Die FB hat IPv6 aktiviert und hat folglich eine IPv6-Adresse erhalten.
Jetzt würde ich gerne die VPN-Verbindung sowhol über IPv4 als auch über IPv6 realisieren.
Für IPv4 gibt es foltende Einstellungen:
Code: Alles auswählen
cd /Setup/VPN/VPN-Peers
# Peer SH-Time Extranet-Address Remote-Gw Rtg-tag Layer dynamic IKE-Exchange Rule-creation DPD-Inact-Timeout IKE-CFG XAUTH SSL-Encaps. OCSP-Check IPv4-Rules IPv6-Rules IPv6
# ==================-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
add "VPN_TEST" {SH-Time} 9999 {Extranet-Address} 0.0.0.0 {Remote-Gw} "vpn.averlon.com" {Rtg-tag} 0 {Layer} "VPN_TEST" {dynamic} No {IKE-Exchange} Aggressive-Mode {Rule-creation} manually {DPD-Inact-Timeout} 90 {IKE-CFG} Off {XAUTH} Off {SSL-Encaps.} No {OCSP-Check} No {IPv4-Rules} "VPN_REGL_TEST" {IPv6-Rules} "" {IPv6} ""
Code: Alles auswählen
cd /Setup/IP-Router/IP-Routing-Table
# IP-Address IP-Netmask Rtg-tag Admin-Distance Peer-or-IP Distance Masquerade Active Comment
# ===========================================================----------------------------------------------------------------------------------------------------------------------
add 192.168.178.0 255.255.255.0 0 0 {Peer-or-IP} "VPN_TEST" {Distance} 0 {Masquerade} No {Active} Yes {Comment} "VPN-Verbindung TEST"
Jetzt würde ich das gerne um IPv6 erweitern.
Der Teil scheint mir noch einfach zu sein:
Code: Alles auswählen
cd /Setup/VPN/VPN-Peers
# Peer SH-Time Extranet-Address Remote-Gw Rtg-tag Layer dynamic IKE-Exchange Rule-creation DPD-Inact-Timeout IKE-CFG XAUTH SSL-Encaps. OCSP-Check IPv4-Rules IPv6-Rules IPv6
# ==================-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
add "VPN_TEST" {SH-Time} 9999 {Extranet-Address} 0.0.0.0 {Remote-Gw} "vpn.averlon.com" {Rtg-tag} 0 {Layer} "VPN_TEST" {dynamic} No {IKE-Exchange} Aggressive-Mode {Rule-creation} manually {DPD-Inact-Timeout} 90 {IKE-CFG} Off {XAUTH} Off {SSL-Encaps.} No {OCSP-Check} No {IPv4-Rules} "VPN_REGL_TEST" {IPv6-Rules} "IP6_REGL_TEST" {IPv6} "IPV6_TELEKOM"
Code: Alles auswählen
cd /Setup/IPv6/Firewall/Inbound-Rules
# Name Action Services Source-Stations Active Prio Src-Tag Comment
# ======================================-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
add "ALLOW-IPSEC" {Action} "ACCEPT, ACCEPT-VPN_LOG" {Services} "IPSEC" {Source-Stations} "ANYHOST" {Active} Yes {Prio} 100 {Src-Tag} 0 {Comment} ""
Update:
Ich glaube, die Forwarding-Rule für IPv6 habe ich mittlerweile ermittelt:
Code: Alles auswählen
ls Stations
Name Type Local-network Remote-peer/local-host Address/Prefix
==================================-------------------------------------------------------------------------------------------------------------------------------------------------------
VPN_TEST Remote-peer VPN_TEST
Code: Alles auswählen
/Setup/IPv6/Firewall
> ls Forwarding-Rules/
Name Action Services Source-Stations Destination-Stations LB-Policy Flags Prio Src-Tag Rtg-tag Comment
======================================------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
ALLOW_VPN_TEST ACCEPT-VPN_LOG ANY VPN_TEST LOCALNET none 0 0 0