{"id":3497,"date":"2013-06-10T19:45:18","date_gmt":"2013-06-10T19:45:18","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=3497"},"modified":"2020-05-06T10:31:39","modified_gmt":"2020-05-06T17:31:39","slug":"fun-with-ipv6-subnetting","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/fun-with-ipv6-subnetting\/","title":{"rendered":"Fun with IPv6 Subnetting"},"content":{"rendered":"<p>Here&#8217;s a neat IPv6 subnetting method. Using any number of bits available in the subnet ID, it will allow you to calculate the number of remaining prefixes and enumerate each resulting prefix.<\/p>\n<p>Note that the method is best for numbering and enumerating prefixes using non-nibble boundary bits. Recall that If we stick to the nibble boundary in the subnet ID we always get either 16, 256, 4096, or 65536 prefixes. Also, enumeration is simple as each hexadecimal character represents a nibble and prefixes will never &#8220;divide&#8221; a hex character.<\/p>\n<p>Let&#8217;s practice this subnetting method using a fictional IPv6 allocation. Say we&#8217;ve gotten an allocation of a \/48 to use to number a campus LAN and we want to subnet it further.<\/p>\n<p>The allocation we&#8217;ve received is 2001:db8:3eff::\/48<\/p>\n<p>Let&#8217;s assume we&#8217;re going to need 16 subnets for each building. This first group of prefixes will not require our method as we simply adhere to the 4 bits of the first nibble boundary.<\/p>\n<p>This gives us 16 prefixes enumerated by the first character of our fourth block:<\/p>\n<p>2001:db8:3eff::\/52<br \/>\n2001:db8:3eff:1000::\/52<br \/>\n2001:db8:3eff:2000::\/52<br \/>\n2001:db8:3eff:3000::\/52<br \/>\n.<br \/>\n.<br \/>\n.<br \/>\n2001:db8:3eff:F000::\/52<\/p>\n<p>Now let&#8217;s say for the sake of illustration that our typical campus building uses 20 VLANs. Since allocating 4 more bits to take us to the next nibble boundary only yields 16 additional prefixes, we&#8217;ll need more than 4 bits. By standard IPv6 address planning principles we should be entirely comfortable simply allocating an additional 4 bits for a total of 8 bits. This would give us 256 additional prefixes (with 4 bits remaining for 16 \/64s per prefix). But to demonstrate our method, let&#8217;s get more granular and only use as many bits as gives us sufficient prefixes for the number of elements in this level of our design (i.e., 20 VLANs). Since the least number of bits that produces an integer value greater than 20 is 5 (2^5 = 32) we&#8217;ll use 5 bits to subnet our \/52 prefix.<\/p>\n<p>First, by:<\/p>\n<p>a = p &#8211; 48\u00a0\u00a0 \u00a0# where p = prefix length of the parent subnet and a = number of fixed bits in the subnet ID<\/p>\n<p>From our example:<\/p>\n<p>a = 52 &#8211; 48 = 4<\/p>\n<p>a = 4<\/p>\n<p>So we have 4 bits that are fixed (which we already knew but the value is used in later formulae).<\/p>\n<p>Next, by:<\/p>\n<p>s = 2 ^ b\u00a0\u00a0 \u00a0# where s = subnets created and b = bits used to subnet<\/p>\n<p>s = 2 ^ 5 = 32<\/p>\n<p>s = 32<\/p>\n<p>As we outlined above, we&#8217;ll create 32 subnets using 5 bits.<\/p>\n<p>Next, by:<\/p>\n<p>i = 2 ^ 16 &#8211; (a + b)\u00a0\u00a0 \u00a0# where i = the (decimal) increment value between the created subnets (which we must convert back to hexadecimal)<\/p>\n<p>i = 2 ^ 16 &#8211; (4 + 5) = 2 ^ 16 &#8211; 9 = 2 ^ 7 = 128<\/p>\n<p>i = 128<\/p>\n<p>Converted to hexadecimal:<\/p>\n<p>i = 0x80<\/p>\n<p>Finally, by:<\/p>\n<p>p_1 = 48 + a + b\u00a0\u00a0 \u00a0# where p_1 = the prefix length of the created subnets<\/p>\n<p>p_1 = 48 + 4 + 5 = 57<\/p>\n<p>So now that we know the increment and prefix length value we can enumerate the new subnets:<\/p>\n<p>2001:db8:3eff::\/57<br \/>\n2001:db8:3eff:80::\/57<br \/>\n2001:db8:3eff:100::\/57<br \/>\n2001:db8:3eff:180::\/57<br \/>\n.<br \/>\n.<br \/>\n.<br \/>\n2001:db8:3eff:F80::\/57<\/p>\n<p>Et voila: Our 32 new subnets.<\/p>\n<p>We could of course subnet each of these \/57s further in order to provide additional hierarchy for other organizational or operational requirements.<\/p>\n<p>But assuming we don&#8217;t, how many \/64 interface subnets would each of these \/57s provide?<\/p>\n<p>By:<\/p>\n<p>n = 2 ^ (64 &#8211; p_1)\u00a0\u00a0 \u00a0# where n =\u00a0 number of \/64 subnets provided by each new subnet<\/p>\n<p>n = 2 ^ (64 &#8211; 57) = 2 ^ 7 = 128<\/p>\n<p>So each \/57 will provide us with 128 \/64 interface subnets.<\/p>\n<p>With enough practice, you&#8217;ll eventually be able to do this in your head. Imagine impressing your friends and family at parties with your amazing IPv6 subnetting prowess!