{"id":1802,"date":"2017-01-11T22:03:47","date_gmt":"2017-01-11T22:03:47","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=1802"},"modified":"2020-05-06T10:28:01","modified_gmt":"2020-05-06T17:28:01","slug":"methods-of-providing-ipv4-as-a-service-ipv4aas-part-2","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/methods-of-providing-ipv4-as-a-service-ipv4aas-part-2\/","title":{"rendered":"Methods of Providing IPv4 as a Service (IPv4aaS) (Part 2)"},"content":{"rendered":"<p>Methods of servicing legacy IPv4-only nodes with an IPv6-only core<\/p>\n<p>In the\u00a0<a href=\"\/ipv6-coe\/ipv4-as-a-service-ipv4aas-part-1\/\" target=\"_blank\" rel=\"noopener noreferrer\">first part of this 3-part blog series<\/a>, we discussed how IPv4 will soon become a legacy protocol.\u00a0 In a few years,\u00a0<a href=\"\/ipv6-coe\/ipv6-is-accelerating-as-ipv4-is-nearing-its-peak\/\" target=\"_blank\" rel=\"noopener noreferrer\">IPv6 Internet traffic volumes will surpass IPv4 Internet traffic volumes<\/a>.\u00a0 We also explored the motivation for service providers to build an IPv6-only core network yet still fulfill their obligations to connect customer IPv4-only devices to the Internet.\u00a0 We must remember that, even though we may be striving for a near-term dual-protocol transition strategy, the\u00a0<a href=\"\/ipv6-coe\/from-dual-stack-to-ipv6-only-what-tech-will-you-need\/\" target=\"_blank\" rel=\"noopener noreferrer\">long-term strategy is to run an IPv6-only environment<\/a>.\u00a0 This article is going to continue by exploring how this will be accomplished while also peering into what is going on behind the scenes (from the subscriber\u2019s perspective) in the service provider network.<\/p>\n<h2 id=\"toc-hId-649940895\">Providing IPv4 as a Service<\/h2>\n<p>These\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/IPv6_transition_mechanism\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">transition mechanisms<\/a>\u00a0for providing IPv4 as a Service (IPv4aaS) require some changes to the service provider\u2019s network architecture.\u00a0 This can include some form of\u00a0<a href=\"http:\/\/www.networkworld.com\/article\/2237054\/cisco-subnet\/understanding-carrier-grade-nat.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Carrier Grade NAT<\/a>\u00a0(CGN) or\u00a0<a href=\"http:\/\/www.networkworld.com\/article\/2231905\/cisco-subnet\/large-scale-nat-architectures.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Large Scale NAT<\/a>\u00a0(LSN)\u00a0<a href=\"https:\/\/tools.ietf.org\/html\/rfc3022\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">NAT44<\/a>\u00a0function at their Internet edge due to the\u00a0<a href=\"\/ipv6-coe\/north-americas-ipv4-address-shortage\/\" target=\"_blank\" rel=\"noopener noreferrer\">shortage of public IPv4 addresses<\/a>.\u00a0 The service provider is allowed to use the shared IPv4 prefix 100.64.0.0\/10 (<a href=\"https:\/\/tools.ietf.org\/html\/rfc6598\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RFC 6598<\/a>) for these transition purposes.\u00a0 Most of these IPv4aaS techniques require some form of encapsulation and tunneling of the subscriber\u2019s legacy IPv4 packets across the service provider\u2019s IPv6-only core network.\u00a0 These techniques must also consider how to perform\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Lawful_interception\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Lawful Interception<\/a>\u00a0(LI) and session logging for local and national Law Enforcement Agencies (LEAs).<\/p>\n<p>Some of these techniques require some changes to the software running on the device at the customer\/subscriber edge.\u00a0 This could involve changes to the\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/DSL_modem\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">DSL Modem<\/a>\u00a0or the\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/DOCSIS\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">DOCSIS<\/a>\u00a03.1 cable modems and\u00a0<a class=\" bf_ungated_init\" href=\"https:\/\/www.cablelabs.com\/wp-content\/uploads\/specdocs\/CM-SP-eRouter-I10-130808.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">eRouters<\/a>.\u00a0 However, today, most consumer home routers support IPv6 (<a href=\"https:\/\/tools.ietf.org\/html\/rfc7084\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RFC 7084<\/a>), particularly if they are the higher-end routers that\u00a0<a href=\"\/ipv6-coe\/could-wireless-802-11ac-be-propelling-ipv6-adoption\/\" target=\"_blank\" rel=\"noopener noreferrer\">have 802.11ac wireless<\/a>.