Firewalls and Internet Security: Repelling the Wily Hacker
Firewalls and Internet Security: Repelling the Wily Hacker
A Monitoring Approach for Safe IPv6 Renumbering
ICCGI '06 Proceedings of the International Multi-Conference on Computing in the Global Information Technology
No Administration Protocol (NAP) for IPv6 router auto-configuration
International Journal of Internet Protocol Technology
A secure mechanism for address block allocation and distribution
NETWORKING'08 Proceedings of the 7th international IFIP-TC6 networking conference on AdHoc and sensor networks, wireless networks, next generation internet
Implementation and evaluation of the Shim6 protocol in the Linux kernel
Computer Communications
Hi-index | 0.00 |
The difficulty of renumbering a network--i.e., adding and removing an Internet Protocol (IP) prefix due to a provider change or a network merger--is a real issue for most network administrators. In this paper, we propose a set of macros that can be used in configuration files. These allow network administrators to write generic configurations that are independent of the public IPv6 prefixes allocated to their network. We explain how to apply our macros to key configuration files, namely firewall access lists, Domain Name Service and Dynamic Host Configuration Protocol, and how to use this mechanism in a full renumbering process.