{"id":4551,"date":"2012-07-09T10:31:47","date_gmt":"2012-07-09T17:31:47","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=4551"},"modified":"2025-04-02T11:06:06","modified_gmt":"2025-04-02T18:06:06","slug":"choosing-static-slaac-or-dhcpv6-part-4-privacy-addressing","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/choosing-static-slaac-or-dhcpv6-part-4-privacy-addressing\/","title":{"rendered":"Choosing Static, SLAAC or DHCPv6? (Part 4 &#8212; Privacy Addressing)"},"content":{"rendered":"<p>Here\u2019s the fourth and final entry of Cisco Press author and chair of the Rocky Mountain IPv6 Task Force\u00a0<a href=\"http:\/\/www.hoggnet.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Scott Hogg<\/a>\u2019s multi-part blog on IPv6 addressing. This week: dealing with IPv6 privacy addressing.<\/p>\n<p>We hope these particular blog entries have been helpful. Please check back soon for additional technical blog posts on IPv6 adoption. Also, be sure to check out the Infoblox\u00a0<a href=\"http:\/\/www.infoblox.com\/en\/resources\/ipv6-resource-center\/videos-whitepapers.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">IPv6 CoE page for more IPv6 adoption resources<\/a>.<\/p>\n<p>Thanks Scott! -Tom<\/p>\n<h4 id=\"toc-hId--159560332\">PRIVACY ADDRESSING\/TEMPORARY ADDRESSING POLICY<\/h4>\n<p>When <a href=\"https:\/\/www.infoblox.com\/glossary\/ipv6\/\" target=\"_blank\"><strong>IPv6<\/strong><\/a> was first being defined in the standards organizations concerns arose of the use of a node\u2019s MAC address to form the last 64 bits of the IPv6 address.\u00a0 The EUI-64 technique uses the 48 bytes of the MAC address split into two 24-bit sections with a predetermined set of bits (FFFE) in between (not counting the universal\/local bit).\u00a0 The concern came from the fact that no matter what subnet the user\u2019s computer was on it would have an identifiable interface identifier, making it easy to track a user\u2019s activity and thus identity.\u00a0 To avoid this issue, the IETF created an RFC titled \u201cPrivacy Extensions for Stateless Address Autoconfiguration in IPv6\u201d (RFC 3041).\u00a0 This IETF RFC was later updated &#8220;<a href=\"http:\/\/tools.ietf.org\/html\/rfc4941\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Privacy Extensions for Stateless Address Autoconfiguration in IPv6<\/a>&#8221; (RFC 4941).<\/p>\n<p>Privacy addresses use an MD5 hash of the EUI-64 concatenated with a random number that can change over time to create the interface identifier.\u00a0 Different implementations of this RFC rotate the address at different frequencies and some implementations allow this feature to be disabled.<\/p>\n<p>The security issue that privacy addressing creates is that forensics and troubleshooting are made increasingly difficult with privacy addresses.\u00a0 Because the IPv6 address may be assigned in a stateless way, network and security administrators would not know what IPv6 address any node had at any given point in time.\u00a0Privacy addressing also requires Dynamic DNS (DDNS) and firewall state to update every time the address changes. Utilizing <a href=\"https:\/\/www.infoblox.com\/products\/ipam-dhcp\/\" target=\"_blank\"><strong>IPAM DHCP<\/strong><\/a> can streamline the management of dynamically assigned addresses and ensure consistency across the network. This adds difficulty to creating granular firewall policy when IP addresses change often.\u00a0 Therefore, systems used with firewalls should use static IPv6 addresses instead.<\/p>\n<p>While privacy addresses have their place in allowing users to anonymously communicate with servers there are some security trade-offs to this privacy.\u00a0 When we talk about individuals using their own home computers to connect to the Internet that is one thing.\u00a0 However, when we talk about a company\u2019s internal network the use of the computer for personal use is typically not within the \u201cacceptable use policy\u201d.\u00a0 Therefore, preserving a user\u2019s privacy on a corporate enterprise network is not a \u201cright\u201d that must be granted.<\/p>\n<p>One could argue that the MAC address of a host is already used within the source address of an Ethernet II frame.\u00a0 The MAC address can be changed locally on a computer if the administrator of that system desires to change it.\u00a0 The organizations that assign OUIs to NIC manufacturers have no way of tracking which user their allocations were given to and which user ended up with which MAC address.\u00a0 The lower 64 bits of the IPv6 address don\u2019t necessarily have to use the MAC address, but they do have to be unique.<\/p>\n<p>Privacy extensions are supported by default on Windows XP, Server 2003, Vista, Server 2008, and Windows 7 but not supported on Windows NT or Windows 2000.\u00a0 On Windows XP you can run the \u201cnetsh interface ip6 show privacy\u201d command to display the parameters of the privacy extension addresses.\u00a0 Privacy extensions can be disabled on Windows XP by running the \u201cnetsh interface IPv6 set privacy state=disabled\u201d command.<\/p>\n<p>To disable privacy extensions on a Linux host you simply use the following command.