{"id":31456,"date":"2025-10-21T15:45:54","date_gmt":"2025-10-21T15:45:54","guid":{"rendered":"https:\/\/blog.lacnic.net\/?p=31456"},"modified":"2025-10-21T17:32:56","modified_gmt":"2025-10-21T17:32:56","slug":"telemetry-security-ipv6","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/en\/telemetry-security-ipv6\/","title":{"rendered":"Telemetry Applied to Security Automation in IPv6 Networks"},"content":{"rendered":"\n<p><strong>By <a href=\"https:\/\/blog.lacnic.net\/en\/author\/ernesto-sanchez\/\">Ernesto S\u00e1nchez<\/a> and<\/strong> <strong><a href=\"https:\/\/blog.lacnic.net\/en\/author\/henri-alves-de-godoy\/\">Henri Alves de Godoy<\/a><\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Introduction<\/h2>\n\n\n\n<p>During the <strong>LACNIC 44 meeting held in El Salvador<\/strong>, we presented the study titled \u201c<em>Telemetry Applied to Security Automation in IPv6 Networks<\/em>,\u201d the result of a collaboration between <strong>Universidad Cat\u00f3lica de Salta (Argentina)<\/strong> and <strong>Universidade Estadual de Campinas (UNICAMP, Brasil)<\/strong>.<\/p>\n\n\n\n<p>The study provided practical evidence of how the use of <strong>modern telemetry protocols<\/strong> and <strong>programmable interfaces<\/strong> can transform the way we operate and protect IPv6 networks, combining <strong>visibility, automation, and security<\/strong>. As the number of devices, IoT sensors, and data flows have increased, network visibility and control have become essential.<\/p>\n\n\n\n<p>For many years, network administrators relied on traditional technologies such as <strong>SNMP<\/strong> and <strong>CLI<\/strong>, which we became accustomed to using. However, these methods <strong>lack scalability<\/strong>, depend on <strong>unstructured<\/strong> formats, and offer <strong>limited real-time visibility<\/strong>, making it difficult to react quickly to security incidents or operational failures.<\/p>\n\n\n\n<p>To address these limitations, the study introduced the concept of <strong>Network Telemetry<\/strong>, a new paradigm that replaces reactive data collection with a <strong>proactive and continuous<\/strong> model, integrating automation, security, and operational intelligence.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">From Classic Monitoring to Smart Telemetry<\/h2>\n\n\n\n<p>Traditionally, network administrators used a <strong>polling model<\/strong>, periodically querying each device, usually via SNMP, to collect status information. This process not only generates operational overhead but also provides a fragmented and delayed view of network status.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Telemetry Applied to Security Automation in IPv6 Networks\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/l8O-t24BykM?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p>In contrast, <strong>modern telemetry<\/strong> eliminates the need to poll devices and instead <strong>continuously<\/strong> transmits their performance metrics, CPU usage, traffic, or security events in <strong>structured, real-time data streams<\/strong>.<\/p>\n\n\n\n<p>This shift is supported by next-generation protocols, such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>NETCONF and RESTCONF<\/strong>, based on YANG models, which allow for standardized configuration and querying;<\/li>\n\n\n\n<li><strong>gNMI (gRPC Network Management Interface)<\/strong>, designed for continuous and efficient streaming;<\/li>\n\n\n\n<li><strong>JSON-RPC<\/strong>, used for remote procedure calls in JSON format, ideal for integration with automation and security systems.<\/li>\n<\/ul>\n\n\n\n<p>The combined use of these technologies forms what <strong>RFC 9232<\/strong> defines as the <strong>Network Telemetry Framework<\/strong>, a set of processes and protocols that provide full visibility across the different network planes (data, control, and management).<\/p>\n\n\n\n<p>Published by the IETF, <strong>RFC 9232 \u2013 Framework for Network Telemetry<\/strong> defines the architecture and fundamental principles of modern telemetry. It proposes implementation across all operational network planes, as outlined below:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Data plane telemetry<\/strong>: monitors traffic, packet statistics, losses, latencies, and flows.<\/li>\n\n\n\n<li><strong>Control plane telemetry<\/strong>: monitors routing and neighbor discovery protocols such as ICMPv6 ND, OSPFv3, and BGP.<\/li>\n\n\n\n<li><strong>Management plane telemetry<\/strong>: collects configuration metrics, logs, ACLs, policies, and security states.