\u00a0 Getting your\u00a0<a href=\"\/ipv6-coe\/home-networking-with-ipv6\/\" target=\"_blank\" rel=\"noopener noreferrer\">home network connected with IPv6<\/a>\u00a0isn\u2019t as difficult as you might expect, but you would want to make sure that your legacy IPv4-only systems remain operational in the near-term.<\/p>\n<p>There are also ISPs who are actively planning on establishing an IPv4aaS offering.\u00a0 Brian Field Ph.D., with Comcast gave a great presentation at last year\u2019s\u00a0<a class=\" bf_ungated_init\" href=\"https:\/\/www.nanog.org\/sites\/default\/files\/meetings\/NANOG64\/1031\/20150603_Field_Motivation_Analysis_And_v1.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">NANOG64<\/a>\u00a0on the \u201c<a href=\"https:\/\/www.youtube.com\/watch?v=s0Dj6gXOSnQ\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Motivation, Analysis, and Architecture for IPv4aaS<\/a>\u201d describing this concept from their perspective.\u00a0 He has also written a paper on the topic of \u201c<a href=\"http:\/\/www.nctatechnicalpapers.com\/Paper\/2015\/2015-approaches-for-ipv4-as-a-service\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Approaches for IPv4 as a Service (2015)<\/a>\u201d.\u00a0 John Jason Brzozowski, Fellow and Chief Architect, IPv6 for Comcast Cable has\u00a0<a class=\" bf_ungated_init\" href=\"http:\/\/pirl.tech\/pdf\/John_Brzozowski_comcast.cisco_symposium_2016_brief.v1.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">published a presentation about their IPv6-only plans<\/a>\u00a0and given a\u00a0<a class=\" bf_ungated_init\" href=\"https:\/\/ripe72.ripe.net\/wp-content\/uploads\/presentations\/63-comcast.ripe_72_plenary.v4.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">presentation at RIPE72<\/a>.\u00a0 Comcast\u2019s plans include taking\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Software-defined_networking\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Software-Defined Networking<\/a>\u00a0(SDN) techniques like Fast Data Input Output (<a href=\"https:\/\/fd.io\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">fd.io<\/a>) and their\u00a0<a href=\"https:\/\/fd.io\/technology#one\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Vector Packet Processor<\/a>\u00a0(VPP) combined with\u00a0<a href=\"http:\/\/blogs.cisco.com\/sp\/bringing-segment-routing-and-ipv6-together\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Segment Routing<\/a>\u00a0over an IPv6 core.<\/p>\n<p>The protocol architects at the IETF have been considering this IPv4aaS concept for many years now and have been working on establishing several different techniques for tunneling IPv4 across an IPv6-only ISP infrastructure.\u00a0 The IETF has established the \u201c<a href=\"https:\/\/datatracker.ietf.org\/wg\/softwire\/charter\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Softwires<\/a>\u201d (softwire) working group that is chartered with developing ways to seamlessly carry IPv4 over IPv6 core networks.\u00a0 What follows are descriptions of the various methods of accomplishing an IPv4 as a Service network.<\/p>\n<h2 id=\"toc-hId-678570046\">GRE over IPv6<\/h2>\n<p>Encapsulating one type of packet within another creates a tunnel-type experience for the inner packet.\u00a0 It is as if it went into an intergalactic wormhole and miraculously emerged in the next dimension over what seemed like a single hop, but in reality, the packet traversed many parsecs.<\/p>\n<p>In the early days of IPv6, it was envisioned that IPv6 packets would be encapsulated in IPv4 (<a href=\"https:\/\/tools.ietf.org\/html\/rfc4213\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RFC 4213<\/a>) on their way to their ultimate IPv6 destination.\u00a0 Early tunneling transition mechanisms like 6over4 (<a href=\"https:\/\/tools.ietf.org\/html\/rfc2529\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RFC 2529<\/a>), 6to4\u00a0<a href=\"https:\/\/tools.ietf.org\/html\/rfc3056\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">(RFC 3056<\/a>), Teredo (<a href=\"https:\/\/tools.ietf.org\/html\/rfc4380\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RFC 4380<\/a>), ISATAP (<a href=\"https:\/\/tools.ietf.org\/html\/rfc5214\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RFC 5214<\/a>), and 6rd (<a href=\"https:\/\/tools.ietf.org\/html\/rfc5969\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RFC 5969<\/a>) were developed.\u00a0 It has also been possible to use Generic Packet Tunneling in the IPv6 Specification (<a href=\"https:\/\/tools.ietf.org\/html\/rfc2473\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RFC 2473<\/a>) to carry IPv6 packets within IPv4.