Ipv6 12 4 Book
Ipv6 12 4 Book
Ipv6 12 4 Book
Release 12.4
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL
STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT
WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public
domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
CCDE, CCENT, Cisco Eos, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, Cisco TelePresence, the Cisco logo, DCE, and Welcome to the Human Network are
trademarks; Changing the Way We Work, Live, Play, and Learn and Cisco Store are service marks; and Access Registrar, Aironet, AsyncOS, Bringing the Meeting To You,
Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems,
Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation, EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing,
FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, IronPort, the IronPort logo,
LightStream, Linksys, MediaTone, MeetingPlace, MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels,
ProConnect, ScriptShare, SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the
WebEx logo are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship
between Cisco and any other company. (0807R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the
document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
This document describes the objectives, audience, conventions, and organization used in Cisco IOS and
Cisco IOS XE software documentation, collectively referred to in this document as Cisco IOS
documentation. Also included are resources for obtaining technical assistance, additional
documentation, and other information from Cisco. This document is organized into the following
sections:
• Documentation Objectives, page i
• Audience, page i
• Documentation Conventions, page ii
• Documentation Organization, page iii
• Additional Resources and Documentation Feedback, page xi
Documentation Objectives
Cisco IOS documentation describes the tasks and commands available to configure and maintain Cisco
networking devices.
Audience
The Cisco IOS documentation set is i ntended for users who configure and maintain Cisco networking
devices (such as routers and switches) but who may not be familiar with the configuration and
maintenance tasks, the relationship among tasks, or the Cisco IOS commands necessary to perform
particular tasks. The Cisco IOS documentation set is also intended for those users experienced with
Cisco IOS who need to know about new features, new configuration options, and new software
characteristics in the current Cisco IOS release.
i
About Cisco IOS and Cisco IOS XE Software Documentation
Documentation Conventions
Documentation Conventions
In Cisco IOS documentation, the term router may be used to refer to various Cisco products; for example,
routers, access servers, and switches. These and other networking devices that support Cisco IOS
software are shown interchangeably in examples and are used only for illustrative purposes. An example
that shows one product does not necessarily mean that other products are not supported.
This section includes the following topics:
• Typographic Conventions, page ii
• Command Syntax Conventions, page ii
• Software Conventions, page iii
• Reader Alert Conventions, page iii
Typographic Conventions
Cisco IOS documentation uses the following typographic conventions:
Convention Description
^ or Ctrl Both the ^ symbol and Ctrl represent the Control (Ctrl) key on a keyboard. For
example, the key combination ^D or Ctrl-D means that you hold down the
Control key while you press the D key. (Keys are indicated in capital letters but
are not case sensitive.)
string A string is a nonquoted set of characters shown in italics. For example, when
setting a Simple Network Management Protocol (SNMP) community string to
public, do not use quotation marks around the string; otherwise, the string will
include the quotation marks.
Convention Description
bold Bold text indicates commands and keywords that you enter as shown.
italic Italic text indicates arguments for which you supply values.
[x] Square brackets enclose an optional keyword or argument.
| A vertical line, called a pipe, indicates a choice within a set of keywords
or arguments.
[x | y] Square brackets enclosing keywords or arguments separated by a pipe indicate an
optional choice.
{x | y} Braces enclosing keywords or arguments separated by a pipe indicate a
required choice.
[x {y | z}] Braces and a pipe within square brackets indicate a required choice within an
optional element.
ii
About Cisco IOS and Cisco IOS XE Software Documentation
Documentation Organization
Software Conventions
Cisco IOS uses the following program code conventions:
Convention Description
Courier font Courier font is used for information that is displayed on a PC or terminal screen.
Bold Courier font Bold Courier font indicates text that the user must enter.
< > Angle brackets enclose text that is not displayed, such as a password. Angle
brackets also are used in contexts in which the italic font style is not supported;
for example, ASCII text.
! An exclamation point at the beginning of a line indicates that the text that follows
is a comment, not a line of code. An exclamation point is also displayed by
Cisco IOS software for certain processes.
[ ] Square brackets enclose default responses to system prompts.
Caution Means reader be careful. In this situation, you might do something that could result in equipment
damage or loss of data.
Note Means reader take note. Notes contain helpful suggestions or references to material not covered in the
manual.
Timesaver Means the described action saves time. You can save time by performing the action described in the
paragraph.
Documentation Organization
This section describes the Cisco IOS documentation set, how it is organized, and how to access it on
Cisco.com. Included are lists of configuration guides, command references, and supplementary
references and resources that make up the documentation set. The following topics are included:
• Cisco IOS Documentation Set, page iv
• Cisco IOS Documentation on Cisco.com, page iv
• Configuration Guides, Command References, and Supplementary Resources, page v
iii
About Cisco IOS and Cisco IOS XE Software Documentation
Documentation Organization
Configuration Guides
Configuration guides are provided by technology and release and comprise a set of individual feature
guides relevant to the release and technology.
iv
About Cisco IOS and Cisco IOS XE Software Documentation
Documentation Organization
Command References
Command reference books describe Cisco IOS commands that are supported in many different software
releases and on many different platforms. The books are provided by technology. For information about
all Cisco IOS commands, use the Command Lookup Tool at http://tools.cisco.com/Support/CLILookup
or the Cisco IOS Master Command List, All Releases, at
http://www.cisco.com/en/US/docs/ios/mcl/all_release/all_mcl.html.
Table 1 Cisco IOS and Cisco IOS XE Configuration Guides and Command References
v
About Cisco IOS and Cisco IOS XE Software Documentation
Documentation Organization
Table 1 Cisco IOS and Cisco IOS XE Configuration Guides and Command References (continued)
vi
About Cisco IOS and Cisco IOS XE Software Documentation
Documentation Organization
Table 1 Cisco IOS and Cisco IOS XE Configuration Guides and Command References (continued)
vii
About Cisco IOS and Cisco IOS XE Software Documentation
Documentation Organization
Table 1 Cisco IOS and Cisco IOS XE Configuration Guides and Command References (continued)
viii
About Cisco IOS and Cisco IOS XE Software Documentation
Documentation Organization
Table 1 Cisco IOS and Cisco IOS XE Configuration Guides and Command References (continued)
ix
About Cisco IOS and Cisco IOS XE Software Documentation
Documentation Organization
Table 1 Cisco IOS and Cisco IOS XE Configuration Guides and Command References (continued)
x
About Cisco IOS and Cisco IOS XE Software Documentation
Additional Resources and Documentation Feedback
xi
About Cisco IOS and Cisco IOS XE Software Documentation
Additional Resources and Documentation Feedback
CCDE, CCENT, Cisco Eos, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, Cisco TelePresence, the Cisco logo, DCE, and Welcome to the
Human Network are trademarks; Changing the Way We Work, Live, Play, and Learn and Cisco Store are service marks; and Access Registrar,
Aironet, AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified
Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration
Without Limitation, EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient,
IOS, iPhone, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone,
MeetingPlace, MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect,
ScriptShare, SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and
the WebEx logo are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply
a partnership relationship between Cisco and any other company. (0807R)!
