transition affects many subjects: hardware, IP addressing,

routing protocols, security, DNS, DHCP, VPN, monitoring and any other services or applications provided

by the network. Table 5.7 shows the subjects that need to be taken into consideration and what need

to be modified in order to achieve an IPv6 enabled network.

To understand what has to be changed we made a survey regarding the services and applications

present in the Refer Telecom data centers. We should identify which ones already have IPv6 support

and which ones must be upgraded or replaced.

5.5.1 Backup and Storage

HP Data Protector is a software from HP for backups. This software is composed by three components

who utilize the IP protocol to communicate (as shown in figure 5.11): the Cell Manager (CM), the Media

Agent (MA) and the Client. The CM is the brain of the system; it contains the list of clients and manages

the beginning and ending of backups. It is also responsible for installing a Data Protector agent on the

client where we want to perform the backup. The MA is responsible for asking the data from the client

and injecting it in the SpectraT950 (Tape library used by Refer Telecom) or in the EMC Data Domain

(Virtual Tape Library used by Refer Telecom). The CM and the MA can coexist in the same machine but

in Refer Telecom they are located in different machines due to resource distribution policies.

All communication between these 3 components is made using IPv4. Thus, if we want to use IPv6

instead of IPv4 we need the three components to support IPv6. Data protector is IPv6 aware since

its version 6.2. Nowadays Data protector is already on version 8. While the communication between

these components is all made over IP, the communication between the MA, the Spectra T950 and the

EMC Data Domain is not. These devices trade information over Fiber Channel, therefore this part of the

network as no influence in the migration process. However the management of these devices is made

over IPv4, so we need to check their IPv6 support. The SpectraT950 has limited support for IPv6, since

it is possible to perform the management through a browser over IPv6, but only in the local network.

Refer Telecom has two major solutions for backups. One we already analyze and the other is the EMC

Avamar. Opposed to HP Data Protector, the EMC Avamar is 100% based on IP. It is composed by one

node called Avamar Utility Node, storage nodes and by the client. The Utility Node has a function pretty

Page 66: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

46 CHAPTER 5. PRACTICAL CASE

Table 5.7: Affected componenets

Figure 5.11: Data Protector

Page 67: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

5.5. ESTIMATE THE COSTS OF MIGRATING THE COMPANY’S NETWORK 47

similar to the one performed by the CM in Data Protector. It is responsible for connecting to the client in

order to initiate the backup to the storage nodes. Both the solutions referred here perform deduplication,

which means that they are able to identify identical blocks and only save them one time. However,

Avamar is able to reduce the network load since it only sends the blocks that have been altered whereas

Data Protector sends all blocks and only at the destination performs its analysis. Thus, EMC Avamar

has a huge advantage, since it can reduce the network load up to 99%. Unfortunately EMC Avamar has

a big problem for us: it has no IPv6 support. Therefore it is not possible to do backups through IPv6 with

this software. However if we need to back up an IPv6 only system using Avamar, we can use NAT64

and DNS64 to make this possible. With these techniques the IPv6 system will appear as a regular IPv4

system to the EMC Avamar.

Regarding SAN Storage, the predominant protocol is fiber channel. So, the IP protocol is only used for

management. Refer Telecom uses the EMC Control Center for this propose. It is also used by Refer

Telecom the HP 3par Inform Management Console and the EMC Symmetrics Management Console.

This software is used to manage the HP 3par and the EMC Symmetrics respectively. For last Refer

Telecom uses the IBM V7000, this software also uses the IP protocol for management.

The EMC Control Center has IPv6 support since version 6.1. Regarding EMC Symmetrics, the version

Symmetrics V-Max Engenuity 5874 obtained the IPv6 Ready Logo Phase 2 in the Core Protocols cate-

gory. The IPv6 Ready Logo "is a conformance and interoperability testing program intended to increase

user confidence by demonstrating that IPv6 is available now and is ready to be used."1. Equipment

with this Logo has performed a battery of tests and received a positive feedback. There are different

categories: IPv6 Core Protocols, IPsec, DHCPv6, Management and MIPv6. There are other categories

but they are still in an experimental phase, so no logos are granted to them.

The IBM solution also has IPv6 support since version 6.1, which allow us to connect to the graphical

management interface through IPv6. On the other hand the HP solution does not have IPv6 support,

hence, the management of that device must still be performed over IPv4. If we need to have IPv6 access

to this device we can use also a solution with NAT64/DNS64.

For last Refer Telecom uses the EMC Celerra VG2 as NAS (Network-Attached Storage). It is used to

create a centralized file server service for the whole network. This platform has IPv6 support, hence, all

request made from users to the server can be done over IPv4 or IPv6.

5.5.2 Virtualization and Monitoring

Nowadays virtualization is one of the most important components of a company, especially an IT related

company. Refer Telecom uses as a virtualization tool the VMware Vsphere, which consists of a bundle1https://www.ipv6ready.org/ (last accessed October 1st, 2013)

Page 68: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

48 CHAPTER 5. PRACTICAL CASE

of virtualization software. Refer Telecom has some of this software, including ESXi, Virtual Center and

Vcloud Director. ESXi is the hypervisor and it creates and runs virtual machines in a shared storage.

Virtual Center is a centralized application to perform management of the ESXi over the network. For

last but not least the Vcloud Director is used to create virtual environments and it allows us to allocate

storage, CPU and memory to the clients. With this tool, the clients themselves can build their own virtual

data centers.

Naturally all these components utilize the IP protocol to communicate. Both the ESXi and the virtual

Center have IPv6 support, the first one since version 3.5 and the second since version 4.1. On the

other hand, Vcloud Director does not have IPv6 support. Since this software interacts with ESXi, Virtual

Center and storage, it is not possible to use it with IPv6. However, it is likely that VMware, introduce IPv6

support for Vcloud Director in future releases.

The ESXis are installed in blades belonging to the HP BladeSystem. The management of this equip-

ment is performed over the network through the HP BladeSystem Onboard Administrator, which already

supports IPv6.

Refer Telecom also uses the HP Systems Insight Manager to monitor all its HP equipment. This tool is

not properly prepared for IPv6 yet, because it can only show the IPv6 addresses of the machines (if they

are configured) and it uses IPv4 to get that information.

5.5.3 DNS

The DNS service is essential for any IP network, since it is responsible for resolving a domain name (ex:

www.referelecom.pt) into the corresponding IP address.

Refer Telecom data centers have 2 distinct DNS servers, one for the internal clients and another for the

external ones. The internal DNS server is located in the internal network of the data centers whereas

the external one is placed in the DMZ. The external DNS server is BIND from ISC while the internal one

is the DNS server from Microsoft. The internal DNS supports IPv6 (Microsoft DNS server supports IPv6

since version 2008) and it is resolving IPv6 requests, but we need to find if the requests to the DNS

server are being made through IPv6 or if they are still using IPv4. Although BIND supports IPv6, the

external DNS is not resolving IPv6 requests yet. BIND supports IPv6 since version 9, however we should

always use the most recent version (the last stable version is 10.1) because there are some versions

with some security problems that can be exploited like version 9.1 for example.

Page 69: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

5.5. ESTIMATE THE COSTS OF MIGRATING THE COMPANY’S NETWORK 49

5.5.4 Windows

Microsoft solutions are widely used by Refer Telecom, starting from Windows operating systems for

both PCs and servers until Exchange,DNS, DHCP, SQL Server, Lync, TMG or Sharepoint. With all

these services in use, it is easy to realize that Refer Telecom uses Active Directory to integrate them.

Thus, it can centralize all authentications and permissions to everyone of those services in a single

software.

Now that we already identified all the Microsoft products used by Refer Telecom let’s check their IPv6

support:

• Active Directory works with IPv6 if the version of Microsoft Server where the AD is running is equal

or higher to 2008

• Exchange Server supports IPv6 since version 2007 with Service Pack1, however it needs to be

installed on Windows Server 2008 and have both IPv4 and IPv6 activated. Refer Telecom uses

the version 2010. This version has IPv6 support, but we also need to have IPv4 activated in order

to use IPv6. Since Refer Telecom pretends to have dual stack in its network, there is no problem

here.