\u00a0 This was a method that was created before\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Generic_Routing_Encapsulation\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Generic Routing Encapsulation<\/a>\u00a0(GRE) and was officially standardized in\u00a0<a href=\"https:\/\/tools.ietf.org\/html\/rfc2784\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RFC 2784<\/a>.\u00a0 The original\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/6bone\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">6bone<\/a>\u00a0IPv6 testbed used this technique to tie together early IPv6 researchers.\u00a0 Ironically, the\u00a0<a href=\"http:\/\/www.iana.org\/assignments\/protocol-numbers\/protocol-numbers.xhtml\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">IANA assigned IP protocol number<\/a>\u00a0for encapsulating IPv6 packets in IPv4 packets is 41, which precedes the protocol number for encapsulating IPv4 packets in IPv4 with GRE, IP protocol 47.<\/p>\n<p>Now we have full \u201cIPv6 Support for Generic Routing Encapsulation\u201d (GRE) (<a href=\"https:\/\/tools.ietf.org\/html\/rfc7676\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RFC 7676<\/a>) and an ISP would be able to use this technique to create an IPv4aaS offering.\u00a0 This is a simple technique that just reverses the original IPv6 transition mechanism: i.e., instead of joining islands of IPv6 across an ocean of IPv4 by putting the IPv6 packets in an IPv4 boat, we inverse the method.\u00a0 Now we are talking about joining solar systems of IPv4 across a galaxy of IPv6 by thrusting the IPv4 packets into the IPv6 \u00a0wormhole for their voyage across the intergalactic Internet.\u00a0 GRE could be used within the subscriber\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Customer-premises_equipment\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CPE<\/a>\u00a0device and encapsulate all IPv4 packets within IPv6 packets, traverse those GRE packets across the service provider\u2019s core, and then use a GRE tunnel termination system to decapsulate the IPv4 packets and send them to the Internet.\u00a0 This function could optionally be combined with a CGN\/LSN NAT function.<\/p>\n<h2 id=\"toc-hId-707199197\">Dual-Stack Lite (DS-Lite)<\/h2>\n<p>One of the first techniques conceived to transport IPv4 across an IPv6-only core is\u00a0<a href=\"http:\/\/www.networkworld.com\/article\/2232181\/cisco-subnet\/understanding-dual-stack-lite.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Dual-Stack Lite<\/a>\u00a0(DS-Lite).\u00a0 DS-Lite was defined by\u00a0<a href=\"https:\/\/tools.ietf.org\/html\/rfc6333\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RFC 6333<\/a>\u00a0as a method of leveraging IPv6 for the service provider core as IPv4 address exhaustion occurred.\u00a0 The way that DS-Lite works is the subscriber CPE will have a Basic Bridging BroadBand (B4) element that encapsulates IPv4 packets within IPv6 packets.\u00a0 IPv6 packets from the subscriber are handled natively across the ISP\u2019s IPv6-only core.\u00a0 These encapsulated connections are handled with the per-session state maintained per subscriber to a central CGN gateway called the Address Family Transition Router (AFTR).\u00a0 Get it?\u00a0 B4 (before) and AFTR (after).<\/p>\n<p>The AFTR terminates the 4in6 tunnels from the B4 elements and performs the CGN\/LSN translation.\u00a0 To be able to scale to many subscribers, the AFTR requires significant compute and throughput resources.\u00a0 The B4 elements use a\u00a0<a href=\"https:\/\/tools.ietf.org\/html\/rfc3315\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">DHCPv6<\/a>\u00a0Option for Dual-Stack Lite (<a href=\"https:\/\/tools.ietf.org\/html\/rfc6334\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RFC 6334<\/a>) to help the B4 element learn its global IPv6 address.\u00a0 The IETF has documented \u201cDeployment Considerations for Dual-Stack Lite\u201d (<a href=\"https:\/\/tools.ietf.org\/html\/rfc6908\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RFC 6908<\/a>) and there are \u201cRADIUS Extensions for Dual-Stack Lite\u201d (<a href=\"https:\/\/tools.ietf.org\/html\/rfc6519\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RFC 6519<\/a>).<\/p>\n<p>One advantage with DS-Lite is that subscribers can have overlapping IPv4 address space.\u00a0\u00a0<a href=\"http:\/\/www.iana.org\/assignments\/iana-ipv4-special-registry\/iana-ipv4-special-registry.xhtml\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">IANA<\/a>\u00a0has set aside the IPv4 address block 192.0.0.0\/29 and documented it as the \u201cIPv4 Service Continuity Prefix\u201d (<a href=\"https:\/\/tools.ietf.org\/html\/rfc7335\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RFC 7335<\/a>) for this exact purpose.\u00a0 The overlapping IPv4 subnets are separated statefully by the fact that they are wrapped in globally-unique IPv6 addresses.