<\/li>\n<\/ul>\n\n\n\n<p>The main goal of the framework is to enable <strong>visibility, automation, and smart event correlation<\/strong>, making it possible to detect anomalies, optimize performance, verify policy compliance, and\u2014most importantly\u2014<strong>automate incident responses in real time<\/strong>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">AI Applied to Network Automation<\/h2>\n\n\n\n<p>One of the distinctive aspects of this project is the use of <strong>Artificial Intelligence<\/strong> to support the research and development cycle. <strong>Python and Scapy<\/strong> scripts were automatically generated through <strong>prompt engineering<\/strong>, along with <strong>gNMI and JSON-RPC API configurations<\/strong>, integrated into an automated process control environment.<\/p>\n\n\n\n<p>This methodology included three main phases:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Definition and Design<\/strong>: identification of the problem and modeling of the solution architecture.<\/li>\n\n\n\n<li><strong>Assisted Implementation<\/strong>: human-machine collaboration in the creation of scripts, commands, and component integration.<\/li>\n\n\n\n<li><strong>Validation and Control<\/strong>: security, performance, and robustness testing.<\/li>\n<\/ol>\n\n\n\n<p>It should be noted that throughout the research, AI functioned strictly as a technical assistant. It <strong>did not replace the researcher<\/strong>, but instead increased efficiency and reduced task implementation times.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Case Study: IPv6 Telemetry and Security<\/h2>\n\n\n\n<p>The testing and simulation lab was developed on the <strong>Nokia SR Linux Streaming Telemetry Lab<\/strong> platform in a virtualized topology. Nodes were integrated with <strong>gNMIc<\/strong> (a gRPC-based client for collecting and subscribing to metrics) and visualized in Elasticsearch, <strong>Prometheus, and Grafana<\/strong>, an architecture that enabled real-time measurement of network behavior and dynamic response to events. Using this modern telemetry framework, we were able to address some of our research needs and overcome several challenges, such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Automatic discovery<\/strong> of hosts in IPv6 networks.<\/li>\n\n\n\n<li><strong>Detection of unknown or unauthorized devices<\/strong>.<\/li>\n\n\n\n<li>Real-time mitigation of <strong>ICMPv6 Neighbor Discovery<\/strong>-based attacks through <strong>dynamic ACL enforcement.<\/strong><\/li>\n\n\n\n<li><strong>Subscription to traffic and performance metrics<\/strong> on interfaces, ACLs, and CPU via gNMI streaming.<\/li>\n<\/ul>\n\n\n\n<p>The following is part of an example of an automatically generated binding between a MAC address and IPv6:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>{\n  \"mac\": \"aa:c1:ab:55:20:5a\",\n  \"interface\": \"ethernet-1\/2.0\",\n  \"ipv6_link_local\": \"fe80::a8c1:abff:fe55:205a\",\n  \"ipv6_global\": \"2001:db8:20:0:a8c1:abff:fe55:205a\",\n  \"timestamp\": \"2025-06-10T01:28:39.773935\"\n}<\/code><\/pre>\n\n\n\n<p>Based on this information, the system:<\/p>\n\n\n\n<p>Sends valid bindings via JSON-RPC to Elasticsearch for serialization and indexing, where they become a data source for visualization in Grafana.<\/p>\n\n\n\n<p>Applies dynamic policies via JSON-RPC\/YANG to accept or block ICMPv6 traffic according to predefined rules:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>set acl acl-filter {iface} type ipv6 entry 10 match ipv6 next-header icmp6 source-ip prefix {ipv6_link_local}\/128\nset acl acl-filter {iface} type ipv6 entry 10 action accept\nset acl acl-filter {iface} type ipv6 entry 11 match ipv6 next-header icmp6 source-ip prefix {ipv6_global}\/128\nset acl acl-filter {iface} type ipv6 entry 11 action accept<\/code><\/pre>\n\n\n\n<p>These metrics are collected via <strong>gNMI stream-mode sampling<\/strong> every five seconds and exported in <strong>Prometheus<\/strong> format, allowing instant visualization in <strong>Grafana<\/strong>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Findings<\/h2>\n\n\n\n<p><strong>The study demonstrated that modern telemetry<\/strong> based on gNMI and JSON-RPC not only monitors, but also integrates <strong>security, automation, and operational analytics<\/strong> into a single data stream. As a result, it is consolidating its role as a <strong>strategic element<\/strong> for IPv6 network reliability and security, enabling academic institutions, ISPs, and companies to advance toward the operation of <strong>smart, resilient, and autonomous networks<\/strong>.<\/p>\n\n\n\n<p>Finally, the tests revealed significant improvements:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Early threat detection<\/strong>: streaming-based telemetry identifies traffic changes and anomalies almost instantly.<\/li>\n\n\n\n<li><strong>Mitigation automation<\/strong>: ACLs are dynamically applied, reducing human intervention and shortening response times.<\/li>\n\n\n\n<li><strong>True interoperability<\/strong>: the use of <strong>open YANG models (OpenConfig)<\/strong> eliminates vendor lock-in and simplifies integration.