<\/p>\n<p>For a more detailed description of this method, check out Joseph Davies excellent\u00a0<a href=\"http:\/\/www.amazon.com\/Understanding-IPv6-Essential-Windows-Networks\/dp\/0735659141\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Understanding IPv6<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Here&#8217;s a neat IPv6 subnetting method. Using any number of bits available in the subnet ID, it will allow you to calculate the number of remaining prefixes and enumerate each resulting prefix. Note that the method is best for numbering and enumerating prefixes using non-nibble boundary bits. Recall that If we stick to the nibble [&hellip;]<\/p>\n","protected":false},"author":319,"featured_media":3187,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[17],"tags":[16,38,15],"class_list":{"0":"post-3497","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ipv6-coe","8":"tag-infoblox","9":"tag-ipv6","10":"tag-security","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Fun with IPv6 Subnetting<\/title>\n<meta name=\"description\" content=\"Here&#039;s a neat IPv6 subnetting method. Using any number of bits available in the subnet ID, it will allow you to calculate the number of remaining prefixes and enumerate each resulting prefix.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/fun-with-ipv6-subnetting\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fun with IPv6 Subnetting\" \/>\n<meta property=\"og:description\" content=\"Here&#039;s a neat IPv6 subnetting method. Using any number of bits available in the subnet ID, it will allow you to calculate the number of remaining prefixes and enumerate each resulting prefix.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/fun-with-ipv6-subnetting\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-06-10T19:45:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:31:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-ARIN.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Tom Coffeen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tom Coffeen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/fun-with-ipv6-subnetting\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/fun-with-ipv6-subnetting\\\/\"},\"author\":{\"name\":\"Tom Coffeen\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b299068ee4a9f542d2ad7d59a5b1d5b1\"},\"headline\":\"Fun with IPv6 Subnetting\",\"datePublished\":\"2013-06-10T19:45:18+00:00\",\"dateModified\":\"2020-05-06T17:31:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/fun-with-ipv6-subnetting\\\/\"},\"wordCount\":576,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/fun-with-ipv6-subnetting\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/IPv6-ARIN.jpg\",\"keywords\":[\"Infoblox\",\"IPv6\",\"Security\"],\"articleSection\":[\"IPv6 CoE\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/fun-with-ipv6-subnetting\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/fun-with-ipv6-subnetting\\\/\",\"name\":\"Fun with IPv6 Subnetting\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/fun-with-ipv6-subnetting\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/fun-with-ipv6-subnetting\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/IPv6-ARIN.jpg\",\"datePublished\":\"2013-06-10T19:45:18+00:00\",\"dateModified\":\"2020-05-06T17:31:39+00:00\",\"description\":\"Here's a neat IPv6 subnetting method. Using any number of bits available in the subnet ID, it will allow you to calculate the number of remaining prefixes and enumerate each resulting prefix.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/fun-with-ipv6-subnetting\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/fun-with-ipv6-subnetting\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/fun-with-ipv6-subnetting\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/IPv6-ARIN.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/IPv6-ARIN.jpg\",\"width\":660,\"height\":454,\"caption\":\"The IPv6 Tipping Point Effect\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/fun-with-ipv6-subnetting\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IPv6 CoE\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/ipv6-coe\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Fun with IPv6 Subnetting\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b299068ee4a9f542d2ad7d59a5b1d5b1\",\"name\":\"Tom Coffeen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_319_1574118081-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_319_1574118081-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_319_1574118081-96x96.jpg\",\"caption\":\"Tom Coffeen\"},\"description\":\"Tom Coffeen is a network engineer, architect, and author with over twenty years of internetwork design, deployment, administration, and management experience. Tom co-founded HexaBuild, an IT consultancy specializing in the advancement of cloud, IoT, and security deployment best practices through IPv6 adoption. Prior to co-founding HexaBuild, Tom was an IPv6 Evangelist and a Distinguished Architect at Infoblox. Before that Tom was the VP of network architecture at the global CDN Limelight Networks where he led their deployment of IPv6. He is also the author of O\u2019Reilly Media\u2019s IPv6 Address Planning.