{"id":4277,"date":"2019-12-06T08:00:17","date_gmt":"2019-12-06T16:00:17","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=4277"},"modified":"2022-10-19T16:22:46","modified_gmt":"2022-10-19T23:22:46","slug":"ipv6-prefix-allocation-methods-part-one-of-two","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-prefix-allocation-methods-part-one-of-two\/","title":{"rendered":"IPv6 Prefix Allocation Methods &#8211; Part One (of Two)"},"content":{"rendered":"<h4><strong>\u00a0Introduction<\/strong><\/h4>\n<p>So, let&#8217;s suppose that you&#8217;ve been allocated a block of IPv6 addresses. If it&#8217;s your primary allocation, I&#8217;m hopeful that you&#8217;ve both encountered and taken to heart one critical address planning principle. This principle recommends that your primary allocation be sufficiently large enough to meet your addressing needs for the next several decades \u2013 say, 20-50 years. And chances are, that timeframe exceeds the likely lifespan of the Internet Protocol. (If you haven\u2019t yet obtained an IPv6 allocation you can learn more about how to do so <a href=\"https:\/\/www.arin.net\/resources\/guide\/ipv6\/first_request\/\">from ARIN\u2019s website<\/a>.)<\/p>\n<p>This blog deals with the most familiar methods available for assigning subsets of address space from that primary allocation. And of course the same methods will continue to work when assigning space from within those subsets of assigned space as well (wheels within wheels!). These methods will work for any IPv6 allocation size (though as we will see as we explore the different allocation methods, some of them make more sense to use with larger allocations and some with smaller).<\/p>\n<p>You&#8217;re likely already familiar with this process of assigning address blocks from your work with IPv4. But chances are due to the natural constraints on the availability of IPv4 address space, you may not be as familiar with a couple of the more commonly used address assignment methods the abundance of IPv6 address space allows for.<\/p>\n<h4><strong>Four Common IPv6 Assignment Methods<\/strong><\/h4>\n<p>Let&#8217;s begin with defining four common IPv6 prefix assignment methods. They are:<\/p>\n<ul>\n<li>Next available<\/li>\n<li>Sparse<\/li>\n<li>Best fit<\/li>\n<li>Random<\/li>\n<\/ul>\n<p>To demonstrate how each of these methods works, I&#8217;m going to pick different allocation sizes. These sizes range from a \/64 up to and including our primary allocation (the one we would get from a Regional Internet Registry or ISP to meet all of the IPv6 addressing needs for our entire network). If we&#8217;ve been paying attention to proper IPv6 address planning principles, we might hope that our overall primary allocation has a couple of beneficial characteristics. I&#8217;ve already mentioned that our primary allocation needs to be sufficiently large to accommodate the growth of our network more or less indefinitely.<\/p>\n<p>Another beneficial characteristic would be that our primary allocation falls on a <a href=\"https:\/\/en.wikipedia.org\/wiki\/Hextet\">nibble boundary<\/a>. It should probably also go without saying that such an allocation won&#8217;t be smaller than the smallest legally assignable prefix in IPv6 of a \/64 nor larger than the largest allocation we&#8217;re likely to receive from a Regional Internet Registry. This largest size might vary but from personal experience wouldn&#8217;t likely be greater than an IPv6 \/24.<\/p>\n<p>Somewhere in between these largest and smallest allocations lies the \/48, which we should recognize as significant for being both the recommended baseline size for a particular site within our network as well as for being the <a href=\"https:\/\/blogs.infoblox.com\/ipv6-coe\/only-you-can-prevent-ipv6-prefix-disaggregation\/\">smallest Internet-routable prefix size<\/a>. In my book, <a href=\"https:\/\/www.amazon.com\/IPv6-Address-Planning-Designing-Future\/dp\/1491902760\/\">IPv6 Address Planning<\/a>, I make a distinction between something I rather blandly referred to as <em>inter-site <\/em>vs. <em>intra-site <\/em>planning and this, in the briefest of nutshells, is the distinction between handing out address blocks from our primary allocation (something larger than a \/48 if our network has more than one site \u2013 and nearly all networks requiring the architecture, engineering, and administration that keep us employed typically do) and handing out address blocks from within a single \/48.<\/p>\n<p>While any of our address allocation methods would theoretically work for either intra-site or inter-site planning, we&#8217;ll soon see which particular methods are more commonly used for each type of planning.