<section title="10.8. Network Design, Architecture and IP Address Management"><subsection title="Objective"><paragraph
    title="10.8.1."


><![CDATA[<p>IP Address architecture, allocation and addressing schemes enable and support system security and data protection.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="10.8.2."


><![CDATA[<p>This section includes discussion of the principles of separation and segregation as network design and network architecture characteristics.  It also discusses how IP addresses can be used to support these principles for improved security of larger or multi-classification agency systems.</p>]]></paragraph>
</block>
<block title="Background"><paragraph
    title="10.8.3."


><![CDATA[<p>The larger the network, the more difficult it is to protect.  A large, unsegmented network presents a large attack surface with greater susceptibility to the rapid spread and dissemination of system faults, weaknesses, vulnerabilities and attacks.  In a non-segmented network, traffic and applications generally have access to the entire network. If a fault occurs or an attacker gains entry, the fault or attacker can move laterally through the network causing disruption, network outages and enabling access to critical operational or classified data.</p>]]></paragraph>
<paragraph
    title="10.8.4."


><![CDATA[<p>A large network is also more difficult to monitor and control.  Segmenting the network limits an attacker’s ability to move through the network by preventing lateral movement between zones.  Segmentation also enhances the ability to detect, monitor, control, isolate and correct faults.</p>]]></paragraph>
<paragraph
    title="10.8.5."


><![CDATA[<p>A fundamental construct in the management of risk in networks is that of Trust Zones and Trust Boundaries. &nbsp;A Trust Zone is a zoning construct based on levels of trust, classification, information asset value and essential information security. &nbsp;A Trust Boundary is the interface between two or more Trust Zones. Trust Zones use the principles of separation and segregation to manage sensitive information assets and ensure security policies are consistently applied to all assets in a particular Trust Zone. &nbsp;Refer also to <a title="Cloud computing" href="http://nzism.gcsb.govt.nz/ism-document#Section-17217">Section 22.1 – Cloud Computing</a> and <a title="Virtualisation" href="http://nzism.gcsb.govt.nz/ism-document#Section-17306">Section 22.2 – Virtualisation</a>.</p>]]></paragraph>
</block>
<block title="Separation and Segregation"><paragraph
    title="10.8.6."


><![CDATA[<p>Separation and Segregation are determined by system function and the sensitivity of the data the system stores, processes and transmits.  One common example is placing systems that require a connection to the Internet into a demilitarized zone (DMZ) that is separated and segregated (isolated) from more sensitive systems. Another example is the use of compartments.</p>]]></paragraph>
<paragraph
    title="10.8.7."


><![CDATA[<p>Separation and Segregation limits the ability of an intruder to exploit a vulnerability with the intent of elevating privileges to gain access to more sensitive systems on the internal network.  VLANs may be used to further separate systems by controlling access and providing segregation thus giving additional protection.</p>]]></paragraph>
<paragraph
    title="10.8.8."


><![CDATA[<p>Network segmentation is an effective strategy for protecting access to key data assets, and impeding the lateral movement of system faults, threats and malicious activity.  Segregation has the following benefits:</p><ul>
<li>Enhanced performance: with fewer hosts per subnet, there is a reduced signalling and traffic overhead allowing more bandwidth for data communication.</li>
<li>Improved security: with less signalling traffic going through all network segments, it is more difficult for an attacker to analyse the addressing scheme and network structure.  Failures in one segment are less likely to propagate and more robust access control can be established and enforced.</li>
</ul>]]></paragraph>
<paragraph
    title="10.8.9."


><![CDATA[<p>Effective segregation also requires:</p><ul>
<li>Specialised knowledge: networks may support many devices with complex policies and rule sets.  Support staff must be properly educated and trained to ensure the network segmentation is maintained.</li>
<li>Administrative effort: changes in infrastructure, such as new applications and new technologies, can extend the time required to make changes and ensure the integrity of network segments.</li>
<li>Infrastructure Investment: segregation may require more equipment, new equipment with advanced functionalities, or specific software to deal with multiple segments.  These requirements should be considered during budget planning.</li>
</ul>]]></paragraph>
</block>
<block title="ISO 27001 and ISO 27002 implementation recommendations for network segregation"><paragraph
    title="10.8.10."