!
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and
figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and
coincidental.!
!
© 2007–2008 Cisco Systems, Inc. All rights reserved.
xii
Using the Command-Line Interface in Cisco IOS
and Cisco IOS XE Software
This document provides basic information about the command-line interface (CLI) in Cisco IOS and
Cisco IOS XE software and how you can use some of the CLI features. This document contains the
following sections:
• Initially Configuring a Device, page i
• Using the CLI, page ii
• Saving Changes to a Configuration, page xii
• Additional Information, page xii
For more information about using the CLI, see the “Using the Cisco IOS Command-Line Interface”
section of the Cisco IOS Configuration Fundamentals Configuration Guide.
For information about the software documentation set, see the “About Cisco IOS and Cisco IOS XE
Software Documentation” document.
i
Using the Command-Line Interface in Cisco IOS and Cisco IOS XE Software
Using the CLI
Note The AUX port on the Route Processor (RP) installed in a Cisco ASR1000 series router does not serve
any useful customer purpose and should be accessed only under the advisement of a customer support
representative.
ii
Using the Command-Line Interface in Cisco IOS and Cisco IOS XE Software
Using the CLI
iii
Using the Command-Line Interface in Cisco IOS and Cisco IOS XE Software
Using the CLI
iv
Using the Command-Line Interface in Cisco IOS and Cisco IOS XE Software
Using the CLI
EXEC commands are not saved when the software reboots. Commands that you issue in a configuration
mode can be saved to the startup configuration. If you save the running configuration to the startup
configuration, these commands will execute when the software is rebooted. Global configuration mode
is the highest level of configuration mode. From global configuration mode, you can enter a variety of
other configuration modes, including protocol-specific modes.
ROM monitor mode is a separate mode that is used when the software cannot load properly. If a valid
software image is not found when the software boots or if the configuration file is corrupted at startup,
the software might enter ROM monitor mode. Use the question symbol (?) to view the commands that
you can use while the device is in ROM monitor mode.
rommon 1 > ?
alias set and display aliases command
boot boot up an external process
confreg configuration register utility
cont continue executing a downloaded image
context display the context of a loaded image
cookie display contents of cookie PROM in hex
.
.
.
rommon 2 >
The following example shows how the command prompt changes to indicate a different command mode:
Router> enable
Router# configure terminal
Router(config)# interface ethernet 1/1
Router(config-if)# ethernet
Router(config-line)# exit
Router(config)# end
Router#
Command Purpose
help Provides a brief description of the help feature in any command mode.
? Lists all commands available for a particular command mode.
partial command? Provides a list of commands that begin with the character string (no
space between the command and the question mark).
partial command<Tab> Completes a partial command name (no space between the command
and <Tab>).
command ? Lists the keywords, arguments, or both associated with the command
(space between the command and the question mark).
command keyword ? Lists the arguments that are associated with the keyword (space between
the keyword and the question mark).
v
Using the Command-Line Interface in Cisco IOS and Cisco IOS XE Software
Using the CLI
help
Router> help
Help may be requested at any point in a command by entering a question mark '?'. If
nothing matches, the help list will be empty and you must backup until entering a '?'
shows the available options.
Two styles of help are provided:
1. Full help is available when you are ready to enter a command argument (e.g. 'show ?')
and describes each possible argument.
2. Partial help is provided when an abbreviated argument is entered and you want to know
what arguments match the input (e.g. 'show pr?'.)
?
Router# ?
Exec commands:
access-enable Create a temporary access-List entry
access-profile Apply user-profile to interface
access-template Create a temporary access-List entry
alps ALPS exec commands
archive manage archive files
<snip>
partial command?
Router(config)# zo?
zone zone-pair
partial command<Tab>
Router(config)# we<Tab> webvpn
command ?
Router(config-if)# pppoe ?
enable Enable pppoe
max-sessions Maximum PPPOE sessions
command keyword ?
Router(config-if)# pppoe enable ?
group attach a BBA group
<cr>
vi
Using the Command-Line Interface in Cisco IOS and Cisco IOS XE Software
Using the CLI
vii
Using the Command-Line Interface in Cisco IOS and Cisco IOS XE Software
Using the CLI
Note Both password commands have numeric keywords that are single integer values. If you choose a number
for the first character of your password followed by a space, the system will read the number as if it were
the numeric keyword and not as part of your password.
When both passwords are set, the enable secret password takes precedence over the enable password.
To remove a password, use the no form of the commands: no enable password or
no enable secret password.
For more information about password recovery procedures for Cisco products, see
http://www.cisco.com/en/US/products/sw/iosswrel/ps1831/!
products_tech_note09186a00801746e6.shtml.
A command history buffer is also available in line configuration mode with the same default and
configuration options. To set the command history buffer size for a terminal session in line configuration
mode, issue the history command:
Router(config-line)# history [size num]
To recall commands from the history buffer, use the following methods:
• Press Ctrl-P or the up arrow key—Recalls commands beginning with the most recent command.
Repeat the key sequence to recall successively older commands.
viii
Using the Command-Line Interface in Cisco IOS and Cisco IOS XE Software
Using the CLI
• Press Ctrl-N or the down arrow key—Recalls the most recent commands in the history buffer after
they have been recalled using Ctrl-P or the up arrow key. Repeat the key sequence to recall
successively more recent commands.
Note The arrow keys function only on ANSI-compatible terminals such as the VT100.
• Issue the show history command in user EXEC or privileged EXEC mode—Lists the most recent
commands that you entered. The number of commands that are displayed is determined by the
setting of the terminal history size and history commands.
The CLI command history feature is enabled by default. To disable this feature for a terminal
session, issue the terminal no history command in user EXEC or privileged EXEC mode or the
no history command in line configuration mode.
Abbreviating Commands
Typing a complete command name is not always required for the command to execute. The CLI
recognizes an abbreviated command when the abbreviation contains enough characters to uniquely
identify the command. For example, the show version command can be abbreviated as sh ver. It cannot
be abbreviated as s ver because s could mean show, set, or systat. The sh v abbreviation also is not valid
because the show command has vrrp as a keyword in addition to version. (Command and keyword
examples from Cisco IOS Release 12.4(13)T.)
To create a command alias, issue the alias command in global configuration mode. The syntax of the
command is alias mode command-alias original-command. Following are some examples:
• Router(config)# alias exec prt partition—privileged EXEC mode
• Router(config)# alias configure sb source-bridge—global configuration mode
• Router(config)# alias interface rl rate-limit—interface configuration mode
ix
Using the Command-Line Interface in Cisco IOS and Cisco IOS XE Software
Using the CLI
To view both default and user-created aliases, issue the show alias command.
For more information about the alias command, see
http://www.cisco.com/en/US/docs/ios/fundamentals/command/reference/cf_book.html.