<\/p>\n<p>echo \u201c0\u201d &gt; \/proc\/sys\/net\/ipv6\/conf\/default\/use_tempaddr<\/p>\n<p>Windows 7 does not use the EUI-64 technique by default when forming its interface identifier. Microsoft has blurred the lines between these two address autoconfiguration concepts with their temporary addresses and now their randomly-generated interface identifiers. However, thankfully Microsoft has given us the ability to disable or enable this feature as needed with the following commands.<\/p>\n<p>netsh interface ipv6 set global randomizeidentifiers=disabled<\/p>\n<p>netsh interface ipv6 set global randomizeidentifiers=enabled<\/p>\n<p>Microsoft has provided a setting to prevent the use of privacy extension; this setting can also be deployed with a Active Directory (AD) to all hosts member of the AD domain. The commands are:<\/p>\n<p>netsh interface ipv6 set global randomizeidentifiers=disabled store=persistent<\/p>\n<p>netsh interface ipv6 set privacy state=disabled store=persistent<\/p>\n<p>Linux systems also support privacy and temporary addressing.\u00a0 To configure a Linux system to use privacy addresses enter the following commands.<\/p>\n<p>sysctl net.ip6.conf.eth0.use_tempaddr=2<\/p>\n<p>sysctl net.ipv6.conf.all.use_tempaddr=2<\/p>\n<p>If you want to configure the Linux system to enable a temporary IPv6 address along with the autoconfigured address, then enter the following command.<\/p>\n<p>sysctl net.ipv6.conf.all.use_tempaddr=1<\/p>\n<p>BSD systems are also capable of supporting privacy extensions.\u00a0 The following commands can be used on a FreeBSD system to enable IPv6 privacy addressing.<\/p>\n<p>sysctl net.inet6.ip6.use_tempaddr=1<\/p>\n<p>sysctl net.inet6.ip6.prefer_tempaddr=1<\/p>\n<p>To enable privacy addressing on a NetBSD, enter the following command.<\/p>\n<p>sysctl -w net.inet6.ip6.use_tempaddr=1<\/p>\n<p>Apple MAC OS X also supports temporary addressing and it is enabled on MAC OS X 10.7 Lion by default.\u00a0 The following command can be used to set this manually.<\/p>\n<p>sysctl -w net.inet6.ip6.use_tempaddr=1<\/p>\n<p>Solaris 10 does not have privacy addresses enabled by default.\u00a0 Temporary addresses can be configured by using the Neighbor Discovery Daemon (in.ndpd).\u00a0 The settings are controlled by the \/etc\/inet\/ndpd.conf file.\u00a0 Enter the following command to this file to enable the use of privacy addresses.<\/p>\n<p>ifdefault TmpAddrsEnabled true<\/p>\n<p>To enable privacy addressing on a per-interface basis you can add the following line to the \/etc\/inet\/ndpd.conf file.<\/p>\n<p>if interface TmpAddrsEnabled true<\/p>\n<p>For example, if a Solaris 10 system is using an interface named pcn1, you\u00a0 place the following entry:<\/p>\n<p>if pcn1 TmpAddrsEnabled true<\/p>\n<p>For the above-mentioned reasons, many organizations will not use privacy addressing or temporary addressing on any server or system with the internal network or engineering network or for any application server.\u00a0 Most critical servers will have statically configured IPv6 addresses.\u00a0 Many enterprises should use DHCPv6 as the preferred method of dynamically assigning addresses to hosts, and then use Extended Unique Identifier 64 (EUI-64) if DHCPv6 is not available.\u00a0 The issue here is that many organizations currently have a large population of Microsoft Windows XP and older Apple Mac OS X systems that do not have native DHCPv6 client software.\u00a0 Regardless, organizations should keep track of what IPv6 addresses all hosts are using.\u00a0 However, some may allow subscriber mobile devices to use privacy addressing for accessing the Internet.<\/p>\n<h4 id=\"toc-hId--130931181\">SUMMARY<\/h4>\n<p>Enterprises should prefer the use of DHCPv6 over SLAAC or Stateless DHCPv6 for dynamic address assignment to end-nodes.\u00a0 DHCPv6 provides the security benefits of privacy addressing, but allows for the management and forensic information required to operate the network environment.<\/p>\n<p>Following is a listing of a typical address preference order for systems in an enterprise environments:<\/p>\n<p>Servers\/appliances in data centers, DMZ, or cloud:<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Statically assigned<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Stateful DHCPv6 \u2013 very rare cases and only by approval<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 SLAAC \u2013 never allowed (possibly disable RA messages)<\/p>\n<p>Host based end-node systems internal to the enterprise:<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Stateful DHCPv6<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Stateless DHCPv6 (if nodes do now support DHCPv6)<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 SLAAC \u2013 only if no other means is supported.<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Privacy addresses are not allowed at all.<\/p>\n<p>eof<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Here\u2019s the fourth and final entry of Cisco Press author and chair of the Rocky Mountain IPv6 Task Force\u00a0Scott Hogg\u2019s multi-part blog on IPv6 addressing. This week: dealing with IPv6 privacy addressing. We hope these particular blog entries have been helpful. Please check back soon for additional technical blog posts on IPv6 adoption. Also, be [&hellip;]<\/p>\n","protected":false},"author":319,"featured_media":3187,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[17],"tags":[16,56,38,15],"class_list":{"0":"post-4551","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ipv6-coe","8":"tag-infoblox","9":"tag-ipv4","10":"tag-ipv6","11":"tag-security","12":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Choosing Static, SLAAC or DHCPv6? (Part 4 -- Privacy Addressing)<\/title>\n<meta name=\"description\" content=\"There are many dynamic address formats that you can utilize. Find out the benefits of DHCPv6 and why it is advised that you use it for your network here.