Dear Tom: 

I am trying to do IPv6 using the the peramaters that Charter gave me the 
following for Shorewall6 version 4.5.21.6. 

Prefix = 2602:100::/32 
Boarder Relay Address 68.114.165.1 
Prefix length = 32 
IPv4 mask length = 0 

DNS 1 Address = 2607:f428:1::5353:1 
DNS 2 Address = 2607:f428:2::5353:1 

I was using Shorewall 6to4 and 6in4 Tunnels 

I had to modify your script so that I could use it for dynamic address's 
enclosed. 


when I ping I get the following 
# ping6 -c3 www.kame.net 
PING www.kame.net(2001:200:dff:fff1:216:3eff:feb1:44d7) 56 data bytes 
>From 2602:100:6153:810d::1 icmp_seq=1 Destination unreachable: Address 
>unreachable 
>From 2602:100:6153:810d::1 icmp_seq=1 Destination unreachable: Address 
>unreachable 
>From 2602:100:6153:810d::1 icmp_seq=1 Destination unreachable: Address 
>unreachable 

--- www.kame.net ping statistics --- 
0 packets transmitted, 0 received, +3 errors 

The fact that I am getting a ipv6 address in the above shows that something is 
working . 

#ipv6 status 
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 
inet6 ::1/128 scope host 
valid_lft forever preferred_lft forever 
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qlen 1000 
inet6 2602:100:6153:810d:1::1/32 scope global 
valid_lft forever preferred_lft forever 
inet6 fe80::250:bfff:feb5:368f/64 scope link 
valid_lft forever preferred_lft forever 
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qlen 1000 
inet6 2602:100:6153:810d:1::253/32 scope global 
valid_lft forever preferred_lft forever 
inet6 fe80::223:aeff:fe55:f52/64 scope link 
valid_lft forever preferred_lft forever 
5: sit1: <NOARP,UP,LOWER_UP> mtu 1480 
inet6 ::97.83.129.13/96 scope global 
valid_lft forever preferred_lft forever 
inet6 2602:100:6153:810d::1/128 scope global 
valid_lft forever preferred_lft forever 
::/96 dev sit1 proto kernel metric 256 
2602:100:6153:810d::1 dev sit1 proto kernel metric 256 
2602:100::/32 dev eth1 proto kernel metric 256 
2602:100::/32 dev eth0 proto kernel metric 256 
fe80::/64 dev eth0 proto kernel metric 256 
fe80::/64 dev eth1 proto kernel metric 256 
default via ::68.114.165.1 dev sit1 metric 1 

-- 

Eric 

Attachment: interfaces
Description: Binary data

Attachment: radvd.conf
Description: Binary data

#!/bin/sh
#
#     This program is under GPL [http://www.gnu.org/copyleft/gpl.htm]
#
#     (c) 2008 2009 - Tom Eastep ([email protected])
#
#       On most distributions, this file should be called /etc/init.d/shorewall.
#
#       Complete documentation is available at http://shorewall.net
#
#       This program is free software; you can redistribute it and/or modify
#       it under the terms of Version 2 of the GNU General Public License
#       as published by the Free Software Foundation.
#
#       This program is distributed in the hope that it will be useful,
#       but WITHOUT ANY WARRANTY; without even the implied warranty of
#       MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
#       GNU General Public License for more details.
#
#       You should have received a copy of the GNU General Public License
#       along with this program; if not, write to the Free Software
#       Foundation, Inc., 675 Mass Ave, Camipv6, MA 02139, USA
#
#       If an error occurs while starting or restarting the firewall, the
#       firewall is automatically stopped.
#
#       Commands are:
#
#          ipv6 start                     Starts ipv6
#          ipv6 restart                   Restarts ipv6
#          ipv6 reload                    Restarts ipv6
#          ipv6 stop                      Stops ipv6
#          ipv6 status                    Displays ipv6 status
#

# chkconfig: 2345 4 99
# description: Configure a 6to4 tunnel

### BEGIN INIT INFO
# Provides:       ipv6
# Required-Start: boot.udev
# Required-Stop:
# Default-Start:  2 3 5
# Default-Stop:   0 1 6
# Description:    starts and stops ipv6
### END INIT INFO

#6rd Prefix and length for Charter.com
PREFIX="2602:100:"

LENGTH="/32"