• DHCPv6 was introduced by Microsoft on Windows Server 2008

• Lync supports IPv6 in its newer version: Lync 2013. Refer Telecom has the 2010 version, so it

needs to upgrade Lync and install it on Windows Server 2008 with the lastest service pack at least.

• SQL Server supports IPv6 since version 2005 but needs to be installed on Windows Server 2008

or higher. If SQL Server 2005 is used and it is installed on Windows server 2008 we need to install

Service Pack 2 if we want to use IPv6 only. Refer Telecom will have no problem with SQL Server,

since all versions used for SQL Server and Windows Server are within the established standards.

• SharePoint supports IPv6 since version 2007 and it can be installed in any version of Windows

Server since 2003. However for Windows Server 2003, IPv4 must be activated and we have to

install IPv6. Refer Telecom uses SharePoint 2007 on top of Windows Server 2003 and SharePoint

2013 on top of Windows Server 2012(Standard).

• The Microsoft operating system for PCs supports IPv6 since Windows XP with Service Pack 3.

Windows Vista, Windows 7 and Windows 8 possess the IPv6 Ready Logo Phase 2 on Core Pro-

tocols category. Windows Server 2008 and 2012 also have this logo.

Page 70: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

50 CHAPTER 5. PRACTICAL CASE

5.5.5 Linux

- The operating systems based on Linux are also used by Refer Telecom, both in PCs and servers. The

following list shows the operating systems used and their IPv6 support:

• Ubuntu - The first version of Ubuntu with full IPv6 support is 11.04, however this version has some

problems with the network manager and its configuration for IPv6. These problems were correct

in version 11.10.

• Debian - The operating system Debian fully supports IPv6 since version 6 (Squeeze)

• SUSE - SUSE is IPv6 enabled since version 11 and with SP1 got the IPv6 Ready Logo Phase 2

on Core Protocols category.

• Red Hat Enterprise Linux - Red Hat also has the IPv6 Ready Logo Phase 2 on version 5 and

6. Version 5 has that logo in the categories of Core Protocols and IPsec and version 6 has be-

yond those 2, the categories of DHCPv6 and SNMP. Older versions already support IPv6(IPv6

functionalities were introduce since version 3), however we should use the newer versions.

• CentOS - CentOS is based on Red Hat Enterprise Linux, so they both follow the same matrix

regarding IPv6. The numbering of CentOS version is made according to Red Hat versions, hence

the version 3 of CentOS corresponds to version 3 of Red Hat, version 4 of CentOS corresponds to

version 4 of Red Hat and so on.

5.5.6 Routers

As shown in figure 5.9, the access to the data centers is made through two routers. The main connection

is made through a Cisco Catalyst 6500 whereas the redundant connection is made through a Cisco

Catalyst 4500.

In order to support IPv6 in the Cisco Catalyst 6500 prior to the release 12.2(33)SXI, we needed to

buy an additional license from Cisco. From this version on, the IPv6 support is already included in the

default firmware. This equipment has the IPv6 Ready Logo Phase 2 on the Core Protocols category

since release 12.2(33)SXI. The Catalyst 4500 is in a similar situation. Before the release 12.2(54)SG,

it also needs an additional paid license to support IPv6. This equipment also has the IPv6 Ready Logo

Phase 2 in the same category since version 12.2(52)SG. Catalyst 6500 and 4500 also have the USGv6

(US Government version 6) certification since versions 12.2(33)SXI3 and 12.2(54)SG respectively. A

entity like the US Government cannot afford to use equipment with security vulnerabilities that can be

exploited, so they created this certification to ensure that equipment with this certification, have no

vulnerabilities and can be used safely.

Page 71: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

5.5. ESTIMATE THE COSTS OF MIGRATING THE COMPANY’S NETWORK 51

IPv6 support is not the only thing that matters when we look at a router. We should take their perfor-

mance into account as well. Cisco routers have similar throughput and latency for IPv4 and IPv6. These

values only suffer a minor decrease in throughput and a slightly increase in latency when we use IPv6

for small packets (less than 256 bytes). This happens due to the difference in the size of the IP headers.

5.5.7 Firewalls

Firewalls are a fundamental aspect in any network. They are responsible for maintaining the network

secure from external threats. It is important to realize that no one will introduce IPv6 in a network if that

means less security for the network. Firewalls have to guarantee at least the same level of security for

IPv6 when compared to IPv4. To do that, all existing policies for IPv4 need to be replicated for IPv6 and

we also need to add policies to protect the network against IPv6 only threats.

To control the access to its data centers, Refer Telecom uses the following firewalls: Checkpoint R75/R76,

Cisco ASA 5520/5540/5505 and Cisco FWSM. Cisco ASA supports IPv6 since version 7.0.1, however it

is advisable that we use a more recent version because the earlier versions have some vulnerabilities. If

possible, we should use the version 8.4.2(10), which has the USGv6 certification. The same applies to

the Cisco FWSM, which also has the USGv6 certification on version 4.1(2) but already has IPv6 support

since version 3.1. This firewall is integrated in the Catalyst 6500 model. Cisco FWSM should also be

updated to version 4.1(2) if possible.

As we have seen Cisco solutions are not the only ones used by Refer Telecom. They also use Check-

point firewalls. Checkpoint has IPv6 support in their firewalls since version RGX R60 (except for NGX

R65 HFA 30). However, versions prior to R75.40 require the installation of the package IPv6Pack in

order to improve IPv6 features. The version R75.40 was also the first to obtain the IPv6 Ready Logo

Phase 2 in the category of Core Protocols. However it is advisable that all firewalls are updated to R76

because it has extended IPv6 support, which includes: RADIUS, OSPFv3, BGP, NAT66, IPv6 support

for all communications between security gateways, security management servers and SmartDashboard

and full stateful inspection for IPv6 connections. 1

It is also important to check the performance of the firewalls using IPv6. The payload processing speed

is equal for both IPv4 and IPv6 but the same cannot be said about the IP header. Checkpoint has a 10%

loss in the processing speed of the IPv6 header.

1https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk91140 (last accessed October 1st, 2013)

Page 72: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

52 CHAPTER 5. PRACTICAL CASE

5.5.8 Wireless

For the wireless network, Refer Telecom uses Cisco APs. Cisco has two different modes for their APs:

Autonomous and Lightweight. In autonomous mode each AP has its own configuration and is completely

independent from others APs whereas in lightweight mode we need to have a Wireless LAN Controller

(WLC), which is responsible for the management of all APs connected to it.

Refer Telecom uses their APs in Lightweight mode and has a WLC from the 4400 series. This equipment

is able to support IPv6 in "pass through" mode. This means that even if there is no IPv6 implementation

on the WLC, it will be able to forward packets between equipment. WLC should be used with the release

6.0 at least, because before this release it is not possible to implement any security measurements nor

to have IPv4 and IPv6 users in the same WLAN.

5.5.9 FaxMail and SMS

Refer Telecom uses the service of FaxMail and SMS per Mail to be able to send and receive faxs and

SMSs through the computer. If a user wants to use the SMS service, he just needs to send an email

to an address like [email protected]. Then the email will be delivered to the Exchange

Server (figure 5.12), which will look to what follows the @ and realize that this email must be delivered

to the SMS Center (Movensis SMS Mail 2.1). The SMS Center will now send the SMS through a direct

link to Vodafone, which will deliver the SMS to the number 916543434 just like a regular SMS. This

is what happens if the message is send internally because Microsoft Exchange only does the internal

distribution of emails. To the outside, Refer Telecom uses Anubis.

For the FaxMail service the architecture is extremely similar (figure 5.13), but instead of a SMS Center

they have a Fax server (Solgenia Facsys 5.1) and instead of the link to Vodafone there is a gateway

Figure 5.12: SMS per mail

Page 73: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

5.6. MIGRATION PLAN FOR REFER TELECOM 53

to the PSTN. Both these solutions use the IP protocol to communicate, so they need to support IPv6.

Anubis already has full IPv6 support whereas Movensis SMS Mail and Solgenia Facsys only have IPv4

support yet.

