{"id":2433,"date":"2017-10-11T22:27:35","date_gmt":"2017-10-11T22:27:35","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=2433"},"modified":"2025-06-11T11:56:50","modified_gmt":"2025-06-11T18:56:50","slug":"ipv6-enabled-access-networks-are-priority-for-enterprises","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-enabled-access-networks-are-priority-for-enterprises\/","title":{"rendered":"IPv6-Enabled Access Networks Are Priority for Enterprises"},"content":{"rendered":"<p>One of the\u00a0<a href=\"https:\/\/community.infoblox.com\/t5\/IPv6-CoE-Blog\/Common-IPv6-Newbie-Questions\/ba-p\/10337\" target=\"_blank\" rel=\"noopener noreferrer\">common questions<\/a>\u00a0that often gets askes shortly after some introductory\u00a0<a href=\"https:\/\/community.infoblox.com\/t5\/IPv6-CoE-Blog\/The-second-phase-of-your-IPv6-adoption-plan-Training\/ba-p\/3471\" target=\"_blank\" rel=\"noopener noreferrer\">IPv6 training<\/a>\u00a0is \u201cWhere do I start deploying?\u201d\u00a0 In the\u00a0<a href=\"https:\/\/community.infoblox.com\/t5\/IPv6-CoE-Blog\/Where-Are-You-On-The-IPv6-Adoption-Curve\/ba-p\/11116\" target=\"_blank\" rel=\"noopener noreferrer\">early years of IPv6\u2019s adoption<\/a>\u00a0there were debates about how IPv6 should be deployed in enterprise networks.\u00a0 Should organizations start to deploy IPv6 at the core and then work their way out to access networks or should they start at the edge and move toward the core.\u00a0 In those early days for IPv6, both of these methods considered using IPv6-in-IPv4 tunnels as a method to fill in the gaps where there was IPv4-only connectivity.\u00a0 As time went on, the\u00a0<a href=\"https:\/\/tools.ietf.org\/html\/rfc4213\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">dual-protocol approach<\/a>\u00a0became the recommended transition strategy and\u00a0<a href=\"https:\/\/www.networkworld.com\/article\/2285078\/tech-primers\/ipv6--dual-stack-where-you-can--tunnel-where-you-must.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">tunneling fell out of favor<\/a>.\u00a0 Now that IPv6 is more ubiquitous on the Internet, with virtually all end-user mobile device operating systems support dual-stack, and since more popular content is available over IPv6, the IPv6 deployment recommendation for internal enterprise networks is changing.<\/p>\n<h2 id=\"toc-hId--1333312043\">IPv6 Starts at the Internet Perimeter<\/h2>\n<p>For at least the past decade, the prevailing recommendation for enterprises is to\u00a0<a href=\"https:\/\/www.networkworld.com\/article\/2221687\/cisco-subnet\/internet-edge-ipv6-deployment.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">start to deploy IPv6 at the Internet perimeter<\/a>.\u00a0 The common wisdom to start your IPv6 deployment at your Internet edge makes total sense because that is the point in your network topology where upstream Internet connectivity exists.\u00a0 Therefore, it is a given that you must enable the Internet perimeter first and then proceed toward the core network of the enterprise.<\/p>\n<p>Before you can bring IPv6 in to your organization you first must establish upstream Internet connectivity.\u00a0 This involves contacting your upstream ISP and asking for them to enable IPv6 on your connection.\u00a0 The ISP will allocate some of their IPv6 address space for the link between you and them (probably a single \/64) and then configure either static or dynamic routing (probably BGP).\u00a0 Once you have IPv6 configured on your router and are advertising your assigned IPv6 prefix (probably assigned to you by your Regional Internet Registry (RIR)), you can then test your IPv6 Internet connectivity.\u00a0 This approach is\u00a0<a href=\"https:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/solutions\/Enterprise\/Borderless_Networks\/Internet_Edge\/InternetEdgeIPv6.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">recommended by Cisco<\/a>\u00a0and\u00a0<a href=\"https:\/\/www.linkedin.com\/in\/smcfarland\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Shannon McFarland<\/a>, Distinguished Consulting Engineer at Cisco, has been\u00a0<a class=\" bf_ungated_init\" href=\"http:\/\/www.rmv6tf.org\/wp-content\/uploads\/2012\/11\/mcfarland-rmv6tf-20121.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">extoling this method for many years<\/a>.\u00a0 This has also been the\u00a0<a href=\"https:\/\/www.networkworld.com\/article\/2219838\/ipv6\/white-house-issues-ipv6-directive.