{"id":2787,"date":"2016-04-23T06:00:24","date_gmt":"2016-04-23T06:00:24","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=2787"},"modified":"2022-10-19T16:22:26","modified_gmt":"2022-10-19T23:22:26","slug":"3-ways-to-ruin-your-future-network-with-ipv6-unique-local-addresses-part-2-of-2","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/3-ways-to-ruin-your-future-network-with-ipv6-unique-local-addresses-part-2-of-2\/","title":{"rendered":"3 Ways to Ruin Your Future Network with IPv6 Unique Local Addresses (Part 2 of 2)"},"content":{"rendered":"<div class=\"lia-message-body lia-component-body\">\n<div class=\"lia-message-body-content\">\n<p>3 Ways to Ruin Your Future Network with IPv6 Unique Local Addresses (Part 2 of 2)<\/p>\n<p>Last time around we looked at the first of the three ways you might ruin your future network with Unique Local Addresses. If you\u2019re not already familiar with ULAs, you might want to take a minute to go back and<a href=\"https:\/\/community.infoblox.com\/t5\/IPv6-Center-of-Excellence\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local\/ba-p\/5663\" target=\"_self\" rel=\"noopener noreferrer\">\u00a0read Part 1\u00a0<\/a>for a quick ULA refresher.<\/p>\n<p>Technique \u201cnumero uno\u201d for shooting yourself in the foot with ULA involved using Unique Local Addresses with NAT66. To sum up, statefully translating between GUA and ULA addressing is an exercise in pointlessness for the network operator (though some vendors might be perfectly happy to sell you some additional hardware to accomplish such futility). Why would someone select this configuration? Part 1 goes into more detail but the short answer is an erroneous belief that NATs provide security. (Often this goes hand-in-hand with conflating NAT and stateful packet inspection, or SPI, at the perimeter \u2013 something no one could reasonably argue isn\u2019t critically important.)<\/p>\n<p>In this post we\u2019ll look at two additional ways you can cause yourself much future weeping and gnashing of teeth by (mis)deploying ULAs.<\/p>\n<p><strong>Randomize or You May End Up DEAD:BEEF!<\/strong><\/p>\n<p>As we discussed in Part 1:<\/p>\n<p>\u201c\u2026The 40 bits defining any ULA prefix assigned from the fd00::\/8 ULA range, are supposed to be randomly defined. This is done to maximize the probability that any ULA prefix will indeed be\u00a0<em>unique<\/em>, not only within the site where the prefix is assigned but also truly globally unique across the entire Internet.\u201d<\/p>\n<p>The goal of the random 40 bits is to avoid any possible potential address overlaps when two organizations connect their networks. This randomness has a few important long-term consequences. For one thing, you\u2019re\u00a0<a href=\"mailto:http:\/\/www.mirror.co.uk\/news\/weird-news\/scientists-calculate-odd-ways-die-282884\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">just as likely to die falling off of a ladder in front of a moving train<\/a>\u00a0as you are to end up with two overlapping randomly-generated ULA \/48s.<\/p>\n<p>This means that, should you find yourself having to manage the integration of two separate networks and routing domains following a merger, you\u2019ll be able to route between them without any renumbering (or tricky NAT configuration). But, again, this only works if the ULA subnets have been properly generated using the recommended randomization function.<\/p>\n<p>Another consequence of using proper random ULA prefixes is that you will also have a falling-off-ladder-in-front-of-train chance of ending up with contiguous \/48 subnets. Recall that one of the key benefits of using IPv6 is the ability to allocate subnets on nibble boundaries. This allows for easier route summarization and security policy ACLs. But non-contiguous \/48s means that you won\u2019t be able to summarize routing or collectively define and restrict security policy for any topologies larger than a \/48 (e.g., \/44, \/40, etc.). Most enterprise networks are simply not large enough to ever confront this limitation should they decide to try use ULAs for a very large topology or set of topologies. In any case, most if not all enterprises of that size should be using GUA (and Provider Independent) allocations anyway for end-to-end routing.<\/p>\n<p>Keep in mind that you\u2019ll still be able to summarize routing and define ACLs at the nibble boundary level (or even by individual bits as necessary) within a given ULA \/48, since you\u2019ll still have the 16 bits between the \/48 and the \/64 to work with. This give you 65,536 individual \/64 networks to use for all your networks.<\/p>\n<p>Some network administrators will feel restricted by having to stick to the rule of randomization for ULAs. IPv6 is also fairly new and the scale of it can cause one to mistake the unlimited size of the space for the necessarily restricted ways in which we can effectively manage networks over time. For example, I have little doubt that there are many of the same fd00::\/48 or fd00::1\/48 prefixes assigned across (and even perhaps within) organizations. The heading for this section is obviously a bit tongue-in-cheek but the same reasoning holds true for prefixes formed from such ephemerally original hexadecimal words or word combinations. ULA prefixes formed with these approaches are easy to assign and remember. The newness of IPv6 for most administrators means they\u2019re unlikely to imagine such prefixes conflicting anytime soon with other identical prefixes. Arbitrarily picking a ULA subnet (as opposed to using the proper random method) also means you can grab contiguous subnets as needed.