Caution Debugging is a high priority and high CPU utilization process that can render your device unusable. Use
debug commands only to troubleshoot specific problems. The best times to run debugging are during
periods of low network traffic and when few users are interacting with the network. Debugging during
these periods decreases the likelihood that the debug command processing overhead will affect network
performance or user access or response times.
x
Using the Command-Line Interface in Cisco IOS and Cisco IOS XE Software
Using the CLI
To use one of these output modifiers, type the command followed by the pipe symbol (|), the modifier,
and the regular expression that you want to search for or filter. A regular expression is a case-sensitive
alphanumeric pattern. It can be a single character or number, a phrase, or a more complex string.
The following example illustrates how to filter output of the show interface command to display only
lines that include the expression “protocol.”
Router# show interface | include protocol
xi
Using the Command-Line Interface in Cisco IOS and Cisco IOS XE Software
Saving Changes to a Configuration
You press Enter to accept the startup-config filename (the default), or type a new filename and then press
Enter to accept that name. The following output is displayed indicating that the configuration was saved:
Building configuration...
[OK]
Router#
On most platforms, the configuration is saved to NVRAM. On platforms with a Class A flash file system,
the configuration is saved to the location specified by the CONFIG_FILE environment variable. The
CONFIG_FILE variable defaults to NVRAM.
Additional Information
• “Using the Cisco IOS Command-Line Interface” section of the !
Cisco IOS Configuration Fundamentals Configuration Guide:
http://www.cisco.com/en/US/docs/ios/fundamentals/configuration/guide/cf_cli-basics.html
or
“Using Cisco IOS XE Software” chapter of the Cisco ASR1000 Series Aggregation Services Routers
Software Configuration Guide:
http://www.cisco.com/en/US/docs/routers/asr1000/configuration/guide/chassis/using_cli.html
• Cisco Product Support Resources
http://www.cisco.com/web/psa/products/index.html
• Support area on Cisco.com (also search for documentation by task or product)
http://www.cisco.com/en/US/support/index.html
• White Paper: Cisco IOS Reference Guide
http://www.cisco.com/en/US/products/sw/iosswrel/ps1828/products_white_paper09186a00801830
5e.shtml
• Software Download Center (downloads; tools; licensing, registration, advisory, and general
information) (requires Cisco.com User ID and password)
http://www.cisco.com/kobayashi/sw-center/
• Error Message Decoder, a tool to help you research and resolve error messages for
Cisco IOS software
http://www.cisco.com/pcgi-bin/Support/Errordecoder/index.cgi
xii
Using the Command-Line Interface in Cisco IOS and Cisco IOS XE Software
Additional Information
• Command Lookup Tool, a tool to help you find detailed descriptions of Cisco IOS commands
(requires Cisco.com user ID and password)
http://tools.cisco.com/Support/CLILookup
• Output Interpreter, a troubleshooting tool that analyzes command output of supported
show commands
https://www.cisco.com/pcgi-bin/Support/OutputInterpreter/home.pl\
CCDE, CCENT, Cisco Eos, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, Cisco TelePresence, the Cisco logo, DCE, and Welcome to the
Human Network are trademarks; Changing the Way We Work, Live, Play, and Learn and Cisco Store are service marks; and Access Registrar,
Aironet, AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified
Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration
Without Limitation, EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient,
IOS, iPhone, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone,
MeetingPlace, MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect,
ScriptShare, SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and
the WebEx logo are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply
a partnership relationship between Cisco and any other company. (0807R)!
!
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and
figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and
coincidental.!
!
© 2007–2008 Cisco Systems, Inc. All rights reserved.
xiii
Using the Command-Line Interface in Cisco IOS and Cisco IOS XE Software
Additional Information
xiv
Start Here: Cisco IOS Software Release
Specifics for IPv6 Features
This document lists the IP version 6 (IPv6) features supported in the 12.0S, 12.xT, 12.2S family, XE,
12.3, and 12.4 Cisco IOS software release trains.
The IPv6 for Cisco IOS Software feature documentation provides implementation and command
reference information for IPv6 features supported in the Cisco IOS software. This Start Here document
details only the Cisco IOS software release specifics for IPv6 features. Not all IPv6 features may be
supported in your Cisco IOS software release. We strongly recommend that you read this entire
document before reading the other IPv6 for Cisco IOS software feature documentation.
Finding Support Information for Platforms and Cisco IOS and Catalyst OS Software Images
Use Cisco Feature Navigator to find information about platform support and Cisco IOS and Catalyst OS
software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An
account on Cisco.com is not required.
The Cisco IOS IPv6 Configuration Library, which includes this document, is located at the following
website:
http://www.cisco.com/en/US/docs/ios/ipv6/configuration/guide
The Cisco IOS IPv6 Command Reference is located at the following website:
http://www.cisco.com/en/US/docs/ios/ipv6/command/reference
The following sections are included in this document:
• Cisco IOS Software Platform Dependencies and Restrictions, page 2
• Cisco IOS IPv6 Features and Supported Software Releases, page 2
• Cisco Platforms Supporting IPv6 Hardware Forwarding, page 21
• Additional References, page 24
Americas Headquarters:
Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA
Note Table 1 identifies the earliest release for each software release train in which the feature became
available. Unless noted otherwise in Table 1, subsequent releases of that Cisco IOS software release
train also support that feature.
IPv6C-2
Start Here: Cisco IOS Software Release Specifics for IPv6 Features
Cisco IOS IPv6 Features and Supported Software Releases
IPv6C-3
Start Here: Cisco IOS Software Release Specifics for IPv6 Features
Cisco IOS IPv6 Features and Supported Software Releases
IPv6C-4
Start Here: Cisco IOS Software Release Specifics for IPv6 Features
Cisco IOS IPv6 Features and Supported Software Releases
IPv6C-5
Start Here: Cisco IOS Software Release Specifics for IPv6 Features
Cisco IOS IPv6 Features and Supported Software Releases
IPv6C-6
Start Here: Cisco IOS Software Release Specifics for IPv6 Features
Cisco IOS IPv6 Features and Supported Software Releases
IPv6C-7
Start Here: Cisco IOS Software Release Specifics for IPv6 Features
Cisco IOS IPv6 Features and Supported Software Releases
IPv6C-8
Start Here: Cisco IOS Software Release Specifics for IPv6 Features
Cisco IOS IPv6 Features and Supported Software Releases
IPv6C-9
Start Here: Cisco IOS Software Release Specifics for IPv6 Features
Cisco IOS IPv6 Features and Supported Software Releases
IPv6C-10
Start Here: Cisco IOS Software Release Specifics for IPv6 Features
Cisco IOS IPv6 Features and Supported Software Releases
IPv6C-11
Start Here: Cisco IOS Software Release Specifics for IPv6 Features
Cisco IOS IPv6 Features and Supported Software Releases
IPv6C-12
Start Here: Cisco IOS Software Release Specifics for IPv6 Features
Cisco IOS IPv6 Features and Supported Software Releases
IPv6C-13
Start Here: Cisco IOS Software Release Specifics for IPv6 Features
Cisco IOS IPv6 Features and Supported Software Releases
IPv6C-14
Start Here: Cisco IOS Software Release Specifics for IPv6 Features
Cisco IOS IPv6 Features and Supported Software Releases
IPv6C-15
Start Here: Cisco IOS Software Release Specifics for IPv6 Features
Cisco IOS IPv6 Features and Supported Software Releases
IPv6C-16
Start Here: Cisco IOS Software Release Specifics for IPv6 Features
Cisco IOS IPv6 Features and Supported Software Releases
IPv6C-17
Start Here: Cisco IOS Software Release Specifics for IPv6 Features
Cisco IOS IPv6 Features and Supported Software Releases
IPv6C-18
Start Here: Cisco IOS Software Release Specifics for IPv6 Features
Cisco IOS IPv6 Features and Supported Software Releases
IPv6C-19
Start Here: Cisco IOS Software Release Specifics for IPv6 Features
Cisco IOS IPv6 Features and Supported Software Releases
IPv6C-20
Start Here: Cisco IOS Software Release Specifics for IPv6 Features
Cisco Platforms Supporting IPv6 Hardware Forwarding
Supported Platforms
Table 1 lists the Cisco platforms that have IPv6 hardware forwarding and the Cisco IOS software release
trains that introduce the feature.
