On campus IPv6 beta site: Requirements, solutions, and product defect evaluation

Due to IPv4 address exhaustion, IPv6 deployment has been in progress and the transition from IPv4 to IPv6 has become more imminent. In this article, we report an on-campus IPv6 beta site coexisting with IPv4 networks and designed with requirements from its stakeholders. We conducted a wide range of test cases, from essential functionality tests to advanced stability tests which require complex interoperability tests and cannot be performed in laboratory testing. After one year of operation, tens of defects were observed and seven representative defects in dual-stack tunneling, IPv6 routing table, RIPng, and OSPFv3, are reported. Most defects are reproducible, and some could be fixed by proper configuration while others are caused by flaws in system design, memory management, or protocol implementation. We suggest careful configuration, overloading prevention, limited resource sharing, and robust error handling as the lessons to vendors and administrators of IPv6 devices.

[1]  Yuan-Cheng Lai,et al.  Low-storage capture and loss recovery selective replay of real flows , 2012, IEEE Communications Magazine.

[2]  Ralph E. Droms,et al.  Dynamic Host Configuration Protocol for IPv6 (DHCPv6) , 2003, RFC.

[3]  Hugo Krawczyk,et al.  A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..

[4]  Fangzhe Chang,et al.  Realizing the transition to IPv6 , 2002 .

[5]  Rob Adams,et al.  The ESP CBC-Mode Cipher Algorithms , 1998, RFC.

[6]  Stephen E. Deering,et al.  IP Version 6 Addressing Architecture , 1995, RFC.

[7]  Ralph E. Droms,et al.  DNS Configuration options for Dynamic Host Configuration Protocol for IPv6 (DHCPv6) , 2003, RFC.

[8]  Ralph E. Droms,et al.  Stateless Dynamic Host Configuration Protocol (DHCP) Service for IPv6 , 2004, RFC.

[9]  Thomas Narten,et al.  Neighbor Discovery for IP Version 6 (IPv6) , 1996, RFC.

[10]  Jianping Wu,et al.  CNGI-CERNET2: an IPv6 deployment in China , 2011, CCRV.

[11]  Sheila Frankel,et al.  The AES-CBC Cipher Algorithm and Its Use with IPsec , 2003, RFC.

[12]  Shiho Moriai,et al.  The Camellia Cipher Algorithm and Its Use With IPsec , 2005, RFC.

[13]  Sheila Frankel,et al.  The AES-XCBC-MAC-96 Algorithm and Its Use With IPsec , 2003, RFC.

[14]  Stephen E. Deering,et al.  Path MTU Discovery for IP version 6 , 1996, RFC.

[15]  Jari Arkko,et al.  Experiences from an IPv6-Only Network , 2012, RFC.

[16]  Russ Housley,et al.  Using Advanced Encryption Standard (AES) Counter Mode With IPsec Encapsulating Security Payload (ESP) , 2004, RFC.

[17]  Eric Gamess,et al.  Implementing IPv6 at Central University of Venezuela , 2007, LANC.

[18]  Jeffrey I. Schiller,et al.  Cryptographic Algorithms for Use in the Internet Key Exchange Version 2 (IKEv2) , 2005, RFC.

[19]  Keith McCloghrie,et al.  Conformance Statements for SMIv2 , 1999, RFC.

[20]  Barbara Stark,et al.  Basic Requirements for IPv6 Customer Edge Routers , 2011, RFC.

[21]  Stephen T. Kent,et al.  The NULL Encryption Algorithm and Its Use With IPsec , 1998, RFC.

[22]  Erik Nordmark,et al.  Basic Transition Mechanisms for IPv6 Hosts and Routers , 2005, RFC.

[23]  Hiroshi Esaki,et al.  IPv6 integration and coexistence strategies for next-generation networks , 2004, IEEE Communications Magazine.

[24]  Randy Presuhn,et al.  Management Information Base (MIB) for the Simple Network Management Protocol (SNMP) , 2002, RFC.

[25]  Jordi Palet Basic Requirements for IPv6 Customer Edge Routers , 2017 .

[26]  Randy Presuhn Version 2 of the Protocol Operations for the Simple Network Management Protocol (SNMP) , 2002, RFC.

[27]  Kenneth Raeburn,et al.  Encryption and Checksum Specifications for Kerberos 5 , 2005, RFC.

[28]  Keith McCloghrie,et al.  Structure of Management Information Version 2 (SMIv2) , 1999, RFC.

[29]  Jari Arkko,et al.  Using IPsec to Protect Mobile IPv6 Signaling Between Mobile Nodes and Home Agents , 2004, RFC.

[30]  Cheryl Madson,et al.  The Use of HMAC-SHA-1-96 within ESP and AH , 1998, RFC.

[31]  Ernst L. Leiss Proceedings of the 4th international IFIP/ACM Latin American conference on Networking , 2007, LANC 2007.

[32]  Randall J. Atkinson,et al.  Security Architecture for the Internet Protocol , 1995, RFC.

[33]  Ying-Dar Lin,et al.  On campus beta site: architecture designs, operational experience, and top product defects , 2010, IEEE Communications Magazine.

[34]  Stephen E. Deering,et al.  Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification , 2006, RFC.

[35]  Mark Handley,et al.  SDP: Session Description Protocol , 1998, RFC.

[36]  A. Vallejo,et al.  State of the Art of IPv6 Conformance and Interoperability Testing , 2007, IEEE Communications Magazine.

[37]  Henning Schulzrinne,et al.  An Offer/Answer Model with Session Description Protocol (SDP) , 2002, RFC.

[38]  Mark Handley,et al.  SIP: Session Initiation Protocol , 1999, RFC.

[39]  Robert Sparks,et al.  Session Initiation Protocol (SIP) Basic Call Flow Examples , 2003, RFC.

[40]  Randall J. Atkinson,et al.  IP Encapsulating Security Payload (ESP) , 1995, RFC.

[41]  Stephen E. Deering,et al.  Path MTU Discovery for IP version 6 , 2017, RFC.

[42]  Paul E. Hoffman,et al.  IKEv2 Clarifications and Implementation Guidelines , 2006, RFC.