><![CDATA[<p>These ISO Standards require the implementation of network segregation.  In particular they recommend that groups of information services, users, and information systems are segregated on networks.  Specific recommendations are summarised below:</p><ul>
<li>Divide large networks into separate network domains (segments);</li>
<li>Consider physical and logical segregation;</li>
<li>Define domain perimeters;</li>
<li>Define traffic rules between domains;</li>
<li>Use authentication, encryption, and user-level network access control technologies;</li>
<li>Consider integration of the organisation’s network and segments with those of business partners.</li>
</ul>]]></paragraph>
<paragraph
    title="10.8.11."


><![CDATA[<p>The following structures and techniques should be considered:</p><ul>
<li><strong>Criteria-based segmentation</strong>: Pre-define rules to establish perimeters and create new segments in order to reduce unnecessary redesign and future administrative overheads. &nbsp;Examples of criteria are trust level (e.g., external public segment, staff segment, server segment, database segment, suppliers segment, etc.), organisational unit (e.g., Operations, Service Desk, Outreach, etc.), and combinations (e.g., external public access).</li>
<li><strong>Use of physical and logical segmentation:</strong> Depending upon the risk level identified in the risk assessment, it may be necessary to use physically separated infrastructures to protect the organisation’s information and assets (e.g., classified data flowing through a dedicated fibre), or you may use solutions based on logical segmentation like Virtual Private Network (VPN).</li>
<li><strong>Access rules for traffic flowing</strong>: Traffic between segments, including those of permitted external parties, should be controlled according to the need to access information. &nbsp;Gateways should be configured based on information classification and risk assessment. A specific case of access control applies to wireless networks, since they have poor perimeter definition. &nbsp;The recommendation is to treat wireless communication as an external connection until the traffic can reach a proper wired gateway before granting access to internal network segments. Refer also to <a title="Gateway Security" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-16567">Chapter 19 – Gateway Security</a>.</li>
</ul>]]></paragraph>
</block>
</subsection>
<subsection title="Network Design"><paragraph
    title="10.8.12"


><![CDATA[<p>A poorly designed network has increased support costs, reduced availability, security risks, and limited support for new applications and solutions. &nbsp;Less-than-optimal performance affects end users and access to central resources. Some of the issues that stem from a poorly designed network may include the following:</p><ul>
<li><strong>Failure domains</strong>: One of the most important reasons to implement an effective network design is to minimise the spread and extent of faults. &nbsp;When Layer 2 and Layer 3 boundaries are not clearly deﬁned, failure in one network area can have a far-reaching effect.</li>
<li><strong>Broadcast domains</strong>: Broadcasts exist in every network. &nbsp;Many applications and network operations require broadcasts to function correctly; therefore, it is not possible to eliminate them completely. &nbsp;In the same way that avoiding failure domains involves clearly deﬁning boundaries, broadcast domains should have clear boundaries and include an optimal number of devices to minimise the negative impact of broadcasts.</li>
<li><strong>MAC unicast ﬂooding</strong>: Some switches limit unicast frame forwarding to ports that are associated with the speciﬁc unicast address. &nbsp;However, when frames arrive at a destination MAC address that is not recorded in the MAC table, they are ﬂooded out of the switch ports in the same VLAN except for the port that received the frame. &nbsp;This behaviour is called unknown MAC unicast ﬂooding.</li>
<li>Because this type of ﬂooding causes excessive trafﬁc on all the switch ports, network interface cards (NIC) must contend with a larger number of frames on the wire. &nbsp;When data is propagated on a connection or network segment for which it was not intended, security can be compromised.</li>
<li><strong>Multicast trafﬁc on ports where it is not intended</strong>: IP multicast is a technique that allows IP trafﬁc to be propagated from one source to a multicast group that is identiﬁed by a single IP and MAC destination-group address pair. &nbsp;Similar to unicast ﬂooding and broadcasting, multicast frames are ﬂooded out all the switch ports. A robust design allows for the containment of multicast frames while allowing them to be functional.</li>
<li><strong>Difﬁculty in management and support</strong>: Trafﬁc ﬂows can be difficult to identify in a poorly designed network. &nbsp;This can make support, maintenance, and problem resolution time-consuming and difficult as well as creating security risks.</li>
<li><strong>Possible security vulnerabilities</strong>: A switched network that has been designed with little attention to security requirements at the access layer can compromise the integrity of the entire network.</li>
<li><strong>Criteria-based segmentation</strong>: Pre-define rules to establish perimeters and create new segments in order to reduce unnecessary redesign and future administrative overheads. &nbsp;Examples of criteria are trust level (e.g., external public segment, staff segment, server segment, database segment, suppliers segment, etc.), organisational unit (e.g., Operations, Service Desk, Outreach, etc.), and combinations (e.g., external public access).</li>
</ul>]]></paragraph>
 <block title="Design Implementation"><paragraph
    title="10.8.13."