\u00a0 However, the down side to DS-Lite is that it requires changes to the subscriber CPE.\u00a0 If an ISP is going to go through all the trouble and cost to replace CPE, they could just as easily replace it with dual-protocol CPE to help speed up IPv6 adoption.<\/p>\n<h2 id=\"toc-hId-735828348\">Lightweight 4over6<\/h2>\n<p>The IETF is continuing to develop new IPv4 as a Service standards.\u00a0 The IETF has finalized an RFC for \u201cLightweight 4over6: An Extension to the Dual-Stack Lite Architecture\u201d (<a href=\"https:\/\/tools.ietf.org\/html\/rfc7596\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RFC 7596<\/a>).\u00a0 As the name implies, it is a modification of DS-Lite whereby the NAT function occurs on the B4 element instead of on the AFTR element.\u00a0 This adjustment to the DS-Lite architecture alleviates the NAT44\/NAPT per-client state maintenance from the AFTR element. \u00a0Additionally, there is no centralized stateful CGN\/LSN function performed.\u00a0 Moving the NAT function to the B4 CPE element decouples the binding between the IPv4 and IPv6 addresses.\u00a0 This Lw4o6 method still maintains per-subscriber state for the provisioning of the IPv6 tunnels carrying the subscriber\u2019s legacy IPv4 packets inside.\u00a0 With the Lw4o6 method, the central system is referred to the lwAFTR and the CPE element is referred to as the lwB4.<\/p>\n<p>The Lw4o6 method can leverage \u201cDHCPv4-over-DHCPv6 (DHCP 4o6) Transport\u201d (<a href=\"https:\/\/tools.ietf.org\/html\/rfc7341\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RFC 7341<\/a>) or the alternative \u201cDynamic Allocation of Shared IPv4 Addresses\u201d (<a href=\"https:\/\/tools.ietf.org\/html\/rfc7618\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RFC 7618<\/a>) to facilitate providing the shared IPv4 address to the lwB4 element using an IPv6 core infrastructure.\u00a0 Early Lw4o6 research results were published at\u00a0<a href=\"http:\/\/www.internetsociety.org\/articles\/lightweight-4over6-efforts-debuted-ietf-85-ipv4-service-continuity-solution-smooth-ipv6\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">IETF 85 in 2012<\/a>\u00a0and the IETF is continuing its work on this method by documenting \u201c<a href=\"https:\/\/tools.ietf.org\/html\/draft-sun-softwire-lightweight-4over6-deployment-04\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Deployment Considerations for Lightweight 4over6<\/a>\u201d.<\/p>\n<h2 id=\"toc-hId-764457499\">Public 4over6<\/h2>\n<p>The IETF has also published an RFC titled \u201cPublic IPv4-over-IPv6 Access Network\u201d (<a href=\"https:\/\/tools.ietf.org\/html\/rfc7040\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RFC 7040<\/a>).\u00a0 This is an informational RFC related to work done at the China Next Generation Internet (CNGI) and China Education and Research Network 2 (CERNET2).\u00a0 This RFC emphasizes that this is a specific implementation of IPv4 over IPv6, but any new deployment of an IPv4aaS should use Lightweight 4over6 instead.<\/p>\n<p>In this Public 4over6 method, the CPE is referred to as a 4over6 CE and the central tunnel concentrator is referred to as a 4over6 BR.\u00a0 This method uses public IPv4 addresses for the subscriber and completely avoids any NAT function.\u00a0 Therefore, there is no IPv4 address sharing but the tunnel concentrator still maintains per-subscriber binding state of the subscriber\u2019s public IPv4 and global IPv6 addresses.<\/p>\n<h2 id=\"toc-hId-793086650\">Part 3<\/h2>\n<p>In the\u00a0<a href=\"\/ipv6-coe\/even-more-methods-of-providing-ipv4-as-a-service-ipv4aas-part-3\/\" target=\"_blank\" rel=\"noopener noreferrer\">next and final part of this three-part blog series<\/a>\u00a0we will continue to look at additional protocols and methods that service providers are using to establish an IPv4 as a Service.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Methods of servicing legacy IPv4-only nodes with an IPv6-only core In the\u00a0first part of this 3-part blog series, we discussed how IPv4 will soon become a legacy protocol.\u00a0 In a few years,\u00a0IPv6 Internet traffic volumes will surpass IPv4 Internet traffic volumes.