<\/p>\n<p>But this approach is almost guaranteed to cause overlapping subnet and address conflicts in the future once IPv6 has been around a bit longer. Such conflicts leading to renumbering defeats one of the entire purposes of IPv6. So for anything other than the sparsest, most occasional use of ULA, use a randomly generated prefix. The SixXS site offers a\u00a0<a href=\"mailto:https:\/\/www.sixxs.net\/tools\/grh\/ula\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">free random ULA prefix generator<\/a>. You can register your new prefix as well though there\u2019s no guarantee that such registration will provide it any enduring uniqueness (not to mention the fact that your ULA prefix would be publicly visible and some organizations might have security requirements disallowing this).<\/p>\n<p><strong>fc00::\/7 vs. fc00::\/8 vs. fd00::\/8<\/strong><\/p>\n<p>If you only read the first couple of pages of the ULA RFC 4193\u00a0<a href=\"mailto:https:\/\/tools.ietf.org\/html\/rfc4193\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">(\u201cUnique Local IPv6 Unicast Addresses\u201d)<\/a>\u00a0you might be forgiven for grabbing any old \/48 anywhere in the fc00::\/7 range defined in the document by the 7 prefix bits of the ULA allocation. However, reading a little further in the document you would learn that the first half of the allocation, the block fc00::\/8, is formally undefined. Meanwhile, the second half, fd00::\/8 is the address block available for use.\u00a0 Again, as reasoned in the previous section, if the network is small and static and requires few ULA prefixes, guaranteed uniqueness and\/or the formal validity of any prefix by RFC standards may not be critical. But from my experience\u00a0<em>anything<\/em>\u00a0that decreases the probability of renumbering significant amounts of infrastructure or eliminating NAT between networks is worth pursuing.<\/p>\n<p>So to recap, don\u2019t ruin your network with ULAs:<\/p>\n<ol>\n<li>Avoid ULA and NAT66 (and keep in mind that NPTv6 offers a special and very limited use case)<\/li>\n<li>Use a properly randomly generated ULA prefix<\/li>\n<li>Make sure that prefix is taken only from the fd00::\/8 range (<em>not<\/em>\u00a0the fc00::\/8)<\/li>\n<\/ol>\n<p><strong>One Final Comment<\/strong><\/p>\n<p>As we mentioned in Part 1, ULAs are commonly viewed as the IPv6 replacement for RFC 1918, or private, addresses in IPv4. But it\u2019s important to keep in mind that IPv6 was designed for everything to have a global unicast address (i.e., an address from a range assigned by a RIR or an ISP from the 2000::\/3 allocation). ULAs should not be seen simply as a substitute for Global Unicast Addresses (GUAs), especially where they might be used merely to maintain the traditional enterprise configuration of private addressing with NAT at the edge. Since IPv6 is designed to have multiple addresses on an interface, it is very possible that we\u2019ll eventually see deployments where ULAs coexist with GUAs on the same interface for access to different networks and network scopes \u2013 all without the hidden technical debt and false security of NAT.<\/p>\n<p>PS. There&#8217;s still time to register for\u00a0<a href=\"https:\/\/www.bloxfest.com\/\" target=\"_self\" rel=\"nofollow noopener noreferrer\">Bloxfest<\/a>, Infoblox&#8217;s first-ever customer conference being held May 17th through the 19th in Boston.\u00a0We promise an &#8220;intense learning and sharing experience for IT professionals committed to building world-class networks and security infrastructure&#8221; with track sessions, hands-on, and a keynote from hacker emeritus extrodinaire Kevin Mitnick. Visit the\u00a0<a href=\"https:\/\/www.bloxfest.com\/\" target=\"_self\" rel=\"nofollow noopener noreferrer\">Bloxfest website<\/a> for more details and to register now.<\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>3 Ways to Ruin Your Future Network with IPv6 Unique Local Addresses (Part 2 of 2) Last time around we looked at the first of the three ways you might ruin your future network with Unique Local Addresses. If you\u2019re not already familiar with ULAs, you might want to take a minute to go back [&hellip;]<\/p>\n","protected":false},"author":319,"featured_media":2788,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[17],"tags":[28,51,56,38],"class_list":{"0":"post-2787","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ipv6-coe","8":"tag-ddi","9":"tag-ipam","10":"tag-ipv4","11":"tag-ipv6","12":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>3 Ways to Ruin Your Future Network with IPv6 Unique Local Addresses (Part 2 of 2)<\/title>\n<meta name=\"description\" content=\"IPv6 can be used to optimize your company&#039;s network, but there are some detrimental misuses. Learn about 3 ways IPv6 can negatively effect your network here.