><![CDATA[<p>To assist in the implementation of separation and segregation as network design and architectural principles, the following aspects should be considered:</p><ul>
<li>Classification;</li>
<li>Security Zones;</li>
<li>IP Address Management;</li>
<li>Central Information Repository;</li>
<li>Private Use of Reserved Addresses;</li>
<li>Devices with Default IP Addresses; and</li>
<li>Connector types and cable colours.</li>
</ul>]]></paragraph>
</block>
<block title="Classification"><paragraph
    title="10.8.14."


><![CDATA[<p>Classified systems should, by definition, be segregated.  This is particularly important where network elements have access to compartments and compartmented data.</p>]]></paragraph>
<paragraph
    title="10.8.15."


><![CDATA[<p>Ideally compartmented elements of systems should be segregated and separated from the main network.  This may include the use of a reserved address space, monitored to detect violations or unauthorised attempts to connect to compartments or to access compartmented data.</p>]]></paragraph>
</block>
<block title="Security Zones"><paragraph
    title="10.8.16."


><![CDATA[<p>A security zone is a group of one or more physical or virtual firewall interfaces and the network segments connected to the zone’s interfaces.  Protection for each zone is individually specified and controlled so that each zone receives the specific protections it requires according to classification, endorsement, compartment and sensitivity of data.</p>]]></paragraph>
</block>
<block title="IP Address Management"><paragraph
    title="10.8.17."


><![CDATA[<p>The fundamental goal of an IP addressing scheme is to ensure network devices are uniquely addressed.  IP Address Schemes are a fundamental part of any network’s security architecture and should support network separation and segregation.  There are a number of techniques to assist in separating and segregating network elements. It is also useful to consider how to segregate and control network traffic through:</p><ul>
<li>Defined network perimeters and boundaries; and</li>
<li>Defined network traffic rules.</li>
</ul>]]></paragraph>
<paragraph
    title="10.8.18."


><![CDATA[<p>A well-structured IP addressing scheme promotes the ability to quickly identify node properties from an IP address which assist in network management and fault finding and rectification.</p>]]></paragraph>
</block>
<block title="Address Block Allocation"><paragraph
    title="10.8.19."


><![CDATA[<p>There are two main difficulties when assigning address blocks for types of devices.  First is that over time there is insufficient provision for additional devices and network growth.  When the allocated address block is exhausted, the addressing scheme is compromised (broken). The second is that you have a small number of devices in an address block, but are running out of addresses in other parts of the network.  If you “borrow” from a pre-assigned address range, the addressing scheme is also compromised.</p>]]></paragraph>
<paragraph
    title="10.8.20."


><![CDATA[<p>Internal IP address ranges are defined by the IETF. &nbsp;Commonly known as RFC 1918 addresses, the most recent RFC is 6761. &nbsp;These RFC’s define private IP address ranges which cannot be used for external (Internet) IP addressing. &nbsp;Three address ranges (blocks) are defined:</p>
<table class="table-main">
<tbody>
<tr>
<td><strong>IPv4 Address Range</strong></td>
<td><strong>Network IPv4 address Block</strong></td>
<td><strong>Directed Broadcast IPv4 address</strong></td>
<td><strong>IPv4 Addresses</strong></td>
</tr>
<tr>
<td><strong>10.0.0.0 to 10.255.255.255</strong></td>
<td>10.0.0.0/8</td>
<td>10.255.255.255</td>
<td>16,777,216</td>
</tr>
<tr>
<td><strong>172.16.0.0 to 172.31.255.255</strong></td>
<td>172.16.0.0/12</td>
<td>172.31.255.255</td>
<td>1,048,576</td>
</tr>
<tr>
<td><strong>192.168.0.0 to 192.168.255.255</strong></td>
<td>192.168.0.0/16</td>
<td>192.168.255.255</td>
<td>65,536</td>
</tr>
</tbody>
</table>]]></paragraph>
<paragraph
    title="10.8.21."


