{"id":3073,"date":"2015-02-11T15:56:19","date_gmt":"2015-02-11T15:56:19","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=3073"},"modified":"2020-05-06T10:30:15","modified_gmt":"2020-05-06T17:30:15","slug":"the-second-phase-of-your-ipv6-adoption-plan-training","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/the-second-phase-of-your-ipv6-adoption-plan-training\/","title":{"rendered":"The second phase of your IPv6 adoption plan: Training"},"content":{"rendered":"<p>In my previous <a href=\"\/ipv6-coe\/kick-off-2015-with-the-first-phase-of-your-ipv6-plan-assessment\/\" target=\"_blank\" rel=\"noopener noreferrer\">post<\/a>\u00a0I went over in detail the first phase of your IPv6 adoption plan, the assessment. You can find the original post that covers the overall topic about IPv6 adoption at\u00a0<a href=\"\/ipv6-coe\/the-first-steps-in-ipv6-adoption-having-a-plan\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/community.infoblox.com\/blogs\/2014\/10\/28\/first-steps-ipv6-adoption-having-plan<\/a>. Next, I wanted to tackle the second phase in the plan, training.<\/p>\n<p>A training plan is going to be important for several reasons.<\/p>\n<ul>\n<li>First, it allows you to introduce the topic of IPv6 to a wide group of individuals within your company. The explicit goal of training them is to build fundamental skills around IPv6.<\/li>\n<li>Second, you can add it as a career tracked skillset so you can accurately know how much progress (or lack of progress) you and your team are making.<\/li>\n<li>Third, it allows your team to better understand the impacts that IPv6 might have in further adoption phases like planning and design or proof of concept.<\/li>\n<\/ul>\n<p>The level and breadth of IPv6 training you provide will determine how much vendor and consulting help you will require in getting IPv6 deployed and widely adopted. Training needs can vary widely depending on what an organization needs from its staff. As a general rule of thumb most training involves a basic introductory IPv6 session that takes several days at a minimum. Good introductory training includes some hands on labs of some kind to help reinforce the basic principles and build familiarity in using the protocol. You should expect in the hands on labs things like basic IPv6 for:<\/p>\n<ul>\n<li>Networking on router and switches<\/li>\n<li>Security on firewalls<\/li>\n<li>Host configurations<\/li>\n<li>Core infrastructure services like DHCP, DNS and IPAM<\/li>\n<\/ul>\n<p>As with everything, practice will help to reinforce what you have learned so having at least a small pilot or lab for your teams will be a big win.<\/p>\n<p class=\"rteindent1\">Caution:<br \/>\nOne pitfall you will want to avoid is doing training too early. If your training happens to far in advance and no one gets to use the new knowledge in a timely manner they will forget the information. This is to be expected so timing is really important. Not too soon, not too late, it has to be just right!<\/p>\n<p>From here the options vary. If you are a technical engineering development team you might require training around programming and APIs for IPv6 and how to patch, upgrade or maintain custom code to accommodate IPv6. If you are an IT operations team perhaps you need training on advanced networking (for a specific platform), operating systems or security. Remember, all the departments that might potentially deal with IPv4 information will need to be trained on IPv6. For example, besides what I have mentioned already you might have to train the helpdesk, database, storage, unified communications, logging, wireless, inventory and asset management teams, just to name a few. If someone is dealing with IPv4 in anyway now, they will need at a minimum basic IPv6 training. That can be a lot of people in a reasonably sized enterprise organization.<\/p>\n<p>Regardless, training your teams will become critical for making informed decisions about IPv6 impacts. It will also allow you to better understand the assessment reports that were produced as part of the IPv6 assessment you or a third party did.<\/p>\n<p>Some companies choose to do the training prior to the assessment, especially if they use their own staff to do the assessment phase. This can be a reasonable approach if you have enough time and realize that your team needs more than basic IPv6 training to add value in the assessment phase. However, they will have needed to complete advanced IPv6 training and likely had extensive lab time to truly be qualified to do a proper IPv6 assessment. This is where hiring a qualified third party to do the assessment while you are providing training for your staff might be the most cost effective option in the long run.<\/p>\n<p>The reality is your team is likely made up of specialized members who are more vertically qualified in a unique skill set. It would be important that they build an equal set of skills with IPv6 as with IPv4 in their particular area of expertise. If they do not have these skills it is important to hire consulting specialist who do. Often in-house specialty-skilled individuals may not be as well versed as the consultants who are performing the assessment meaning they will need help in making accurate decisions. This is why, at a minimum everyone needs to attend the basic IPv6 training. Otherwise they lack the common language and understanding to communicate about IPv6 effectively.