{"id":3033,"date":"2015-01-24T23:20:10","date_gmt":"2015-01-24T23:20:10","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=3033"},"modified":"2020-05-06T10:30:15","modified_gmt":"2020-05-06T17:30:15","slug":"staring-at-ipv6-prosthetic-head-ers-part-3-of-3","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/staring-at-ipv6-prosthetic-head-ers-part-3-of-3\/","title":{"rendered":"Staring at IPv6 Prosthetic Head(ers) &#8211; Part 3 (of 3)"},"content":{"rendered":"<p>First of all, Happy New Year! Here\u2019s hoping your holidays were relaxing, or at least pleasantly frenetic. Mine managed to be both.<\/p>\n<p>Speaking of New Year\u2019s, one of my\u00a0resolutions for 2015\u00a0is to\u00a0try to finish my multipart blogs on a tighter schedule.<\/p>\n<p>My last two posts explored the exciting world of IPv6 extension headers. Among other details, we contrasted the variable header length of IPv4\u00a0reviewed with the 40 byte\u00a0fixed header\u00a0length of IPv6 as\u00a0 \u2014 something that\u00a0makes packet processing much faster for routers and switches. It also provides an efficient\u00a0model for adding\u00a0special treatment of,\u00a0and\u00a0additional options to, IPv6 packets. These include things like fragmentation, hop-by-hop handling, and authentication and encryption.<\/p>\n<p>Hopefully, I\u2019ve provided enough background to now talk about the inspiration for this series, a new(ish) IETF draft,\u00a0<a href=\"http:\/\/tools.ietf.org\/html\/draft-gont-v6ops-ipv6-ehs-in-real-world-00\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">IPv6 Extension Headers in the Real World<\/a>.\u00a0You may recall (and please excuse) a bit of snark on my part regarding the juxtaposition of the abbreviation\u00a0IETF with the phrase\u00a0&#8220;the Real World.\u201d<\/p>\n<p>And now that you know a little about IPv6 extension headers, here\u2019s that quote from\u00a0<a href=\"http:\/\/www.arbornetworks.com\/asert\/2011\/08\/ipv6-extension-headers\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Arbor Network\u2019s Bill Cerveny<\/a>\u00a0again:<\/p>\n<blockquote><p>&#8220;In theory, extension headers allow for adding new functionality to IPv6. In reality, it is hard to create and implement new extension headers because of the lead time that network device implementers need to update their hardware and software. Many network devices will drop any packets with extension headers that aren\u2019t recognized by the device. There will be a continual trade-off between the introduction of new extension headers to IPv6 and the cost to network device creators and maintainers of adding support for the new extension header.\u201d<\/p><\/blockquote>\n<p>Doesn\u2019t sound very encouraging, does it?\u00a0Indeed, the opening paragraph of the IETF draft points out:<\/p>\n<blockquote><p>&#8220;IPv6 Extension Headers are deemed to present\u00a0a challenge to IPv6 implementations and networks, and are known to be\u00a0intentionally filtered in some existing IPv6 deployments\u201d but promises &#8220;real-world data regarding the extent to which packets with IPv6 extension headers are filtered in the public Internet, and where in the network such filtering occurs.&#8221;<\/p><\/blockquote>\n<p>So what do such data look like?<\/p>\n<p>The authors of the draft ran tests to various types of servers running IPv6. These servers were sourced using the\u00a0<a href=\"http:\/\/www.worldipv6launch.org\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">World IPv6 Launch site<\/a>\u00a0as well as\u00a0<a href=\"http:\/\/www.alexa.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Alexa<\/a>.<\/p>\n<p>According to the draft, testing was conducted to web, mail, and DNS servers using the following probes:<\/p>\n<p>\u2022\u00a0\u00a0\u00a0 IPv6 packets with a Destination Options header of 8 bytes<\/p>\n<p>\u2022\u00a0\u00a0\u00a0 IPv6 packets resulting in two IPv6 fragments of 512 bytes each\u00a0(approximately)<\/p>\n<p>\u2022\u00a0\u00a0\u00a0 IPv6 packets with a Hop-by-Hop Options header of 8 bytes<\/p>\n<p>The authors\u00a0were primarily concerned where packets including these extension headers might be dropped.\u00a0If drops occurred in the destination AS network, such results could be attributed to the local security policy\u00a0\u2014\u00a0much like, say, the complete filtering\u00a0of ICMP in IPv4: Limiting for end-to-end troubleshooting, perhaps, but the prerogative of the filtering network.