5.6 Migration Plan for Refer Telecom

With the costs for the transition to IPv6 estimated and the go ahead signal from the administration, we

can start to define our road map towards IPv6. In order to start it, we need to look at the actual network’s

topology and its components. But first, there are some basic rules that should be followed before we can

proceed. These rules were already defined in the methodology for the migration plan and consist of:

• Every department in the company is informed about the IPv6 migration.

• Give IPv6 training to the IT staff (or else they are not able to migrate the infrastructure and main-

taining it).

• All software developed inside the company takes IPv6 into consideration

• All software and hardware acquired from that moment on must support IPv6. If the equipment

that we want to acquire do not have IPv6 support and no feasible alternatives are available, the

equipment’s suppliers should be questioned about their road map for IPv6. Since we want a full

dual stack network there is no big problem if such equipment is not available because as we have

already seen dual stack will prevail for many years.

• Acquire an IPv6 address block from its LIR.

• Define a lab environment to make some experiences with IPv6. This way, there is no risk to disrupt

the services.

Figure 5.13: FaxMail

Page 74: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

54 CHAPTER 5. PRACTICAL CASE

• Learn with others mistakes. If possible analyze similar IPv6 migrations in other companies to avoid

mistakes and problems that may have occurred.

Taking into consideration the size and dimension of Refer Telecom’s data centers it would not be feasible

to create a migration plan for its entire network in this work. Therefore Refer Telecom selected a few of

their most used services and software (DHCP, DNS, Active Directory, IIS and HP Data Protector) and

difined a smaller network environment (figure 5.14), which tries to represent a subset of the real one. It

has 2 internal networks (Porto and Lisbon) interconnected by a Cisco 3750 router. Both these networks

have Windows clients and Lisbon’s network also has a Domain Controller and a Data Protector cell

manager. The domain controller, besides running Active Directory also has DNS and DHCP services

running. The DHCP service is unique and serves the entire network. The connection to the DMZ and

the public network is made through a Checkpoint firewall, which separates the internal network from the

DMZ and the public network. In the DMZ there is a web server and an external DNS server. Both these

services are available for both the internal and public network. To consult the version and the OS of the

equipment and services, refer to table 5.8.

This network has the following features:

• Both office networks are able to communicate between them

• Porto office has only personal computers whereas Lisbon office has personal computers as well

as the Domain Controller running AD, DHCP and Internal DNS services and a data protector Cell

Manager

• DMZ contains the webserver and the external DNS server. It is contained behind the firewall,

which is their gateway

• Porto and Lisbon networks are interconnected by a router, if someone inside these networks

wishes to communicate with the DMZ or the public network, the router will carry their requests

to the firewall

• The router is the default gateway for Porto and Lisbon offices

Table 5.8: Services and equipment

Page 75: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

5.6. MIGRATION PLAN FOR REFER TELECOM 55

Figure 5.14: Network to migrate

• The Lisbon office has free access to the DMZ and to the public network, whereas Porto office can

only reach the webserver via HTTP or HTTPS. It is also possible to ping the webserver via Porto.

• Both machines in the DMZ have a restricted access to the internal networks; they are only allowed

to establish connections with the cell manager in order to perform backups. The firewall also allows

DNS queries originating from the external DNS server to reach the internal network.

• The personal computers in Porto and Lisbon offices should obtain an IP address via the DHCP

server present in the Lisbon Office.

• All servers have static IP addresses except for the External DNS server.

• BIND server should obtain an IP address via DHCP.

• Internal clients must use the internal DNS server to resolve hostnames and IP addresses, if no

records are found for a specific name, the request should be forward to the external DNS server.

• External clients must use the external DNS server to resolve hostnames and IP addresses.

• The internal DNS server is the master for the rt.local zone.

• The external DNS server is the master for the ist.local zone.

• The management of the firewall is performed via the IP address 192.168.1.100.

• The data protector service should be able to perform backups in every device of the network.

• All machines should be able to reach the web server.

Page 76: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

56 CHAPTER 5. PRACTICAL CASE

Our goal is to achieve a successful IPv6 migration. So, how can we achieve it? Since we want a transition

based on dual-stack we must assure that all services and equipment in the network can communicate

through IPv4 and IPv6. After all the steps presented in the beginning of this chapter have been fulfilled

we can proceed. As mention earlier there are 6 phases to complete in order to obtain a full IPv6

transition:

• Upgrading or replacing equipment without IPv6 support

• Addressing Plan

• Phased deployment of IPv6 into the network

• Treat network’s dependencies without IPv6

• Partial decommissioning of IPv4

• Decommissioning of IPv4

5.6.1 Upgrading or Replacing Equipment Without IPv6 Support

Here is where the document about the estimation of costs comes in handy. This document contains

information about all the necessary steps to assure IPv6 support in all network equipment and services.

After all the recommendations presented in the document are fulfilled we can move on to the next phase.

If we compare all the equipment and services included by Refer Telecom in our network with the rec-

ommendations made in the elaborated document, we can see that everything already has IPv6 support.

However, if there are newer versions with extended IPv6 support, the device or service should be up-

dated. In our case we should update Checkpoint from R75.40 to R76 because the R75.40 version has

some limitations, like the inability to perform management over IPv6. To see a more detail explanation,

check the firewalls section in the elaborated document.

5.6.2 Addressing Plan

Enabling IPv6 in the network is a process that must be carefully planned. It should follow a predefined

order and not a random order. Some equipment and services like routers and firewalls must be enabled

before any others. But there is something that should be done before all this. If we look at figure 5.14

we can see that all devices have IPv4 addresses, so a good start will be to create an addressing plan for

IPv6. We do not want to give random IPv6 addresses to the migrated hosts. In fact, we should create

an addressing plan as efficient as possible. Thus, we will benefit from many advantages:

Page 77: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

5.6. MIGRATION PLAN FOR REFER TELECOM 57

• Security policies are easier to implement

• Addresses are easier to trace

• The Addressing plan is scalable

• Enables a more efficient network management

We will use the following address space: 2001:da12:1234::/48. Therefore we have 16 bits to create

subnets since the last 64 bits are used for addressing hosts. Thus, we can use all the prefixes from

2001:da12:1234:0000::/64 until 2001:da12:1234:ffff::/64 to create subnets, in a total of 65536 subnets.

There are already diverse documents created to help network engineers create their own addressing

plans, in this work we use the following one: Preparing an IPv6 Addressing Plan1. We will create our

addressing plan based on locations, so we need one subnet for Porto office, one subnet for the Lisbon

office, one subnet for the DMZ, and one subnet for the public network. Now we must determine how

many bits we need from the 16 available for our addressing plan. Looking at all the bits available (128)

it is common to think "why should I bother not wasting a few more bits when there are 128 available?"

The answer is quite simple: we need to assure that our plan can be extended in the future in a scalable

manner granting us efficiency. To find out how many bits we need, do as follow:

1. Determine the number of locations or user types within the organization (we use locations).

2. Increase the number by one (backbone purposes) .

3. Add one number for each network without a fixed location, like VPNs or tunnels.

4. Add one or two groups for future expansion.

5. To create a practical addressing plan we will round up our number to the nearest power of 2.

By following these steps we end up with 4 locations in step 1. Step 2 adds another number and step

3 does not change our number since we have neither VPNs nor tunnels. For last step 4 adds 2 more

number making a total of 7. Now we need to round up our number to the nearest power of 2, ending up

with 3 bits. These 3 bits allows us to create 8 subnets (one more than we need) leaving 13 available bits.

These bits left available can be used to define different subnets for different types of users for example

(in our network environment this is not taken into consideration). Since we have so many bits left we

can use them to improve legibility of IPv6 addresses. As we know 4 bits represent one hexadecimal

number in an IPv6 address, so instead of 3 bits we can take one bit from the available ones and use

4 bits to create subnets. This way we can create subnets from: 2001:da12:1234:0000::/64 through

2001:da12:1234:f000::/64. Table 5.9 shows the subnets that we will be using.1http://www.ripe.net/lir-services/training/material/IPv6-for-LIRs-Training-Course/IPv6_

addr_plan4.pdf (last accessed October 1st, 2013)

Page 78: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

58 CHAPTER 5. PRACTICAL CASE

Table 5.9: Subnets

For the hosts with static addresses like servers we can use a similar policy to the one used in IPv4.