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">mandated strategy<\/a>\u00a0for U.S. Federal Government entities to have IPv6-enabled the Internet edge.\u00a0\u00a0<a href=\"https:\/\/usgv6-deploymon.antd.nist.gov\/cgi-bin\/generate-gov\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Many federal organizations have IPv6 at their Internet edge and on their web site<\/a>, but they have yet to fully deploy an IPv6-enabled core network.<\/p>\n<p>Once you have achieved this IPv6 internet edge configuration, the next step would be to enable IPv6 on your perimeter firewalls and security systems.\u00a0 After that, the next step is to deploy IPv6 into the core backbone.<\/p>\n<h2 id=\"toc-hId--445808362\">IPv6 Across the Core<\/h2>\n<p>During this phase of your IPv6 deployment you will need to deploy IPv6 across your core network.\u00a0 IPv6 must be enabled one layer-3 hop at a time as you bring it inward to your organization\u2019s core network.\u00a0 As this simple video illustrates, IPv6 moves across the backbone network without leaving any gaps in connectivity.\u00a0 The blue lines represent links that have IPv4 enabled on them.\u00a0 The red lines represent IPv6 enabled links that are configured in sequence one at a time.\u00a0 The IPv6 migration progresses one router and link at a time in a cohesive manner until it has been enabled across the entire core network.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2434\" src=\"\/wp-content\/uploads\/ipv6-enabled-access-network.gif\" alt=\"IPv6 enabled access network\" width=\"600\" height=\"332\" \/><\/p>\n<p>This process of adding IPv6 to the core network should be fairly easy because you are simply overlaying a new protocol on top of existing links and interfaces.\u00a0 The IPv6 addressing is straightforward and you will\u00a0<a href=\"https:\/\/tools.ietf.org\/html\/rfc4291\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">use a \/64<\/a>\u00a0for each of these links from your overall IPv6 address block.\u00a0 The IPv4 routing protocols you are intimately familiar with already support IPv6 and you can leverage your knowledge of these protocols to simply add IPv6 as a new address family.<\/p>\n<p>Once you are at this point you have a choice of what to do next: Should you configure IPv6 in the data center or on access networks first?<\/p>\n<h2 id=\"toc-hId-441695319\">Motivation for IPv6-Enabling Users<\/h2>\n<p>At this point, if your plan was to start by enabling IPv6 on the IPv4 systems in the data center, then those servers and services would only have dual-protocol Internet connectivity.\u00a0 Since the end-user networks would be IPv4-only at that point, then the end-users would continue to use IPv4 to connect to internal and external applications.\u00a0 Many of the applications and services in the private on premises enterprise data center are not reachable directly from the Internet.\u00a0 IPv6-enabling the data center networks at this point does not provide significant benefit compared to the work involved.<\/p>\n<p>Many end-users have IPv6 on their mobile devices and in their homes or when they are working from a remote location.\u00a0 As a result of this\u00a0<a href=\"https:\/\/www.google.com\/intl\/en\/ipv6\/statistics.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">growth in IPv6 adoption<\/a>, IPv6 adoption is accelerating while IPv4 is nearing its peak.\u00a0 LinkedIn has observed that\u00a0<a href=\"https:\/\/engineering.linkedin.com\/blog\/2017\/07\/linkedin-passes-ipv6-milestone\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">more than 50% of their traffic is using IPv6<\/a>.\u00a0 Also, in some cases,\u00a0<a href=\"https:\/\/community.infoblox.com\/t5\/IPv6-CoE-Blog\/Can-IPv6-Really-Be-Faster-than-IPv4-Part-1\/ba-p\/6419\" target=\"_blank\" rel=\"noopener noreferrer\">IPv6 can even perform better than IPv4<\/a>\u00a0and\u00a0<a href=\"https:\/\/www.youtube.com\/watch?v=axRv4F3csT0\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Facebook prefers IPv6<\/a>\u00a0for user connections.<\/p>\n<p>These end-users are often using IPv6 and they don\u2019t even realize it, nor do we want them to be cognizant of which IP version they are using.\u00a0 We want to shield end-users from any knowledge of IPv4 or IPv6 addresses but we do want to provide them the best end-user experience when connecting to the Internet and to their applications.