{"id":3487,"date":"2013-03-08T19:27:16","date_gmt":"2013-03-08T19:27:16","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=3487"},"modified":"2020-05-06T10:31:40","modified_gmt":"2020-05-06T17:31:40","slug":"dhcpv6-fingerprinting-byod-and-the-2013-rmv6tf-summit","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/dhcpv6-fingerprinting-byod-and-the-2013-rmv6tf-summit\/","title":{"rendered":"DHCPv6 Fingerprinting, BYOD, and the 2013 RMv6TF Summit"},"content":{"rendered":"<p>Fun fact: Did you know that staple of classic crime show (&#8220;Book &#8217;em, Danno!&#8221;) evidence, the humble fingerprint is\u00a0<a href=\"http:\/\/www.theregister.co.uk\/2004\/04\/06\/identity\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">perhaps not reliably unique<\/a>? Fortunately, the fingerprints I talk about below are unlikely to let any real killers go free. More on that in a moment.<\/p>\n<p>In a little more than a month I&#8217;ll be speaking at the\u00a0<a href=\"http:\/\/rmv6tf.org\/na-ipv6-summit\/2013-na-ipv6-summit\/2013-agendaspeakers\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Rocky Mountain IPv6 Task Force Summit<\/a>\u00a0in Denver Colorado. For my presentation this year, I wanted to talk about something IPv6-related that was both relevant to enterprise networks as well as perhaps more technically substantial: As part of the Infoblox IPv6 CoE, I&#8217;ve tended to talk a lot more about general strategy and trends related to IPv6 adoption but drilling down to examine a specific technical aspect of IPv6 certainly tweaks my interest based on my background as a network architect and engineer &#8212; heck, it even makes me a bit wistful for running live networks (not that I miss getting paged at 3AM when a production router gives up the ghost!).<\/p>\n<p>Infoblox delivers products that are designed to increase network control and solve business problems by, among other things, leveraging the DDI (DNS, DHCP, and IP Address Management) technology it has been key in innovating. IT network requirements around scale, performance, and security are perennial while other challenges crop up based on often unpredictable market and cultural trends. The &#8220;BYOD&#8221; (i.e., &#8220;bring your own device&#8221;) phenomenon and associated challenges are a perfect example of the latter. The enormous success of smartphones and tablets and the demand for integration of such personal devices into the corporate network have led to a recognition by those tasked with managing those networks that new tools and solutions are needed to securely and effectively accomplish such integration. DHCP\/DHCPv6 fingerprinting offers one component of potential BYOD solutions.<\/p>\n<p>The basic idea of DHCP\/DHCPv6 fingerprinting is simple: any client wishing to connect to a corporate network must in nearly all cases request addresses via DHCP\/DHCPv6.The basic DHCP\/DHCPv6 transaction for a given client device includes a number of uniquely ordered DHCP &#8220;option&#8221; fields. These options can be &#8220;read&#8221; by the server as a way to reliably characterize the device. Such characterization includes attributes like device type (e.g., iPhone4, Dell Laptop, iPad2, Samsung Note II, etc.), device OS (iOS6, Fedora 18, Windows 7 SP1, Android 4, Mac OS X 10.7.4, etc.).<\/p>\n<p>Once devices are characterized, actions can be taken to allow, disallow, or conditionally allow network access (typically accomplished using captive portal-type functionality). Further, reports can be generated to learn what devices are connecting, or attempting to connect, to the network allowing BYOD policy to be refined and improved leading to better security practice and closer adherence to security policy.<\/p>\n<p>Perhaps best of all, the DHCP fingerprinting process introduces no additional transactional overhead or burden on the client (unlike, say, nmap OS detection). Any additional load on the server would be due to onboard captive portal or reporting functionality. But here&#8217;s the rub. DHCP (IPv4) fingerprinting works well because of the relative abundance of client fingerprints from freely available sources like\u00a0<a href=\"http:\/\/www.fingerbank.org\/english\/about.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Fingerbank<\/a>\u00a0(maintained by the open-source captive portal provider Packet Fence). Unfortunately, no thorough database yet exists exclusively for DHCPv6 fingerprints. This is probably okay for now but corporate networks are likely to evolve first via migration to a dual-stack address architecture followed eventually by the deprecation of IPv4 altogether. Thus the ability to characterize clients via DHCPv6 fingerprinting will soon be essential. The effort to build and consistently maintain a publicly available database of DHCPv6 fingerprints should begin now.<\/p>\n<p>That&#8217;s all for now. Future blog posts will explore these topics in more detail. Hope to see you in Denver at the summit and remember: Never leave any fingerprints at the scene (but if you do make sure your lawyer reads that first linked article!).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Fun fact: Did you know that staple of classic crime show (&#8220;Book &#8217;em, Danno!