<\/p>\n<p>More troubling\u00a0to the authors would be drops of\u00a0packets in transit\u00a0ASes between the source and destination networks:\u00a0The viability of any extension header functionality and subsequent deployment and effective use\u00a0is entirely reliant on whether or not these intermediate\u00a0networks honor packets with extension headers or merely drop them as a matter of policy.<\/p>\n<p>So\u00a0here are the data (in the inimitable ASCII formatting that we\u2019ve come to\u00a0know and love\u00a0from\u00a0IETF documents):<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3034\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/ascii-data.png\" alt=\"ASCII Data\" width=\"1122\" height=\"958\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ascii-data.png 1122w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ascii-data-300x256.png 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ascii-data-768x656.png 768w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ascii-data-1024x874.png 1024w\" sizes=\"auto, (max-width: 1122px) 100vw, 1122px\" \/><\/p>\n<p>A bit of explanation is in order. The first number in each cell (e.g., 11.88%) is the percentage of drops experienced by the extension header type given the target type. The values in parentheses are the \u201cbest-case\u201d and\u00a0\u201cworst-case\u201d percentage &#8220;ranges&#8221;\u00a0for where the drop occurred.\u00a0For example, the best case scenario\u00a0is the packet drop occurring in the destination network. The worst\u00a0case scenario\u00a0happens when\u00a0the packet is dropped in the transit network. (You may want to refer to the draft for more info about the exact methodology and results.)<\/p>\n<p>At first glance, it doesn\u2019t look too good for the viability\u00a0of IPv6\u00a0extension headers\u00a0in the \u201cReal World.\u201d Indeed, the authors recommend the following:<\/p>\n<blockquote><p>&#8220;New protocols that are to operate in the public Internet should\u00a0consider the effect of widespread filtering of IPv6 extension headers\u00a0in the public Internet. If IPv6 extension headers are at all\u00a0employed, a fall-back mechanism that does not rely on IPv6 extension\u00a0headers should be considered.&#8221;<\/p><\/blockquote>\n<p>This doesn\u2019t mean we can\u2019t take advantage of IPv6 extension headers within an AS (or where traffic paths are\u00a0deterministic through ASes that are known to support them).\u00a0But given their limited viability in the \u201cReal World,\u201d we\u2019re likely to see less and less vendor support for existing (and new) IPv6\u00a0extension headers over time.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>First of all, Happy New Year! Here\u2019s hoping your holidays were relaxing, or at least pleasantly frenetic. Mine managed to be both. Speaking of New Year\u2019s, one of my\u00a0resolutions for 2015\u00a0is to\u00a0try to finish my multipart blogs on a tighter schedule. My last two posts explored the exciting world of IPv6 extension headers. Among other [&hellip;]<\/p>\n","protected":false},"author":319,"featured_media":2788,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[17],"tags":[16,38,15],"class_list":{"0":"post-3033","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ipv6-coe","8":"tag-infoblox","9":"tag-ipv6","10":"tag-security","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Staring at IPv6 Prosthetic Head(ers) - Part 3 (of 3)<\/title>\n<meta name=\"description\" content=\"First of all, Happy New Year! Here\u2019s hoping your holidays were relaxing, or at least pleasantly frenetic. Mine managed to be both.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/staring-at-ipv6-prosthetic-head-ers-part-3-of-3\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Staring at IPv6 Prosthetic Head(ers) - Part 3 (of 3)\" \/>\n<meta property=\"og:description\" content=\"First of all, Happy New Year! Here\u2019s hoping your holidays were relaxing, or at least pleasantly frenetic. Mine managed to be both.