\u00a0 End-users may be using IPv6 when they are on their wireless mobile devices or when they are at their homes or connected to a public wireless network. However, they lack IPv6 Internet connectivity when they are at work.\u00a0 Therefore, we want to give end-users the option to use the best performing transport protocol resulting in the optimal\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/User_experience\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">end-user experience<\/a>\u00a0when they are in the office as well as at home.<\/p>\n<p>An enterprise will gain more benefits from providing dual-protocol connectivity to their end-users than configuring dual-protocols in the data center.\u00a0 The priority for enterprises should be to IPv6-enable end-user access networks.<\/p>\n<h2 id=\"toc-hId-1329199000\">IPv6 Access Enablement Preparation<\/h2>\n<p>When you get to the point of IPv6-enabling the access network you need to be prepared.\u00a0 Before you enable IPv6 on the edge, you must validate that you have solid contiguous IPv6 connectivity across the core network.\u00a0 You must also verify that your users will be able to have their IPv6 connections traverse the security perimeter and the other security measures such as intrusion prevention and content filtering, which will need to be IPv6-enabled.<\/p>\n<p>As soon as you assign an IPv6 address to the first-hop router for the access network, it will immediately send out\u00a0<a href=\"https:\/\/community.infoblox.com\/t5\/IPv6-CoE-Blog\/Why-You-Must-Use-ICMPv6-Router-Advertisements-RAs\/ba-p\/3416\" target=\"_blank\" rel=\"noopener noreferrer\">ICMPv6 Router Advertisement<\/a>\u00a0(RA) messages indicating to the end-nodes that IPv6 is available.\u00a0 In a data center environment you may prefer to\u00a0<a href=\"https:\/\/community.infoblox.com\/t5\/IPv6-CoE-Blog\/Disabling-IPv6-Router-Advertisements-in-the-Data-Center\/ba-p\/7007\" target=\"_blank\" rel=\"noopener noreferrer\">disable ICMPV6 RAs<\/a>\u00a0and use static IPv6 addressing for the hosts and turn up IPv6 deliberately on one server at a time.\u00a0 However, in an access network, you will send out an RA and the IPv6-enabled user devices will immediately obtain a global IPv6 unicast address and start to originate IPv6 traffic.\u00a0 The end-user devices will receive the RA and use the A, L, M, and O bits in the RA message to determine the method their OS will use (i.e., SLAAC or DHCPv6) to configure their Interface Identifier (the last 64-bits of their IPv6 address).<\/p>\n<p>You must also plan if you are going to use\u00a0<a href=\"https:\/\/www.ietf.org\/rfc\/rfc3315.txt\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">DHCPv6<\/a>\u00a0or if you must keep\u00a0<a href=\"https:\/\/community.infoblox.com\/t5\/IPv6-CoE-Blog\/SLAAC-to-Basics-Part-1-of-2\/ba-p\/11356\" target=\"_blank\" rel=\"noopener noreferrer\">SLAAC<\/a>\u00a0and use RDNSS (<a href=\"https:\/\/tools.ietf.org\/html\/rfc8106\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RFC 8106<\/a>) to support your Android devices.\u00a0 For most enterprises, the preference will be to use\u00a0<a href=\"https:\/\/community.infoblox.com\/t5\/IPv6-CoE-Blog\/DHCPv6-and-the-Trouble-with-MAC-Addresses-Part-1-of-2\/ba-p\/3474\" target=\"_blank\" rel=\"noopener noreferrer\">DHCPv6<\/a>\u00a0in the same way they use DHCP for IPv4 today; i.e., to lease IPv6 addresses to end-nodes.\u00a0 These DHCPv6 or RDNSS services will need to be configured and tested prior to sending that first ICMPv6 RA message from the first-hop router for the access network.<\/p>\n<h2 id=\"toc-hId--2078264615\">Wireless Access Networks<\/h2>\n<p>As organizations have upgraded their wireless infrastructure to support\u00a0<a href=\"https:\/\/community.infoblox.com\/t5\/IPv6-CoE-Blog\/Could-Wireless-802-11ac-be-Propelling-IPv6-Adoption\/ba-p\/4861\" target=\"_blank\" rel=\"noopener noreferrer\">IEEE 802.11ac<\/a>, the hardware and software have been upgraded and now IPv6 features are assured.\u00a0 For your wireless access networks, you will need to plan how to configure your wireless LAN controllers for IPv6.\u00a0\u00a0<a href=\"https:\/\/supportforums.cisco.com\/t5\/wireless-mobility-documents\/ipv6-support-on-cisco-wlc-wireless-lan-controller-configuring\/ta-p\/3109935\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Cisco<\/a>\u00a0has some good documents to help you configure\u00a0<a href=\"https:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/wireless\/controller\/8-0\/configuration-guide\/b_cg80\/b_cg80_chapter_01101.