{"id":4567,"date":"2012-05-07T10:59:08","date_gmt":"2012-05-07T17:59:08","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=4567"},"modified":"2020-05-06T10:31:43","modified_gmt":"2020-05-06T17:31:43","slug":"using-gns3-to-model-a-simple-ipv6-network-part-3","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/using-gns3-to-model-a-simple-ipv6-network-part-3\/","title":{"rendered":"Using GNS3 to Model a Simple IPv6 Network (part 3)"},"content":{"rendered":"<p>Picking up where we left off, let\u2019s take a look at some packet captures using Wireshark that will give us more insight into what\u2019s happening with SLAAC (Stateless Address Autoconfiguration) as it auto-configures an IPv6 address.<\/p>\n<p>Start GNS3 and recreate the topology and configuration from the\u00a0last post.<\/p>\n<p>In the topology window right click on the link between the router and host. Choose\u00a0<strong><em>capture<\/em><\/strong>\u00a0then select the interface (if you\u2019ve used the router\/host topology, only the router ethernet interface will appear as a choice). Note: if you have enabled the router interface GNS will complain that there is no traffic to capture (even if you have, you may get the error anyway but you should see the router interface in the \u201cCaptures\u201d portion of the GNS3 screen).<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-4568\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/using-gns3-part2-1_0.png\" alt=\"Using GNS3 Part 2\" width=\"300\" height=\"195\" \/><\/p>\n<p>In the \u201cCaptures\u201d window, right click on the interface and choose\u00a0<strong><em>Start Wireshark<\/em><\/strong>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-4569\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/using-gns3-part3-2_0.png\" alt=\"Using GNS3 Part 3\" width=\"300\" height=\"194\" \/><\/p>\n<p>X11, then Wireshark will start and you should get a screen that looks similar to the one below.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-4570\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/using-gns3-part3-3_0.png\" alt=\"Using GNS3 Part 3-3\" width=\"300\" height=\"191\" \/><\/p>\n<p>Let\u2019s filter out the packets not related to IPv6 by typing\u00a0<strong><em>ipv6<\/em><\/strong>\u00a0in the filter box then pressing\u00a0<strong><em>Apply<\/em><\/strong>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-4571\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/using-gns3-part3-4_0.png\" alt=\"\" width=\"300\" height=\"191\" \/><\/p>\n<p>Unless you\u2019ve just configured the IPv6 address you\u2019ll see only router advertisements. Let\u2019s take a closer look at one.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-4572\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/using-gns3-part3-5_0.png\" alt=\"Using GNS3 Part 3-5\" width=\"300\" height=\"191\" \/><\/p>\n<p>First, expand the \u201cEthernet II\u201d heading in the middle window.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-4573\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/using-gns3-part3-6_0.png\" alt=\"Using GNS3 Part 3-6\" width=\"300\" height=\"191\" \/><\/p>\n<p>Note the EtherType is set for 0x86DD indicating IPv6.\u00a0Now expand the \u201cInternet Protocol Version 6\u2033 heading.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-4574\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/using-gns3-part3-7_0.png\" alt=\"Using GNS3 Part 3-7\" width=\"300\" height=\"191\" \/><\/p>\n<p>The Next header field is set to a value of 56 indicating that the packet is an ICMPv6 packet. The Hop limit is set to 255 meaning the packet is restricted to the local segment and will be discarded by any routers.<\/p>\n<p>The source address will be the link-local address of the originating router while the destination address is the link-local scoped\u00a0<em>all-nodes\u00a0<\/em>multicast address of ff02::1.<\/p>\n<p>Finally, expand the \u201cInternet Control Message Protocol v6\u2033 heading then the \u201cICMPv6 Option\u201d subheading.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-4575\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/using-gns3-part3-8_0.png\" alt=\"Using GNS3 Part 3-8\" width=\"300\" height=\"191\" \/><\/p>\n<p>The type of ICMPv6 packet is specified as 134, the code for Router Advertisements and under the \u201cICMPv6 Option\u201d subheading you can see the advertised prefix of whatever \/64 you configured on your router interface (in our example 2001:db8:cafe:1:: ).<\/p>\n<p>Try removing and re-adding the \/64 prefix on the router interface. This will generate some other neighbor discovery packets, such as neighbor solicitations and advertisements.<\/p>\n<p>By now, you should have a grasp of how GNS3 can help you \u201cpeek under the hood\u201d with IPv6. Be sure to try modeling your particular IPv6 network challenges with GNS3.