{"id":18630,"date":"2022-08-17T13:32:27","date_gmt":"2022-08-17T13:32:27","guid":{"rendered":"https:\/\/prensa.lacnic.net\/news?p=18630"},"modified":"2022-08-17T13:33:09","modified_gmt":"2022-08-17T13:33:09","slug":"key-considerations-to-avoid-errors-when-deploying-a-network","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/en\/key-considerations-to-avoid-errors-when-deploying-a-network\/","title":{"rendered":"Key Considerations to Avoid Errors When Deploying a Network"},"content":{"rendered":"\n<p class=\"author\"><strong>By <a href=\"https:\/\/prensa.lacnic.net\/news\/en\/author\/henri-alves-de-godoy\">Henri Alves de Godoy<\/a><\/strong> &#8211; Computer Network Analyst, Campinas University<\/p>\n\n\n\n<p>With emerging technologies such as 5G, IoT, streaming platforms and game consoles, we need to be vigilant so that we can support applications in a way that allows providing high-quality Internet access to end users. To serve this vast number of hosts, we must consider the use of the IPv6 protocol in new projects so that business growth prospects will not be affected. To minimize potential errors and consequently project failure, the entire infrastructure must be properly planned from the beginning. Below I will share four steps or main topics that will help us avoid these mistakes and achieve greater success in future network projects, whether at ISP, university, corporate, or government level.<\/p>\n\n\n\n<p><strong>1 \u2013 The IPv4 mindset<\/strong><\/p>\n\n\n\n<p>A common error among professionals is that they maintain some habits and practices while still thinking in terms of the IPv4 protocol. An example of this is the use of ICMP message blocks or packet filtering firewalls. While in the past some professionals used these blocks in the belief that they would keep their network safe (something that is not true), thanks to the IPv6 protocol, today we can no longer do this as we depend on ICMPv6 for the protocol and its neighbor discovery protocol (NDP) announcements to work.<\/p>\n\n\n\n<p>We must understand that, today, with IPv6, we no longer assign an IP address, but an entire \/64 network or more, and we don&#8217;t need to worry about the scarcity of addresses as we did in the past (economy of IPv4 addresses) \u2014 IPv6 addresses will last for hundreds of years. This change in mindset is very important, as some are still afraid that they are wasting IPv6 resources and will end up having to perform NAT on IPv6 addresses.<\/p>\n\n\n\n<p>Choosing the method used to assign IPv6 addresses to hosts is essential, as DHCPv6 does not configure the default gateway and we must combine it with other techniques such as SLAAC. We need to understand that the main purpose of DHCP\/DHCPv6 is assigning the hosts\u2019 IP addresses and other configuration parameters, yet many use this service as a way to create records (logs) for their users.<\/p>\n\n\n\n<p><strong>2 \u2013 Not involving our systems development teams<\/strong><\/p>\n\n\n\n<p>The use of new services and applications must consider their compatibility with the IPv6 protocol. With ISPs assigning more and more IPv6 addresses, most still in dual-stack mode, users now connect to basic web services, email, DNS and most likely also to smartphone apps using IPv6. Thus, involving the entire systems development team and helping them understand the new network protocols is extremely important so that the code of new applications can handle addresses longer than the 32 bits allowed by IPv4, for example, in a database.<\/p>\n\n\n\n<p>A simple example would be to make a habit of having the applications\u2019 bind socket (Apache, Nginx, Tomcat, MySQL, PostgreSQL) at the ::1 address (localhost) so that our datacenter services will be prepared for an IPv6-only scenario and the elimination of IPv4 from our network.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"337\" src=\"https:\/\/prensa.lacnic.net\/news\/wp-content\/uploads\/2022\/08\/figure1-despliegue-red-ipv6-agosto-2022-1024x337.png\" alt=\"\" class=\"wp-image-18617\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/08\/figure1-despliegue-red-ipv6-agosto-2022-1024x337.png 1024w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/08\/figure1-despliegue-red-ipv6-agosto-2022-300x99.png 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/08\/figure1-despliegue-red-ipv6-agosto-2022-768x253.png 768w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/08\/figure1-despliegue-red-ipv6-agosto-2022-1536x505.png 1536w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/08\/figure1-despliegue-red-ipv6-agosto-2022-2048x674.png 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption>Tomcat (server.xml) and PostgreSQL (database.yml) configuration files<br><\/figcaption><\/figure>\n\n\n\n<p>Keep in mind that new products that offer audit reports, network monitoring, and access restrictions must consider IPv6 addresses in their development. In this sense, the DevOps movement is considered the key for breaking the barrier of 40% global IPv6 adoption we reached in 2022.