<\/p>\n<p>With all that in mind, let&#8217;s return to defining the first of our most common IPv6 address assignment methods.<\/p>\n<h4><strong>Next Available<\/strong><\/h4>\n<p>This method is alternatively referred to as<em> sequential<\/em> or\u00a0<em>monotonic.<\/em>\u00a0It&#8217;s best demonstrated by beginning with an allocation that is subsequently divided into smaller prefixes of identical size. For the purposes of making our example practical, we&#8217;ll start with the smallest nibble-boundary-aligned prefix that doesn&#8217;t directly go on an interface \u2013 which would be (and here we pause for an exercise briefly left to the reader)&#8230;<\/p>\n<p>&#8230;.that&#8217;s right, a \/60! Hopefully, you&#8217;ve gotten familiar enough with your nibble math at this point that you recognize that a \/60 provides you with&#8230;<\/p>\n<p>&#8230;again correct, 16 \/64s for interface assignment!<\/p>\n<p>And so back to <em>next available<\/em>\u00a0assignment. With all this cogitation, you can probably guess how it works given a \/60 contains 16 \/64s. First, let&#8217;s enumerate the prefixes we have available. To do this, I&#8217;ll use a handy little Perl tool called\u00a0<a href=\"https:\/\/github.com\/vladak\/ipv6gen\/wiki\/IPv6-prefix-generator\"><em>ipv6gen<\/em><\/a>.\u00a0It enumerates the IPv6 prefixes from a larger allocation. I&#8217;ll use a \/60 arbitrarily derived from the documentation prefix (2001:db8::\/32). The arbitrary allocation is 2001:db8:2112:1230::\/60 and the following show the \/64 breakdown:<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-4278 size-full\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/Picture1.png\" alt=\"\" width=\"974\" height=\"560\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Picture1.png 974w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Picture1-300x172.png 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Picture1-768x442.png 768w\" sizes=\"auto, (max-width: 974px) 100vw, 974px\" \/><em>Next available <\/em>allocation typically works by assigning the next available prefix from the list of all prefixes. In the above example, the \/64s would most likely be assigned to network interfaces. Using the\u00a0<em>next available<\/em>\u00a0allocation method, a network interface needing an IPv6 prefix would get the next available prefix in the list. For example:<\/p>\n<pre>2001:db8:2112:1230::\/60\r\n2001:db8:2112:1230::\/64 -&gt;\u00a0Reserved\r\n2001:db8:2112:1231::\/64 -&gt;\u00a0VLAN 1 \u00a0 \u00a0 \u00a0\r\n2001:db8:2112:1232::\/64 -&gt;\u00a0VLAN 343 \u00a0 \u00a0\r\n2001:db8:2112:1233::\/64 -&gt;\u00a0VLAN 400 \u00a0 \u00a0\r\n...\r\n2001:db8:2112:123f::\/64 -&gt;\u00a0Reserved<\/pre>\n<p>You may have noticed from the example above; this method doesn&#8217;t presume any particular order or organization of the elements needing a prefix assignment. It simply dictates that whatever element needs a prefix of a particular size (in this case, a \/64) from a particular larger allocation (in this case, a \/60) gets the next available prefix from the list of available prefixes.<\/p>\n<p>Note that if I were actually numbering VLANs, I might wish to use a scheme that aligns the VLAN number to the prefix being assigned. If my network configuration uses extended VLANs at least 4094 unique \/64 prefixes I would be need to map them all to specific VLANs. This would require at least a \/52, which in turn would provide 4096 \/64s.<\/p>\n<pre>2001:db8:2112:1000::\/52 \r\n2001:db8:2112:1000::\/64 - Reserved\r\n2001:db8:2112:1001::\/64 - VLAN 0001 (Don't use VLAN 1! ;))\r\n2001:db8:2112:1002::\/64 - VLAN 0002\r\n2001:db8:2112:1003::\/64 - VLAN 0003\r\n...\r\n2001:db8:2112:100a::\/64 - VLAN 0010\r\n...\r\n2001:db8:2112:1920::\/64 - VLAN 2336\r\n...\r\n2001:db8:2112:1ffe::\/64 - VLAN 4094<\/pre>\n<p>Obviously, with this method it helps if you can easily convert hexadecimal to decimal, something which may pose challenges to your operations teams. Alternatively, by using a \/48, no hexadecimal to decimal conversion would be necessary. For example:<\/p>\n<pre>2001:db8:2112::\/48 \r\n2001:db8:2112:0000::\/64 - Reserved\r\n2001:db8:2112:0001::\/64 - VLAN 0001 (Don't use VLAN 1! ;))\r\n2001:db8:2112:0002::\/64 - VLAN 0002\r\n2001:db8:2112:0003::\/64 - VLAN 0003\r\n...\r\n2001:db8:2112:0010::\/64 - VLAN 0010\r\n...\r\n2001:db8:2112:2336::\/64 - VLAN 2336\r\n...\r\n2001:db8:2112:4094::\/64 - VLAN 4094<\/pre>\n<p>A caveat with this approach is that one is consuming only 6% of the \/48 for that particular application. Of course, we could use the remaining prefixes in an ad-hoc fashion (especially where IPAM can help keep track of them). Even if we don&#8217;t assign any prefixes beyond the 6% for extended VLANs, there is no requirement to avoid this method to conserve IPv6 address space.