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/3-ways-to-ruin-your-future-network-with-ipv6-unique-local-addresses-part-2-of-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"3 Ways to Ruin Your Future Network with IPv6 Unique Local Addresses (Part 2 of 2)\" \/>\n<meta property=\"og:description\" content=\"IPv6 can be used to optimize your company&#039;s network, but there are some detrimental misuses. Learn about 3 ways IPv6 can negatively effect your network here.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/3-ways-to-ruin-your-future-network-with-ipv6-unique-local-addresses-part-2-of-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-04-23T06:00:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-19T23:22:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Tom Coffeen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tom Coffeen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/3-ways-to-ruin-your-future-network-with-ipv6-unique-local-addresses-part-2-of-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/3-ways-to-ruin-your-future-network-with-ipv6-unique-local-addresses-part-2-of-2\\\/\"},\"author\":{\"name\":\"Tom Coffeen\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b299068ee4a9f542d2ad7d59a5b1d5b1\"},\"headline\":\"3 Ways to Ruin Your Future Network with IPv6 Unique Local Addresses (Part 2 of 2)\",\"datePublished\":\"2016-04-23T06:00:24+00:00\",\"dateModified\":\"2022-10-19T23:22:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/3-ways-to-ruin-your-future-network-with-ipv6-unique-local-addresses-part-2-of-2\\\/\"},\"wordCount\":1242,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/3-ways-to-ruin-your-future-network-with-ipv6-unique-local-addresses-part-2-of-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg\",\"keywords\":[\"DDI\",\"IPAM\",\"IPv4\",\"IPv6\"],\"articleSection\":[\"IPv6 CoE\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/3-ways-to-ruin-your-future-network-with-ipv6-unique-local-addresses-part-2-of-2\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/3-ways-to-ruin-your-future-network-with-ipv6-unique-local-addresses-part-2-of-2\\\/\",\"name\":\"3 Ways to Ruin Your Future Network with IPv6 Unique Local Addresses (Part 2 of 2)\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/3-ways-to-ruin-your-future-network-with-ipv6-unique-local-addresses-part-2-of-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/3-ways-to-ruin-your-future-network-with-ipv6-unique-local-addresses-part-2-of-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg\",\"datePublished\":\"2016-04-23T06:00:24+00:00\",\"dateModified\":\"2022-10-19T23:22:26+00:00\",\"description\":\"IPv6 can be used to optimize your company's network, but there are some detrimental misuses. Learn about 3 ways IPv6 can negatively effect your network here.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/3-ways-to-ruin-your-future-network-with-ipv6-unique-local-addresses-part-2-of-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/3-ways-to-ruin-your-future-network-with-ipv6-unique-local-addresses-part-2-of-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/3-ways-to-ruin-your-future-network-with-ipv6-unique-local-addresses-part-2-of-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg\",\"width\":660,\"height\":454,\"caption\":\"3 Ways to Ruin Your Future Network with IPv6 Unique Local Addresses (Part 2 of 2)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/3-ways-to-ruin-your-future-network-with-ipv6-unique-local-addresses-part-2-of-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IPv6 CoE\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/ipv6-coe\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"3 Ways to Ruin Your Future Network with IPv6 Unique Local Addresses (Part 2 of 2)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b299068ee4a9f542d2ad7d59a5b1d5b1\",\"name\":\"Tom Coffeen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_319_1574118081-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_319_1574118081-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_319_1574118081-96x96.jpg\",\"caption\":\"Tom Coffeen\"},\"description\":\"Tom Coffeen is a network engineer, architect, and author with over twenty years of internetwork design, deployment, administration, and management experience. Tom co-founded HexaBuild, an IT consultancy specializing in the advancement of cloud, IoT, and security deployment best practices through IPv6 adoption. Prior to co-founding HexaBuild, Tom was an IPv6 Evangelist and a Distinguished Architect at Infoblox. Before that Tom was the VP of network architecture at the global CDN Limelight Networks where he led their deployment of IPv6. He is also the author of O\u2019Reilly Media\u2019s IPv6 Address Planning.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/tom-coffeen\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"3 Ways to Ruin Your Future Network with IPv6 Unique Local Addresses (Part 2 of 2)","description":"IPv6 can be used to optimize your company's network, but there are some detrimental misuses. Learn about 3 ways IPv6 can negatively effect your network here.