Dear Tom: I am trying to do IPv6 using the the peramaters that Charter gave me the following for Shorewall6 version 4.5.21.6.
Prefix = 2602:100::/32 Boarder Relay Address 68.114.165.1 Prefix length = 32 IPv4 mask length = 0 DNS 1 Address = 2607:f428:1::5353:1 DNS 2 Address = 2607:f428:2::5353:1 I was using Shorewall 6to4 and 6in4 Tunnels I had to modify your script so that I could use it for dynamic address's enclosed. when I ping I get the following # ping6 -c3 www.kame.net PING www.kame.net(2001:200:dff:fff1:216:3eff:feb1:44d7) 56 data bytes >From 2602:100:6153:810d::1 icmp_seq=1 Destination unreachable: Address >unreachable >From 2602:100:6153:810d::1 icmp_seq=1 Destination unreachable: Address >unreachable >From 2602:100:6153:810d::1 icmp_seq=1 Destination unreachable: Address >unreachable --- www.kame.net ping statistics --- 0 packets transmitted, 0 received, +3 errors The fact that I am getting a ipv6 address in the above shows that something is working . #ipv6 status 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 inet6 ::1/128 scope host valid_lft forever preferred_lft forever 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qlen 1000 inet6 2602:100:6153:810d:1::1/32 scope global valid_lft forever preferred_lft forever inet6 fe80::250:bfff:feb5:368f/64 scope link valid_lft forever preferred_lft forever 3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qlen 1000 inet6 2602:100:6153:810d:1::253/32 scope global valid_lft forever preferred_lft forever inet6 fe80::223:aeff:fe55:f52/64 scope link valid_lft forever preferred_lft forever 5: sit1: <NOARP,UP,LOWER_UP> mtu 1480 inet6 ::97.83.129.13/96 scope global valid_lft forever preferred_lft forever inet6 2602:100:6153:810d::1/128 scope global valid_lft forever preferred_lft forever ::/96 dev sit1 proto kernel metric 256 2602:100:6153:810d::1 dev sit1 proto kernel metric 256 2602:100::/32 dev eth1 proto kernel metric 256 2602:100::/32 dev eth0 proto kernel metric 256 fe80::/64 dev eth0 proto kernel metric 256 fe80::/64 dev eth1 proto kernel metric 256 default via ::68.114.165.1 dev sit1 metric 1 -- Eric
interfaces
Description: Binary data
radvd.conf
Description: Binary data
#!/bin/sh # # This program is under GPL [http://www.gnu.org/copyleft/gpl.htm] # # (c) 2008 2009 - Tom Eastep ([email protected]) # # On most distributions, this file should be called /etc/init.d/shorewall. # # Complete documentation is available at http://shorewall.net # # This program is free software; you can redistribute it and/or modify # it under the terms of Version 2 of the GNU General Public License # as published by the Free Software Foundation. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 675 Mass Ave, Camipv6, MA 02139, USA # # If an error occurs while starting or restarting the firewall, the # firewall is automatically stopped. # # Commands are: # # ipv6 start Starts ipv6 # ipv6 restart Restarts ipv6 # ipv6 reload Restarts ipv6 # ipv6 stop Stops ipv6 # ipv6 status Displays ipv6 status # # chkconfig: 2345 4 99 # description: Configure a 6to4 tunnel ### BEGIN INIT INFO # Provides: ipv6 # Required-Start: boot.udev # Required-Stop: # Default-Start: 2 3 5 # Default-Stop: 0 1 6 # Description: starts and stops ipv6 ### END INIT INFO #6rd Prefix and length for Charter.com PREFIX="2602:100:" LENGTH="/32" ################################################################################ # Interfaces to be configured # # External Interface # SIT="sit1" # # If the external interface is a 6to4 tunnel (sit device) then specify the # IPv4 address here. Otherwise, leave this variable enpty # #This is if you have an dynamic ip address, if you have fixed you can change APPRESS4 to your fixed address ETH=eth0 OS=`uname` IO="" # store IP case $OS in Linux) IP=`ifconfig $ETH | grep 'inet addr:'| grep -v '127.0.0.1' | cut -d: -f2 | awk '{ print $1}'`;; FreeBSD|OpenBSD) IP=`ifconfig $ETH | grep -E 'inet.