Note Table 2 lists only the Cisco IOS software release that introduced support for a given feature in a given
Cisco IOS software release train. Unless noted otherwise in Table 2, subsequent releases of that
Cisco IOS software release train also support that feature.
Table 2 Minimum Required Release for Cisco Platforms Supporting IPv6 Hardware Forwarding
Hardware and Feature Cisco IOS Software Release
Cisco 12000 Series
IP ISE line card IPv6 forwarding 12.0(23)S
IP ISE line card extended ACLs 12.0(25)S
IP ISE line card IPv6 over MPLS (6PE) 12.0(25)S
IP ISE line card IPv6 Multicast assist 12.0(26)S
IP ISE line card IPv6 QoS 12.0(28)S
Engine 5 line card IPv6 hardware forwarding 12.0(31)S
IP Receive ACL for IPv6 traffic 12.0(32)S
Cisco 10000 Series
Cisco 10000 series Performance Routing Engine 2 (PRE-2) 12.2(28)SB
Cisco 10000 series PRE-3 12.2(31)SB
Cisco 10000 series 6PE support 12.2(31)SB
Cisco 10000 series PRE-4 12.2(33)SB
Cisco 10720 Series
PxF accelerated for IPv6 forwarding 12.0(26)S, 12.2(28)SB
PxF accelerated for IPv6 extended ACLs 12.0(26)S
PxF accelerated for IPv6 over MPLS (6PE) 12.0(26)S
PRE-2 hardware forwarding 12.2(28)SB
Cisco 7600 Series, Cisco Catalyst 6500, Cisco Catalyst 3700, and Cisco Catalyst 3500
IPv6: Express setup 12.2(35)SE
Cisco Catalyst 3560 series 12.2(25)SEA
Cisco Catalyst 3750 series 12.2(25)SEA
IPv6: IPv6 and IPv4 TCAM templates 12.2(25)SEA
IPv6: IPv6 neighbor discovery throttling 12.2(25)SEA
Cisco Catalyst 3560E series 12.2(35)SE2
Cisco Catalyst 3570E series 12.2(35)SE2
IPv6C-21
Start Here: Cisco IOS Software Release Specifics for IPv6 Features
Cisco Platforms Supporting IPv6 Hardware Forwarding
Table 2 Minimum Required Release for Cisco Platforms Supporting IPv6 Hardware Forwarding
Hardware and Feature Cisco IOS Software Release
Cisco Catalyst 3560 series: IPv6 multicast hardware layer 12.2(25)SED
Supervisor Engines 720 and 720-3bxl 12.2(33)SRA
Route/switch processor 720 on Cisco 7600 series 12.2(33)SRB
Supervisor Engine 720 IPv6 forwarding 12.2(17a)SX1
Supervisor Engine 720 IPv6 extended ACLs 12.2(17a)SX1
Supervisor Engine 720 IPv6 over MPLS (6PE) 12.2(17b)SXA
Supervisor Engine 720 IPv6 multicast hardware forwarding 12.2(18)SXE
Supervisor Engine 720 IPv6 multicast RPR/RPR+ support 12.2(18)SXE
Supervisor Engine 720 IPv6 multicast hardware-assisted 12.2(18)SXE
egress replication
Supervisor Engine 32/MSFC2A 12.2(18)SXF
Cisco ASR 1000 Series
ASR1000 series RP1 Cisco IOS XE Release 2.1
Table 3 Minimum Required Release for IPv6 Hardware on Early-Deployment 12.2S Cisco IOS Software Release
Trains
Early-Deployment Cisco IOS Software Release and Hardware Release Description
12.2(28)SB and 12.2(33)SB on Cisco 10000 series Not all features for Cisco IOS Release 12.2(28)SB or
Cisco IOS Release 12.2(33)SB are supported on the
Cisco 10000 series routers. For further information on
Cisco IOS Release 12.2(28)SB or Cisco IOS Release
12.2(33)SB, see the release notes at the following URLs:
http://www.cisco.com/en/US/docs/ios/12_2sb/release/notes/
122SB.html
12.2(25)SEA on Cisco Catalyst 3560 and 3570 series 12.2(25)SEA supports a subset of the 12.2S IPv6 feature set.
IPv6 multicast is not supported.
12.2(33)SRA on Cisco 7600 series 12.2(33)SRA includes all IPv6 features from Cisco IOS
software releases 12.2S and 12.2SX.
12.2SX on Cisco Catalyst 6500 12.2(17)SX includes the entire Cisco IOS software
Release 12.2(14)S feature set, plus OSPFv3.
12.2(17d)SXB on Cisco Catalyst 6500 Supervisor IPv6 support provided on 12.2(17)SXB for
Engine 2/MSFC2 Cisco Catalyst 6500 Supervisor Engine 2/MSFC2.
12.2(18)SXE on Cisco Catalyst 6500 and Cisco 7600 series 12.2(18)SXE supports IPv6 multicast hardware forwarding.
12.2(18)SXF on Supervisor Engine 32/MSFC2A
12.2(35)SE2 on Cisco Catalyst 3560E and 3570E series
IPv6C-22
Start Here: Cisco IOS Software Release Specifics for IPv6 Features
Cisco Platforms Supporting IPv6 Hardware Forwarding
Table 3 Minimum Required Release for IPv6 Hardware on Early-Deployment 12.2S Cisco IOS Software Release
Trains
Early-Deployment Cisco IOS Software Release and Hardware Release Description
12.2(40)SE on Cisco Catalyst 2960 IPv6 support provided for MLD snooping.
12.2(33)SCA on UBR Support is provided for DHCPv6 relay agent notification for
prefix delegation.