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">IPv6 correctly on their Wireless LAN Controllers<\/a>\u00a0(WLCs) running\u00a0<a href=\"https:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/wireless\/controller\/technotes\/8-0\/IPV6_DG.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">version 8.0 or newer<\/a>.\u00a0 Aruba Mobility Controllers have\u00a0<a href=\"http:\/\/www.arubanetworks.com\/techdocs\/ArubaOS_60\/UserGuide\/IPv6.php\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">supported IPv6<\/a>\u00a0since ArubaOS 6.0 and there are\u00a0<a href=\"http:\/\/www.arubanetworks.com\/techdocs\/ArubaOS_65x_WebHelp\/Content\/ArubaFrameStyles\/IPv6\/Important_Points_to_Reme.htm\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">documents to assist you with IPv6 configuration<\/a>\u00a0of these devices as well.<\/p>\n<p>If you are using autonomous WAPs that are individually configured, they are likely able to support simple bridging of the IPv6 packets from the RF interface to the wired interface.\u00a0 If you are using a cloud-based controller system, like\u00a0<a href=\"https:\/\/documentation.meraki.com\/zGeneral_Administration\/Other_Topics\/IPv6_Device_Compatibility\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Cisco Meraki<\/a>, then you will want to confirm IPv6 support and device compatibility.\u00a0 Other wireless systems from\u00a0<a href=\"https:\/\/www.ruckuswireless.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Ruckus<\/a>\u00a0and\u00a0<a href=\"https:\/\/www.aerohive.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Aerohive<\/a>\u00a0also have some IPv6 capabilities as well.<\/p>\n<p>Regardless of the wireless infrastructure you are using, enabling IPv6 on both the wired and wireless access networks will mean that end-users will enjoy dual-protocol Internet connectivity using either medium.<\/p>\n<p>&nbsp;<\/p>\n<h2 id=\"toc-hId--1190760934\">Summary<\/h2>\n<p>As you start to bring IPv6 from the Internet perimeter inward to your enterprise networks, you will need to IPv6-enable the core, one layer-3 hop at a time.\u00a0 As your IPv6 deployment proceeds across the core network you will soon reach the access networks.\u00a0 You may want to enable IPv6 for the end-user access networks before you try to tackle enabling IPv6 for the systems in the data center.\u00a0 The preference in this case would be unlocking the improved end-user-experience benefits as soon as possible for your employees.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>One of the\u00a0common questions\u00a0that often gets askes shortly after some introductory\u00a0IPv6 training\u00a0is \u201cWhere do I start deploying?\u201d\u00a0 In the\u00a0early years of IPv6\u2019s adoption\u00a0there were debates about how IPv6 should be deployed in enterprise networks.\u00a0 Should organizations start to deploy IPv6 at the core and then work their way out to access networks or should they [&hellip;]<\/p>\n","protected":false},"author":321,"featured_media":2037,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[17],"tags":[50,56,38,31,39],"class_list":{"0":"post-2433","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ipv6-coe","8":"tag-dhcp","9":"tag-ipv4","10":"tag-ipv6","11":"tag-networking","12":"tag-protocols","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>IPv6-Enabled Access Networks Are Priority for Enterprises<\/title>\n<meta name=\"description\" content=\"One of the common questions that often gets askes shortly after some introductory IPv6 training is \u201cWhere do I start deploying?\u201d\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-enabled-access-networks-are-priority-for-enterprises\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IPv6-Enabled Access Networks Are Priority for Enterprises\" \/>\n<meta property=\"og:description\" content=\"One of the common questions that often gets askes shortly after some introductory IPv6 training is \u201cWhere do I start deploying?\u201d\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-enabled-access-networks-are-priority-for-enterprises\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-10-11T22:27:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-11T18:56:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/holiday-shopping.