[0-9]' | grep -v '127.0.0.1' | awk '{ print $2}'` ;; SunOS) IP=`ifconfig $ETH -a | grep inet | grep -v '127.0.0.1' | awk '{ print $2} '` ;; *) IP="Unknown";; esac ADDRESS4=$IP # # Internal interfaces of the firewall -- space separated # INTERFACES=$ETH # # Bits 48-63 of the first internal interface address. Will be incremented # for each additional internal interface. # SLA=1 # # Default Gateway -- for 6to4, this is ::192.88.99.1 # #GATEWAY=::192.88.99.1 GATEWAY=::68.114.165.1 # # For 6to4 configurations, the ADDRESS6 variable is calculated as follows. # # For other configurations, you need to specify ADDRESS6. # # ADDRESS6 is assumed to be a 48-bit prefix. If not, then the logic for # addressing on the internal networks needs to be replaced below. # ADDRESS6=$(printf $PREFIX%02x%02x:%02x%02x $(echo $ADDRESS4 | tr '.' ' ')) #ADDRESS6=2602:100 # # The global address of $SIT # SITADDR=${ADDRESS6}::1 ################################################################################ # Give Usage Information # ################################################################################ usage() { echo "Usage: $0 start|stop|reload|restart|status" exit 1 } ################################################################################ # Start IPv6 ################################################################################ do_start() { local interface if [ -n "$SIT" ]; then if [ -n "$ADDRESS4" ]; then # # 6to4 -- create tunnel # modprobe sit /sbin/ip tunnel add $SIT mode sit ttl 64 remote any local $ADDRESS4 fi # # Configure the external IP address # /sbin/ip -6 addr add ${SITADDR} dev $SIT [ -n "$ADDRESS4" ] && /sbin/ip link set dev $SIT up [ -n "$GATEWAY" ] && /sbin/ip -6 route add default via $GATEWAY dev $SIT metric 1 fi for interface in $INTERFACES ; do /sbin/ip -6 addr add ${ADDRESS6}:$SLA::1$LENGTH dev $interface SLA=$(($SLA + 1 )) done } ################################################################################ # Stop IPv6 ################################################################################ do_stop() { local interface local device device=1 local original_sla original_sli=$SLA if [ -n "$SIT" ]; then if [ -n "$ADDRESS4" ]; then /sbin/ip link set $SIT down else /sbin/ip -6 addr del ${SITADDR} dev $SIT [ -n "$GATEWAY" ] && /sbin/ip -6 route del default via $GATEWAY dev $SIT metric 1 fi [ -n "$ADDRESS4" ] && /sbin/ip tunnel del $SIT fi for interface in $INTERFACES; do /sbin/ip -6 addr del ${ADDRESS6}:$SLA::1$LENGTH dev $interface SLA=$(($SLA + 1 )) done SLA=$original_sla #In case this is a restart/reload } ################################################################################ # E X E C U T I O N B E G I N S H E R E # ################################################################################ command="$1" case "$command" in start) do_start ;; stop) do_stop ;; restart|reload) do_stop do_start ;; status) /sbin/ip -6 addr list /sbin/ip -6 route list ;; *) usage ;; esac
No virus found in this message.
Checked by AVG - www.avg.com
Version: 2014.0.4570 / Virus Database: 3950/7546 - Release Date: 05/23/14
------------------------------------------------------------------------------ "Accelerate Dev Cycles with Automated Cross-Browser Testing - For FREE Instantly run your Selenium tests across 300+ browser/OS combos. Get unparalleled scalability from the best Selenium testing platform available Simple to use. Nothing to install. Get started now for free." http://p.sf.net/sfu/SauceLabs
_______________________________________________ Shorewall-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/shorewall-users
