Router - Cisco IPv6 Native Config: Difference between revisions

From AAISP Support Site
No edit summary
No edit summary
 
(4 intermediate revisions by 3 users not shown)
Line 23: Line 23:
ipv6 nd router-preference High
ipv6 nd router-preference High
ipv6 nd ra interval 60
ipv6 nd ra interval 60
</pre>

EDIT - Feb 2015 - Above didn't work for me, alternative config below

<pre>
! Feb 2015 - Cisco 1841 / FTTC
! LAN Port (I used default /64 on clueless)
!
interface FastEthernet0/0
ipv6 address 2001:8B0:xx:xxxx::1/64
ipv6 enable
ipv6 nd other-config-flag
ipv6 dhcp server ipv6dhcp_pool
!
! Below gives out IPv6 DNS to clients
!
ipv6 dhcp pool ipv6dhcp_pool
dns-server 2001:8B0::2020
dns-server 2001:8B0::2021
</pre>
</pre>


Line 43: Line 62:
<pre>
<pre>
ipv6 traffic-filter outboundfilters-ipv6 out
ipv6 traffic-filter outboundfilters-ipv6 out
</pre>

EDIT Feb 2015 - Alternative config below

<pre>
! Feb 2015 - Cisco 1841 / FTTC
! WAN
!
interface Dialer0
ipv6 address dhcp rapid-commit
ipv6 enable
</pre>
</pre>


Line 80: Line 110:
</pre>
</pre>


If you include the "deny any any" line a a "show access-lists ..." will show the number of
If you include the "deny any any" line a "show access-lists ..." will show the number of
packets that have hit that line. Thus you can tell if a problem exists because
packets that have hit that line. Thus you can tell if a problem exists because
the packets are not passing through the access list or failure to communicate is
the packets are not passing through the access list or failure to communicate is
Line 87: Line 117:




[[Category:IPv6]] [[Category:Cisco]] [[Category:Router]] [[Category:Internet]][[Category:FTTC]][[Category:ADSL]]
[[Category:3rd Party Routers|Cisco]] [[Category:IPv6]]

Latest revision as of 10:05, 27 February 2015

This page will walk you through getting IPv6 to work correctly on your Cisco device

Enable IPv6 routing on your router

 conf t
 ipv6 source-route
 ipv6 unicast-routing
 ipv6 cef
 ipv6 multicast-routing
 ipv6 route ::/0 Dialer0

Enable IPv6 to work on your internal Ethernet Ports

 conf t
 interface FastEthernet 0/0
 ipv6 address <your_slash_48>:1::/64 eui-64
 ipv6 enable
 ipv6 nd prefix <your_slash_48>:1::/64
 ipv6 nd managed-config-flag
 ipv6 nd router-preference High
 ipv6 nd ra interval 60

EDIT - Feb 2015 - Above didn't work for me, alternative config below

! Feb 2015 - Cisco 1841 / FTTC 
! LAN Port (I used default /64 on clueless)
!
interface FastEthernet0/0
 ipv6 address 2001:8B0:xx:xxxx::1/64
 ipv6 enable
 ipv6 nd other-config-flag
 ipv6 dhcp server ipv6dhcp_pool
!
! Below gives out IPv6 DNS to clients
!
ipv6 dhcp pool ipv6dhcp_pool
  dns-server 2001:8B0::2020
  dns-server 2001:8B0::2021

Enable IPv6 to work on your WAN side

 conf t
 interface dialer0
 ipv6 enable
 ipv6 traffic-filter adsl-ipv6 in

02/11/2011 The above config didn't work for me I had to create a new /64 via Clueless and add this here as an IP address

 ipv6 nd prefix <your_slash_64>::1/64

I would also add the following traffic-filter to the dialer interface

 ipv6 traffic-filter outboundfilters-ipv6 out

EDIT Feb 2015 - Alternative config below

! Feb 2015 - Cisco 1841 / FTTC 
! WAN 
!
 interface Dialer0
  ipv6 address dhcp rapid-commit
  ipv6 enable

Lock down your IPv6 network with an access list

 conf t
 ipv6 access-list ipv6 adsl-ipv6
 permit tcp any any established
 permit icmp any any
 deny ipv6 any any
 interface dialer0
 ipv6 traffic-filter adsl-ipv6 in


02/11/2011 I would use the following access-list - I would advise against allowing any IPv6 ICMP into the network unless absolutely necessary and then only allow on a case-by-case basis

ipv6 access-list adsl-ipv6
! This only allows in IPv6 traffic which originated from our local network
! No need for a deny at the end as an implicit deny is the default
 evaluate tcptraffic-out-ipv6
 evaluate udptraffic-out-ipv6
 evaluate icmptraffic-out-ipv6

ipv6 access-list outboundfilters-ipv6
! This only creates a reflexive access-list that adsl-ipv6 uses to allow traffic back in
! No need for a deny at the end as an implicit deny is the default
 permit tcp any any reflect tcptraffic-out-ipv6 timeout 30
 permit icmp any any reflect icmptraffic-out-ipv6 timeout 30
 permit udp any any reflect udptraffic-out-ipv6 timeout 30

interface dialer<n>
 ipv6 traffic-filter adsl-ipv6 in
 ipv6 traffic-filter outboundfilters-ipv6 out

If you include the "deny any any" line a "show access-lists ..." will show the number of packets that have hit that line. Thus you can tell if a problem exists because the packets are not passing through the access list or failure to communicate is because of some other problem.