><![CDATA[<p>IPv4 addresses are 32-bit binary addresses, divided into 4-Octets and normally represented in a decimal format.  An example of IPv4 address is 192.168.100.10.  IPv6 addresses are so much larger than IPv4 addresses and impractical to clearly represent in decimals.  IPv6 addresses are usually represented in hexadecimal numbers, separated by a colon.  An example of an IPv6 address is 2001:0DB8:0000:0002:0022:2217:FF3B:118C.  Private IPv6 addresses are specified in RFC 4193</p>]]></paragraph>
<paragraph
    title="10.8.22."


><![CDATA[<p>Private addressing is a means of distinguishing networks, assisting in separation and segregation.</p>]]></paragraph>
</block>
<block title="Private use of reserved addresses"><paragraph
    title="10.8.23."


><![CDATA[<p>Some IP addresses have been reserved in IETF standards.  Despite official warnings, some organisations use parts of the reserved IP address space for their internal networks where address space is exhausted or poorly designed.  This creates conflicts with devices and signalling traffic protocols which can create network faults, anomalies and network outages. This practice is strongly discouraged.</p>]]></paragraph>
</block>
<block title="Devices which have default IP addresses"><paragraph
    title="10.8.24."


><![CDATA[<p>Some devices are supplied with default IP addresses.  If using the IETF RFC 1918 addressing protocol (e.g. 10.0.x.x) some devices may have been allocated the same (duplicate) IP address.</p>]]></paragraph>
<paragraph
    title="10.8.25."


><![CDATA[<p>It is important to change default addresses to new addresses that conform with the addressing scheme selected for the agency.</p>]]></paragraph>
</block>
<block title="DHCP"><paragraph
    title="10.8.26."


><![CDATA[<p>In theory, there is only one network device that absolutely needs a true static address, the DHCP server.  In practice, it is preferable to assign address blocks to major groups of devices for control, fault isolation and security purposes.  Traditionally static devices are provided with a reserved address. These devices may include:</p><ul>
<li>DCHP Server;</li>
<li>Gateway devices;</li>
<li>Firewalls;</li>
<li>Routers; and</li>
<li>Switches.</li>
</ul>]]></paragraph>
<paragraph
    title="10.8.27."


><![CDATA[<p>The majority of other devices can be allocated a DHCP address.</p>]]></paragraph>
<paragraph
    title="10.8.28."


><![CDATA[<p>It is important to identify the essential device groups using a risk assessment, operational characteristics, level of security, system classification and other relevant architectural features, business requirements and operational constraints.</p>]]></paragraph>
</block>
<block title="Connector Types and Cable Colours"><paragraph
    title="10.8.29."


><![CDATA[<p>Cable management is discussed in detail earlier in this chapter. &nbsp;In particular note the discussion (<a href="http://nzism.gcsb.govt.nz/ism-document#Paragraph-13531">10.1.4</a>) of Red/Black concepts which includes separation of electrical and electronic circuits, devices, equipment cables, connectors and systems that transmit store or process national security information (Red) from non-national security information (Black)</p>]]></paragraph>
<paragraph
    title="10.8.30."


><![CDATA[<p>Wherever practical and possible, connectors for systems of different classifications should be distinct and be selected to avoid accidental cross-connection of systems of different classifications.  This can be achieved through the use of colour and keyed connectors where the colour and keying is different for each classification level or compartment (refer also to 10.1.30 and 10.6.6).</p>]]></paragraph>
</block>
<block title="Central Information Repository"><paragraph
    title="10.8.31."


><![CDATA[<p>Creating a central repository of all the information on networks, IP addresses and devices, is critical to maintaining control of the network.  The challenge with traditional tools is that there are often specific tools for each category of devices: one system to track virtual machines, one system to track wireless users, one system to track Windows servers, one system to track Linux machines, etc.</p>]]></paragraph>
<paragraph
    title="10.8.32."


><![CDATA[<p>A single repository where all the data relevant to networks, hosts, servers, dynamic clients, and virtual environments can be tracked and synchronised is essential for larger networks.  The ability to search across all this information will enable network teams to quickly track changing network landscapes and rapidly troubleshoot issues as they arise. In addition, business data related to a network resource helps bind together the logical network construct and the reality of IT resources.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="10.8.33."