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/choosing-static-slaac-or-dhcpv6-part-4-privacy-addressing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Choosing Static, SLAAC or DHCPv6? (Part 4 -- Privacy Addressing)\" \/>\n<meta property=\"og:description\" content=\"There are many dynamic address formats that you can utilize. Find out the benefits of DHCPv6 and why it is advised that you use it for your network here.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/choosing-static-slaac-or-dhcpv6-part-4-privacy-addressing\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2012-07-09T17:31:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-02T18:06:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-ARIN.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Tom Coffeen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tom Coffeen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/choosing-static-slaac-or-dhcpv6-part-4-privacy-addressing\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/choosing-static-slaac-or-dhcpv6-part-4-privacy-addressing\\\/\"},\"author\":{\"name\":\"Tom Coffeen\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b299068ee4a9f542d2ad7d59a5b1d5b1\"},\"headline\":\"Choosing Static, SLAAC or DHCPv6? (Part 4 &#8212; Privacy Addressing)\",\"datePublished\":\"2012-07-09T17:31:47+00:00\",\"dateModified\":\"2025-04-02T18:06:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/choosing-static-slaac-or-dhcpv6-part-4-privacy-addressing\\\/\"},\"wordCount\":1253,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/choosing-static-slaac-or-dhcpv6-part-4-privacy-addressing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/IPv6-ARIN.jpg\",\"keywords\":[\"Infoblox\",\"IPv4\",\"IPv6\",\"Security\"],\"articleSection\":[\"IPv6 CoE\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/choosing-static-slaac-or-dhcpv6-part-4-privacy-addressing\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/choosing-static-slaac-or-dhcpv6-part-4-privacy-addressing\\\/\",\"name\":\"Choosing Static, SLAAC or DHCPv6? (Part 4 -- Privacy Addressing)\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/choosing-static-slaac-or-dhcpv6-part-4-privacy-addressing\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/choosing-static-slaac-or-dhcpv6-part-4-privacy-addressing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/IPv6-ARIN.jpg\",\"datePublished\":\"2012-07-09T17:31:47+00:00\",\"dateModified\":\"2025-04-02T18:06:06+00:00\",\"description\":\"There are many dynamic address formats that you can utilize. Find out the benefits of DHCPv6 and why it is advised that you use it for your network here.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/choosing-static-slaac-or-dhcpv6-part-4-privacy-addressing\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/choosing-static-slaac-or-dhcpv6-part-4-privacy-addressing\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/choosing-static-slaac-or-dhcpv6-part-4-privacy-addressing\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/IPv6-ARIN.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/IPv6-ARIN.jpg\",\"width\":660,\"height\":454,\"caption\":\"The IPv6 Tipping Point Effect\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/choosing-static-slaac-or-dhcpv6-part-4-privacy-addressing\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IPv6 CoE\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/ipv6-coe\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Choosing Static, SLAAC or DHCPv6? (Part 4 &#8212; Privacy Addressing)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b299068ee4a9f542d2ad7d59a5b1d5b1\",\"name\":\"Tom Coffeen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_319_1574118081-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_319_1574118081-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_319_1574118081-96x96.jpg\",\"caption\":\"Tom Coffeen\"},\"description\":\"Tom Coffeen is a network engineer, architect, and author with over twenty years of internetwork design, deployment, administration, and management experience. Tom co-founded HexaBuild, an IT consultancy specializing in the advancement of cloud, IoT, and security deployment best practices through IPv6 adoption. Prior to co-founding HexaBuild, Tom was an IPv6 Evangelist and a Distinguished Architect at Infoblox. Before that Tom was the VP of network architecture at the global CDN Limelight Networks where he led their deployment of IPv6. He is also the author of O\u2019Reilly Media\u2019s IPv6 Address Planning.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/tom-coffeen\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Choosing Static, SLAAC or DHCPv6? (Part 4 -- Privacy Addressing)","description":"There are many dynamic address formats that you can utilize. Find out the benefits of DHCPv6 and why it is advised that you use it for your network here.