<\/p>\n<p>For this example, I picked on one of the smallest prefixes allowing for subsequent, more granular subnet assignments (i.e., \/60 -&gt; \/64), but of course this method works just as well with larger prefix allocations. For example, a RIR might assign a \/44 to a small enterprise with 12 or fewer sites.<\/p>\n<pre>2001:db8:2110::\/44\r\n2001:db8:2110::\/48 \u2013 Reserved\r\n2001:db8:2111::\/48 \u2013 Site 1 - HQ\r\n2001:db8:2112::\/48 \u2013 Site 2 - Toronto Data center\r\n2001:db8:2113::\/48 \u2013 Site 3 - Remote office \r\n2001:db8:2114::\/48 - Site 4 - Remote office\r\n2001:db8:2115::\/48 \u2013\u00a0<em>Next available<\/em>\r\n...\r\n2001:db8:211f::\/48 \u2013 Reserved<\/pre>\n<p>Another way to visualize this and other allocation methods is by using a pie chart:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-4279 size-full\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/Picture2-2.png\" alt=\"\" width=\"974\" height=\"641\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Picture2-2.png 974w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Picture2-2-300x197.png 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Picture2-2-768x505.png 768w\" sizes=\"auto, (max-width: 974px) 100vw, 974px\" \/><\/p>\n<h4>Reserving Zero Prefixes<\/h4>\n<p>Incidentally, you probably noticed that in the above allocation examples, I didn&#8217;t use the first available prefix\u00a0for an actual assignment but instead marked it as <em>reserved<\/em>.\u00a0There are two beneficial reasons for this. The first is that it avoids potential confusion between two prefixes that share the exact same label but differ in size. For example, in standard zero compressed format:<\/p>\n<pre>2001:db8:2110::\/44\r\n2001:db8:2110::\/48<\/pre>\n<p>Without referencing the CIDR notation, I can&#8217;t immediately determine whether I&#8217;m looking at the entire block (i.e., 2001:db8:2110::\/44) or merely the second available prefix from it (i.e., 2001:db8:2110::\/48). We network engineering types naturally pride ourselves on our precision and accuracy. But we&#8217;ve also likely got the operational battle scars from middle-of-the-night outages. Those outages where, in spite of our best precision-and-accuracy intentions, we misread one prefix for another. By not using the first subnet from each larger block, we can entirely avoid any such confusion.<\/p>\n<p>The second beneficial reason to reserve the first available prefix is a bit more direct. When labeling things, it&#8217;s convention to start enumerating them from \u201c1\u201d. By not using the first available prefix from the larger allocation (which will always end in \u201c0\u201d), we&#8217;ll always start assigning prefixes beginning with \u201c1\u201d.<\/p>\n<p>That&#8217;s it for part one! Next time we&#8217;ll cover the remaining IPv6 prefix allocation methods <em>sparse<\/em>, <em>best fit<\/em>, and <em>random<\/em>.<\/p>\n<p>Thanks for reading!<\/p>\n<p>Tom Coffeen (@ipv6tom) is a co-founder of\u00a0<a href=\"https:\/\/hexabuild.io\/\">HexaBuild<\/a>, an IPv6 consulting and IPv6 training company. Tom is the author of\u00a0<a href=\"https:\/\/www.amazon.com\/IPv6-Address-Planning-Designing-Future\/dp\/1491902760\/\">IPv6 Address Planning<\/a>\u00a0on O\u2019Reilly Media. You can follow HexaBuild on\u00a0<a href=\"https:\/\/twitter.com\/hexabuild\">Twitter<\/a>\u00a0and\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/hexabuild\">LinkedIn<\/a>.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00a0Introduction So, let&#8217;s suppose that you&#8217;ve been allocated a block of IPv6 addresses. If it&#8217;s your primary allocation, I&#8217;m hopeful that you&#8217;ve both encountered and taken to heart one critical address planning principle. This principle recommends that your primary allocation be sufficiently large enough to meet your addressing needs for the next several decades \u2013 [&hellip;]<\/p>\n","protected":false},"author":319,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[17],"tags":[51,38,170],"class_list":{"0":"post-4277","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-ipv6-coe","7":"tag-ipam","8":"tag-ipv6","9":"tag-ipv6-address-planning","10":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>IPv6 Prefix Allocation Methods - Part One (of Two)<\/title>\n<meta name=\"description\" content=\"It can be difficult to maintain space when allocating IPv6 addresses. Learn how you can more easily manage IPv6 addresses and the benefits it offers here.