Use the firsts or the lasts addresses available, for example: 2001:da12:1234:1000::1. The network

administration responsible for the migration is free to choose the method that fits best in his mind.

However ,there is another alternative to the addressing plan present above. We may prefer to create an

addressing plan that explicitly matches the correspondent IPv4 network. Since all our IPv4 networks are

/24 it is extremely easy to create a direct map between an IPv4 address and an IPv6 address. For exam-

ple, if we have a network 192.168.1.0/24, we can use penultimate number to perform this mapping. So

the address 192.168.1.0/24 will correspond to the IPv6 address 2001:da12:1234:1::/64. For equipment

using static addresses like routers or servers we can also use the last number of the IPv4 address in the

IPv6 address. So, a server with the IP 192.168.1.254 will have the IP 2001:da12:1234:1::254 for IPv6.

This method is very useful for a network administrator, since he can look at an IPv6 address and imme-

diately associate that address with the respective IPv4 address. As we know is way easier to remember

an IPv4 address than an IPv6 address. Without this method it is not possible for a network engineers

in big environments to know to what machine a given IPv6 address belongs without consulting informa-

tion regarding the list of IP addresses. Taking this into consideration we will use the mapping of IPv4

addresses into IPv6 addresses for our network. Figure 5.15 shows the IPv4 and the respective IPv6

addresses of all devices that were configured statically in IPv4 and that need to be configured now for

IPv6. The mapping of addresses is very interesting regarding servers and routers but for common hosts

is almost irrelevant. These hosts will get IPs from DHCPv6 without any relation to the correspondent

IPv4 addresses.

When we look at the subnets used we may find odd that a link which only requires 2 addresses has a

/64 prefix, however these are the IETF recommendations. A subnet should never be higher than a /64.

Now that we have IPv6 addresses to distribute through our machines, we can proceed to the next step.

5.6.3 Phased Deployment of IPv6 into the Network

The deployment of IPv6 through the network should be done according to this order:

Page 79: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

5.6. MIGRATION PLAN FOR REFER TELECOM 59

Figure 5.15: IPv4/IPv6 addresses

1. Routers, firewalls and switches

2. Basic network services

3. Workstations in the internal network

4. Servers and services in the internal network

5. DMZ

We should focus first on the internal network and once the internal network is fully IPv6 enabled and

monitored we can start enabling IPv6 in the DMZ. This order should be followed for two reasons. The first

is that by enabling IPv6 in just one part of the network it is easier to perform and monitor the migration.

The second reason regards the DMZ itself. The DMZ should be left for last because it requires special

attention in terms of security. Since the DMZ is open to the outside, a simple mistake could compromise

the entire network whereas the internal network cannot be reached from the outside. Thus a mistake

here would not have the same impact as one in the DMZ.

5.6.3.1 Routers, Firewalls and Switches

Routing and security devices should always be the first devices where IPv6 is enabled. First of all, IPv6

must be enabled on the only router present in the network. The router has to be able to respond to any

request coming either through IPv4 or IPv6. The same thing goes for the firewall. It has to be configured

to process IPv6 packets with the same rigor of IPv4 packets. All the existing firewall rules must be

adapted to IPv6 and since Checkpoint cannot inspect extension headers, (except for the fragmentation

one) any packets containing these headers should be dropped.

Page 80: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

60 CHAPTER 5. PRACTICAL CASE

Since the switches only work on layer 2, there is no real impact from IPv6 in them. The only part

where the IP protocol is used is for management, so we will need to configure IPv6 addresses in their

management interfaces.

5.6.3.2 Basic Network Services

After enabling IPv6 in the firewall and in the router we need to enable basic network services like DNS

and DHCP before having concerns with other devices. There is no reason for migrating services and

hosts to IPv6 who rely on DNS and DHCP to work, before those services are IPv6 enabled. As we have

seen before both of these services run on a single machine, together with Active Directory. Once this

machine is IPv6 enabled, we should be able to start creating AAAA records. After that, we can move on

to DHCP and activate DHCPv6. Active Directory should have no problem working over IPv6 after the

machine and the DNS server are configured for IPv6.

5.6.3.3 Workstations in the internal network

All the workstations in the internal network run Windows 7. IPv6 should be enabled on every PC of the

network and should be configured to get an IP address via DHCPv6.

5.6.3.4 Servers and Services in the Internal Network

Looking at our internal network we can see that in this phase we should enable IPv6 in Data Protector

Cell Manager. Data protector works with names not with IP addresses, so as long as our DNS server is

well configured and the system where the cell manager is running has an IPv6 address, the cell manager

should have no problems working with IPv6 instead of IPv4. Besides the cell manager, the media agent

(both the cell manager and the media agent run in the same machine)and the system on which we want

to run a backup must also be IPv6 enabled and have their names registered in the DNS server. Thus,

we will be able to perform backups, regardless of the version of the Internet Protocol used.

5.6.3.5 DMZ

In the DMZ there are two servers that need to be migrated. One runs the web server and the other

runs BIND as the external DNS server. To allow connection to the web server over IPv6 we just need to

enable IPv6 on the machine hosting the web server. For BIND we need to go a bit further, since BIND

has to be configured to handle AAAA records. Since BIND is a DNS Server we have to enable IPv6 in it

before we proceed to the web server.

Page 81: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

5.6. MIGRATION PLAN FOR REFER TELECOM 61

In the end of this phase all equipment and services should have been configured with dual stack. All

network features supported for IPv4 should now be supported using IPv6. If there is any feature of the

network who is not working properly over IPv6, we have to pinpoint the respective feature and deal with

it in the next phase.

5.6.4 Treat Network’s Dependencies Without IPv6

As we have seen before, every component of the network has support for IPv6, therefore we should be

able to have the entire network working over IPv6 with no limitations. However, it is possible that when

the migration is putt into practice or the testbed is elaborated, we find some special features presented

in the IPv4 network that are not supported in IPv6. In this case we have to find a plausible alternative.

The alternatives could be:

• Find out if the equipment will have support for that feature any time soon

• Replacing the equipment for another with the same characteristics but with the required feature

• Replacing the equipment for another with similar characteristics and support for the required fea-

ture

• Find a way to avoid this problem

• Decommissioning of the equipment

5.6.5 Partial Decommissioning of IPv4

Once the IPv4 traffic is no longer relevant (somehow compared to today’s IPv6 traffic), we should take

measures to reduce the company concerns with IPv4 usage. Therefore, IPv4 should first be removed

from workstations and then from servers. In order to be able to reach the few IPv4 users spread across

the public network, we need to implement NAT64 and DNS64. Here we can use a solution like the one

provided by A10networks 1, which is exactly what we need. So by adding this device to the DMZ, it will

be possible for both internal and external IPv6 clients to access IPv4 hosts and servers. Although this

solution is made to allow IPv6 users to access IPv4 content and not the other way around, this is not an

immediate requirement, because nowadays there is no IPv6-only content. This will only be a reality in

the next decade probably, so by then, this solution from A10networks as well as many others will also

provide NAT46 services. As the name suggests, NAT46 is the opposite of NAT64, it allow IPv4 users to

access IPv6 content.1http://www.a10networks.com/products/axseries-NAT64_DNS64.php (last accessed October 1st, 2013)

Page 82: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

62 CHAPTER 5. PRACTICAL CASE

5.6.6 Decommissioning of IPv4

When IPv4 is no longer used it is time to proceed with its decommissioning:

• NAT64, NAT46 and DNS64 should be discontinued since they are no longer needed.

• IPv4 should be removed from the firewall and the router.

• IPv4 addresses should be returned to the respective LIR.

After completing this last phase we have finally completed our IPv6 migration.

Page 83: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

Chapter 6

Experimental Validation

6.1 Introduction

In this section we will test the migration plan defined in the previous chapter. To do that we created a lab

environment as close as possible to the network present in figure 5.14.

6.2 Validation

Due to space and equipment limitations we will have to create a virtual network to simulate the real one.