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">References<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>RFC 9232 \u2014 <em>Framework for Network Telemetry<\/em><\/li>\n\n\n\n<li>OpenConfig \/ gNMI \u2014 <a href=\"https:\/\/gnmic.openconfig.net\/\">https:\/\/gnmic.openconfig.net<\/a><\/li>\n\n\n\n<li>Nokia SR Linux Telemetry Lab \u2014 <a href=\"https:\/\/github.com\/srl-labs\/srl-telemetry-lab\">https:\/\/github.com\/srl-labs\/srl-telemetry-lab<\/a><\/li>\n\n\n\n<li>Nokia YANG Documentation \u2014 <a href=\"https:\/\/yang.srlinux.dev\/\">https:\/\/yang.srlinux.dev<\/a><\/li>\n\n\n\n<li>IPv6 Telemetry Project \u2014 <a href=\"https:\/\/github.com\/ernestosv73\/telemetria-ipv6\">https:\/\/github.com\/ernestosv73\/telemetria-ipv6<\/a><\/li>\n\n\n\n<li>Presentation video \u2014 <a href=\"https:\/\/www.youtube.com\/watch?v=u7ans7c86NA\">https:\/\/www.youtube.com\/watch?v=u7ans7c86NA<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>By Ernesto S\u00e1nchez and Henri Alves de Godoy Introduction During the LACNIC 44 meeting held in El Salvador, we presented the study titled \u201cTelemetry Applied to Security Automation in IPv6 Networks,\u201d the result of a collaboration between Universidad Cat\u00f3lica de Salta (Argentina) and Universidade Estadual de Campinas (UNICAMP, Brasil). The study provided practical evidence of [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":31451,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[531],"tags":[1283,1304],"archivo":[1345,1451],"taxonomy-authors":[1566,1260],"tipo_autor":[],"class_list":["post-31456","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ipv6","tag-events","tag-ipv6","archivo-editions","archivo-highlights-2023","taxonomy-authors-ernesto-sanchez-en","taxonomy-authors-henri-alves-de-godoy-en"],"acf":{"author":"","related_notes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC Blog | Telemetry Applied to Security Automation in IPv6 Networks<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/en\/telemetry-security-ipv6\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC Blog | Telemetry Applied to Security Automation in IPv6 Networks\" \/>\n<meta property=\"og:description\" content=\"By Ernesto S\u00e1nchez and Henri Alves de Godoy Introduction During the LACNIC 44 meeting held in El Salvador, we presented the study titled \u201cTelemetry Applied to Security Automation in IPv6 Networks,\u201d the result of a collaboration between Universidad Cat\u00f3lica de Salta (Argentina) and Universidade Estadual de Campinas (UNICAMP, Brasil). The study provided practical evidence of [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/en\/telemetry-security-ipv6\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-21T15:45:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-21T17:32:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/10\/telemetria-ipv6-lacnic44.png\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gianni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/telemetry-security-ipv6\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/telemetry-security-ipv6\/\"},\"author\":{\"name\":\"Gianni\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\"},\"headline\":\"Telemetry Applied to Security Automation in IPv6 Networks\",\"datePublished\":\"2025-10-21T15:45:54+00:00\",\"dateModified\":\"2025-10-21T17:32:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/telemetry-security-ipv6\/\"},\"wordCount\":932,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/telemetry-security-ipv6\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/10\/telemetria-ipv6-lacnic44.png\",\"keywords\":[\"Events\",\"IPv6\"],\"articleSection\":[\"IPv6\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/telemetry-security-ipv6\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/telemetry-security-ipv6\/\",\"url\":\"https:\/\/blog.lacnic.net\/en\/telemetry-security-ipv6\/\",\"name\":\"LACNIC Blog | Telemetry Applied to Security Automation in IPv6 Networks\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/telemetry-security-ipv6\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/telemetry-security-ipv6\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/10\/telemetria-ipv6-lacnic44.png\",\"datePublished\":\"2025-10-21T15:45:54+00:00\",\"dateModified\":\"2025-10-21T17:32:56+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/telemetry-security-ipv6\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/telemetry-security-ipv6\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/telemetry-security-ipv6\/#primaryimage\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/10\/telemetria-ipv6-lacnic44.png\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/10\/telemetria-ipv6-lacnic44.png\",\"width\":680,\"height\":330},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/telemetry-security-ipv6\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Telemetry Applied to Security Automation in IPv6 