Solved

Removing IPv6

Posted on 2006-11-21
4
344 Views
Last Modified: 2006-11-25
A previous network admin installed IPv6 on all servers and workstations on my network.  We're experiencing weird network issues and I'd like to remove IPv6.  What are the repercussions?  Is there an order I need to do this so that I don't kill network connectivity?

I see in Microsoft DNS that there is a Host (A) entry [with IPv4 ip address] and a IPv6 Host (AAAA) entry for every machine.

Can it be done incrementally?  I have a lot of machines and multiple locations, so this isn't going to be done quickly.  I can't kill connectivity while this change is in progress.
0
Comment
Question by:blotto99
  • 2
  • 2
4 Comments
 
LVL 32

Expert Comment

by:rsivanandan
ID: 17988754
If you're running on IPv4 completely now but just want to uninstall ipv6, it won't interfere with anything. Because being installed doesn't change anything if still ipv4 is in place.

Just write a batch script for 'ipv6 uninstall' and let it run as startup script for all computers.

Cheers,
Rajesh
0
 

Author Comment

by:blotto99
ID: 17989066
When you say running on IPv4 completely now, do you mean the routers and switches?
0
 

Author Comment

by:blotto99
ID: 17990251
Do you have any suggestions on how to script this?  Could it be done via a GPO?
0
 
LVL 32

Accepted Solution

by:
rsivanandan earned 500 total points
ID: 17993371
Routers/Switches/Desktops/Servers all of them.

Very simple, write down a batch script with this 2 entries;

ipv6 uninstall
shutdown /r

Cheers,
Rajesh
0

Featured Post

Easy, flexible multimedia distribution & control

Coming soon!  Ideal for large-scale A/V applications, ATEN's VM3200 Modular Matrix Switch is an all-in-one solution that simplifies video wall integration. Easily customize display layouts to see what you want, how you want it in 4k.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

FIPS stands for the Federal Information Processing Standardisation and FIPS 140-2 is a collection of standards that are generically associated with hardware and software cryptography. In most cases, people can refer to this as the method of encrypti…
This is the first one of a series of articles I’ll be writing to address technical issues that are always referred to as network problems. The network boundaries have changed, therefore having an understanding of how each piece in the network  puzzl…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

713 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question