To do it, we will use VMware ESX 5.1. Since there was no physical router available for this project, we

had to find an alternative. The alternative was to emulate the router using Graphical Network Simulator

3(GNS3). A Virtual Machine (VM) running CentOS was used to implement GNS3. To simplify the lab

environment we will create only one host in Porto and one in Lisbon. Table 6.10 shows the VMs and

the Operating System (OS) used as well as the version of each service running on them.

As we can see the only differences to the real network are the router used and the version of the firewall.

Table 6.10: VMs used

63

Page 84: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

64 CHAPTER 6. EXPERIMENTAL VALIDATION

In the router’s case this is due to equipment limitation whereas in the firewall’s case we used the R75.40

version by request of Refer Telecom. The implemented network is fully contained within the ESX host.

So the first thing to do is to configure the ESX host. As we can see in figure 5.14 the network includes

VLANs, so we will need to use the Vswitch functionality of VMware. There are three different types

of VLAN tagging in an ESX host: EST (External Switch Tagging), VST (Virtual Switch Tagging), VGT

(Virtual Guest Tagging). Given that we will not be using an external switch and we do not want the VMs to

perform the tagging by themselves, we will use VST. In VST all tagging is performed by the virtual switch

before leaving the ESX host, which is clearly the best option if we want to simulate a real environment in

a fully contained network within an ESX host. The term "real environment" was used because generally

in a network all the VLAN tagging is performed by the switch/router and not by the machine itself. In

order to respect the given VLAN configuration we had to pair the VMs network interfaces like Appendix

A.26 shows.

6.2.1 IPv4 Network

With the ESX configuration complete we can proceed to configure all the virtual machines required until

we have a fully operational IPv4 network.

6.2.1.1 Configuration of the Router

Since the router is emulated with GNS3 (figure 6.16), we must create a TAP and a bridge interface in

the VM responsible for running GNS3 for each interface on the router. These interfaces are needed to

assure that the router inside GNS3 is able to communicate with the VM and therefore with the network

within ESX.One more thing is needed in the ESX host, we have to enable promiscuous mode in our

Vswitch. The reason is simple, we are running a virtual router on a VM and the ESX host has no idea

that this is happening. Therefore without promiscuous mode enabled the network would not allow ARP

packets to go back into the router, breaking communication.

With the VM configuration complete, it is necessary to configure the router itself. First of all we should

define Porto and Lisbon networks and their respective VLANs:

• 192.168.1.0/24 in VLAN 100 as the Lisbon Office

• 192.168.2.0/24 in VLAN 101 as the Porto Office

As we can see in figure 6.16 the router uses only one phisycal interface for Porto and Lisbon networks,

therefore besides the VLAN configuration on the Vswitch we also have to define the VLANs in the switch

and configure the router to forward requests coming from one VLAN to another. To add VLANs to the

Page 85: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

6.2. VALIDATION 65

Figure 6.16: GNS topology

switch we needed to configure port 1 and port 2 in access mode with VLAN ID 100 and 101 respectively.

Port 3 must be in trunk mode to allow traffic from any VLAN in that link (figure 6.17). The next step

was to configure the link to the firewall, which is directly connected to the DMZ and the public network.

For this link we used the 192.168.4.252/30 network. Since no routing protocols are used the router only

needs to have configured a default route to the firewall.

6.2.1.2 Configuration of the VM Domain Controller

Domain controller is a very important part of the network since it contains three of the network most

important services: AD, DHCP and DNS. The machine was configured with the IP address 192.168.1.1

and has the router as the default gateway. The DHCP server in this machine is responsible to serve 3

networks: Lisbon, Porto and DMZ. To allow the DHCP server to serve requests coming from Porto and

Figure 6.17: Switch configuration

Page 86: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

66 CHAPTER 6. EXPERIMENTAL VALIDATION

DMZ it was necessary to configure the router and the checkpoint as relay agents. The DNS service was

configured to be the master of the rt.local zone.

6.2.1.3 Configuration of the Windows Hosts

As already mentioned, hosts in Lisbon and Porto were configured using a DHCP Server

6.2.1.4 Configuration of the IIS

Our web server was configured with the static IP address 192.168.3.50 in the DMZ. The firewall is its

default gateway.

6.2.1.5 Configuration of the Firewall

Static routing was configured in the firewall to create routes between Porto, Lisbon, DMZ and the public

network. The firewall was also configured as the default gateway for the DMZ. As we can notice in

figure 5.14 the firewall reaches Lisbon and Porto networks through the router whereas for the DMZ and

public network it is directly connected. As we know, by default Checkpoint and any other firewall drop all

traffic, so we need to configure rules to allow network traffic to pass through the firewall. Lisbon office

should be able to get to the web server without any restrictions whereas Porto should only be able to

get to the web server through http or https. Regarding BIND, it is necessary to allow DNS queries to

flow between BIND and Windows DNS server. The management of checkpoint should be made through

the IP address 192.168.1.100. To make all this possible we had to implement in checkpoint the rules

present in Appendix B.27.

6.2.1.6 Configuration of External DNS

BIND was configured to be the master of the ist.local zone and to serve DNS requests coming from the

internal network as well as requests from the public network. It is important to state that the internal

DNS forwards unknown requests to this DNS server. This server does not possess a static IP address

as most of the servers in a DMZ possess, in fact it has an IP address from the DHCP server in Lisbon

office.

Page 87: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

6.2. VALIDATION 67

6.2.1.7 Configuration of Data Protector

The components of Data Protector were already exhaustively detailed previously so there is no need to

repeat all the concepts. A Cell Manager was installed in a Windows Server 2008 R2 in Lisbon office

to control all the backups in the network. Since it is a central part of Data Protector it was obviously

configured with a static IP address. The Cell Manager will also act as a Media Agent, so it is responsible

for mediating the communication between the system being backed up and the system where the backup

will be stored. However, since we do not have any storage device the backups will be storage in the

Media Agent itself. For the systems that we want to backup we have to install a data protector agent on

them (remotely or locally).

One important note to take is that all the services and equipment used, have IPv6 support. Figure 6.18

shows the implemented network with all the correspondent IP addresses.

6.2.2 IPv6 Network

With the IPv4 network implemented it is time to test our migration plan. The objective is to achieve a full

dual-stack network by following the migration plan recommendations. So we will focus on the third point

of our migration plan: phased deployment of IPv6.

As we described in the migration plan there are 5 stages to deploy IPv6:

1. Routers, firewalls and switches

2. Basic network services

3. Workstations in the internal network

4. Servers and services in the internal network

5. DMZ

6.2.2.1 Routers, Firewalls and Switches

Since the router is emulated with GNS3 we need to enable IPv6 on CentOS (machine where GNS3 is

running) and define IPv6 addresses for the bridge interfaces used by the router.

After that we can move on to the actual topology. As in any network, the router is the first device where

IPv6 should be enabled. By default the Cisco 7200 comes with IPv6 turned off, so we need to enable

it. Then all three interfaces must be configured with IPv6 addresses and the IPv6 static routes must be

Page 88: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

68 CHAPTER 6. EXPERIMENTAL VALIDATION

Figure 6.18: Implemented network

defined. The static routes are exactly the same as in IPv4 but with their correspondent IPv6 addresses.

The full configuration of the router can be found in Appendices A.24 and A.25.

Remember that the switch is also emulated with GNS3 so it is not possible to add an IP address to its

management interface. However when we implement IPv6 in the real network, this must be done.

For the Checkpoint R75.40 we need to enable IPv6 through the browser interface. After that we are able

to configure IPv6 in the firewall. As it happened in the router, we also have to configure the network

interfaces and the static routes for IPv6. With this done, we can move to the creation of IPv6 rules in

the firewall. In order to secure the network for both IPv4 and IPv6 threats, all the rules defined for IPv4

must be replicated to their correspondent IPv6 rules. Creating these new rules is just like creating rules

for IPv4. We just need to create IPv6 hosts instead of IPv4 hosts. By request of Refer Telecom, we

will add a rule to only allow users in Lisbon Office to perform remote desktop access to the web server

through IPv6, all the rest remains the same. The full list of rules implemented in the firewall can be seen

in Appendix B.28.