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-prefix-allocation-methods-part-one-of-two\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IPv6 Prefix Allocation Methods - Part One (of Two)\" \/>\n<meta property=\"og:description\" content=\"It can be difficult to maintain space when allocating IPv6 addresses. Learn how you can more easily manage IPv6 addresses and the benefits it offers here.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-prefix-allocation-methods-part-one-of-two\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-12-06T16:00:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-19T23:22:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/Picture1.png\" \/>\n<meta name=\"author\" content=\"Tom Coffeen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tom Coffeen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-prefix-allocation-methods-part-one-of-two\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-prefix-allocation-methods-part-one-of-two\\\/\"},\"author\":{\"name\":\"Tom Coffeen\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b299068ee4a9f542d2ad7d59a5b1d5b1\"},\"headline\":\"IPv6 Prefix Allocation Methods &#8211; Part One (of Two)\",\"datePublished\":\"2019-12-06T16:00:17+00:00\",\"dateModified\":\"2022-10-19T23:22:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-prefix-allocation-methods-part-one-of-two\\\/\"},\"wordCount\":1398,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-prefix-allocation-methods-part-one-of-two\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/Picture1.png\",\"keywords\":[\"IPAM\",\"IPv6\",\"IPv6 address planning\"],\"articleSection\":[\"IPv6 CoE\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-prefix-allocation-methods-part-one-of-two\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-prefix-allocation-methods-part-one-of-two\\\/\",\"name\":\"IPv6 Prefix Allocation Methods - Part One (of Two)\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-prefix-allocation-methods-part-one-of-two\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-prefix-allocation-methods-part-one-of-two\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/Picture1.png\",\"datePublished\":\"2019-12-06T16:00:17+00:00\",\"dateModified\":\"2022-10-19T23:22:46+00:00\",\"description\":\"It can be difficult to maintain space when allocating IPv6 addresses. Learn how you can more easily manage IPv6 addresses and the benefits it offers here.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-prefix-allocation-methods-part-one-of-two\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-prefix-allocation-methods-part-one-of-two\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-prefix-allocation-methods-part-one-of-two\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/Picture1.png\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/Picture1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-prefix-allocation-methods-part-one-of-two\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IPv6 CoE\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/ipv6-coe\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IPv6 Prefix Allocation Methods &#8211; Part One (of Two)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b299068ee4a9f542d2ad7d59a5b1d5b1\",\"name\":\"Tom Coffeen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_319_1574118081-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_319_1574118081-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_319_1574118081-96x96.jpg\",\"caption\":\"Tom Coffeen\"},\"description\":\"Tom Coffeen is a network engineer, architect, and author with over twenty years of internetwork design, deployment, administration, and management experience. Tom co-founded HexaBuild, an IT consultancy specializing in the advancement of cloud, IoT, and security deployment best practices through IPv6 adoption. Prior to co-founding HexaBuild, Tom was an IPv6 Evangelist and a Distinguished Architect at Infoblox. Before that Tom was the VP of network architecture at the global CDN Limelight Networks where he led their deployment of IPv6. He is also the author of O\u2019Reilly Media\u2019s IPv6 Address Planning.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/tom-coffeen\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"IPv6 Prefix Allocation Methods - Part One (of Two)","description":"It can be difficult to maintain space when allocating IPv6 addresses. Learn how you can more easily manage IPv6 addresses and the benefits it offers here.