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/choosing-static-slaac-or-dhcpv6-part-4-privacy-addressing\/","og_locale":"en_US","og_type":"article","og_title":"Choosing Static, SLAAC or DHCPv6? (Part 4 -- Privacy Addressing)","og_description":"There are many dynamic address formats that you can utilize. Find out the benefits of DHCPv6 and why it is advised that you use it for your network here.","og_url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/choosing-static-slaac-or-dhcpv6-part-4-privacy-addressing\/","og_site_name":"Infoblox Blog","article_published_time":"2012-07-09T17:31:47+00:00","article_modified_time":"2025-04-02T18:06:06+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-ARIN.jpg","type":"image\/jpeg"}],"author":"Tom Coffeen","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Tom Coffeen","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/choosing-static-slaac-or-dhcpv6-part-4-privacy-addressing\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/choosing-static-slaac-or-dhcpv6-part-4-privacy-addressing\/"},"author":{"name":"Tom Coffeen","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b299068ee4a9f542d2ad7d59a5b1d5b1"},"headline":"Choosing Static, SLAAC or DHCPv6? (Part 4 &#8212; Privacy Addressing)","datePublished":"2012-07-09T17:31:47+00:00","dateModified":"2025-04-02T18:06:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/choosing-static-slaac-or-dhcpv6-part-4-privacy-addressing\/"},"wordCount":1253,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/choosing-static-slaac-or-dhcpv6-part-4-privacy-addressing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-ARIN.jpg","keywords":["Infoblox","IPv4","IPv6","Security"],"articleSection":["IPv6 CoE"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/choosing-static-slaac-or-dhcpv6-part-4-privacy-addressing\/","url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/choosing-static-slaac-or-dhcpv6-part-4-privacy-addressing\/","name":"Choosing Static, SLAAC or DHCPv6? (Part 4 -- Privacy Addressing)","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/choosing-static-slaac-or-dhcpv6-part-4-privacy-addressing\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/choosing-static-slaac-or-dhcpv6-part-4-privacy-addressing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-ARIN.jpg","datePublished":"2012-07-09T17:31:47+00:00","dateModified":"2025-04-02T18:06:06+00:00","description":"There are many dynamic address formats that you can utilize. Find out the benefits of DHCPv6 and why it is advised that you use it for your network here.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/choosing-static-slaac-or-dhcpv6-part-4-privacy-addressing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/ipv6-coe\/choosing-static-slaac-or-dhcpv6-part-4-privacy-addressing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/choosing-static-slaac-or-dhcpv6-part-4-privacy-addressing\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-ARIN.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-ARIN.jpg","width":660,"height":454,"caption":"The IPv6 Tipping Point Effect"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/choosing-static-slaac-or-dhcpv6-part-4-privacy-addressing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"IPv6 CoE","item":"https:\/\/www.infoblox.com\/blog\/category\/ipv6-coe\/"},{"@type":"ListItem","position":3,"name":"Choosing Static, SLAAC or DHCPv6? (Part 4 &#8212; Privacy Addressing)"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b299068ee4a9f542d2ad7d59a5b1d5b1","name":"Tom Coffeen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_319_1574118081-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_319_1574118081-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_319_1574118081-96x96.jpg","caption":"Tom Coffeen"},"description":"Tom Coffeen is a network engineer, architect, and author with over twenty years of internetwork design, deployment, administration, and management experience. Tom co-founded HexaBuild, an IT consultancy specializing in the advancement of cloud, IoT, and security deployment best practices through IPv6 adoption. Prior to co-founding HexaBuild, Tom was an IPv6 Evangelist and a Distinguished Architect at Infoblox. Before that Tom was the VP of network architecture at the global CDN Limelight Networks where he led their deployment of IPv6. He is also the author of O\u2019Reilly Media\u2019s IPv6 Address Planning.","url":"https:\/\/www.infoblox.com\/blog\/author\/tom-coffeen\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4551","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/319"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=4551"}],"version-history":[{"count":4,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4551\/revisions"}],"predecessor-version":[{"id":11339,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4551\/revisions\/11339"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/3187"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=4551"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=4551"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=4551"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}