IPv6C-23
Start Here: Cisco IOS Software Release Specifics for IPv6 Features
Additional References
Additional References
The following sections provide references related to Cisco IOS IPv6 features:
Related Documents
Related Topic Document Title
IPv6 commands: complete command syntax, command Cisco IOS IPv6 Command Reference
mode, defaults, usage guidelines, and examples
RFCs
RFCs Title
RFC 1886 DNS Extensions to Support IP version 6
RFC 1981 Path MTU Discovery for IP version 6
RFC 2080 RIPng for IPv6
RFC 2375 IPv6 Multicast Address Assignments
RFC 2401 Security Architecture for the Internet Protocol
RFC 2402 IP Authentication Header
RFC 2404 The Use of Hash Message Authentication Code Federal Information
Processing Standard 180-1 within Encapsulating Security Payload
and Authentication Header
RFC 2406 IP Encapsulating Security Payload (ESP)
RFC 2407 The Internet Security Domain of Interpretation for ISAKMP
RFC 2408 Internet Security Association and Key Management Protocol
RFC 2409 Internet Key Exchange (IKE)
RFC 2460 Internet Protocol, Version 6 (IPv6) Specification
RFC 2461 Neighbor Discovery for IP Version 6 (IPv6)
RFC 2462 IPv6 Stateless Address Autoconfiguration
RFC 2463 Internet Control Message Protocol (ICMPv6) for the Internet
Protocol Version 6 (IPv6) Specification
RFC 2464 Transmission of IPv6 Packets over Ethernet Networks
RFC 2467 Transmission of IPv6 Packets over FDDI Networks
RFC 2472 IP Version 6 over PPP
RFC 2474 Definition of the Differentiated Services Field (DS Field) in the IPv4
and IPv6 Headers
RFC 2475 An Architecture for Differentiated Services Framework
RFC 2492 IPv6 over ATM Networks
RFC 2545 Use of BGP-4 Multiprotocol Extensions for IPv6 Inter-Domain
Routing
IPv6C-24
Start Here: Cisco IOS Software Release Specifics for IPv6 Features
Additional References
RFCs Title
RFC 2590 Transmission of IPv6 Packets over Frame Relay Networks
Specification
RFC 2597 Assured Forwarding PHB
RFC 2598 An Expedited Forwarding PHB
RFC 2697 A Single Rate Three Color Marker
RFC 2698 A Two Rate Three Color Marker
RFC 2710 Multicast Listener Discovery (MLD) for IPv6
RFC 2711 IPv6 Router Alert Option
RFC 2740 OSPF for IPv6
RFC 2766 Network Address Translation–Protocol Translation (NAT-PT)
RFC 2858 Multiprotocol Extensions for BGP-4
RFC 2893 Transition Mechanisms for IPv6 Hosts and Routers
RFC 3056 Connection of IPv6 Domains via IPv4 Clouds
RFC 3068 An Anycast Prefix for 6to4 Relay Routers
RFC 3147 Generic Routing Encapsulation over CLNS Networks
RFC 3162 RADIUS and IPv6
RFC 3315 Dynamic Host Configuration Protocol for IPv6 (DHCPv6)
RFC 3319 Dynamic Host Configuration Protocol (DHCPv6) Options for
Session Initiated Protocol (SIP) Servers
RFC 3392 Capabilities Advertisement with BGP-4
RFC 3484 Default Address Selection for Internet Protocol version 6 (IPv6)
RFC 3513 Internet Protocol Version 6 (IPv6) Addressing Architecture
RFC 3576 Change of Authorization
RFC 3587 IPv6 Global Unicast Address Format
RFC 3596 DNS Extensions to Support IP Version 6
RFC 3633 DHCP IPv6 Prefix Delegation
RFC 3646 DNS Configuration options for Dynamic Host Configuration
Protocol for IPv6 (DHCPv6)
RFC 3736 Stateless DHCP Service for IPv6
RFC 3775 Mobility Support in IPv6
RFC 3810 Multicast Listener Discovery Version 2 (MLDv2) for IPv6
RFC 3879 Deprecating Site Local Addresses
RFC 3954 Cisco Systems NetFlow Services Export Version 9
RFC 3956 Embedding the Rendezvous Point (RP) Address in an IPv6 Multicast
Address
RFC 3963 Network Mobility (NEMO) Basic Support Protocol
RFC 4007 IPv6 Scoped Address Architecture
RFC 4087 IP Tunnel MIB
IPv6C-25
Start Here: Cisco IOS Software Release Specifics for IPv6 Features
Additional References
RFCs Title
RFC 4109 Algorithms for Internet Key Exchange version 1 (IKEv1)
RFC 4191 Default Router Preferences and More-Specific Routes
RFC 4193 Unique Local IPv6 Unicast Addresses
RFC 4214 Intra-Site Automatic Tunnel Addressing Protocol (ISATAP)
RFC 4291 IP Version 6 Addressing Architecture
RFC 4292 IP Forwarding Table MIB
RFC 4293 Management Information Base for the Internet Protocol (IP)
RFC 4302 IP Authentication Header
RFC 4306 Internet Key Exchange (IKEv2) Protocol
RFC 4308 Cryptographic Suites for IPsec
RFC 4382 MPLS/BGP Layer 3 Virtual Private Network (VPN) Management
Information Base
RFC 4443 Internet Control Message Protocol (ICMPv6) for the Internet
Protocol Version 6 (IPv6) Specification
RFC 4552 Authentication/Confidentiality for OSPFv3
RFC 4659 BGP-MPLS IP Virtual Private Network (VPN) Extension for IPv6
VPN
RFC 4724 Graceful Restart Mechanism for BGP
RFC 4798 Connecting IPv6 Islands over IPv4 MPLS Using IPv6 Provider Edge
Routers (6PE)
RFC 5095 Deprecation of Type 0 Routing Headers in IPv6
IPv6C-26
Start Here: Cisco IOS Software Release Specifics for IPv6 Features
Additional References
MIBs
MIBs MIBs Link
• CISCO-CONFIG-COPY-MIB To obtain lists of supported MIBs by platform and Cisco IOS
release, and to download MIB modules, go to the Cisco MIB website
• CISCO-CONFIG-MAN-MIB
on Cisco.com at the following URL:
• CISCO-DATA-COLLECTION-MIB
http://www.cisco.com/public/sw-center/netmgmt/cmtk/mibs.shtml
• CISCO-FLASH-MIB
• CISCO-IETF-IP-FORWARDING-MIB (not
available as of Cisco IOS Release 12.2(33)SRC)
• CISCO-IETF-IP-MIB (not available as of Cisco
IOS Release 12.2(33)SRC)
• CISCO-IP-FORWARD-MIB
• CISCO-IP-MIB
• CISCO-SNMP-TARGET-EXT-MIB
• ENTITY-MIB
• NOTIFICATION-LOG-MIB
• SNMP-TARGET-MIB
• TUNNEL-MIB
CCDE, CCENT, Cisco Eos, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, Cisco TelePresence, the Cisco logo, DCE, and Welcome to the Human
Network are trademarks; Changing the Way We Work, Live, Play, and Learn and Cisco Store are service marks; and Access Registrar, Aironet,
AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork
Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation,
EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, iQ
Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone, MeetingPlace,
MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare,
SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx logo
are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply
a partnership relationship between Cisco and any other company. (0807R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and
figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and
coincidental.