As we have seen before, IPv6 has its own special features that must be dealt with, namely extension

headers. In order to protect the network, these packets cannot be ignored. By default checkpoint

drops all extension headers except the fragmentation header 1 and we will leave it that way. Regarding

fragmentation, if checkpoint receives a packet that cannot be transmit due to an MTU issue, an ICMP

is sent back to tell the client to send a smaller packet. As of R75.40 it is also possible to block routing

headers with type 0. This parameter is also enabled by default and we will also leave it that way. It

is important to notice that allowing extension headers through the firewall may not be a good idea,

since checkpoint does not inspect any extension header except fragmentation. It can only allow or1https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_

doGoviewsolutiondetails=&solutionid=sk39374 (last accessed October 1st, 2013)

Page 89: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

6.2. VALIDATION 69

block them. Thus, extension headers besides the fragmentation headers should only be allowed if

it is absolutely necessary. Unfortunately R75.40 does not support IPv6 for communications between

Security Gateways, Security Management Servers, and SmartDashboard. So firewall management can

only be done over IPv4.

6.2.2.2 Basic Network Services

With the router and the firewall ready to support an IPv6 network it is time to enable basic network

services like DNS and DHCP. In our network these services run on a single machine, together with

Active Directory. So the first step is to enable IPv6 in this machine. To enable IPv6 in Windows Server

2008 R2 we just need to give the machine a static IPv6 address. Accordingly to the addressing plan

defined, this address will be 2001:da12:1234:1::1. There is however a small problem in Windows when

we configure a static IPv6 address, if there is a DHCP server in the network, a Windows machine

with a static IP address will also obtain an IP address via DHCP. To solve this problem we must turn

off Router Discovery on every Windows Server with a static IPv6 address configured, by issuing the

command: netsh interface ipv6 set interface "Local Area Connection" routerdiscovery=disabled

in the command line.

With this done the machine is ready to connect to IPv6 devices and provide services through IPv6.

Active Directory does not need any additional configuration to work with IPv6.

The DNS server from Windows Server 2008 R2 is extremely easy to configure for IPv6. In fact we just

need to add AAAA records instead of A records for IPv6 hosts. We also needed to create the respective

reverse lookup zones to allow the server to retrieve a name from an IPv6 address. The names used are

the same as in IPv4 (figure 6.19). However, we added specific IPv6 names for testing purposes.

The configuration of the DHCP server for IPv6 is a bit trickier. As we know, the routers are now re-

sponsible for sending RAs messages (Router Advertisements) , who among other tasks are responsible

for telling the hosts how they are going to get an IP address (DHCP, SLAAC or static). So we have to

configure both the router and the DHCP server. The DHCP server from Windows Server 2008 R2 is

ready to be configured for IPv6. We just need to create the respective pools (figure 6.20). There are still

some differences in IPv6, DHCP does not propagate information like the default gateway for the host.

In IPv6, router advertisements are used for these functions. Other small difference is that we can no

longer define smaller ranges of addresses like we did in IPv4. Nonetheless it is still possible to create

reservations, which serve the same purpose.

The configuration of the DHCP server for IPv6 is fairly simple if we know how to configure it for IPv4.

However if we configure an IPv6 pool but forget to configure the router accordingly, things will go wrong.

By default a Cisco router will send RAs with the Autonomous (A) flag set to 1, telling the hosts that they

Page 90: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

70 CHAPTER 6. EXPERIMENTAL VALIDATION

Figure 6.19: DNS resolutions

should configure a stateless address based on the advertised prefix. Therefore hosts will get stateless

and stateful IPv6 addresses leading to connectivity problems. To correct this problem we must configure

the router to tell the hosts that they should get an IPv6 address through a DHCP server. There are three

types of flags to help hosts know how they are going to get an IP address: A (Autonomous), M (Managed

Address) and O (other stateful configuration). These bits are part of the neighbor discover feature from

ICMPv6. We already saw above what the A bit does but not M and O bits. If the M bit is set to 1 the host

is instructed to get and IP address through a stateful configuration protocol (DHCPv6). If the O bit is set

to 1 that means the host will get other configurations from a stateful configuration protocol (DHCPv6).

Table 6.11 shows us the different types of combinations and their repercussions. By default the A flag

is set to 1 while M and O are set to 0.

By looking at table 3 we can see 2 options that satisfy our requirement to have our hosts receiving IPs

from a DHCP server. The first option is the A bit set to 0 and the other two set to 1, and the other option

is only the M bit set to 1. However the DHCP server should also distribute other information to hosts like

the location of the DNS server, so we should configure the router with both the M and O bits set to 1. To

end our DHCP configuration on the router we need to configure the DHCP relay agent just like we did in

IPv4, so that the hosts in Porto office can get an address from the DHCP server in Lisbon.

Page 91: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

6.2. VALIDATION 71

Figure 6.20: DHCP pools

Table 6.11: Different options to configure an IPv6 address in a host

Page 92: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

72 CHAPTER 6. EXPERIMENTAL VALIDATION

6.2.2.3 Workstations in the Internal Network

All the workstations in the internal network run Windows 7. By default Windows 7 already has IPv6

enabled, so if the DHCP server is well configured our Windows hosts will get an IPv6 address. Windows

7 as well as Windows Server 2008 and later versions prefer IPv6 over IPv4 if both versions are config-

ured. So if Windows makes a DNS query, and both type of records (A and AAAA) are returned, it will

choose IPv6 to make the connection. However, even with dual stack enabled, all Windows systems use

IPv4 to make DNS queries. If we want to make these queries over IPv6 we can turn off IPv4. If IPv6 is

disabled we just need to open the network and sharing center, click on local area connection and click

on properties. There you need to fill the Internet Protocol version 6 (TCP/IP) check box in the networking

tab. Then using wireshark we should be able to see the messages trade between the DHCP server and

the client before the client get an IPv6 address (figure 6.21).

6.2.2.4 Servers and Services in the Internal Network

The Cell Manager, as already referred, is also running under Windows Server 2008 R2, therefore we

must enable IPv6 in it, if IPv6 is not yet enabled. The server must be configured with the static address

2001:da12:1234:1::2/64.

No additional configurations are required to allow Data Protector to work with IPv6 because as we

already explained, Data protector works with names not with IP addresses. Therefore we are now able

to perform backups over IPv6 to any client who has an IPv6 address and is registered in the DNS server.

Appendix C.29 shows Data Protector performing a backup to the web server over IPv6. One important

note is that Data Protector favors IPv6 over IPv4. As expected this is valid for both Windows and Linux

hosts since Data Protector relies on DNS to communicate with the backup target and both of those

operating systems have this behavior by default. So if both types of records are available for a certain

query, it will choose the one from IPv6.

By having dual stack implemented on the network we gain more resilience. Let’s look at the example

provided by data protector: if data protector tries to initiate a backup over IPv6 and it fails for some

reason, it will be able to switch to IPv4 and perform the backup over IPv4. To test this scenario we created

a rule in the firewall to drop any IPv6 packets with destination address equal to 2001:da12:1234:3::50

or 2001:da12:1234:1::2 and destination port equal to 5555 or between 18000 and 18050 (ports used by

Figure 6.21: DHCPv6 messages

Page 93: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

6.2. VALIDATION 73

Data Protector). As we can see in Appendix C.30, Data Protector is able to perform the backup over

IPv4 after failing to establish a connection over IPv6. The contrary would also be possible, using IPv6

after failing to connect through IPv4.

6.2.2.5 DMZ

In the DMZ there are two servers that need to be migrated. One runs the web server and the other runs

BIND as the external DNS server. The web server runs under Microsoft Server 2008 R2 and BIND runs

under CentOS 6.