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Picking up where we left off, let\u2019s take a look at some packet captures using Wireshark that will give us more insight into what\u2019s happening with SLAAC (Stateless Address Autoconfiguration) as it auto-configures an IPv6 address. Start GNS3 and recreate the topology and configuration from the\u00a0last post. In the topology window right click on the [&hellip;]<\/p>\n","protected":false},"author":319,"featured_media":3187,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[17],"tags":[16,56,38,15],"class_list":{"0":"post-4567","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ipv6-coe","8":"tag-infoblox","9":"tag-ipv4","10":"tag-ipv6","11":"tag-security","12":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Using GNS3 to Model a Simple IPv6 Network (part 3)<\/title>\n<meta name=\"description\" content=\"Picking up where we left off, let\u2019s take a look at some packet captures using Wireshark that will give us more insight into what\u2019s happening with SLAAC (Stateless Address Autoconfiguration) as it auto-configures an IPv6 address.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/using-gns3-to-model-a-simple-ipv6-network-part-3\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Using GNS3 to Model a Simple IPv6 Network (part 3)\" \/>\n<meta property=\"og:description\" content=\"Picking up where we left off, let\u2019s take a look at some packet captures using Wireshark that will give us more insight into what\u2019s happening with SLAAC (Stateless Address Autoconfiguration) as it auto-configures an IPv6 address.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/using-gns3-to-model-a-simple-ipv6-network-part-3\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2012-05-07T17:59:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:31:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-ARIN.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Tom Coffeen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tom Coffeen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/using-gns3-to-model-a-simple-ipv6-network-part-3\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/using-gns3-to-model-a-simple-ipv6-network-part-3\\\/\"},\"author\":{\"name\":\"Tom Coffeen\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b299068ee4a9f542d2ad7d59a5b1d5b1\"},\"headline\":\"Using GNS3 to Model a Simple IPv6 Network (part 3)\",\"datePublished\":\"2012-05-07T17:59:08+00:00\",\"dateModified\":\"2020-05-06T17:31:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/using-gns3-to-model-a-simple-ipv6-network-part-3\\\/\"},\"wordCount\":412,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/using-gns3-to-model-a-simple-ipv6-network-part-3\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/IPv6-ARIN.jpg\",\"keywords\":[\"Infoblox\",\"IPv4\",\"IPv6\",\"Security\"],\"articleSection\":[\"IPv6 CoE\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/using-gns3-to-model-a-simple-ipv6-network-part-3\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/using-gns3-to-model-a-simple-ipv6-network-part-3\\\/\",\"name\":\"Using GNS3 to Model a Simple IPv6 Network (part 3)\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/using-gns3-to-model-a-simple-ipv6-network-part-3\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/using-gns3-to-model-a-simple-ipv6-network-part-3\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/IPv6-ARIN.jpg\",\"datePublished\":\"2012-05-07T17:59:08+00:00\",\"dateModified\":\"2020-05-06T17:31:43+00:00\",\"description\":\"Picking up where we left off, let\u2019s take a look at some packet captures using Wireshark that will give us more insight into what\u2019s happening with SLAAC (Stateless Address Autoconfiguration) as it auto-configures an IPv6 address.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/using-gns3-to-model-a-simple-ipv6-network-part-3\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/using-gns3-to-model-a-simple-ipv6-network-part-3\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/using-gns3-to-model-a-simple-ipv6-network-part-3\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/IPv6-ARIN.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/IPv6-ARIN.jpg\",\"width\":660,\"height\":454,\"caption\":\"The IPv6 Tipping Point Effect\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/using-gns3-to-model-a-simple-ipv6-network-part-3\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IPv6 CoE\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/ipv6-coe\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Using GNS3 to Model a Simple IPv6 Network (part 3)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b299068ee4a9f542d2ad7d59a5b1d5b1\",\"name\":\"Tom Coffeen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_319_1574118081-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_319_1574118081-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_319_1574118081-96x96.jpg\",\"caption\":\"Tom Coffeen\"},\"description\":\"Tom Coffeen is a network engineer, architect, and author with over twenty years of internetwork design, deployment, administration, and management experience. Tom co-founded HexaBuild, an IT consultancy specializing in the advancement of cloud, IoT, and security deployment best practices through IPv6 adoption. Prior to co-founding HexaBuild, Tom was an IPv6 Evangelist and a Distinguished Architect at Infoblox. Before that Tom was the VP of network architecture at the global CDN Limelight Networks where he led their deployment of IPv6. He is also the author of O\u2019Reilly Media\u2019s IPv6 Address Planning.