IPv6C-27
Start Here: Cisco IOS Software Release Specifics for IPv6 Features
Additional References
IPv6C-28
Implementing IPv6 Addressing and Basic
Connectivity
Implementing basic IPv6 connectivity in the Cisco IOS software consists of assigning IPv6 addresses to
individual router interfaces. The forwarding of IPv6 traffic can be enabled globally, and Cisco Express
Forwarding switching for IPv6 can also be enabled. Basic connectivity can be enhanced by configuring
support for AAAA record types in the Domain Name System (DNS) name-to-address and
address-to-name lookup processes, and by managing IPv6 neighbor discovery.
The Implementing IPv6 Addressing and Basic Connectivity module describes IPv6 addressing and basic
IPv6 connectivity tasks.
Finding Support Information for Platforms and Cisco IOS and Catalyst OS Software Images
Use Cisco Feature Navigator to find information about platform support and Cisco IOS and Catalyst OS
software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An
account on Cisco.com is not required.
Contents
• Prerequisites for Implementing IPv6 Addressing and Basic Connectivity, page 2
• Restrictions for Implementing IPv6 Addressing and Basic Connectivity, page 3
• Information About Implementing IPv6 Addressing and Basic Connectivity, page 3
• How to Implement IPv6 Addressing and Basic Connectivity, page 28
Americas Headquarters:
Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA
• Configuration Examples for Implementing IPv6 Addressing and Basic Connectivity, page 53
• Where to Go Next, page 58
• Additional References, page 59
• Command Reference, page 61
• Feature Information for Implementing IPv6 Addressing and Basic Connectivity, page 64
Note By default, the Cisco 12000 series Internet routers support only distributed Cisco Express
Forwarding.
– To use Unicast Reverse Path Forwarding (RPF), enable Cisco Express Forwarding switching or
distributed Cisco Express Forwarding switching in the router. There is no need to configure the
input interface for Cisco Express Forwarding switching. As long as Cisco Express Forwarding
is running on the router, individual interfaces can be configured with other switching modes.
Note For Unicast RPF to work, Cisco Express Forwarding must be configured globally in the router.
Unicast RPF will not work without Cisco Express Forwarding.
IPv6C-2
Implementing IPv6 Addressing and Basic Connectivity
Restrictions for Implementing IPv6 Addressing and Basic Connectivity
IPv6C-3
Implementing IPv6 Addressing and Basic Connectivity
Information About Implementing IPv6 Addressing and Basic Connectivity
IPv6C-4
Implementing IPv6 Addressing and Basic Connectivity
Information About Implementing IPv6 Addressing and Basic Connectivity
It is common for IPv6 addresses to contain successive hexadecimal fields of zeros. To make IPv6
addresses less cumbersome, two colons (::) may be used to compress successive hexadecimal fields of
zeros at the beginning, middle, or end of an IPv6 address (the colons represent successive hexadecimal
fields of zeros). Table 1 lists compressed IPv6 address formats.
A double colon may be used as part of the ipv6-address argument when consecutive 16-bit values are
denoted as zero. You can configure multiple IPv6 addresses per interfaces, but only one link-local
address.
Note Two colons (::) can be used only once in an IPv6 address to represent the longest successive hexadecimal
fields of zeros.
The loopback address listed in Table 1 may be used by a node to send an IPv6 packet to itself. The
loopback address in IPv6 functions the same as the loopback address in IPv4 (127.0.0.1).
Note The IPv6 loopback address cannot be assigned to a physical interface. A packet that has the IPv6
loopback address as its source or destination address must remain within the node that created the packet.
IPv6 routers do not forward packets that have the IPv6 loopback address as their source or destination
address.
The unspecified address listed in Table 1 indicates the absence of an IPv6 address. For example, a newly
initialized node on an IPv6 network may use the unspecified address as the source address in its packets
until it receives its IPv6 address.
Note The IPv6 unspecified address cannot be assigned to an interface. The unspecified IPv6 addresses must
not be used as destination addresses in IPv6 packets or the IPv6 routing header.
An IPv6 address prefix, in the format ipv6-prefix/prefix-length, can be used to represent bit-wise
contiguous blocks of the entire address space. The ipv6-prefix must be in the form documented in
RFC 2373 where the address is specified in hexadecimal using 16-bit values between colons. The prefix
length is a decimal value that indicates how many of the high-order contiguous bits of the address
comprise the prefix (the network portion of the address). For example, 2001:0DB8:8086:6502::/32 is a
valid IPv6 prefix.
IPv6C-5
Implementing IPv6 Addressing and Basic Connectivity
Information About Implementing IPv6 Addressing and Basic Connectivity
88119
Global Routing Prefix SLA Interface ID
001
Addresses with a prefix of 2000::/3 (001) through E000::/3 (111) are required to have 64-bit interface
identifiers in the extended universal identifier (EUI)-64 format. The Internet Assigned Numbers
Authority (IANA) allocates the IPv6 address space in the range of 2000::/16 to regional registries.
The aggregatable global address typically consists of a 48-bit global routing prefix and a 16-bit subnet
ID or Site-Level Aggregator (SLA). In the IPv6 aggregatable global unicast address format document
(RFC 2374), the global routing prefix included two other hierarchically structured fields named
Top-Level Aggregator (TLA) and Next-Level Aggregator (NLA). The IETF decided to remove the TLS
and NLA fields from the RFCs because these fields are policy-based. Some existing IPv6 networks
deployed before the change might still be using networks based on the older architecture.
A 16-bit subnet field called the subnet ID could be used by individual organizations to create their own
local addressing hierarchy and to identify subnets. A subnet ID is similar to a subnet in IPv4, except that
an organization with an IPv6 subnet ID can support up to 65,535 individual subnets.
An interface ID is used to identify interfaces on a link. The interface ID must be unique to the link. It
may also be unique over a broader scope. In many cases, an interface ID will be the same as or based on
the link-layer address of an interface. Interface IDs used in aggregatable global unicast and other IPv6
address types must be 64 bits long and constructed in the modified EUI-64 format.
IPv6C-6
Implementing IPv6 Addressing and Basic Connectivity
Information About Implementing IPv6 Addressing and Basic Connectivity
Interface IDs are constructed in the modified EUI-64 format in one of the following ways:
• For all IEEE 802 interface types (for example, Ethernet, and FDDI interfaces), the first three octets
(24 bits) are taken from the Organizationally Unique Identifier (OUI) of the 48-bit link-layer
address (MAC address) of the interface, the fourth and fifth octets (16 bits) are a fixed hexadecimal
value of FFFE, and the last three octets (24 bits) are taken from the last three octets of the MAC
address. The construction of the interface ID is completed by setting the Universal/Local (U/L)
bit—the seventh bit of the first octet—to a value of 0 or 1. A value of 0 indicates a locally
administered identifier; a value of 1 indicates a globally unique IPv6 interface identifier.