<\/p>\n<p>So, what sort of IPv6 training is right for your team?<\/p>\n<p>There are a variety of training options and I don\u2019t want to give preference to one over the other. There are so many options because there is a need for each. Let\u2019s briefly review some options and where I think they fit.<\/p>\n<ol>\n<li>Online blog, wiki or vendor training is a great way to get introduced to the overall topic of IPv6. It is not uncommon that many first get started working on IPv6 by reading blog sites or a vendor site to figure out how to set something up. These often do not provide in depth training but rather a quick snippet of how to do something with IPv6.<\/li>\n<li>Online video or audio training is a more formal way to get training. These can be screencasts that cover the material in a structured fashion or they can be a full formal course with an instructor. Both are an excellent option if you are comfortable learning this way (and perhaps working independently on your own labs).<\/li>\n<li>Formal classroom training through a training provider which may or may not be vendor focused. This is the most common method for post education training around topics like IPv6. Many of the training companies you are familiar with already provide IPv6 training. Ascolta(now ITT Tech) at\u00a0<a href=\"https:\/\/cpd.itt-tech.edu\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">https:\/\/cpd.itt-tech.edu\/<\/a>, New Horizons\u00a0<a href=\"http:\/\/www.newhorizons.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">http:\/\/www.newhorizons.com\/<\/a>\u00a0have IPv6 content, and others may as well. IPv6 is not mainstream enough yet (the way IPv4 is) that it is an assumed skill that everyone needs so it is often left out of other training content. By this I mean, if you take a training class on OSPF routing it may or may not include IPv6 in the course. As a general rule of thumb, any course on networking that leaves out IPv6 should not be considered acceptable. An example of a vendor course which does include IPv6 would be Cisco providing an IPv6 Fundamentals Course which is focused on their routing and switching platforms. You can find information at\u00a0<a href=\"http:\/\/tools.cisco.com\/GlobalLearningLocator\/courseDetails.do?actionType=executeCourseDetail&amp;courseID=5653\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">http:\/\/tools.cisco.com\/GlobalLearningLocator\/courseDetails.do?actionType=executeCourseDetail&amp;courseI&#8230;<\/a><\/li>\n<li>Technical Expert (custom training) through a professional consulting company like Groupware Technology\u00a0<a href=\"http:\/\/www.groupwaretechnology.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">http:\/\/www.groupwaretechnology.com<\/a>\u00a0or GTRI\u00a0<a href=\"http:\/\/www.gtri.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">http:\/\/www.gtri.com<\/a>\u00a0where I and Scott Hogg work respectively. You want to make sure you have a true technical expert teaching you for these courses. Do not be confused with special on-site version of the formal classroom training from the big training providers. Unfortunately, most of those training providers don\u2019t have true IPv6 experts on staff to teach their classes. Also the content they use for training is often not developed by technical experts either, which can be disappointing as it can includes errors or not be current and accurate. The big difference here is that with a professional consulting company that specializes in IPv6 you are getting customized training by an industry expert built to your needs. This option is expensive but often worth it in terms of the quality of content and the depth of knowledge of the individual teaching it. Also, it is not uncommon that they will provide all the training on-site so you reduce travel expenses for your company while maximizing the number of individuals being trained.<\/li>\n<\/ol>\n<p>Once you decide what training is right for you and your team, get it scheduled right away. You don\u2019t want to delay getting your team comfortable with IPv6 and the earlier you start the less scary it becomes for them (keep in mind my caution above). Over time, you and your team will simply take IPv6 in stride, just like IPv4, and it will not need special project status. This is where operational experience with IPv6 will be incredibly important.<\/p>\n<p>This naturally leads into the next phase for your IPv6 adoption plan; Planning and design. When your team is comfortable with IPv6 they are capable of doing things like planning and designing on the company\u2019s behalf. It is not uncommon to have a technical IPv6 expert help on a bigger IPv6 project but that isn\u2019t necessarily needed for many who simply want to get a clear plan and a reference design done. Design needs can vary widely between organizations and I will cover both planning and design in my next blog post.