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-prefix-allocation-methods-part-one-of-two\/","og_locale":"en_US","og_type":"article","og_title":"IPv6 Prefix Allocation Methods - Part One (of Two)","og_description":"It can be difficult to maintain space when allocating IPv6 addresses. Learn how you can more easily manage IPv6 addresses and the benefits it offers here.","og_url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-prefix-allocation-methods-part-one-of-two\/","og_site_name":"Infoblox Blog","article_published_time":"2019-12-06T16:00:17+00:00","article_modified_time":"2022-10-19T23:22:46+00:00","og_image":[{"url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/Picture1.png","type":"","width":"","height":""}],"author":"Tom Coffeen","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Tom Coffeen","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-prefix-allocation-methods-part-one-of-two\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-prefix-allocation-methods-part-one-of-two\/"},"author":{"name":"Tom Coffeen","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b299068ee4a9f542d2ad7d59a5b1d5b1"},"headline":"IPv6 Prefix Allocation Methods &#8211; Part One (of Two)","datePublished":"2019-12-06T16:00:17+00:00","dateModified":"2022-10-19T23:22:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-prefix-allocation-methods-part-one-of-two\/"},"wordCount":1398,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-prefix-allocation-methods-part-one-of-two\/#primaryimage"},"thumbnailUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/Picture1.png","keywords":["IPAM","IPv6","IPv6 address planning"],"articleSection":["IPv6 CoE"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-prefix-allocation-methods-part-one-of-two\/","url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-prefix-allocation-methods-part-one-of-two\/","name":"IPv6 Prefix Allocation Methods - Part One (of Two)","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-prefix-allocation-methods-part-one-of-two\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-prefix-allocation-methods-part-one-of-two\/#primaryimage"},"thumbnailUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/Picture1.png","datePublished":"2019-12-06T16:00:17+00:00","dateModified":"2022-10-19T23:22:46+00:00","description":"It can be difficult to maintain space when allocating IPv6 addresses. Learn how you can more easily manage IPv6 addresses and the benefits it offers here.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-prefix-allocation-methods-part-one-of-two\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-prefix-allocation-methods-part-one-of-two\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-prefix-allocation-methods-part-one-of-two\/#primaryimage","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/Picture1.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/Picture1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-prefix-allocation-methods-part-one-of-two\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"IPv6 CoE","item":"https:\/\/www.infoblox.com\/blog\/category\/ipv6-coe\/"},{"@type":"ListItem","position":3,"name":"IPv6 Prefix Allocation Methods &#8211; Part One (of Two)"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b299068ee4a9f542d2ad7d59a5b1d5b1","name":"Tom Coffeen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_319_1574118081-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_319_1574118081-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_319_1574118081-96x96.jpg","caption":"Tom Coffeen"},"description":"Tom Coffeen is a network engineer, architect, and author with over twenty years of internetwork design, deployment, administration, and management experience. Tom co-founded HexaBuild, an IT consultancy specializing in the advancement of cloud, IoT, and security deployment best practices through IPv6 adoption. Prior to co-founding HexaBuild, Tom was an IPv6 Evangelist and a Distinguished Architect at Infoblox. Before that Tom was the VP of network architecture at the global CDN Limelight Networks where he led their deployment of IPv6. He is also the author of O\u2019Reilly Media\u2019s IPv6 Address Planning.","url":"https:\/\/www.infoblox.com\/blog\/author\/tom-coffeen\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4277","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/319"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=4277"}],"version-history":[{"count":7,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4277\/revisions"}],"predecessor-version":[{"id":8115,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4277\/revisions\/8115"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=4277"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=4277"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=4277"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}