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/tom-coffeen\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Fun with IPv6 Subnetting","description":"Here's a neat IPv6 subnetting method. Using any number of bits available in the subnet ID, it will allow you to calculate the number of remaining prefixes and enumerate each resulting prefix.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/fun-with-ipv6-subnetting\/","og_locale":"en_US","og_type":"article","og_title":"Fun with IPv6 Subnetting","og_description":"Here's a neat IPv6 subnetting method. Using any number of bits available in the subnet ID, it will allow you to calculate the number of remaining prefixes and enumerate each resulting prefix.","og_url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/fun-with-ipv6-subnetting\/","og_site_name":"Infoblox Blog","article_published_time":"2013-06-10T19:45:18+00:00","article_modified_time":"2020-05-06T17:31:39+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-ARIN.jpg","type":"image\/jpeg"}],"author":"Tom Coffeen","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Tom Coffeen","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/fun-with-ipv6-subnetting\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/fun-with-ipv6-subnetting\/"},"author":{"name":"Tom Coffeen","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b299068ee4a9f542d2ad7d59a5b1d5b1"},"headline":"Fun with IPv6 Subnetting","datePublished":"2013-06-10T19:45:18+00:00","dateModified":"2020-05-06T17:31:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/fun-with-ipv6-subnetting\/"},"wordCount":576,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/fun-with-ipv6-subnetting\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-ARIN.jpg","keywords":["Infoblox","IPv6","Security"],"articleSection":["IPv6 CoE"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/fun-with-ipv6-subnetting\/","url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/fun-with-ipv6-subnetting\/","name":"Fun with IPv6 Subnetting","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/fun-with-ipv6-subnetting\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/fun-with-ipv6-subnetting\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-ARIN.jpg","datePublished":"2013-06-10T19:45:18+00:00","dateModified":"2020-05-06T17:31:39+00:00","description":"Here's a neat IPv6 subnetting method. Using any number of bits available in the subnet ID, it will allow you to calculate the number of remaining prefixes and enumerate each resulting prefix.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/fun-with-ipv6-subnetting\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/ipv6-coe\/fun-with-ipv6-subnetting\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/fun-with-ipv6-subnetting\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-ARIN.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-ARIN.jpg","width":660,"height":454,"caption":"The IPv6 Tipping Point Effect"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/fun-with-ipv6-subnetting\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"IPv6 CoE","item":"https:\/\/www.infoblox.com\/blog\/category\/ipv6-coe\/"},{"@type":"ListItem","position":3,"name":"Fun with IPv6 Subnetting"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b299068ee4a9f542d2ad7d59a5b1d5b1","name":"Tom Coffeen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_319_1574118081-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_319_1574118081-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_319_1574118081-96x96.jpg","caption":"Tom Coffeen"},"description":"Tom Coffeen is a network engineer, architect, and author with over twenty years of internetwork design, deployment, administration, and management experience. Tom co-founded HexaBuild, an IT consultancy specializing in the advancement of cloud, IoT, and security deployment best practices through IPv6 adoption. Prior to co-founding HexaBuild, Tom was an IPv6 Evangelist and a Distinguished Architect at Infoblox. Before that Tom was the VP of network architecture at the global CDN Limelight Networks where he led their deployment of IPv6. He is also the author of O\u2019Reilly Media\u2019s IPv6 Address Planning.","url":"https:\/\/www.infoblox.com\/blog\/author\/tom-coffeen\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3497","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/319"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=3497"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3497\/revisions"}],"predecessor-version":[{"id":3498,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3497\/revisions\/3498"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/3187"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=3497"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=3497"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=3497"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}