Network Infrastructure Integration Design
You are a well-known expert in the design and security of corporate network infrastructures. As such, Z Corporation, Inc. (ZCorp) has contacted you requesting a proposal for a network infrastructure integration design.

ZCorp is a global financial institution that intends to add Internet Protocol version 6 (IPv6) to its existing network. The headquarters of ZCorp is in Denver, CO, and it has main offices in Sydney, Australia; Vienna, Austria; Tokyo, Japan; and Rio de Janeiro, Brazil. Local routers are providing network services such as Dynamic Host Configuration Protocol (DHCP), network address translation (NAT), and Domain Name System (DNS). It is using Enhanced Interior Gateway Routing Protocol (EIGRP) as its interior gateway protocol and Exterior Gateway Protocol (EGP) as its exterior gateway protocol. Its wide area network (WAN) involves multiple T3 connections and the use of Asynchronous Transfer Mode (ATM). It is unclear to the ZCorp information technology (IT) staff whether they should replace Internet Protocol version 4 (IPv4) with IPv6 or use both versions of IP (dual-stack operation).

Your mission is to prepare a proposal document that makes a recommendation for either replacing IPv4 with IPv6 or using both versions of IP. This recommendation must be supported and explained in detail. Research IPv4 and IPv6 to understand differences, benefits, and challenges. Seek information regarding LANs implementing dual protocol stacks. Make a recommendation for: a) replacing IPv4 with IPv6 and b) using IPv4 and IPv6 together (dual-stack operation). Support your recommendations.

Your proposal should specify a phased approach for your recommendation. You should include the following considerations in your document:

List and explain 5 of most significant changes of IPv6 over IPv4
Benefits of implementing IPv6, especially in the area of security
Potential issues and concerns with IPv6
Whether or not to continue the use of network services with IPv6
Necessary changes to existing hardware with IPv6
Other resource factors
High-level set of steps to implement your recommendation, including IP addressing scheme
Your proposal should be an APA Word document of 3 pages plus a title page and a reference page. Refer to the APA Style Guide found in the Library for further information.