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Scott Hogg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Scott Hogg\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-enabled-access-networks-are-priority-for-enterprises\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-enabled-access-networks-are-priority-for-enterprises\\\/\"},\"author\":{\"name\":\"Scott Hogg\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/ee71ac61fe2ea349f6e991e628d22f4c\"},\"headline\":\"IPv6-Enabled Access Networks Are Priority for Enterprises\",\"datePublished\":\"2017-10-11T22:27:35+00:00\",\"dateModified\":\"2025-06-11T18:56:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-enabled-access-networks-are-priority-for-enterprises\\\/\"},\"wordCount\":1576,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-enabled-access-networks-are-priority-for-enterprises\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/holiday-shopping.jpg\",\"keywords\":[\"DHCP\",\"IPv4\",\"IPv6\",\"Networking\",\"Protocols\"],\"articleSection\":[\"IPv6 CoE\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-enabled-access-networks-are-priority-for-enterprises\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-enabled-access-networks-are-priority-for-enterprises\\\/\",\"name\":\"IPv6-Enabled Access Networks Are Priority for Enterprises\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-enabled-access-networks-are-priority-for-enterprises\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-enabled-access-networks-are-priority-for-enterprises\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/holiday-shopping.jpg\",\"datePublished\":\"2017-10-11T22:27:35+00:00\",\"dateModified\":\"2025-06-11T18:56:50+00:00\",\"description\":\"One of the common questions that often gets askes shortly after some introductory IPv6 training is \u201cWhere do I start deploying?\u201d\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-enabled-access-networks-are-priority-for-enterprises\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-enabled-access-networks-are-priority-for-enterprises\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-enabled-access-networks-are-priority-for-enterprises\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/holiday-shopping.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/holiday-shopping.jpg\",\"width\":660,\"height\":454},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-enabled-access-networks-are-priority-for-enterprises\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IPv6 CoE\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/ipv6-coe\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IPv6-Enabled Access Networks Are Priority for Enterprises\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/ee71ac61fe2ea349f6e991e628d22f4c\",\"name\":\"Scott Hogg\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_321_1574118215-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_321_1574118215-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_321_1574118215-96x96.jpg\",\"caption\":\"Scott Hogg\"},\"description\":\"Scott Hogg has 30 years of network and security experience and is president of Hogg Networking with. Scott Hogg specializes in teaching Internet Protocol version 6 (IPv6) and providing implementation guidance. Scott is CCIE #5133 (Emeritus) and CISSP #4610. Scott is Chair Emeritus of the Rocky Mountain IPv6 Task Force (RMv6TF), a member of the IPv6 Center of Excellence (COE), and co-author of the Cisco Press book on IPv6 Security.\",\"sameAs\":[\"https:\\\/\\\/hexabuild.io\"],\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/scott-hogg\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"IPv6-Enabled Access Networks Are Priority for Enterprises","description":"One of the common questions that often gets askes shortly after some introductory IPv6 training is \u201cWhere do I start deploying?\u201d","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-enabled-access-networks-are-priority-for-enterprises\/","og_locale":"en_US","og_type":"article","og_title":"IPv6-Enabled Access Networks Are Priority for Enterprises","og_description":"One of the common questions that often gets askes shortly after some introductory IPv6 training is \u201cWhere do I start deploying?