<\/p>\n<p>IPv6 is the future and the future is now!<\/p>\n<p>It is 2015, go get IPv6 training!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In my previous post\u00a0I went over in detail the first phase of your IPv6 adoption plan, the assessment. You can find the original post that covers the overall topic about IPv6 adoption at\u00a0https:\/\/community.infoblox.com\/blogs\/2014\/10\/28\/first-steps-ipv6-adoption-having-plan. Next, I wanted to tackle the second phase in the plan, training. A training plan is going to be important for several [&hellip;]<\/p>\n","protected":false},"author":323,"featured_media":2788,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[17],"tags":[16,38,15],"class_list":{"0":"post-3073","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ipv6-coe","8":"tag-infoblox","9":"tag-ipv6","10":"tag-security","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Holding IPv6 Neighbor Discovery to a Higher Standard of Security<\/title>\n<meta name=\"description\" content=\"The security of IPv4 is roughly equivalent to IPv6. So why do we expect more from IPv6?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/the-second-phase-of-your-ipv6-adoption-plan-training\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The second phase of your IPv6 adoption plan: Training\" \/>\n<meta property=\"og:description\" content=\"The security of IPv4 is roughly equivalent to IPv6. So why do we expect more from IPv6?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/the-second-phase-of-your-ipv6-adoption-plan-training\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-02-11T15:56:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:30:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ed Horley\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ed Horley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/the-second-phase-of-your-ipv6-adoption-plan-training\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/the-second-phase-of-your-ipv6-adoption-plan-training\\\/\"},\"author\":{\"name\":\"Ed Horley\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b09ec2fd0a273ea1cb94ae2fd98232f9\"},\"headline\":\"The second phase of your IPv6 adoption plan: Training\",\"datePublished\":\"2015-02-11T15:56:19+00:00\",\"dateModified\":\"2020-05-06T17:30:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/the-second-phase-of-your-ipv6-adoption-plan-training\\\/\"},\"wordCount\":1507,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/the-second-phase-of-your-ipv6-adoption-plan-training\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg\",\"keywords\":[\"Infoblox\",\"IPv6\",\"Security\"],\"articleSection\":[\"IPv6 CoE\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/the-second-phase-of-your-ipv6-adoption-plan-training\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/the-second-phase-of-your-ipv6-adoption-plan-training\\\/\",\"name\":\"Holding IPv6 Neighbor Discovery to a Higher Standard of Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/the-second-phase-of-your-ipv6-adoption-plan-training\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/the-second-phase-of-your-ipv6-adoption-plan-training\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg\",\"datePublished\":\"2015-02-11T15:56:19+00:00\",\"dateModified\":\"2020-05-06T17:30:15+00:00\",\"description\":\"The security of IPv4 is roughly equivalent to IPv6. So why do we expect more from IPv6?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/the-second-phase-of-your-ipv6-adoption-plan-training\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/the-second-phase-of-your-ipv6-adoption-plan-training\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/the-second-phase-of-your-ipv6-adoption-plan-training\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg\",\"width\":660,\"height\":454,\"caption\":\"3 Ways to Ruin Your Future Network with IPv6 Unique Local Addresses (Part 2 of 2)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/the-second-phase-of-your-ipv6-adoption-plan-training\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IPv6 CoE\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/ipv6-coe\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The second phase of your IPv6 adoption plan: Training\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b09ec2fd0a273ea1cb94ae2fd98232f9\",\"name\":\"Ed Horley\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/blog-ed-horley-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/blog-ed-horley-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/blog-ed-horley-96x96.jpg\",\"caption\":\"Ed Horley\"},\"description\":\"Ed Horley (@ehorley) is a Co-founder and CEO of HexaBuild.io, an IPv6 consulting and training company. Ed is Co-chair of the California IPv6 Task Force (CAv6TF) and authored the Apress Press book Practical IPv6 for Windows Administrators and two IPv6 courses on Pluralsight. He is also the co-host of the IPv6 Buzz Podcast on the PacketPushers. Follow HexaBuild on Twitter and LinkedIn and let us help you advance cloud, IoT and security with IPv6!