><![CDATA[<p>Further references can be found at:</p>
<table class="table-main">
<tbody>
<tr>
<td><strong>Reference&nbsp;</strong></td>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td><strong>Network Segmentation and Segregation</strong></td>
<td style="text-align: center;">ASD</td>
<td><a rel="noopener noreferrer" href="https://www.cyber.gov.au/acsc/view-all-content/publications/implementing-network-segmentation-and-segregation" target="_blank">Implementing Network Segmentation and Segregation | Cyber.gov.au</a></td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td><strong>Cisco on Cisco Best Practices – Cisco IP Addressing Policy</strong></td>
<td style="text-align: center;">Cisco</td>
<td><a rel="noopener noreferrer" href="https://www.cisco.com/c/dam/en_us/about/ciscoitatwork/downloads/ciscoitatwork/pdf/Cisco_IT_IP_Addressing_Best_Practices.pdf" target="_blank">Cisco IT IP Addressing Best Practices</a></td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td><strong>IP Addressing and Subnetting for New Users, Document ID: 13788</strong></td>
<td style="text-align: center;">Cisco</td>
<td><a rel="noopener noreferrer" href="https://www.cisco.com/c/en/us/support/docs/ip/routing-information-protocol-rip/13788-3.pdf" target="_blank">Configure IP Addresses and Unique Subnets for New Users (cisco.com)</a></td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td><strong>IP Addressing: IPv4 Addressing Configuration Guide, Cisco IOS Release 15S</strong></td>
<td style="text-align: center;">Cisco</td>
<td><a href="https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipaddr_ipv4/configuration/15-s/ipv4-15-s-book.html"></a><a rel="noopener noreferrer" href="https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipaddr_ipv4/configuration/15-s/ipv4-15-s-book.html" target="_blank">IP Addressing: IPv4 Addressing Configuration Guide, Cisco IOS Release 15S - Cisco</a></td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td><strong>Introduction to Server and Domain Isolation</strong></td>
<td style="text-align: center;">Microsoft</td>
<td><a rel="noopener noreferrer" href="https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc725770(v=ws.10)?redirectedfrom=MSDN" target="_blank">Introduction to Server and Domain Isolation | Microsoft Learn</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 27001:2013&nbsp;</strong></td>
<td><strong>Information technology -- Security techniques -- Information security management systems -- Requirements</strong></td>
<td style="text-align: center;">ISO</td>
<td><a title="ISO/IEC 27001:2013" rel="noopener noreferrer" href="https://www.iso.org/standard/54534.html" target="_blank">https://www.iso.org/standard/54534.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 27002:2022</strong></td>
<td>
<p class="no-uppercase"><strong>Information security, cybersecurity and privacy protection — Information security controls</strong></p>
</td>
<td style="text-align: center;">ISO</td>
<td><a title="ISO/IEC 27002:2022" rel="noopener noreferrer" href="https://www.iso.org/standard/75652.html" target="_blank">https://www.iso.org/standard/75652.html</a></td>
</tr>
<tr>
<td><strong>RFC 1518</strong></td>
<td><strong>An Architecture for IP Address Allocation with CIDR</strong></td>
<td style="text-align: center;">IETF</td>
<td><a title="An Architecture for IP Address Allocation with CIDR" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc1518" target="_blank">https://datatracker.ietf.org/doc/html/rfc1518</a></td>
</tr>
<tr>
<td><strong>RFC 1918</strong></td>
<td><strong>Address Allocation for Private Internets</strong></td>
<td style="text-align: center;">IETF</td>
<td><a title="Address Allocation for Private Internets" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc1918" target="_blank">https://datatracker.ietf.org/doc/html/rfc1918</a></td>
</tr>
<tr>
<td><strong>RFC 2036</strong></td>