\u201d","og_url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-enabled-access-networks-are-priority-for-enterprises\/","og_site_name":"Infoblox Blog","article_published_time":"2017-10-11T22:27:35+00:00","article_modified_time":"2025-06-11T18:56:50+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/holiday-shopping.jpg","type":"image\/jpeg"}],"author":"Scott Hogg","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Scott Hogg","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-enabled-access-networks-are-priority-for-enterprises\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-enabled-access-networks-are-priority-for-enterprises\/"},"author":{"name":"Scott Hogg","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/ee71ac61fe2ea349f6e991e628d22f4c"},"headline":"IPv6-Enabled Access Networks Are Priority for Enterprises","datePublished":"2017-10-11T22:27:35+00:00","dateModified":"2025-06-11T18:56:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-enabled-access-networks-are-priority-for-enterprises\/"},"wordCount":1576,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-enabled-access-networks-are-priority-for-enterprises\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/holiday-shopping.jpg","keywords":["DHCP","IPv4","IPv6","Networking","Protocols"],"articleSection":["IPv6 CoE"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-enabled-access-networks-are-priority-for-enterprises\/","url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-enabled-access-networks-are-priority-for-enterprises\/","name":"IPv6-Enabled Access Networks Are Priority for Enterprises","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-enabled-access-networks-are-priority-for-enterprises\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-enabled-access-networks-are-priority-for-enterprises\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/holiday-shopping.jpg","datePublished":"2017-10-11T22:27:35+00:00","dateModified":"2025-06-11T18:56:50+00:00","description":"One of the common questions that often gets askes shortly after some introductory IPv6 training is \u201cWhere do I start deploying?\u201d","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-enabled-access-networks-are-priority-for-enterprises\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-enabled-access-networks-are-priority-for-enterprises\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-enabled-access-networks-are-priority-for-enterprises\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/holiday-shopping.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/holiday-shopping.jpg","width":660,"height":454},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-enabled-access-networks-are-priority-for-enterprises\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"IPv6 CoE","item":"https:\/\/www.infoblox.com\/blog\/category\/ipv6-coe\/"},{"@type":"ListItem","position":3,"name":"IPv6-Enabled Access Networks Are Priority for Enterprises"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/ee71ac61fe2ea349f6e991e628d22f4c","name":"Scott Hogg","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_321_1574118215-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_321_1574118215-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_321_1574118215-96x96.jpg","caption":"Scott Hogg"},"description":"Scott Hogg has 30 years of network and security experience and is president of Hogg Networking with. Scott Hogg specializes in teaching Internet Protocol version 6 (IPv6) and providing implementation guidance. Scott is CCIE #5133 (Emeritus) and CISSP #4610. Scott is Chair Emeritus of the Rocky Mountain IPv6 Task Force (RMv6TF), a member of the IPv6 Center of Excellence (COE), and co-author of the Cisco Press book on IPv6 Security.","sameAs":["https:\/\/hexabuild.io"],"url":"https:\/\/www.infoblox.com\/blog\/author\/scott-hogg\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2433","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/321"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=2433"}],"version-history":[{"count":2,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2433\/revisions"}],"predecessor-version":[{"id":11875,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2433\/revisions\/11875"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2037"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=2433"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=2433"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=2433"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}