&#8221;) evidence, the humble fingerprint is\u00a0perhaps not reliably unique? Fortunately, the fingerprints I talk about below are unlikely to let any real killers go free. More on that in a moment. In a little more than a month I&#8217;ll be speaking at [&hellip;]<\/p>\n","protected":false},"author":319,"featured_media":3187,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[17],"tags":[16,38,15],"class_list":{"0":"post-3487","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ipv6-coe","8":"tag-infoblox","9":"tag-ipv6","10":"tag-security","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>DHCPv6 Fingerprinting, BYOD, and the 2013 RMv6TF Summit<\/title>\n<meta name=\"description\" content=\"Fun fact: Did you know that staple of classic crime show (&quot;Book &#039;em, Danno!&quot;) evidence, the humble fingerprint is\u00a0perhaps not reliably unique?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/dhcpv6-fingerprinting-byod-and-the-2013-rmv6tf-summit\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DHCPv6 Fingerprinting, BYOD, and the 2013 RMv6TF Summit\" \/>\n<meta property=\"og:description\" content=\"Fun fact: Did you know that staple of classic crime show (&quot;Book &#039;em, Danno!&quot;) evidence, the humble fingerprint is\u00a0perhaps not reliably unique?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/dhcpv6-fingerprinting-byod-and-the-2013-rmv6tf-summit\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-03-08T19:27:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:31:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-ARIN.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Tom Coffeen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tom Coffeen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/dhcpv6-fingerprinting-byod-and-the-2013-rmv6tf-summit\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/dhcpv6-fingerprinting-byod-and-the-2013-rmv6tf-summit\\\/\"},\"author\":{\"name\":\"Tom Coffeen\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b299068ee4a9f542d2ad7d59a5b1d5b1\"},\"headline\":\"DHCPv6 Fingerprinting, BYOD, and the 2013 RMv6TF Summit\",\"datePublished\":\"2013-03-08T19:27:16+00:00\",\"dateModified\":\"2020-05-06T17:31:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/dhcpv6-fingerprinting-byod-and-the-2013-rmv6tf-summit\\\/\"},\"wordCount\":649,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/dhcpv6-fingerprinting-byod-and-the-2013-rmv6tf-summit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/IPv6-ARIN.jpg\",\"keywords\":[\"Infoblox\",\"IPv6\",\"Security\"],\"articleSection\":[\"IPv6 CoE\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/dhcpv6-fingerprinting-byod-and-the-2013-rmv6tf-summit\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/dhcpv6-fingerprinting-byod-and-the-2013-rmv6tf-summit\\\/\",\"name\":\"DHCPv6 Fingerprinting, BYOD, and the 2013 RMv6TF Summit\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/dhcpv6-fingerprinting-byod-and-the-2013-rmv6tf-summit\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/dhcpv6-fingerprinting-byod-and-the-2013-rmv6tf-summit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/IPv6-ARIN.jpg\",\"datePublished\":\"2013-03-08T19:27:16+00:00\",\"dateModified\":\"2020-05-06T17:31:40+00:00\",\"description\":\"Fun fact: Did you know that staple of classic crime show (\\\"Book 'em, Danno!\\\") evidence, the humble fingerprint is\u00a0perhaps not reliably unique?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/dhcpv6-fingerprinting-byod-and-the-2013-rmv6tf-summit\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/dhcpv6-fingerprinting-byod-and-the-2013-rmv6tf-summit\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/dhcpv6-fingerprinting-byod-and-the-2013-rmv6tf-summit\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/IPv6-ARIN.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/IPv6-ARIN.jpg\",\"width\":660,\"height\":454,\"caption\":\"The IPv6 Tipping Point Effect\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/dhcpv6-fingerprinting-byod-and-the-2013-rmv6tf-summit\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IPv6 CoE\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/ipv6-coe\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"DHCPv6 Fingerprinting, BYOD, and the 2013 RMv6TF Summit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b299068ee4a9f542d2ad7d59a5b1d5b1\",\"name\":\"Tom Coffeen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_319_1574118081-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_319_1574118081-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_319_1574118081-96x96.jpg\",\"caption\":\"Tom Coffeen\"},\"description\":\"Tom Coffeen is a network engineer, architect, and author with over twenty years of internetwork design, deployment, administration, and management experience. Tom co-founded HexaBuild, an IT consultancy specializing in the advancement of cloud, IoT, and security deployment best practices through IPv6 adoption. Prior to co-founding HexaBuild, Tom was an IPv6 Evangelist and a Distinguished Architect at Infoblox. Before that Tom was the VP of network architecture at the global CDN Limelight Networks where he led their deployment of IPv6. He is also the author of O\u2019Reilly Media\u2019s IPv6 Address Planning.