IPv6 Planning and Design Workshop

ipSpace.net » Workshops » IPv6 Planning and Design Workshop

Is your content available over IPv6? If not, do you know how to make it available? Do you know what to do when you won’t be able to get public IPv4 addresses? Is your existing gear capable of running IPv6? Do you know where to start the IPv6 deployment? Can you create an IPv6 addressing plan?

If you answered YES to all of the above questions, you don’t need this workshop. If not, you might consider getting fluent in the protocol that will become as ubiquitous as IPv4 is today in just a few years.

This workshop describes the technology fundamentals of IPv6, high-level deployment guidelines, network edge and network core design, IPv6 transition mechanisms, IPv6-specific security challenges, and high-availability considerations.


  • IPv6 planning and design workshop is a 2½ day instructor-led on-site workshop
  • Contact us for more details or if you want to have a customized on-site workshop for a closed group of up to 20 attendees

Topics Covered

IPv6 Introduction

  • The need for IPv6
  • IPv6 compared to IPv4
  • IPv6 addressing and routing
  • IPv6 neighbor discovery and autoconfiguration
  • Host configuration (SLAAC and DHCPv6)
  • Application-level changes

High-level IPv6 deployment guidelines

  • Where should I deploy IPv6 today?
  • Making IPv4 content available to IPv6 clients
  • VPN access considerations.

Edge Network Design and Implementation

  • Design principles
  • Business-grade connectivity with static routes or BGP
  • Hosts on multi-access networks (Ethernet or wireless)
  • Connecting consumer CPE devices
  • PPPoE and DSL environments
  • 6rd

Core Network Design and Implementation

  • Design principles
  • Native IPv6 core
  • IPv6-over-MPLS (6PE)
  • Layer-3 IPv6 VPNs (6VPE)

IPv6 Transition Mechanisms

  • Rapid IPv6 deployment (6in4, 6to4, 6rd)
  • Residual IPv4 deployment (DS-Lite, MAP-E)
  • Accessing old content (NAT64, SLB64)

IPv6 Security

  • Typical IPv6 security issues
  • First-hop vulnerabilities
  • Denial-of-service attacks
  • User authentication and authorization
  • Routing security
  • Dual-stack- and tunneling-related exposures

IPv6 High Availability

  • High availability components
  • First-hop high availability
  • Service endpoint high availability
  • Redundant network connectivity
  • End-to-end high availability

Delivering Content over IPv6

  • Why do I care?
  • Legacy application challenges
  • Deployment options: NAT64, DNS64, dual-stack applications, IPv6-only data centers

Target Audience

Network architects, designers and implementation engineers faced with imminent need to start IPv6 planning, design or deployment.

About the Author

Ivan PepelnjakIvan Pepelnjak (CCIE#1354 Emeritus) has been designing, deploying, operating and troubleshooting IP-based enterprise and service provider networks since 1990. He’s the author of EIGRP and MPLS books published by Cisco Press, numerous articles and highly praised webinars, including Building Large IPv6 Service Provider Networks, IPv6 Security and IPv6 Transition Mechanisms.

His blog, where you'll find numerous data center- and IPv6-related articles, is usually considered one of the best technology-focused internetworking blogs.

More about Ivan Pepelnjak