<td><strong>Observations on the use of Components of the Class A Address Space within the Internet</strong></td>
<td style="text-align: center;">IETF</td>
<td><a title="Observations on the use of Components of the Class A Address Space within the Internet" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc2036" target="_blank">https://datatracker.ietf.org/doc/html/rfc2036</a></td>
</tr>
<tr>
<td><strong>RFC 2050</strong></td>
<td><strong>Internet Registry IP Allocation Guidelines</strong></td>
<td style="text-align: center;">IETF</td>
<td><a title="rfc 2050" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc2050" target="_blank">https://datatracker.ietf.org/doc/html/rfc2050</a></td>
</tr>
<tr>
<td><strong>RFC 2101</strong></td>
<td><strong>IPv4 Address Behaviour Today</strong></td>
<td style="text-align: center;">IETF</td>
<td><a title="rfc 2101" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc2101" target="_blank">https://datatracker.ietf.org/doc/html/rfc2101</a></td>
</tr>
<tr>
<td><strong>RFC 2401</strong></td>
<td><strong>Security Architecture for the Internet Protocol</strong></td>
<td style="text-align: center;">IETF</td>
<td><a title="rfc 2401" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc2401" target="_blank">https://datatracker.ietf.org/doc/html/rfc2401</a></td>
</tr>
<tr>
<td><strong>RFC 2663</strong></td>
<td><strong>IP Network Address Translator (NAT) Terminology and Considerations</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc2663" target="_blank">https://datatracker.ietf.org/doc/html/rfc2663</a></td>
</tr>
<tr>
<td><strong>RFC 2894</strong></td>
<td><strong>Router Renumbering for IPv6</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc2894" target="_blank">https://datatracker.ietf.org/doc/html/rfc2894</a></td>
</tr>
<tr>
<td><strong>RFC 3022</strong></td>
<td><strong>Traditional IP Network Address Translator (Traditional NAT)</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc3022" target="_blank">https://datatracker.ietf.org/doc/html/rfc3022</a></td>
</tr>
<tr>
<td><strong>RFC 3053</strong></td>
<td><strong>IPv6 Tunnel Broker</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc3053" target="_blank">https://datatracker.ietf.org/doc/html/rfc3053</a></td>
</tr>
<tr>
<td><strong>RFC 3056</strong></td>
<td><strong>Connection of IPv6 Domains via IPv4 Clouds</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc3056" target="_blank">https://datatracker.ietf.org/doc/html/rfc3056</a></td>
</tr>
<tr>
<td><strong>RFC 3232</strong></td>
<td><strong>Assigned Numbers</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc3232" target="_blank">https://datatracker.ietf.org/doc/html/rfc3232</a></td>
</tr>
<tr>
<td><strong>RFC 3260</strong></td>
<td><strong>New Terminology and Clarifications for Diffserv</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc3260" target="_blank">https://datatracker.ietf.org/doc/html/rfc3260</a></td>
</tr>
<tr>
<td><strong>RFC 3330&nbsp;</strong></td>
<td><strong>Special-Use IPv4 Addresses" (superseded)</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc3330" target="_blank">https://datatracker.ietf.org/doc/html/rfc3330</a></td>
</tr>
<tr>
<td><strong>RFC 3879&nbsp;</strong></td>
<td><strong>Deprecating Site Local Addresses&nbsp;</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc3879" target="_blank">https://datatracker.ietf.org/doc/html/rfc3879</a></td>
</tr>
<tr>
<td><strong>RFC 3927</strong></td>
<td><strong>Dynamic Configuration of IPv4 Link-Local Addresses</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc3927" target="_blank">https://datatracker.ietf.org/doc/html/rfc3927</a></td>
</tr>
<tr>
<td><strong>RFC 3956</strong></td>
<td><strong>Embedding the Rendezvous Point (RP) Address in an IPv6 Multicast Address</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc3956" target="_blank">https://datatracker.ietf.org/doc/html/rfc3956</a></td>