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/3-ways-to-ruin-your-future-network-with-ipv6-unique-local-addresses-part-2-of-2\/","og_locale":"en_US","og_type":"article","og_title":"3 Ways to Ruin Your Future Network with IPv6 Unique Local Addresses (Part 2 of 2)","og_description":"IPv6 can be used to optimize your company's network, but there are some detrimental misuses. Learn about 3 ways IPv6 can negatively effect your network here.","og_url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/3-ways-to-ruin-your-future-network-with-ipv6-unique-local-addresses-part-2-of-2\/","og_site_name":"Infoblox Blog","article_published_time":"2016-04-23T06:00:24+00:00","article_modified_time":"2022-10-19T23:22:26+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg","type":"image\/jpeg"}],"author":"Tom Coffeen","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Tom Coffeen","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/3-ways-to-ruin-your-future-network-with-ipv6-unique-local-addresses-part-2-of-2\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/3-ways-to-ruin-your-future-network-with-ipv6-unique-local-addresses-part-2-of-2\/"},"author":{"name":"Tom Coffeen","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b299068ee4a9f542d2ad7d59a5b1d5b1"},"headline":"3 Ways to Ruin Your Future Network with IPv6 Unique Local Addresses (Part 2 of 2)","datePublished":"2016-04-23T06:00:24+00:00","dateModified":"2022-10-19T23:22:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/3-ways-to-ruin-your-future-network-with-ipv6-unique-local-addresses-part-2-of-2\/"},"wordCount":1242,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/3-ways-to-ruin-your-future-network-with-ipv6-unique-local-addresses-part-2-of-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg","keywords":["DDI","IPAM","IPv4","IPv6"],"articleSection":["IPv6 CoE"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/3-ways-to-ruin-your-future-network-with-ipv6-unique-local-addresses-part-2-of-2\/","url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/3-ways-to-ruin-your-future-network-with-ipv6-unique-local-addresses-part-2-of-2\/","name":"3 Ways to Ruin Your Future Network with IPv6 Unique Local Addresses (Part 2 of 2)","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/3-ways-to-ruin-your-future-network-with-ipv6-unique-local-addresses-part-2-of-2\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/3-ways-to-ruin-your-future-network-with-ipv6-unique-local-addresses-part-2-of-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg","datePublished":"2016-04-23T06:00:24+00:00","dateModified":"2022-10-19T23:22:26+00:00","description":"IPv6 can be used to optimize your company's network, but there are some detrimental misuses. Learn about 3 ways IPv6 can negatively effect your network here.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/3-ways-to-ruin-your-future-network-with-ipv6-unique-local-addresses-part-2-of-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/ipv6-coe\/3-ways-to-ruin-your-future-network-with-ipv6-unique-local-addresses-part-2-of-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/3-ways-to-ruin-your-future-network-with-ipv6-unique-local-addresses-part-2-of-2\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg","width":660,"height":454,"caption":"3 Ways to Ruin Your Future Network with IPv6 Unique Local Addresses (Part 2 of 2)"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/3-ways-to-ruin-your-future-network-with-ipv6-unique-local-addresses-part-2-of-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"IPv6 CoE","item":"https:\/\/www.infoblox.com\/blog\/category\/ipv6-coe\/"},{"@type":"ListItem","position":3,"name":"3 Ways to Ruin Your Future Network with IPv6 Unique Local Addresses (Part 2 of 2)"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b299068ee4a9f542d2ad7d59a5b1d5b1","name":"Tom Coffeen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_319_1574118081-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_319_1574118081-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_319_1574118081-96x96.jpg","caption":"Tom Coffeen"},"description":"Tom Coffeen is a network engineer, architect, and author with over twenty years of internetwork design, deployment, administration, and management experience. Tom co-founded HexaBuild, an IT consultancy specializing in the advancement of cloud, IoT, and security deployment best practices through IPv6 adoption. Prior to co-founding HexaBuild, Tom was an IPv6 Evangelist and a Distinguished Architect at Infoblox. Before that Tom was the VP of network architecture at the global CDN Limelight Networks where he led their deployment of IPv6. He is also the author of O\u2019Reilly Media\u2019s IPv6 Address Planning.","url":"https:\/\/www.infoblox.com\/blog\/author\/tom-coffeen\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2787","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/319"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=2787"}],"version-history":[{"count":2,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2787\/revisions"}],"predecessor-version":[{"id":8113,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2787\/revisions\/8113"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2788"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=2787"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=2787"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=2787"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}