Network Infrastructure Integration Design
Connectivity is essential to the viability of enterprise such as Z Corporation, which deals in the global financial industry. The proposal of ZCorp adding an Internet Protocol version 6 (IPv6) to its existing network of IPv4 will expand its networks and enabling the enterprise to take competitive advantage of IPv6 new features.
Significant changes of IPv6 over IPv4 include expanded address space that contains 128 bits long compared to IPv4 that only consists of 32 bites. Moving to IPv6 expands the address space from IPv4 four billion addresses to an astronomic number of over 300 trillion addressees. IPv6 also comes with advanced address configuration that helps in reducing the complexity of the host through two different ways; stateful address configuration and the stateless address configuration (Nguyen & Anh, 2012). Another feature of IPv6 is a new datagram format that has been redefined proving it with the capabilities of adding extension headers after the IPv6 header. Unlike the IPv4 header that leaves only 40 bytes of options, the IPv6 extension headers are constrained only by the size of the IPv6 packet. IPv4 networks have difficulties in supporting the quality of Service (QoS) as they cannot tell the difference if data that are time-sensitive. However, IPv6 128 bits contain features that enhance security and improve reliability by identifying and handling traffic in IPv6 field, enabling the support of QoS efficiently. IPv6 also provides better support for non-unicast addressing.
There are several benefits of implementing IPv6 when it comes to the area of security. Some of them include dealing with threats, which has been improved through the inclusion of IP Security (IPSec). IPv6 also prevents header manipulation and fragmentation. Unlike in IPv4 where its fragmentation can be used as a technique to bypass access controls on devices, in IPv6, overlapping fragments are considered as a possible attack and dropped preventing any possible control breach (Abu Sameeha, 2012). Another benefit of IPv6 is that it set up that it can easily summarize at different points of networks which allows Internet Service Providers (ISPs) to install filters in place that prevent their customers from spoofing outside their range.
However, several potential issues and concerns with IPv6 exist. One of the problems is the ability to use rate-limiting tactic that is used to protect the network from automated attack tools. With IPv6 networks being vast, the rate limit tactic cannot be applied at the 128 bites addresses level. The high number of addresses in IPv6 gives hackers more room to exploit the network, unlike in IPv4, where the tactic can work effectively due to limited addresses. Another issue with IPv6 is that every host can contain multiple IPv6 addresses simultaneously, which might cause SIEM systems not to function appropriately (Rubens, 2012). The financial and manpower costs are also a concern in the deployment of the IPv6. The implementation of IPv6 requires careful planning and if not well conducted the possibilities of leaving gaping security holes in the network system is high (Jackson, 2013). Since an instant switch from IPv4 to IPv6 does not exist, the transitional process to transport IPv6 over IPv4 if not carefully conducted might create potential sources of misconfiguration and security gaps.
The ZCorp must continue to use the network services with IPv6 as they use IPv4 to serve their customers. Therefore, IPv4 and IPv6 have to exist within the process of transition through a dual-stack device. The device contains network interfaces that originate and understand both IPv6 and IPv4 packets (Juniper Networks, 2017). The dual-stack devices interoperate equally with IPv6 devices and IPv4 devices, enabling the devices to be dual-stacked agreeing on which IP version to use. The transition is normally driven by Domain Name System (DNS) whereby IPv4 packets are sent if the DNS of the device responds with IPv4 address (a DNS A Record). The IPv6 packets are sent if the device DNS responds with an IPv6 address (a DNS AAAA Record). However, necessary changes to existing hardware with IPv6 would include the uses of the HPE 5500 (1G) and 5700 (10G) switches that can provide static routing and routing protocols support for IPv6 (Pavithra & Dakshayini, 2017). The switches also support virtual networks and enhance network performance by supporting up to 40GB uplink speed.
The steps of implementing the IPv6 set up starts with discovering the IP network to determine the scope of the existing IPv4 concerning hardware and software upgrade or replacement needed for compatibility with IPv6. The second step is planning the IPv6 implementation. This step includes what purchasing the necessary hardware or software, conducting administrators and users training, and conducting a complete high-level organizational requirement plan (Sclafani, 2018). The third step of implementing the IPv6 is the modeling of the new dual-stack network that determines how IPv6 will look upon network completion. Modeling provides space to address changes to routers, security policies, and interfaces of the system. After modeling, mapping of IPv4 and Ipv6 is conducted through dual-stack. Implementation of dual-stacking is done after mapping where the network is also continually managed to check important network features and deploy maintenance where necessary.

References
Abu Sameeha, M. (2012). Look at IPV6 Security advantages over IPV4. Network and Complex Systems. Vol 2, No.4. https://pdfs.semanticscholar.org/bf3a/f766cb264513e742c9ad16beecdd534c3522.pdf
Jackson, W. (2013). When moving to IPv6, beware the risks. GCN. Retrieved from https://gcn.com/articles/2013/03/20/risks-moving-to-ipv6.aspx
Juniper Networks. (2017). Understanding Dual Stacking of IPv4 and IPv6 Unicast Addresses. Retrieved from https://www.juniper.net/documentation/en_US/junos/topics/concept/ipv6-dual-stack-understanding.html
Nguyen, P., & Anh, Q. (2012). Transition from Ipv4 to Ipv6: Best Method for Large Enterprise Networks. Lahti University of Applied Sciences. Retrieved from https://www.theseus.fi/bitstream/handle/10024/40098/Nguyen_Phu.pdf
Pavithra, R., & Dakshayini, M. (2017, May). Software and Hardware Enhancements to Support IPV6. International Journal of Advanced Research in Computer Science and Software Engineering. Vol7, Iss 5. http://ijarcsse.com/Before_August_2017/docs/papers/Volume_7/5_May2017/V7I5-0127.pdf
Rubens, P. (2012). 7 IPv6 Security Risks. eSecurity Planet. Retrieved from https://www.esecurityplanet.com/network-security/7-ipv6-security-risks.html
Sclafani, P. (2018). Six Steps to IPv6 (2018). 6 Connect. Retrieved from https://www.6connect.com/resources/six-steps-to-ipv6/

Published by
Essays
View all posts