\u00a0 We also explored the motivation for service providers to build an IPv6-only core network [&hellip;]<\/p>\n","protected":false},"author":321,"featured_media":1803,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[17],"tags":[16,56,38,31,39],"class_list":{"0":"post-1802","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ipv6-coe","8":"tag-infoblox","9":"tag-ipv4","10":"tag-ipv6","11":"tag-networking","12":"tag-protocols","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Methods of Providing IPv4 as a Service (IPv4aaS) (Part 2)<\/title>\n<meta name=\"description\" content=\"Methods of servicing legacy IPv4-only nodes with an IPv6-only core\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/methods-of-providing-ipv4-as-a-service-ipv4aas-part-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Methods of Providing IPv4 as a Service (IPv4aaS) (Part 2)\" \/>\n<meta property=\"og:description\" content=\"Methods of servicing legacy IPv4-only nodes with an IPv6-only core\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/methods-of-providing-ipv4-as-a-service-ipv4aas-part-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-01-11T22:03:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:28:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/142079357-660x454-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Scott Hogg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Scott Hogg\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/methods-of-providing-ipv4-as-a-service-ipv4aas-part-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/methods-of-providing-ipv4-as-a-service-ipv4aas-part-2\\\/\"},\"author\":{\"name\":\"Scott Hogg\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/ee71ac61fe2ea349f6e991e628d22f4c\"},\"headline\":\"Methods of Providing IPv4 as a Service (IPv4aaS) (Part 2)\",\"datePublished\":\"2017-01-11T22:03:47+00:00\",\"dateModified\":\"2020-05-06T17:28:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/methods-of-providing-ipv4-as-a-service-ipv4aas-part-2\\\/\"},\"wordCount\":1538,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/methods-of-providing-ipv4-as-a-service-ipv4aas-part-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/142079357-660x454-1.jpg\",\"keywords\":[\"Infoblox\",\"IPv4\",\"IPv6\",\"Networking\",\"Protocols\"],\"articleSection\":[\"IPv6 CoE\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/methods-of-providing-ipv4-as-a-service-ipv4aas-part-2\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/methods-of-providing-ipv4-as-a-service-ipv4aas-part-2\\\/\",\"name\":\"Methods of Providing IPv4 as a Service (IPv4aaS) (Part 2)\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/methods-of-providing-ipv4-as-a-service-ipv4aas-part-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/methods-of-providing-ipv4-as-a-service-ipv4aas-part-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/142079357-660x454-1.jpg\",\"datePublished\":\"2017-01-11T22:03:47+00:00\",\"dateModified\":\"2020-05-06T17:28:01+00:00\",\"description\":\"Methods of servicing legacy IPv4-only nodes with an IPv6-only core\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/methods-of-providing-ipv4-as-a-service-ipv4aas-part-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/methods-of-providing-ipv4-as-a-service-ipv4aas-part-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/methods-of-providing-ipv4-as-a-service-ipv4aas-part-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/142079357-660x454-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/142079357-660x454-1.jpg\",\"width\":660,\"height\":454},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/methods-of-providing-ipv4-as-a-service-ipv4aas-part-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IPv6 CoE\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/ipv6-coe\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Methods of Providing IPv4 as a Service (IPv4aaS) (Part 2)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/ee71ac61fe2ea349f6e991e628d22f4c\",\"name\":\"Scott Hogg\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_321_1574118215-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_321_1574118215-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_321_1574118215-96x96.jpg\",\"caption\":\"Scott Hogg\"},\"description\":\"Scott Hogg has 30 years of network and security experience and is president of Hogg Networking with. Scott Hogg specializes in teaching Internet Protocol version 6 (IPv6) and providing implementation guidance. Scott is CCIE #5133 (Emeritus) and CISSP #4610. Scott is Chair Emeritus of the Rocky Mountain IPv6 Task Force (RMv6TF), a member of the IPv6 Center of Excellence (COE), and co-author of the Cisco Press book on IPv6 Security.