</tr>
<tr>
<td><strong>RFC 4193</strong></td>
<td><strong>Unique Local IPv6 Unicast Addresses&nbsp;</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc4193" target="_blank">https://datatracker.ietf.org/doc/html/rfc4193</a></td>
</tr>
<tr>
<td><strong>RFC 4632</strong></td>
<td><strong>Classless Inter-domain Routing (CIDR): The Internet Address Assignment and Aggregation Plan&nbsp;</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc4632" target="_blank">https://datatracker.ietf.org/doc/html/rfc4632</a></td>
</tr>
<tr>
<td><strong>RFC 5214&nbsp;</strong></td>
<td><strong>Intra-Site Automatic Tunnel Addressing Protocol (ISATAP)&nbsp;</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc5214" target="_blank">https://datatracker.ietf.org/doc/html/rfc5214</a></td>
</tr>
<tr>
<td><strong>RFC 5737&nbsp;</strong></td>
<td><strong>IPv4 Address Blocks Reserved for Documentation&nbsp;</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc5737" target="_blank">https://datatracker.ietf.org/doc/html/rfc5737</a></td>
</tr>
<tr>
<td><strong>RFC 6040</strong></td>
<td><strong>Tunnelling of Explicit Congestion Notification&nbsp;</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc6040" target="_blank">https://datatracker.ietf.org/doc/html/rfc6040</a></td>
</tr>
<tr>
<td><strong>RFC 6052</strong></td>
<td><strong>IPv6 Addressing of IPv4/IPv6 Translators&nbsp;</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc6052" target="_blank">https://datatracker.ietf.org/doc/html/rfc6052</a></td>
</tr>
<tr>
<td><strong>RFC 6081&nbsp;</strong></td>
<td><strong>Teredo Extensions&nbsp;</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc6081" target="_blank">https://datatracker.ietf.org/doc/html/rfc6081</a></td>
</tr>
<tr>
<td><strong>RFC 6434&nbsp;</strong></td>
<td><strong>IPv6 Node Requirements</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc6434" target="_blank">https://datatracker.ietf.org/doc/html/rfc6434</a></td>
</tr>
<tr>
<td><strong>RFC 6598&nbsp;</strong></td>
<td><strong>Reserved IPv4 Prefix for Shared Address Space</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc6598" target="_blank">https://datatracker.ietf.org/doc/html/rfc6598</a></td>
</tr>
<tr>
<td><strong>RFC 6761&nbsp;</strong></td>
<td><strong>Special-Use Domain Names</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc6761" target="_blank">https://datatracker.ietf.org/doc/html/rfc6761</a></td>
</tr>
<tr>
<td><strong>RFC 6890&nbsp;</strong></td>
<td><strong>Special-Purpose IP Address Registries&nbsp;</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc6890" target="_blank">https://datatracker.ietf.org/doc/html/rfc6890</a></td>
</tr>
<tr>
<td><strong>RFC 7371</strong></td>
<td><strong>Updates to the IPv6 Multicast Addressing Architecture&nbsp;</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc7371" target="_blank">https://datatracker.ietf.org/doc/html/rfc7371</a></td>
</tr>
<tr>
<td><strong>RFC 7619&nbsp;</strong></td>
<td><strong>The NULL Authentication Method<br class="kix-line-break">in the Internet Key Exchange Protocol Version 2 (IKEv2)&nbsp;</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc7619" target="_blank">https://datatracker.ietf.org/doc/html/rfc7619</a></td>
</tr>
<tr>
<td><strong>RFC 8012&nbsp;</strong></td>
<td><strong>Label Switched Path (LSP) and Pseudowire (PW) Ping/Trace over MPLS Networks Using Entropy Labels (ELs)</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc8012" target="_blank">https://datatracker.ietf.org/doc/html/rfc8012</a></td>
</tr>
<tr>
<td><strong>RFC 8190</strong></td>
<td><strong>Updates to the Special-Purpose IP Address Registries&nbsp;</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc8190" target="_blank">https://datatracker.ietf.org/doc/html/rfc8190</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Risk Assessment"><paragraph
    title="10.8.34.R.01."