• For all other interface types (for example, serial, loopback, ATM, Frame Relay, and tunnel interface
types—except tunnel interfaces used with IPv6 overlay tunnels), the interface ID is constructed in
the same way as the interface ID for IEEE 802 interface types; however, the first MAC address from
the pool of MAC addresses in the router is used to construct the identifier (because the interface does
not have a MAC address).
• For tunnel interface types that are used with IPv6 overlay tunnels, the interface ID is the IPv4
address assigned to the tunnel interface with all zeros in the high-order 32 bits of the identifier.
Note For interfaces using PPP, given that the interfaces at both ends of the connection might have the
same MAC address, the interface identifiers used at both ends of the connection are negotiated
(picked randomly and, if necessary, reconstructed) until both identifiers are unique. The first
MAC address in the router is used to construct the identifier for interfaces using PPP.
If no IEEE 802 interface types are in the router, link-local IPv6 addresses are generated on the interfaces
in the router in the following sequence:
1. The router is queried for MAC addresses (from the pool of MAC addresses in the router).
2. If no MAC addresses are available in the router, the serial number of the router is used to form the
link-local addresses.
3. If the serial number of the router cannot be used to form the link-local addresses, the router uses a
Message Digest 5 (MD5) hash to determine the MAC address of the router from the hostname of the
router.
Link-Local Address
A link-local address is an IPv6 unicast address that can be automatically configured on any interface
using the link-local prefix FE80::/10 (1111 1110 10) and the interface identifier in the modified EUI-64
format. Link-local addresses are used in the neighbor discovery protocol and the stateless
autoconfiguration process. Nodes on a local link can use link-local addresses to communicate; the nodes
do not need globally unique addresses to communicate. Figure 2 shows the structure of a link-local
address.
IPv6 routers must not forward packets that have link-local source or destination addresses to other links.
IPv6C-7
Implementing IPv6 Addressing and Basic Connectivity
Information About Implementing IPv6 Addressing and Basic Connectivity
128 bits
0 Interface ID
1111 1110 10
FE80::/10
52669
10 bits
96 bits 32 bits
0 IPv4 address
::192.168.30.1
= ::C0A8:1E01
52727
IPv6C-8
Implementing IPv6 Addressing and Basic Connectivity
Information About Implementing IPv6 Addressing and Basic Connectivity
/7 /48 /64
Local IPv6
Subnet prefix
Link prefix
232389
• Subnet ID — 16-bit subnet ID is an identifier of a subnet within the site.
• Interface ID — 64-bit IID
Site-Local Address
Note Because RFC 3879 deprecates the use of site-local addresses, configuration of private IPv6 addresses
should be done following the recommendations of unique local addressing (ULA) in RFC 4193.
Note Anycast addresses can be used only by a router, not a host, and anycast addresses must not be used as
the source address of an IPv6 packet.
Figure 5 shows the format of the subnet router anycast address; the address has a prefix concatenated by
a series of zeros (the interface ID). The subnet router anycast address can be used to reach a router on
the link that is identified by the prefix in the subnet router anycast address.
128 bits
52670
Prefix 0000000000000...000
IPv6C-9
Implementing IPv6 Addressing and Basic Connectivity
Information About Implementing IPv6 Addressing and Basic Connectivity
The following shows the configuration for an anycast prefix for 6to4 relay routers:
interface Tunnel0
no ip address
ipv6 address 2001:0DB8:A00:1::1/64
ipv6 address 2001:oDB8:c058:6301::/128 anycast
tunnel source Ethernet0
tunnel mode ipv6ip 6to4
!
interface Ethernet0
ip address 10.0.0.1 255.255.255.0
ip address 192.88.99.1 255.255.255.0 secondary
!
ipv6 route 2001:0DB8::/16 Tunnel0
!
128 bits
0 Interface ID
4 bits 4 bits
1111 1111
0 if permanent
F F Lifetime Scope Lifetime =
1 if temporary
1 = node
8 bits 8 bits 2 = link
Scope = 5 = site
8 = organization
52671
E = global
IPv6 nodes (hosts and routers) are required to join (receive packets destined for) the following multicast
groups:
• All-nodes multicast group FF02:0:0:0:0:0:0:1 (scope is link-local)
• Solicited-node multicast group FF02:0:0:0:0:1:FF00:0000/104 for each of its assigned unicast and
anycast addresses
IPv6 routers must also join the all-routers multicast group FF02:0:0:0:0:0:0:2 (scope is link-local).
IPv6C-10
Implementing IPv6 Addressing and Basic Connectivity
Information About Implementing IPv6 Addressing and Basic Connectivity
The solicited-node multicast address is a multicast group that corresponds to an IPv6 unicast or anycast
address. IPv6 nodes must join the associated solicited-node multicast group for every unicast and
anycast address to which it is assigned. The IPv6 solicited-node multicast address has the prefix
FF02:0:0:0:0:1:FF00:0000/104 concatenated with the 24 low-order bits of a corresponding IPv6 unicast
or anycast address (see Figure 7). For example, the solicited-node multicast address corresponding to the
IPv6 address 2037::01:800:200E:8C6C is FF02::1:FF0E:8C6C. Solicited-node addresses are used in
neighbor solicitation messages.
128 bits
52672
Note There are no broadcast addresses in IPv6. IPv6 multicast addresses are used instead of broadcast
addresses.
For further information on IPv6 multicast, see the Implementing IPv6 Multicast document in the Cisco
IOS IPv6 Configuration Library.
IPv6C-11
Implementing IPv6 Addressing and Basic Connectivity
Information About Implementing IPv6 Addressing and Basic Connectivity
Connection 1 contains an IPv6 address that uses the maximum address length in the address field.
Connection 2 shows the IPv6 address overflowing the address field and the following fields moved to
the next line, but in alignment with the appropriate headers. Connection 3 contains an IPv6 address that
fills the maximum length of the hostname and address fields without wrapping any lines. Connection 4
shows the effect of both the hostname and address fields containing a long IPv6 address. The output is
shown over three lines keeping the correct heading alignment. Connection 5 displays a similar effect as
connection 4 with a very long IPv6 address in the hostname and address fields. Note that the connection
name field is actually truncated. Connection 6 displays a very short IPv6 address that does not require
any change in the display. Connections 7 and 8 display short and long IPv4 addresses.
Note The IPv6 address output display applies to all commands that display IPv6 addresses.