\",\"sameAs\":[\"https:\\\/\\\/hexabuild.io\"],\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/scott-hogg\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Methods of Providing IPv4 as a Service (IPv4aaS) (Part 2)","description":"Methods of servicing legacy IPv4-only nodes with an IPv6-only core","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/methods-of-providing-ipv4-as-a-service-ipv4aas-part-2\/","og_locale":"en_US","og_type":"article","og_title":"Methods of Providing IPv4 as a Service (IPv4aaS) (Part 2)","og_description":"Methods of servicing legacy IPv4-only nodes with an IPv6-only core","og_url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/methods-of-providing-ipv4-as-a-service-ipv4aas-part-2\/","og_site_name":"Infoblox Blog","article_published_time":"2017-01-11T22:03:47+00:00","article_modified_time":"2020-05-06T17:28:01+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/142079357-660x454-1.jpg","type":"image\/jpeg"}],"author":"Scott Hogg","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Scott Hogg","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/methods-of-providing-ipv4-as-a-service-ipv4aas-part-2\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/methods-of-providing-ipv4-as-a-service-ipv4aas-part-2\/"},"author":{"name":"Scott Hogg","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/ee71ac61fe2ea349f6e991e628d22f4c"},"headline":"Methods of Providing IPv4 as a Service (IPv4aaS) (Part 2)","datePublished":"2017-01-11T22:03:47+00:00","dateModified":"2020-05-06T17:28:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/methods-of-providing-ipv4-as-a-service-ipv4aas-part-2\/"},"wordCount":1538,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/methods-of-providing-ipv4-as-a-service-ipv4aas-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/142079357-660x454-1.jpg","keywords":["Infoblox","IPv4","IPv6","Networking","Protocols"],"articleSection":["IPv6 CoE"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/methods-of-providing-ipv4-as-a-service-ipv4aas-part-2\/","url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/methods-of-providing-ipv4-as-a-service-ipv4aas-part-2\/","name":"Methods of Providing IPv4 as a Service (IPv4aaS) (Part 2)","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/methods-of-providing-ipv4-as-a-service-ipv4aas-part-2\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/methods-of-providing-ipv4-as-a-service-ipv4aas-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/142079357-660x454-1.jpg","datePublished":"2017-01-11T22:03:47+00:00","dateModified":"2020-05-06T17:28:01+00:00","description":"Methods of servicing legacy IPv4-only nodes with an IPv6-only core","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/methods-of-providing-ipv4-as-a-service-ipv4aas-part-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/ipv6-coe\/methods-of-providing-ipv4-as-a-service-ipv4aas-part-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/methods-of-providing-ipv4-as-a-service-ipv4aas-part-2\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/142079357-660x454-1.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/142079357-660x454-1.jpg","width":660,"height":454},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/methods-of-providing-ipv4-as-a-service-ipv4aas-part-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"IPv6 CoE","item":"https:\/\/www.infoblox.com\/blog\/category\/ipv6-coe\/"},{"@type":"ListItem","position":3,"name":"Methods of Providing IPv4 as a Service (IPv4aaS) (Part 2)"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/ee71ac61fe2ea349f6e991e628d22f4c","name":"Scott Hogg","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_321_1574118215-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_321_1574118215-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_321_1574118215-96x96.jpg","caption":"Scott Hogg"},"description":"Scott Hogg has 30 years of network and security experience and is president of Hogg Networking with. Scott Hogg specializes in teaching Internet Protocol version 6 (IPv6) and providing implementation guidance. Scott is CCIE #5133 (Emeritus) and CISSP #4610. Scott is Chair Emeritus of the Rocky Mountain IPv6 Task Force (RMv6TF), a member of the IPv6 Center of Excellence (COE), and co-author of the Cisco Press book on IPv6 Security.","sameAs":["https:\/\/hexabuild.io"],"url":"https:\/\/www.infoblox.com\/blog\/author\/scott-hogg\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1802","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/321"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=1802"}],"version-history":[{"count":3,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1802\/revisions"}],"predecessor-version":[{"id":3688,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1802\/revisions\/3688"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/1803"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=1802"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=1802"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=1802"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}