Networks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\",\"name\":\"Gianni\",\"url\":\"https:\/\/blog.lacnic.net\/en\/author\/gianni\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC Blog | Telemetry Applied to Security Automation in IPv6 Networks","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/en\/telemetry-security-ipv6\/","og_locale":"en_US","og_type":"article","og_title":"LACNIC Blog | Telemetry Applied to Security Automation in IPv6 Networks","og_description":"By Ernesto S\u00e1nchez and Henri Alves de Godoy Introduction During the LACNIC 44 meeting held in El Salvador, we presented the study titled \u201cTelemetry Applied to Security Automation in IPv6 Networks,\u201d the result of a collaboration between Universidad Cat\u00f3lica de Salta (Argentina) and Universidade Estadual de Campinas (UNICAMP, Brasil). The study provided practical evidence of [&hellip;]","og_url":"https:\/\/blog.lacnic.net\/en\/telemetry-security-ipv6\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2025-10-21T15:45:54+00:00","article_modified_time":"2025-10-21T17:32:56+00:00","og_image":[{"width":680,"height":330,"url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/10\/telemetria-ipv6-lacnic44.png","type":"image\/png"}],"author":"Gianni","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/en\/telemetry-security-ipv6\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/en\/telemetry-security-ipv6\/"},"author":{"name":"Gianni","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab"},"headline":"Telemetry Applied to Security Automation in IPv6 Networks","datePublished":"2025-10-21T15:45:54+00:00","dateModified":"2025-10-21T17:32:56+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/telemetry-security-ipv6\/"},"wordCount":932,"commentCount":0,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/telemetry-security-ipv6\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/10\/telemetria-ipv6-lacnic44.png","keywords":["Events","IPv6"],"articleSection":["IPv6"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.lacnic.net\/en\/telemetry-security-ipv6\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/en\/telemetry-security-ipv6\/","url":"https:\/\/blog.lacnic.net\/en\/telemetry-security-ipv6\/","name":"LACNIC Blog | Telemetry Applied to Security Automation in IPv6 Networks","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/telemetry-security-ipv6\/#primaryimage"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/telemetry-security-ipv6\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/10\/telemetria-ipv6-lacnic44.png","datePublished":"2025-10-21T15:45:54+00:00","dateModified":"2025-10-21T17:32:56+00:00","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/en\/telemetry-security-ipv6\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/en\/telemetry-security-ipv6\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/en\/telemetry-security-ipv6\/#primaryimage","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/10\/telemetria-ipv6-lacnic44.png","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/10\/telemetria-ipv6-lacnic44.png","width":680,"height":330},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/en\/telemetry-security-ipv6\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/en\/"},{"@type":"ListItem","position":2,"name":"Telemetry Applied to Security Automation in IPv6 Networks"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab","name":"Gianni","url":"https:\/\/blog.lacnic.net\/en\/author\/gianni\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/10\/telemetria-ipv6-lacnic44.png","jetpack_sharing_enabled":true,"wpml_current_locale":"en_US","wpml_translations":[{"locale":"es_ES","id":31449,"post_title":"Telemetr\u00eda aplicada a la automatizaci\u00f3n de la seguridad en redes IPv6","slug":"telemetria-seguridad-ipv6","href":"https:\/\/blog.lacnic.net\/telemetria-seguridad-ipv6\/"},{"locale":"pt_BR","id":31458,"post_title":"Telemetria aplicada \u00e0 automa\u00e7\u00e3o da seguran\u00e7a em redes IPv6","slug":"telemetria-seguranca-ipv6","href":"https:\/\/blog.lacnic.net\/pt-br\/telemetria-seguranca-ipv6\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/31456","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=31456"}],"version-history":[{"count":5,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/31456\/revisions"}],"predecessor-version":[{"id":31515,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/31456\/revisions\/31515"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media\/31451"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=31456"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=31456"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=31456"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/archivo?post=31456"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/taxonomy-authors?post=31456"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tipo_autor?post=31456"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}