To allow clients to reach the web server through IPv6 we just need to enable IPv6 in Microsoft Server

2008 R2 as shown before with the IPv6 address 2001:da12:1234:3::50.

Like Windows, CentOS prefers IPv6 over IPv4. If a query made to a DNS Server returns both types of

records, A and AAAA, CentOS will use IPv6 to make the connection. We observed this behavior after

configuring IPv6 on CentOS. To configure it we must edit two configuration files: /etc/sysconfig/network

and /etc/network-scripts/ifcfg-eth0 (the number depends on the configuration). In /etc/sysconfig/net-

work the following lines must be added:

• IPV6_DEFAULTGW=2001:da12:1234:3::254

• NETWORKING_IPV6=yes

In /etc/sysconfig/network-scripts/ifcfg-eth0 we must add this line to enable IPv6 in an interface:

• IPv6INIT=yes

However, this server received its IPv4 address through the DHCP server in Lisbon, which means that

the firewall needs to have the DHCP relay function activated. Here comes the bad news, checkpoint

R75.40 does not support DHCPv6 relay, so it is not possible for a device in the DMZ to get an IPv6

address from a DHCP server outside its local network. To solve this problem we will use for now a static

IPv6 address. To do that, add the following line to the /etc/sysconfig/network-scripts/ifcfg-eth0 file:

• IPV6ADDR=2001:da12:1234:3::100

With the server able to communicate over IPv6 it is time to enable IPv6 in BIND. First we have to edit

the /etc/named.conf file and make sure that the following line is present:

• listen-on-v6 { any; }

Page 94: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

74 CHAPTER 6. EXPERIMENTAL VALIDATION

Then we need to add IPv6 records to our BIND Server. To do this, we should edit our forward zone and

reverse lookup zone files just like we did in IPv4 but now we should add records of type AAAA instead

of type A. Figure 6.22 shows the forward lookup zone required to allow BIND to correctly respond to

requests coming from both IPv4 and IPv6. Once BIND configuration is finished, we can configure the

internal DNS server to forward unknown requests to it. Remember that, since BIND is a DNS server we

had to configure it before the web server.

With all these configurations complete we ended up with the network present in figure 6.23.

6.2.3 Identification of Problems

In the description of the network for which we created a migration plan, we made a list with all the

features of the network. To implement the entire network and its features we used VMware, so now we

will see if those features are supported for both IPv4 and IPv6 (table 6.12 ).

There were only 2 features that we were not able to implement in IPv6: firewall management over IPv6

and DHCPv6 relay. In both cases checkpoint R75.40 does not have IPv6 support for these features.

Resolving the first problem (firewall management over IPv6) is very simple. We just need to upgrade our

Checkpoint from R75.40 to R76. R76 brings several new IPv6 enhancements and managing the firewall

using IPv6 is one of them.

The problem concerning DHCPv6 relay is a bit harder to solve because none of Checkpoint firewalls has

DHCPv6 relay implemented. Therefore we must find an alternative and these are the ones we can use:

• Find and alternative firewall who support DHCPv6 relay

• Implement a DHCP server in the DMZ

Figure 6.22: BIND forward lookup zone

Page 95: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

6.2. VALIDATION 75

Figure 6.23: IPv6 enabled network

• Use static addressing instead of DHCP

We will use static addressing just like we used in the testbed because it is the more economic and simple

solution. This way we do not need to replace the firewall nor add a new machine to the DMZ. And since

we are talking about a DNS server, we should remember that is considered a good practice to use static

addresses in network servers.

In this network we did not have any trouble with equipment without IPv6 support, but imagine if our web

server did not support IPv6 and we could not replace it for another. In fact, the solution for a problem

like this is fairly simple. We could use a load balancer with NAT64/DNS64 incorporated like the one we

have seen before 1. By using this load balancer as the default gateway for the DMZ it would be possible

for any IPv6 client to access our IPv4 web server.

1http://www.a10networks.com/products/axseries-NAT64_DNS64.php (last accessed October 1st, 2013)

Page 96: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

76 CHAPTER 6. EXPERIMENTAL VALIDATION

Table 6.12: IPv4 vs IPv6 features

Page 97: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

Chapter 7

Conclusion

IPv6 will replace IPv4 as the predominant Internet Protocol in a near future. It could take 5, 10 or 20

years but this is inevitable. Organizations around the globe must be prepared for this change and make

sure they have the "know how" to be able to succeed when they decide to migrate to IPv6.

We have shown the differences between the two protocols and the new challenges brought by IPv6 not

only to service providers but to enterprises as well. The world is finally understanding the need to change

and the diversity of new horizons that IPv6 will bring. IPv6 traffic as been growing exponentially in the last

years and with the investment being made by ISPs and organizations worldwide this positive trend will

continue in the next years. Therefore, many companies already started to plan their transition towards

IPv6, however this number is yet very low when compared to companies where nothing has been done

to prepare the company’s network infrastructure to IPv6. These companies are the main target audience

for our work, since this dissertation proposes a generic migration process for a company that pretends

to introduce IPv6 in its network. Network engineers responsible for migrating their companies networks

to IPv6 can use the migration process proposed here as a reference/guideline to help them in this task.

This migration process is comprised of 9 steps:

• Analysis of the current situation

• Present a study focused on the migration impact for the company

• Survey of the enterprise’s network

• Analyse IPv6 support from ISPs

• Estimate the costs of migrating the company’s network

• Migration plan

77

Page 98: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

78 CHAPTER 7. CONCLUSION

• Testbed

• Identify problems

• Final implementation

After the development of the migration process, we applied it to a subset of the data centers’ network

of Refer Telecom and created a lab environment representing a subset of this network to validate our

migration process. By implementing our migration process in a real scenario, we were able to see

its usefulness but also the need to adapt it to the network and organization in question. Every single

company has its own network specifications and rules, so we must be able to adapt the defined migration

process to each individual case.

Unfortunately, due to the size of Refer Telecom, it was not feasible to create a migration process for its

entire network in this dissertation. Although the first 5 points of the migration process were made for

the whole network, it was not possible to do the same for the migration plan (point 6 of the migration

process). Instead Refer Telecom selected a few of their most used services and equipment and created

a subset of its network to be used in our plan. So the migration plan was created for this smaller network

defined by Refer Telecom. With the help of virtualization software we were able to replicate this network

and prove the effectiveness of our plan.

Even without a migration plan for the entire network, it is now possible for Refer Telecom to proceed

with IPv6 migration in their data centers with the help of this work. If Refer Telecom wishes, the next

steps for this work will be the definition of a migration plan for the entire network and then the actual

implementation of IPv6 in their data centers.

Page 99: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

Bibliography

[1] S. V. Limkar, R. K. Jha, and S. Pimpalkar, “Ipv6: issues and solution for next millennium of

internet,” in Proceedings of the International Conference & Workshop on Emerging Trends in

Technology, ser. ICWET ’11. New York, NY, USA: ACM, 2011, pp. 953–954. [Online]. Available:

http://doi.acm.org/10.1145/1980022.1980226

[2] R. Guérin and K. Hosanagar, “Fostering ipv6 migration through network quality differentials,”

SIGCOMM Comput. Commun. Rev., vol. 40, no. 3, pp. 17–25, Jun. 2010. [Online]. Available:

http://doi.acm.org/10.1145/1823844.1823847

[3] E. Davies, S. Krishnan, and P. Savola, “IPv6 Transition/Co-existence Security Considerations,”

RFC 4942 (Informational), Internet Engineering Task Force, Sep. 2007. [Online]. Available:

http://www.ietf.org/rfc/rfc4942.txt

[4] Srinivasan.Nagaraj, B.Kishore, K. rao, and G. Apparao, “A comparative study of ipv6 statistical

approach,” International Journal on Computer Science and Engineering (IJCSE), vol. 2, pp. 1367 –

1370, 2010.

[5] S. Thomson, T. Narten, and T. Jinmei, “IPv6 Stateless Address Autoconfiguration,” RFC

4862 (Draft Standard), Internet Engineering Task Force, Sep. 2007. [Online]. Available:

http://www.ietf.org/rfc/rfc4862.txt

[6] S. Deering and R. Hinden, “Internet Protocol, Version 6 (IPv6) Specification,” RFC 2460 (Draft

Standard), Internet Engineering Task Force, Dec. 1998, updated by RFCs 5095, 5722, 5871,

6437, 6564. [Online]. Available: http://www.ietf.org/rfc/rfc2460.txt

[7] F. Nada, “Performance analysis of mobile IPv4 and mobile IPv6,” in The International Arab Journal

of Information Technology, vol. 4, no. 2, April 2007, pp. 153 –160.