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/staring-at-ipv6-prosthetic-head-ers-part-3-of-3\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-01-24T23:20:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:30:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Tom Coffeen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tom Coffeen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/staring-at-ipv6-prosthetic-head-ers-part-3-of-3\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/staring-at-ipv6-prosthetic-head-ers-part-3-of-3\\\/\"},\"author\":{\"name\":\"Tom Coffeen\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b299068ee4a9f542d2ad7d59a5b1d5b1\"},\"headline\":\"Staring at IPv6 Prosthetic Head(ers) &#8211; Part 3 (of 3)\",\"datePublished\":\"2015-01-24T23:20:10+00:00\",\"dateModified\":\"2020-05-06T17:30:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/staring-at-ipv6-prosthetic-head-ers-part-3-of-3\\\/\"},\"wordCount\":795,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/staring-at-ipv6-prosthetic-head-ers-part-3-of-3\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg\",\"keywords\":[\"Infoblox\",\"IPv6\",\"Security\"],\"articleSection\":[\"IPv6 CoE\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/staring-at-ipv6-prosthetic-head-ers-part-3-of-3\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/staring-at-ipv6-prosthetic-head-ers-part-3-of-3\\\/\",\"name\":\"Staring at IPv6 Prosthetic Head(ers) - Part 3 (of 3)\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/staring-at-ipv6-prosthetic-head-ers-part-3-of-3\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/staring-at-ipv6-prosthetic-head-ers-part-3-of-3\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg\",\"datePublished\":\"2015-01-24T23:20:10+00:00\",\"dateModified\":\"2020-05-06T17:30:15+00:00\",\"description\":\"First of all, Happy New Year! Here\u2019s hoping your holidays were relaxing, or at least pleasantly frenetic. Mine managed to be both.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/staring-at-ipv6-prosthetic-head-ers-part-3-of-3\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/staring-at-ipv6-prosthetic-head-ers-part-3-of-3\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/staring-at-ipv6-prosthetic-head-ers-part-3-of-3\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg\",\"width\":660,\"height\":454,\"caption\":\"3 Ways to Ruin Your Future Network with IPv6 Unique Local Addresses (Part 2 of 2)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/staring-at-ipv6-prosthetic-head-ers-part-3-of-3\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IPv6 CoE\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/ipv6-coe\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Staring at IPv6 Prosthetic Head(ers) &#8211; Part 3 (of 3)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b299068ee4a9f542d2ad7d59a5b1d5b1\",\"name\":\"Tom Coffeen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_319_1574118081-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_319_1574118081-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_319_1574118081-96x96.jpg\",\"caption\":\"Tom Coffeen\"},\"description\":\"Tom Coffeen is a network engineer, architect, and author with over twenty years of internetwork design, deployment, administration, and management experience. Tom co-founded HexaBuild, an IT consultancy specializing in the advancement of cloud, IoT, and security deployment best practices through IPv6 adoption. Prior to co-founding HexaBuild, Tom was an IPv6 Evangelist and a Distinguished Architect at Infoblox. Before that Tom was the VP of network architecture at the global CDN Limelight Networks where he led their deployment of IPv6. He is also the author of O\u2019Reilly Media\u2019s IPv6 Address Planning.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/tom-coffeen\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Staring at IPv6 Prosthetic Head(ers) - Part 3 (of 3)","description":"First of all, Happy New Year! Here\u2019s hoping your holidays were relaxing, or at least pleasantly frenetic. Mine managed to be both.