################################################################################
# Interfaces to be configured
#
# External Interface
#
SIT="sit1"
#
# If the external interface is a 6to4 tunnel (sit device) then specify the
# IPv4 address here. Otherwise, leave this variable enpty
#
#This is if you have an dynamic ip address, if you have fixed you can change 
APPRESS4 to your fixed address
ETH=eth0
OS=`uname`
IO="" # store IP
case $OS in
        Linux) IP=`ifconfig $ETH | grep 'inet addr:'| grep -v '127.0.0.1' | cut 
-d: -f2 | awk '{ print $1}'`;;
        FreeBSD|OpenBSD) IP=`ifconfig $ETH | grep -E 'inet.[0-9]' | grep -v 
'127.0.0.1' | awk '{ print $2}'` ;;
        SunOS) IP=`ifconfig $ETH -a | grep inet | grep -v '127.0.0.1' | awk '{ 
print $2} '` ;;
*) IP="Unknown";;
esac

ADDRESS4=$IP
#
# Internal interfaces of the firewall -- space separated
#
INTERFACES=$ETH
#
# Bits 48-63 of the first internal interface address. Will be incremented
# for each additional internal interface.
#
SLA=1
#
# Default Gateway -- for 6to4, this is ::192.88.99.1
#
#GATEWAY=::192.88.99.1
GATEWAY=::68.114.165.1
#
# For 6to4 configurations, the ADDRESS6 variable is calculated as follows.
#
# For other configurations, you need to specify ADDRESS6.
#
# ADDRESS6 is assumed to be a 48-bit prefix. If not, then the logic for
# addressing on the internal networks needs to be replaced below.
#
ADDRESS6=$(printf $PREFIX%02x%02x:%02x%02x $(echo $ADDRESS4 | tr '.' ' '))
#ADDRESS6=2602:100
#
# The global address of $SIT
#
SITADDR=${ADDRESS6}::1
################################################################################
# Give Usage Information                                                       #
################################################################################
usage() {
    echo "Usage: $0 start|stop|reload|restart|status"
    exit 1
}
################################################################################
# Start IPv6
################################################################################
do_start()
{
    local interface

    if [ -n "$SIT" ]; then
        if [ -n "$ADDRESS4" ]; then
            #
            # 6to4 -- create tunnel
            #
            modprobe sit
            /sbin/ip tunnel add $SIT mode sit ttl 64 remote any local $ADDRESS4
        fi
        #
        # Configure the external IP address
        #
        /sbin/ip -6 addr add ${SITADDR} dev $SIT
        [ -n "$ADDRESS4" ] && /sbin/ip link set dev $SIT up
        [ -n "$GATEWAY"  ] && /sbin/ip -6 route add default via $GATEWAY dev 
$SIT metric 1
    fi

    for interface in $INTERFACES ; do
        /sbin/ip -6 addr add ${ADDRESS6}:$SLA::1$LENGTH dev $interface
        SLA=$(($SLA + 1 ))
    done
}
################################################################################
# Stop IPv6
################################################################################
do_stop()
{
    local interface
    local device
    device=1
    local original_sla
    original_sli=$SLA

    if [ -n "$SIT" ]; then
        if [ -n "$ADDRESS4" ]; then
            /sbin/ip link set $SIT down
        else
            /sbin/ip -6 addr del ${SITADDR} dev $SIT
            [ -n "$GATEWAY" ] && /sbin/ip -6 route del default via $GATEWAY dev 
$SIT metric 1
        fi
        [ -n "$ADDRESS4" ] && /sbin/ip tunnel del $SIT
    fi

    for interface in $INTERFACES; do
        /sbin/ip -6 addr del ${ADDRESS6}:$SLA::1$LENGTH dev $interface
        SLA=$(($SLA + 1 ))
    done

    SLA=$original_sla #In case this is a restart/reload
}
################################################################################
# E X E C U T I O N    B E G I N S   H E R E                                   #
################################################################################
command="$1"

case "$command" in
    start)
        do_start
        ;;
    stop)
        do_stop
        ;;
    restart|reload)
        do_stop
        do_start
        ;;
    status)
        /sbin/ip -6 addr list
        /sbin/ip -6 route list
        ;;
    *)
        usage
        ;;
esac

No virus found in this message.
Checked by AVG - www.avg.com
Version: 2014.0.4570 / Virus Database: 3950/7546 - Release Date: 05/23/14

------------------------------------------------------------------------------
"Accelerate Dev Cycles with Automated Cross-Browser Testing - For FREE
Instantly run your Selenium tests across 300+ browser/OS combos.
Get unparalleled scalability from the best Selenium testing platform available
Simple to use. Nothing to install. Get started now for free."
http://p.sf.net/sfu/SauceLabs
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to