    tags="Infrastructure,Technical,Risk Assessment,Network Infrastructure"


><![CDATA[<p>A risk assessment is a fundamental tool in the architecture and design of a network. </p>]]></paragraph>
<paragraph
    title="10.8.34.C.01."

    tags="Infrastructure,Technical,Risk Assessment,Network Infrastructure"


    classification="All Classifications"
    compliance="Must"
    cid="5815"
><![CDATA[<p>Agencies MUST conduct and document a risk assessment before creating an architecture, and designing an agency network.</p>]]></paragraph>
<paragraph
    title="10.8.34.C.02."

    tags="Infrastructure,Technical,Risk Assessment,Network Infrastructure"


    classification="All Classifications"
    compliance="Must"
    cid="5816"
><![CDATA[<p>The principles of separation and segregation as well as the system classification MUST be incorporated into the risk assessment.</p>]]></paragraph>
</block>
<block title="Security Architecture"><paragraph
    title="10.8.35.R.01."

    tags="Infrastructure,Network Security,Technical,Network Infrastructure"


><![CDATA[<p>It is important that the principles of separation and segregation as well as the system classification are incorporated into the overall security architecture to maximise design and operational efficiency and to provide and support essential security to the network design.</p>]]></paragraph>
<paragraph
    title="10.8.35.C.01."

    tags="Infrastructure,Network Security,Technical,Network Infrastructure"


    classification="All Classifications"
    compliance="Must"
    cid="5820"
><![CDATA[<p>Security architectures MUST apply the principles of separation and segregation.</p>]]></paragraph>
</block>
<block title="Identification of major classifications/categories of network segments"><paragraph
    title="10.8.36.R.01."

    tags="Infrastructure,Technical,Network Infrastructure"


><![CDATA[<p>Identified in the risk assessment, it is essential that the classification of systems is clearly identified and is apparent in all architecture and design elements and systems documentation.</p>]]></paragraph>
<paragraph
    title="10.8.36.R.02."

    tags="Infrastructure,Technical,Network Infrastructure"


><![CDATA[<p>Clear distinction of networks of different classifications is reinforced through the use of different IP addressing schemes as well as the application of Red/Black, separation and segregation concepts and principles.&nbsp; Refer also to <a title="Cable Management Fundamentals" href="http://nzism.gcsb.govt.nz/ism-document#Section-13522">section 10.1 - Cable Management fundamentals</a>.</p>]]></paragraph>
<paragraph
    title="10.8.36.C.01."

    tags="Infrastructure,Technical,Network Infrastructure"


    classification="All Classifications"
    compliance="Must"
    cid="5825"
><![CDATA[<p>The classification and other restrictions on the security and control of information MUST be clearly identified for each part of the Agency network.</p>]]></paragraph>
</block>
<block title="Visibility"><paragraph
    title="10.8.37.R.01."

    tags="Infrastructure,Technical,Network Infrastructure"


><![CDATA[<p>Clear identification and visibility of the classifications or category of a network segment is essential in minimising accidental cross-connections, incident management and in limiting the propagation of errors form one segment to others.  This also assists in network maintenance and management.</p>]]></paragraph>
<paragraph
    title="10.8.37.R.02."

    tags="Infrastructure,Technical,Network Infrastructure"


><![CDATA[<p>Clear visual identification is supported by the use of IP addressing and cable colour schemes as well as the use of different types of cable connectors for different network segments.</p>]]></paragraph>
<paragraph
    title="10.8.37.C.01."

    tags="Infrastructure,Technical,Network Infrastructure"


    classification="All Classifications"
    compliance="Must"
    cid="5843"
><![CDATA[<p>Systems of different classifications MUST be visually distinct.</p>]]></paragraph>
</block>
<block title="Information Repository"><paragraph
    title="10.8.38.R.01."

    tags="Infrastructure,Technical,Network Infrastructure"


><![CDATA[<p>Clear documentation and records of changes to the architecture and construct of a network are essential in change management, planning, design of network modifications, incident management and maintenance of a strong security posture.</p>]]></paragraph>
<paragraph
    title="10.8.38.R.02."

    tags="Infrastructure,Technical,Network Infrastructure"


><![CDATA[<p>A single repository where all the data relevant to networks, hosts, servers, dynamic clients, and virtual environments can be tracked and synchronised is essential for larger networks.  The ability to search across all this information will enable network teams to quickly track changing network landscapes and rapidly troubleshoot issues as they arise.</p>]]></paragraph>
<paragraph
    title="10.8.38.R.03."

    tags="Infrastructure,Technical,Network Infrastructure"


><![CDATA[<p>The repository should also contain business data related to a network resource which helps manage necessary changes and upgrades to a network in a fashion that appropriately allocates IT resources and recognises business needs.</p>]]></paragraph>
<paragraph
    title="10.8.38.C.01."

    tags="Infrastructure,Technical,Network Infrastructure"


    classification="All Classifications"
    compliance="Should"
    cid="5831"
><![CDATA[<p>An information repository, containing essential network information, change records and business requirements SHOULD be established and maintained.</p>]]></paragraph>
</block>
</subsection>
</section>