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/staring-at-ipv6-prosthetic-head-ers-part-3-of-3\/","og_locale":"en_US","og_type":"article","og_title":"Staring at IPv6 Prosthetic Head(ers) - Part 3 (of 3)","og_description":"First of all, Happy New Year! Here\u2019s hoping your holidays were relaxing, or at least pleasantly frenetic. Mine managed to be both.","og_url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/staring-at-ipv6-prosthetic-head-ers-part-3-of-3\/","og_site_name":"Infoblox Blog","article_published_time":"2015-01-24T23:20:10+00:00","article_modified_time":"2020-05-06T17:30:15+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg","type":"image\/jpeg"}],"author":"Tom Coffeen","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Tom Coffeen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/staring-at-ipv6-prosthetic-head-ers-part-3-of-3\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/staring-at-ipv6-prosthetic-head-ers-part-3-of-3\/"},"author":{"name":"Tom Coffeen","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b299068ee4a9f542d2ad7d59a5b1d5b1"},"headline":"Staring at IPv6 Prosthetic Head(ers) &#8211; Part 3 (of 3)","datePublished":"2015-01-24T23:20:10+00:00","dateModified":"2020-05-06T17:30:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/staring-at-ipv6-prosthetic-head-ers-part-3-of-3\/"},"wordCount":795,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/staring-at-ipv6-prosthetic-head-ers-part-3-of-3\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg","keywords":["Infoblox","IPv6","Security"],"articleSection":["IPv6 CoE"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/staring-at-ipv6-prosthetic-head-ers-part-3-of-3\/","url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/staring-at-ipv6-prosthetic-head-ers-part-3-of-3\/","name":"Staring at IPv6 Prosthetic Head(ers) - Part 3 (of 3)","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/staring-at-ipv6-prosthetic-head-ers-part-3-of-3\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/staring-at-ipv6-prosthetic-head-ers-part-3-of-3\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg","datePublished":"2015-01-24T23:20:10+00:00","dateModified":"2020-05-06T17:30:15+00:00","description":"First of all, Happy New Year! Here\u2019s hoping your holidays were relaxing, or at least pleasantly frenetic. Mine managed to be both.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/staring-at-ipv6-prosthetic-head-ers-part-3-of-3\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/ipv6-coe\/staring-at-ipv6-prosthetic-head-ers-part-3-of-3\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/staring-at-ipv6-prosthetic-head-ers-part-3-of-3\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg","width":660,"height":454,"caption":"3 Ways to Ruin Your Future Network with IPv6 Unique Local Addresses (Part 2 of 2)"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/staring-at-ipv6-prosthetic-head-ers-part-3-of-3\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"IPv6 CoE","item":"https:\/\/www.infoblox.com\/blog\/category\/ipv6-coe\/"},{"@type":"ListItem","position":3,"name":"Staring at IPv6 Prosthetic Head(ers) &#8211; Part 3 (of 3)"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b299068ee4a9f542d2ad7d59a5b1d5b1","name":"Tom Coffeen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_319_1574118081-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_319_1574118081-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_319_1574118081-96x96.jpg","caption":"Tom Coffeen"},"description":"Tom Coffeen is a network engineer, architect, and author with over twenty years of internetwork design, deployment, administration, and management experience. Tom co-founded HexaBuild, an IT consultancy specializing in the advancement of cloud, IoT, and security deployment best practices through IPv6 adoption. Prior to co-founding HexaBuild, Tom was an IPv6 Evangelist and a Distinguished Architect at Infoblox. Before that Tom was the VP of network architecture at the global CDN Limelight Networks where he led their deployment of IPv6. He is also the author of O\u2019Reilly Media\u2019s IPv6 Address Planning.","url":"https:\/\/www.infoblox.com\/blog\/author\/tom-coffeen\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3033","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/319"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=3033"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3033\/revisions"}],"predecessor-version":[{"id":3035,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3033\/revisions\/3035"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2788"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=3033"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=3033"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=3033"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}