\",\"sameAs\":[\"https:\\\/\\\/hexabuild.io\"],\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/ed-horley\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Holding IPv6 Neighbor Discovery to a Higher Standard of Security","description":"The security of IPv4 is roughly equivalent to IPv6. So why do we expect more from IPv6?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/the-second-phase-of-your-ipv6-adoption-plan-training\/","og_locale":"en_US","og_type":"article","og_title":"The second phase of your IPv6 adoption plan: Training","og_description":"The security of IPv4 is roughly equivalent to IPv6. So why do we expect more from IPv6?","og_url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/the-second-phase-of-your-ipv6-adoption-plan-training\/","og_site_name":"Infoblox Blog","article_published_time":"2015-02-11T15:56:19+00:00","article_modified_time":"2020-05-06T17:30:15+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg","type":"image\/jpeg"}],"author":"Ed Horley","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ed Horley","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/the-second-phase-of-your-ipv6-adoption-plan-training\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/the-second-phase-of-your-ipv6-adoption-plan-training\/"},"author":{"name":"Ed Horley","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b09ec2fd0a273ea1cb94ae2fd98232f9"},"headline":"The second phase of your IPv6 adoption plan: Training","datePublished":"2015-02-11T15:56:19+00:00","dateModified":"2020-05-06T17:30:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/the-second-phase-of-your-ipv6-adoption-plan-training\/"},"wordCount":1507,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/the-second-phase-of-your-ipv6-adoption-plan-training\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg","keywords":["Infoblox","IPv6","Security"],"articleSection":["IPv6 CoE"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/the-second-phase-of-your-ipv6-adoption-plan-training\/","url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/the-second-phase-of-your-ipv6-adoption-plan-training\/","name":"Holding IPv6 Neighbor Discovery to a Higher Standard of Security","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/the-second-phase-of-your-ipv6-adoption-plan-training\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/the-second-phase-of-your-ipv6-adoption-plan-training\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg","datePublished":"2015-02-11T15:56:19+00:00","dateModified":"2020-05-06T17:30:15+00:00","description":"The security of IPv4 is roughly equivalent to IPv6. So why do we expect more from IPv6?","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/the-second-phase-of-your-ipv6-adoption-plan-training\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/ipv6-coe\/the-second-phase-of-your-ipv6-adoption-plan-training\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/the-second-phase-of-your-ipv6-adoption-plan-training\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg","width":660,"height":454,"caption":"3 Ways to Ruin Your Future Network with IPv6 Unique Local Addresses (Part 2 of 2)"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/the-second-phase-of-your-ipv6-adoption-plan-training\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"IPv6 CoE","item":"https:\/\/www.infoblox.com\/blog\/category\/ipv6-coe\/"},{"@type":"ListItem","position":3,"name":"The second phase of your IPv6 adoption plan: Training"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b09ec2fd0a273ea1cb94ae2fd98232f9","name":"Ed Horley","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/blog-ed-horley-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/blog-ed-horley-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/blog-ed-horley-96x96.jpg","caption":"Ed Horley"},"description":"Ed Horley (@ehorley) is a Co-founder and CEO of HexaBuild.io, an IPv6 consulting and training company. Ed is Co-chair of the California IPv6 Task Force (CAv6TF) and authored the Apress Press book Practical IPv6 for Windows Administrators and two IPv6 courses on Pluralsight. He is also the co-host of the IPv6 Buzz Podcast on the PacketPushers. Follow HexaBuild on Twitter and LinkedIn and let us help you advance cloud, IoT and security with IPv6!","sameAs":["https:\/\/hexabuild.io"],"url":"https:\/\/www.infoblox.com\/blog\/author\/ed-horley\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3073","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/323"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=3073"}],"version-history":[{"count":2,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3073\/revisions"}],"predecessor-version":[{"id":3778,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3073\/revisions\/3778"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2788"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=3073"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=3073"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=3073"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}