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/tom-coffeen\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Using GNS3 to Model a Simple IPv6 Network (part 3)","description":"Picking up where we left off, let\u2019s take a look at some packet captures using Wireshark that will give us more insight into what\u2019s happening with SLAAC (Stateless Address Autoconfiguration) as it auto-configures an IPv6 address.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/using-gns3-to-model-a-simple-ipv6-network-part-3\/","og_locale":"en_US","og_type":"article","og_title":"Using GNS3 to Model a Simple IPv6 Network (part 3)","og_description":"Picking up where we left off, let\u2019s take a look at some packet captures using Wireshark that will give us more insight into what\u2019s happening with SLAAC (Stateless Address Autoconfiguration) as it auto-configures an IPv6 address.","og_url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/using-gns3-to-model-a-simple-ipv6-network-part-3\/","og_site_name":"Infoblox Blog","article_published_time":"2012-05-07T17:59:08+00:00","article_modified_time":"2020-05-06T17:31:43+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-ARIN.jpg","type":"image\/jpeg"}],"author":"Tom Coffeen","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Tom Coffeen","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/using-gns3-to-model-a-simple-ipv6-network-part-3\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/using-gns3-to-model-a-simple-ipv6-network-part-3\/"},"author":{"name":"Tom Coffeen","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b299068ee4a9f542d2ad7d59a5b1d5b1"},"headline":"Using GNS3 to Model a Simple IPv6 Network (part 3)","datePublished":"2012-05-07T17:59:08+00:00","dateModified":"2020-05-06T17:31:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/using-gns3-to-model-a-simple-ipv6-network-part-3\/"},"wordCount":412,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/using-gns3-to-model-a-simple-ipv6-network-part-3\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-ARIN.jpg","keywords":["Infoblox","IPv4","IPv6","Security"],"articleSection":["IPv6 CoE"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/using-gns3-to-model-a-simple-ipv6-network-part-3\/","url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/using-gns3-to-model-a-simple-ipv6-network-part-3\/","name":"Using GNS3 to Model a Simple IPv6 Network (part 3)","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/using-gns3-to-model-a-simple-ipv6-network-part-3\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/using-gns3-to-model-a-simple-ipv6-network-part-3\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-ARIN.jpg","datePublished":"2012-05-07T17:59:08+00:00","dateModified":"2020-05-06T17:31:43+00:00","description":"Picking up where we left off, let\u2019s take a look at some packet captures using Wireshark that will give us more insight into what\u2019s happening with SLAAC (Stateless Address Autoconfiguration) as it auto-configures an IPv6 address.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/using-gns3-to-model-a-simple-ipv6-network-part-3\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/ipv6-coe\/using-gns3-to-model-a-simple-ipv6-network-part-3\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/using-gns3-to-model-a-simple-ipv6-network-part-3\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-ARIN.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-ARIN.jpg","width":660,"height":454,"caption":"The IPv6 Tipping Point Effect"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/using-gns3-to-model-a-simple-ipv6-network-part-3\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"IPv6 CoE","item":"https:\/\/www.infoblox.com\/blog\/category\/ipv6-coe\/"},{"@type":"ListItem","position":3,"name":"Using GNS3 to Model a Simple IPv6 Network (part 3)"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b299068ee4a9f542d2ad7d59a5b1d5b1","name":"Tom Coffeen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_319_1574118081-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_319_1574118081-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_319_1574118081-96x96.jpg","caption":"Tom Coffeen"},"description":"Tom Coffeen is a network engineer, architect, and author with over twenty years of internetwork design, deployment, administration, and management experience. Tom co-founded HexaBuild, an IT consultancy specializing in the advancement of cloud, IoT, and security deployment best practices through IPv6 adoption. Prior to co-founding HexaBuild, Tom was an IPv6 Evangelist and a Distinguished Architect at Infoblox. Before that Tom was the VP of network architecture at the global CDN Limelight Networks where he led their deployment of IPv6. He is also the author of O\u2019Reilly Media\u2019s IPv6 Address Planning.","url":"https:\/\/www.infoblox.com\/blog\/author\/tom-coffeen\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4567","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/319"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=4567"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4567\/revisions"}],"predecessor-version":[{"id":4576,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4567\/revisions\/4576"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/3187"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=4567"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=4567"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=4567"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}