Enterprise IPv6 Transition Matrix IETF 60 IPv6 Operations Working Group Aug 2-6, 2004 San Diego, CA Jim Bound, Yanick Pouffary, Tim Chown, Jordi Palet Special Acknowledgement and Thank You Steve Klynsma and David Green
O rigination D estination R ecom m ended Scenario H ost/App Intranet Sv c Prov ider Sv c Prov ider Intranet H ost/App M echanism 1 v 4 v 4 v 4 v 4 v 4 v 4 2 v 6 v 6 v 6 v 6 v 6 v 6 3 D ual-IP D ual-IP D ual-IP D ual-IP D ual-IP D ual-IP 4 D ual-IP v 4 v 4 v 4 5 v 6 6 D ual-IP 7 v 4 D ual-IP v 4 v 4 8 v 6 9 D ual-IP 10 v 4 v 4 D ual-IP v 4 11 v 6 12 D ual-IP 13 D ual-IP v 6 v 6 v 4 14 v 6 15 D ual-IP 16 v 6 D ual-IP v 6 v 4 17 v 6 18 D ual-IP 19 v 6 v 6 D ual-IP v 4 20 v 6 21 D ual-IP 22 D ual-IP v 4 v 6 v 4 23 v 6 24 D ual-IP 25 D ual-IP v 6 v 4 v 4 26 v 6 27 D ual-IP 28 v 6 D ual-IP v 4 v 4 29 v 6 30 D ual-IP 31 v 4 D ual-IP v 6 v 4 32 v 6 33 D ual-IP 34 v 4 v 6 D ual-IP v 4 35 v 6 36 D ual-IP 37 v 6 v 4 D ual-IP v 4 38 v 6 39 D ual-IP 40 D ual-IP D ual-IP v 4 v 4 41 v 6 42 D ual-IP 43 D ual-IP D ual-IP v 6 v 4 44 v 6 45 D ual-IP 46 D ual-IP v 4 D ual-IP v 4 47 v 6 48 D ual-IP 49 D ual-IP v 6 D ual-IP v 4 50 v 6 51 D ual-IP 52 v 4 D ual-IP D ual-IP v 4 53 v 6 54 D ual-IP 55 v 6 D ual-IP D ual-IP v 4 56 v 6 57 D ual-IP
Matrix Discussion • 36 of these entries are trivial and straight forward tunnel or translation • 12 correspond to a v4 or v6 only service provider and not likely • Then 9 of them correspond to the scenarios that require more analysis and scrutiny. • Those are 37, 38, 39, 41, 43, 47, 49, 53, and 55 • Identifying the key combinations of mechanisms that support these 9 scenarios would be very useful analysis for the enterprise. • Where v6 must get to v4 or v4 to v6 is where the more complex decisions for transition will take place and require a choice based on deployment scenario. • The job is to look at the mechanisms using tunnels or translation and what is required and suggesting a recommended mechanism. • The current available mechanisms users are using now to analyze this matrix exercise are Configured Tunnels, 6to4, ISATAP, Teredo, Tunnel Broker, DSTM, and some form of Translation. • The Enterprise IETF Team will have to do the analysis to describe an approach to this problem space for selection, based on the Enterprise Scenarios document. • One size does not fit all for sure
Recommend
More recommend