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/tom-coffeen\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"DHCPv6 Fingerprinting, BYOD, and the 2013 RMv6TF Summit","description":"Fun fact: Did you know that staple of classic crime show (\"Book 'em, Danno!\") evidence, the humble fingerprint is\u00a0perhaps not reliably unique?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/dhcpv6-fingerprinting-byod-and-the-2013-rmv6tf-summit\/","og_locale":"en_US","og_type":"article","og_title":"DHCPv6 Fingerprinting, BYOD, and the 2013 RMv6TF Summit","og_description":"Fun fact: Did you know that staple of classic crime show (\"Book 'em, Danno!\") evidence, the humble fingerprint is\u00a0perhaps not reliably unique?","og_url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/dhcpv6-fingerprinting-byod-and-the-2013-rmv6tf-summit\/","og_site_name":"Infoblox Blog","article_published_time":"2013-03-08T19:27:16+00:00","article_modified_time":"2020-05-06T17:31:40+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-ARIN.jpg","type":"image\/jpeg"}],"author":"Tom Coffeen","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Tom Coffeen","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/dhcpv6-fingerprinting-byod-and-the-2013-rmv6tf-summit\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/dhcpv6-fingerprinting-byod-and-the-2013-rmv6tf-summit\/"},"author":{"name":"Tom Coffeen","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b299068ee4a9f542d2ad7d59a5b1d5b1"},"headline":"DHCPv6 Fingerprinting, BYOD, and the 2013 RMv6TF Summit","datePublished":"2013-03-08T19:27:16+00:00","dateModified":"2020-05-06T17:31:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/dhcpv6-fingerprinting-byod-and-the-2013-rmv6tf-summit\/"},"wordCount":649,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/dhcpv6-fingerprinting-byod-and-the-2013-rmv6tf-summit\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-ARIN.jpg","keywords":["Infoblox","IPv6","Security"],"articleSection":["IPv6 CoE"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/dhcpv6-fingerprinting-byod-and-the-2013-rmv6tf-summit\/","url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/dhcpv6-fingerprinting-byod-and-the-2013-rmv6tf-summit\/","name":"DHCPv6 Fingerprinting, BYOD, and the 2013 RMv6TF Summit","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/dhcpv6-fingerprinting-byod-and-the-2013-rmv6tf-summit\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/dhcpv6-fingerprinting-byod-and-the-2013-rmv6tf-summit\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-ARIN.jpg","datePublished":"2013-03-08T19:27:16+00:00","dateModified":"2020-05-06T17:31:40+00:00","description":"Fun fact: Did you know that staple of classic crime show (\"Book 'em, Danno!\") evidence, the humble fingerprint is\u00a0perhaps not reliably unique?","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/dhcpv6-fingerprinting-byod-and-the-2013-rmv6tf-summit\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/ipv6-coe\/dhcpv6-fingerprinting-byod-and-the-2013-rmv6tf-summit\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/dhcpv6-fingerprinting-byod-and-the-2013-rmv6tf-summit\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-ARIN.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-ARIN.jpg","width":660,"height":454,"caption":"The IPv6 Tipping Point Effect"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/dhcpv6-fingerprinting-byod-and-the-2013-rmv6tf-summit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"IPv6 CoE","item":"https:\/\/www.infoblox.com\/blog\/category\/ipv6-coe\/"},{"@type":"ListItem","position":3,"name":"DHCPv6 Fingerprinting, BYOD, and the 2013 RMv6TF Summit"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b299068ee4a9f542d2ad7d59a5b1d5b1","name":"Tom Coffeen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_319_1574118081-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_319_1574118081-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_319_1574118081-96x96.jpg","caption":"Tom Coffeen"},"description":"Tom Coffeen is a network engineer, architect, and author with over twenty years of internetwork design, deployment, administration, and management experience. Tom co-founded HexaBuild, an IT consultancy specializing in the advancement of cloud, IoT, and security deployment best practices through IPv6 adoption. Prior to co-founding HexaBuild, Tom was an IPv6 Evangelist and a Distinguished Architect at Infoblox. Before that Tom was the VP of network architecture at the global CDN Limelight Networks where he led their deployment of IPv6. He is also the author of O\u2019Reilly Media\u2019s IPv6 Address Planning.","url":"https:\/\/www.infoblox.com\/blog\/author\/tom-coffeen\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3487","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/319"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=3487"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3487\/revisions"}],"predecessor-version":[{"id":3488,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3487\/revisions\/3488"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/3187"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=3487"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=3487"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=3487"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}