<\/p>\n\n\n\n<p>Source:<\/p>\n\n\n\n<p><a href=\"https:\/\/pulse.internetsociety.org\/blog\/ipv6-deployment-passes-another-milestone\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/pulse.internetsociety.org\/blog\/ipv6-deployment-passes-another-milestone<\/a><\/p>\n\n\n\n<p><strong>3 \u2013 Disabling IPv6<\/strong><\/p>\n\n\n\n<p>One of the biggest mistakes is to consider disabling IPv6 on a network. Despite the false sense of relief provided by the possible solution of a network or application error, this delays the mitigation of the problem even further.<\/p>\n\n\n\n<p>Operating systems and major browsers prefer IPv6 connections through Happy Eyeballs (RFC 8305). Thus, the degradation of IPv6 traffic or any routing issues are perceived by users and can slow down Internet access in general. As a result, the number of complaints may increase, and users may finally give up and disable IPv6 on their hosts. Therefore, in addition to providing IPv6, an essential function of ISPs is to monitor and manage the dual-stack network so that this does not become a common practice and negatively affects IPv6 adoption.<\/p>\n\n\n\n<p>We must also fight the fake news currently circulating in relation to IPv6, for example, that disabling IPv6 can speed up a network or that disabling IPv6 better protects a VPN. These conceptual errors make it very difficult to increase the speed of the transition to IPv6, so we need to create awareness about this.<\/p>\n\n\n\n<p><strong>4 \u2013 Ignoring IPv6<\/strong><\/p>\n\n\n\n<p>Finally, we should avoid dismissing concerns about or ignoring IPv6 on our network based on the notion that it is merely a fad. We should be aware that IPv6 is already present on our networks in some way, for example, through the ULA addresses of network interfaces, and even more serious is the fact that we may still not have noticed this.<\/p>\n\n\n\n<p>By not monitoring or managing our network, 6to4 tunnels may be being created on Windows operating systems, causing us to have IPv6 traffic even if we still do not admit that we do. This may create a poor browsing experience for users who go through different paths, causing serious security problems, as our access controls and firewalls may not be dealing with such traffic.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"692\" src=\"https:\/\/prensa.lacnic.net\/news\/wp-content\/uploads\/2022\/08\/figure2-despliegue-red-ipv6-agosto-2022-1024x692.png\" alt=\"\" class=\"wp-image-18620\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/08\/figure2-despliegue-red-ipv6-agosto-2022-1024x692.png 1024w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/08\/figure2-despliegue-red-ipv6-agosto-2022-300x203.png 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/08\/figure2-despliegue-red-ipv6-agosto-2022-768x519.png 768w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/08\/figure2-despliegue-red-ipv6-agosto-2022-1536x1038.png 1536w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/08\/figure2-despliegue-red-ipv6-agosto-2022.png 1788w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption>Example of automatic 6to4 tunneling on Windows<\/figcaption><\/figure>\n\n\n\n<p>In view of the above, the best way to solve this problem is to convince ourselves that IPv6 is a protocol that should be considered and enabled on our networks. However, if enabling IPv6 on your network is not yet in your plans, automatic tunnels can be dealt with easily (protocol 41) by managing group policies in a network on Active Directory in order to minimize the problem.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Henri Alves de Godoy &#8211; Computer Network Analyst, Campinas University With emerging technologies such as 5G, IoT, streaming platforms and game consoles, we need to be vigilant so that we can support applications in a way that allows providing high-quality Internet access to end users. To serve this vast number of hosts, we must [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":18623,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[531],"tags":[1304],"archivo":[1345],"taxonomy-authors":[1260],"tipo_autor":[],"class_list":["post-18630","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ipv6","tag-ipv6","archivo-editions","taxonomy-authors-henri-alves-de-godoy-en"],"acf":{"author":"","related_notes":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC Blog | Key Considerations to Avoid Errors When Deploying a Network<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/en\/key-considerations-to-avoid-errors-when-deploying-a-network\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC Blog | Key Considerations to Avoid Errors When Deploying a Network\" \/>\n<meta property=\"og:description\" content=\"By Henri Alves de Godoy &#8211; Computer Network Analyst, Campinas University With emerging technologies such as 5G, IoT, streaming platforms and game consoles, we need to be vigilant so that we can support applications in a way that allows providing high-quality Internet access to end users. To serve this vast number of hosts, we must [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/en\/key-considerations-to-avoid-errors-when-deploying-a-network\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-17T13:32:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-17T13:33:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/08\/despliegue-ipv6-agosto-2022.png\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gianni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/key-considerations-to-avoid-errors-when-deploying-a-network\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/key-considerations-to-avoid-errors-when-deploying-a-network\/\"},\"author\":{\"name\":\"Gianni\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\"},\"headline\":\"Key Considerations to Avoid Errors When Deploying a Network\",\"datePublished\":\"2022-08-17T13:32:27+00:00\",\"dateModified\":\"2022-08-17T13:33:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/key-considerations-to-avoid-errors-when-deploying-a-network\/\"},\"wordCount\":954,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/key-considerations-to-avoid-errors-when-deploying-a-network\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/08\/despliegue-ipv6-agosto-2022.png\",\"keywords\":[\"IPv6\"],\"articleSection\":[\"IPv6\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/key-considerations-to-avoid-errors-when-deploying-a-network\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/key-considerations-to-avoid-errors-when-deploying-a-network\/\",\"url\":\"https:\/\/blog.lacnic.net\/en\/key-considerations-to-avoid-errors-when-deploying-a-network\/\",\"name\":\"LACNIC Blog | Key Considerations to Avoid Errors When Deploying a Network\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/key-considerations-to-avoid-errors-when-deploying-a-network\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/key-considerations-to-avoid-errors-when-deploying-a-network\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/08\/despliegue-ipv6-agosto-2022.png\",\"datePublished\":\"2022-08-17T13:32:27+00:00\",\"dateModified\":\"2022-08-17T13:33:09+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/key-considerations-to-avoid-errors-when-deploying-a-network\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/key-considerations-to-avoid-errors-when-deploying-a-network\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/key-considerations-to-avoid-errors-when-deploying-a-network\/#primaryimage\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/08\/despliegue-ipv6-agosto-2022.png\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/08\/despliegue-ipv6-agosto-2022.png\",\"width\":680,\"height\":330},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/key-considerations-to-avoid-errors-when-deploying-a-network\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Key Considerations to Avoid Errors When Deploying a Network\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\",\"name\":\"Gianni\",\"url\":\"https:\/\/blog.lacnic.net\/en\/author\/gianni\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC Blog | Key Considerations to Avoid Errors When Deploying a Network","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/en\/key-considerations-to-avoid-errors-when-deploying-a-network\/","og_locale":"en_US","og_type":"article","og_title":"LACNIC Blog | Key Considerations to Avoid Errors When Deploying a Network","og_description":"By Henri Alves de Godoy &#8211; Computer Network Analyst, Campinas University With emerging technologies such as 5G, IoT, streaming platforms and game consoles, we need to be vigilant so that we can support applications in a way that allows providing high-quality Internet access to end users. To serve this vast number of hosts, we must [&hellip;]","og_url":"https:\/\/blog.lacnic.net\/en\/key-considerations-to-avoid-errors-when-deploying-a-network\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2022-08-17T13:32:27+00:00","article_modified_time":"2022-08-17T13:33:09+00:00","og_image":[{"width":680,"height":330,"url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/08\/despliegue-ipv6-agosto-2022.png","type":"image\/png"}],"author":"Gianni","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/en\/key-considerations-to-avoid-errors-when-deploying-a-network\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/en\/key-considerations-to-avoid-errors-when-deploying-a-network\/"},"author":{"name":"Gianni","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab"},"headline":"Key Considerations to Avoid Errors When Deploying a Network","datePublished":"2022-08-17T13:32:27+00:00","dateModified":"2022-08-17T13:33:09+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/key-considerations-to-avoid-errors-when-deploying-a-network\/"},"wordCount":954,"commentCount":0,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/key-considerations-to-avoid-errors-when-deploying-a-network\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/08\/despliegue-ipv6-agosto-2022.png","keywords":["IPv6"],"articleSection":["IPv6"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.lacnic.net\/en\/key-considerations-to-avoid-errors-when-deploying-a-network\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/en\/key-considerations-to-avoid-errors-when-deploying-a-network\/","url":"https:\/\/blog.lacnic.net\/en\/key-considerations-to-avoid-errors-when-deploying-a-network\/","name":"LACNIC Blog | Key Considerations to Avoid Errors When Deploying a Network","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/key-considerations-to-avoid-errors-when-deploying-a-network\/#primaryimage"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/key-considerations-to-avoid-errors-when-deploying-a-network\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/08\/despliegue-ipv6-agosto-2022.png","datePublished":"2022-08-17T13:32:27+00:00","dateModified":"2022-08-17T13:33:09+00:00","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/en\/key-considerations-to-avoid-errors-when-deploying-a-network\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/en\/key-considerations-to-avoid-errors-when-deploying-a-network\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/en\/key-considerations-to-avoid-errors-when-deploying-a-network\/#primaryimage","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/08\/despliegue-ipv6-agosto-2022.png","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/08\/despliegue-ipv6-agosto-2022.png","width":680,"height":330},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/en\/key-considerations-to-avoid-errors-when-deploying-a-network\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/en\/"},{"@type":"ListItem","position":2,"name":"Key Considerations to Avoid Errors When Deploying a Network"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab","name":"Gianni","url":"https:\/\/blog.lacnic.net\/en\/author\/gianni\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/08\/despliegue-ipv6-agosto-2022.png","jetpack_sharing_enabled":true,"wpml_current_locale":"en_US","wpml_translations":[{"locale":"es_ES","id":18614,"post_title":"Consideraciones clave para no equivocarnos en el despliegue de una red","slug":"consideraciones-clave-para-no-equivocarnos-en-el-despliegue-de-una-red","href":"https:\/\/blog.lacnic.net\/consideraciones-clave-para-no-equivocarnos-en-el-despliegue-de-una-red\/"},{"locale":"pt_BR","id":18639,"post_title":"Considera\u00e7\u00f5es fundamentais para n\u00e3o errar em uma implanta\u00e7\u00e3o de rede","slug":"consideracoes-fundamentais-para-nao-errar-em-uma-implantacao-de-rede","href":"https:\/\/blog.lacnic.net\/pt-br\/consideracoes-fundamentais-para-nao-errar-em-uma-implantacao-de-rede\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/18630","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=18630"}],"version-history":[{"count":2,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/18630\/revisions"}],"predecessor-version":[{"id":18632,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/18630\/revisions\/18632"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media\/18623"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=18630"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=18630"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=18630"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/archivo?post=18630"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/taxonomy-authors?post=18630"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tipo_autor?post=18630"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}