[8] D. O. Awduchev, “Benefits of IPv6 for Enterprises,” Verizon Business, White paper, 2010.

[9] Y. Wu and X. Zhou, “Research on the IPv6 performance analysis based on dual-protocol stack and

79

Page 100: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

80 BIBLIOGRAPHY

tunnel transition,” in Computer Science Education (ICCSE), 2011 6th International Conference on,

aug. 2011, pp. 1091 –1093.

[10] K. Dai, “Ipv4 to ipv6 transition research based on the campus network,” in Proceedings of the 2011

2nd International Symposium on Intelligence Information Processing and Trusted Computing, ser.

IPTC ’11. Washington, DC, USA: IEEE Computer Society, 2011, pp. 199–202. [Online]. Available:

http://dx.doi.org/10.1109/IPTC.2011.58

[11] S. Thomson, C. Huitema, V. Ksinant, and M. Souissi, “DNS Extensions to Support IP Version

6,” RFC 3596 (Draft Standard), Internet Engineering Task Force, Oct. 2003. [Online]. Available:

http://www.ietf.org/rfc/rfc3596.txt

[12] D. Wing and A. Yourtchenko, “Happy Eyeballs: Success with Dual-Stack Hosts,” RFC

6555 (Proposed Standard), Internet Engineering Task Force, Apr. 2012. [Online]. Available:

http://www.ietf.org/rfc/rfc6555.txt

[13] T. Narten, E. Nordmark, W. Simpson, and H. Soliman, “Neighbor Discovery for IP version 6 (IPv6),”

RFC 4861 (Draft Standard), Internet Engineering Task Force, Sep. 2007, updated by RFC 5942.

[Online]. Available: http://www.ietf.org/rfc/rfc4861.txt

[14] L. Wu, D. Hai-xin, L. Tao, L. Xing, and W. Jian-ping, “H6proxy: Icmpv6 weakness analysis and

implementation of ipv6 attacking test proxy,” in Ubiquitous, Autonomic and Trusted Computing,

2009. UIC-ATC ’09. Symposia and Workshops on, july 2009, pp. 519 –524.

[15] Cisco Systems Inc., “IPv6 routing-at-a-glance,” White paper, 2005.

[16] The Federal CIO Council Strategy and Planning Committee, “Planning Guide/Roadmap Toward

IPv6 Adoption within the U.S. Government,” Jul. 2012.

[17] Australian Government, “A Strategy for the Implementation of IPv6 in Australian Government Agen-

cies,” Jul. 2009.

[18] G. V. de Velde, C. Popoviciu, T. Chown, O. Bonness, and C. Hahn, “IPv6 Unicast Address

Assignment Considerations,” RFC 5375 (Informational), Internet Engineering Task Force, Dec.

2008. [Online]. Available: http://www.ietf.org/rfc/rfc5375.txt

[19] E. Nordmark and R. Gilligan, “Basic Transition Mechanisms for IPv6 Hosts and Routers,” RFC

4213 (Proposed Standard), Internet Engineering Task Force, Oct. 2005. [Online]. Available:

http://www.ietf.org/rfc/rfc4213.txt

[20] P.-K. Chen, C.-W. Lu, and Q. Wu, “IPv6 Rapid Deployment in Taiwan Academic Network (TANet),” in

Advanced Communication Technology (ICACT), 2012 14th International Conference on, feb. 2012,

pp. 694 –697.

Page 101: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

BIBLIOGRAPHY 81

[21] R. Despres, “IPv6 Rapid Deployment on IPv4 Infrastructures (6rd),” RFC 5569 (Informational),

Internet Engineering Task Force, Jan. 2010. [Online]. Available: http://www.ietf.org/rfc/rfc5569.txt

[22] F. Templin, “Transmission of IPv4 Packets over Intra-Site Automatic Tunnel Addressing Protocol

(ISATAP) Interfaces,” RFC 5579 (Informational), Internet Engineering Task Force, Feb. 2010.

[Online]. Available: http://www.ietf.org/rfc/rfc5579.txt

[23] C. Huitema, “Teredo: Tunneling IPv6 over UDP through Network Address Translations (NATs),”

RFC 4380 (Proposed Standard), Internet Engineering Task Force, Feb. 2006, updated by RFCs

5991, 6081. [Online]. Available: http://www.ietf.org/rfc/rfc4380.txt

[24] S. Frankel, R. Graveman, and J. Pearce, “Guidelines for the Secure Deployment of IPv6(Draft),”

Feb. 2010.

[25] A. Durand, P. Fasano, I. Guardini, and D. Lento, “IPv6 Tunnel Broker,” RFC 3053 (Informational),

Internet Engineering Task Force, Jan. 2001. [Online]. Available: http://www.ietf.org/rfc/rfc3053.txt

[26] A. Durand, R. Droms, J. Woodyatt, and Y. Lee, “Dual-Stack Lite Broadband Deployments Following

IPv4 Exhaustion,” RFC 6333 (Proposed Standard), Internet Engineering Task Force, Aug. 2011.

[Online]. Available: http://www.ietf.org/rfc/rfc6333.txt

[27] M. Bagnulo, P. Matthews, and I. van Beijnum, “Stateful NAT64: Network Address and Protocol

Translation from IPv6 Clients to IPv4 Servers,” RFC 6146 (Proposed Standard), Internet

Engineering Task Force, Apr. 2011. [Online]. Available: http://www.ietf.org/rfc/rfc6146.txt

[28] C. Aoun and E. Davies, “Reasons to Move the Network Address Translator - Protocol Translator

(NAT-PT) to Historic Status,” RFC 4966 (Informational), Internet Engineering Task Force, Jul. 2007.

[Online]. Available: http://www.ietf.org/rfc/rfc4966.txt

[29] Y. Zhai, C. Bao, and X. Li, “Transition from IPv4 to IPv6: A Translation Approach,” in Networking,

Architecture and Storage (NAS), 2011 6th IEEE International Conference on, july 2011, pp. 30 –39.

[30] J. Bound, “IPv6 Enterprise Network Scenarios,” RFC 4057 (Informational), Internet Engineering

Task Force, Jun. 2005. [Online]. Available: http://www.ietf.org/rfc/rfc4057.txt

[31] J. Bound, Y. Pouffary, S. Klynsma, T. Chown, and D. Green, “IPv6 Enterprise Network Analysis - IP

Layer 3 Focus,” RFC 4852 (Informational), Internet Engineering Task Force, Apr. 2007. [Online].

Available: http://www.ietf.org/rfc/rfc4852.txt

[32] O. Dobrijevic, V. Svedek, and M. Matijasevic, “Ipv6 deployment and transition plans in croatia: Eval-

uation results and analysis,” in Software, Telecommunications and Computer Networks (SoftCOM),

2012 20th International Conference on, sept. 2012, pp. 1 –7.

Page 102: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the
Page 103: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

Appendix A

Configurations

A.1 Router Configuration Part 1

A.2 Router Configuration Part 2

A.3 Vswitch VLANs

83

Page 104: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

84 APPENDIX A. CONFIGURATIONS

Figure A.24: Vswitch VLANs

Page 105: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

A.3. VSWITCH VLANS 85

Figure A.25: Vswitch VLANs

Page 106: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

86 APPENDIX A. CONFIGURATIONS

Figure A.26: Vswitch VLANs

Page 107: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

Appendix B

Firewall

B.1 IPv4 Rules

B.2 IPv4 and IPv6 rules

87

Page 108: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

88 APPENDIX B. FIREWALL

Figure B.27: IPv4 firewall rules

Page 109: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

B.2. IPV4 AND IPV6 RULES 89

Figure B.28: Firewalls rules for a dual-stack network

Page 110: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the
Page 111: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

Appendix C

Data Protector

C.1 Successful backup to the web server over IPv6

C.2 Data Protector switching from IPv6 to IPv4

91

Page 112: Process for IPv6 Migration in Large Organizations - ULisboa · Process for IPv6 Migration in Large Organizations Pedro Filipe Martins de Castro Dissertation submitted to obtain the

92 APPENDIX C. DATA PROTECTOR

Figure C.29: Successful backup to the web server over IPv6

Figure C.30: Data Protector switching from IPv6 to IPv4