The basic IPv6 packet header has 8 fields with a total size of 40 octets (320 bits) (see Figure 9). Fields
were removed from the IPv6 header because, in IPv6, fragmentation is not handled by routers and
checksums at the network layer are not used. Instead, fragmentation in IPv6 is handled by the source of
a packet and checksums at the data link layer and transport layer are used. (In IPv4, the User Datagram
Protocol (UDP) transport layer uses an optional checksum. In IPv6, use of the UDP checksum is required
to check the integrity of the inner packet.) Additionally, the basic IPv6 packet header and Options field
are aligned to 64 bits, which can facilitate the processing of IPv6 packets.
IPv6C-12
Implementing IPv6 Addressing and Basic Connectivity
Information About Implementing IPv6 Addressing and Basic Connectivity
Source Address
40
octets
Destination Address
51458
32 bits
Field Description
Version Similar to the Version field in the IPv4 packet header, except that the
field lists number 6 for IPv6 instead of number 4 for IPv4.
Traffic Class Similar to the Type of Service field in the IPv4 packet header. The
Traffic Class field tags packets with a traffic class that is used in
differentiated services.
Flow Label A new field in the IPv6 packet header. The Flow Label field tags packets
with a specific flow that differentiates the packets at the network layer.
Payload Length Similar to the Total Length field in the IPv4 packet header. The Payload
Length field indicates the total length of the data portion of the packet.
Next Header Similar to the Protocol field in the IPv4 packet header. The value of the
Next Header field determines the type of information following the
basic IPv6 header. The type of information following the basic IPv6
header can be a transport-layer packet, for example, a TCP or UDP
packet, or an Extension Header, as shown in Figure 9.
Hop Limit Similar to the Time to Live field in the IPv4 packet header. The value of
the Hop Limit field specifies the maximum number of routers that an
IPv6 packet can pass through before the packet is considered invalid.
Each router decrements the value by one. Because no checksum is in the
IPv6 header, the router can decrement the value without needing to
recalculate the checksum, which saves processing resources.
IPv6C-13
Implementing IPv6 Addressing and Basic Connectivity
Information About Implementing IPv6 Addressing and Basic Connectivity
Field Description
Source Address Similar to the Source Address field in the IPv4 packet header, except
that the field contains a 128-bit source address for IPv6 instead of a
32-bit source address for IPv4.
Destination Address Similar to the Destination Address field in the IPv4 packet header,
except that the field contains a 128-bit destination address for IPv6
instead of a 32-bit destination address for IPv4.
Following the eight fields of the basic IPv6 packet header are optional extension headers and the data
portion of the packet. If present, each extension header is aligned to 64 bits. There is no fixed number of
extension headers in an IPv6 packet. Together, the extension headers form a chain of headers. Each
extension header is identified by the Next Header field of the previous header. Typically, the final
extension header has a Next Header field of a transport-layer protocol, such as TCP or UDP. Figure 10
shows the IPv6 extension header format.
IPv6
packet
Any number of
extension headers
IPv6C-14
Implementing IPv6 Addressing and Basic Connectivity
Information About Implementing IPv6 Addressing and Basic Connectivity
Table 3 lists the extension header types and their Next Header field values.
Next
Header
Header Type Value Description
Hop-by-hop options header 0 This header is processed by all hops in the path of a packet.
When present, the hop-by-hop options header always
follows immediately after the basic IPv6 packet header.
Destination options header 60 The destination options header can follow any hop-by-hop
options header, in which case the destination options header
is processed at the final destination and also at each visited
address specified by a routing header. Alternatively, the
destination options header can follow any Encapsulating
Security Payload (ESP) header, in which case the destination
options header is processed only at the final destination.
Routing header 43 The routing header is used for source routing.
Fragment header 44 The fragment header is used when a source must fragment a
packet that is larger than the Maximum Transmission Unit
(MTU) for the path between itself and a destination. The
Fragment header is used in each fragmented packet.
Authentication header 51 The Authentication header and the ESP header are used
within IP Security Protocol (IPSec) to provide
and
authentication, integrity, and confidentiality of a packet.
ESP header 50 These headers are identical for both IPv4 and IPv6.
Upper-layer headers 6 (TCP) The upper-layer (transport) headers are the typical headers
used inside a packet to transport the data. The two main
17 (UDP)
transport protocols are TCP and UDP.
Mobility headers 135 Extension headers used by mobile nodes, correspondent
nodes, and home agents in all messaging related to the
creation and management of bindings.
IPv6C-15
Implementing IPv6 Addressing and Basic Connectivity
Information About Implementing IPv6 Addressing and Basic Connectivity
Note By default, the Cisco 12000 series Internet routers support only distributed Cisco Express Forwarding
(Cisco Express Forwarding switching is performed by the line cards). The Cisco 7500 series routers
support both Cisco Express Forwarding and distributed Cisco Express Forwarding. When Cisco Express
Forwarding is configured on Cisco 7500 series routers, Cisco Express Forwarding switching is
performed by the Route Processor (RP); when distributed Cisco Express Forwarding is configured,
Cisco Express Forwarding switching is performed by the line cards.
In Cisco IOS Release 12.0(21)ST, distributed Cisco Express Forwarding included support for IPv6
addresses and prefixes. In Cisco IOS Release 12.0(22)S or later releases and Cisco IOS
Release 12.2(13)T or later releases, distributed Cisco Express Forwarding and Cisco Express
Forwarding were enhanced to include support for separate FIBs for IPv6 global and link-local addresses.
Each IPv6 router interface has an association to one IPv6 global FIB and one IPv6 link-local FIB
(multiple interfaces can have an association to the same FIB). All IPv6 router interfaces that are attached
to the same IPv6 link share the same IPv6 link-local FIB. IPv6 packets that have an IPv6 global
destination address are processed by the IPv6 global FIB; however, packets that have an IPv6 global
destination address and an IPv6 link-local source address are sent to the RP for process switching and
scope-error handling. Packets that have a link-local source address are not forwarded off of the local link
and are sent to the RP for process switching and scope-error handling.
Note Unicast RPF is an input function and is applied only on the input interface of a router at the upstream
end of a connection.
The Unicast RPF feature verifies whether any packet received at a router interface arrives on one of the
best return paths to the source of the packet. The feature performs a reverse lookup in the Cisco Express
Forwarding table. If Unicast RPF does not find a reverse path for the packet, Unicast RPF can drop or
forward the packet, depending on whether an access control list (ACL) is specified. If an ACL is
specified, then when (and only when) a packet fails the Unicast RPF check, the ACL is checked to verify
if the packet should be dropped (using a deny statement in the ACL) or forwarded (using a permit
statement in the ACL). Whether a packet is dropped or forwarded, the packet is counted in the global IP
traffic statistics for Unicast RPF drops and in the interface statistics for Unicast RPF.
If no ACL is specified, the router drops the forged or malformed packet immediately and no ACL logging
occurs. The router and interface Unicast RPF counters are updated.
Unicast RPF events can be logged by specifying the logging option for the ACL entries. Log information
can be used to gather information about the attack, such as source address and time.
IPv6C-16
Implementing IPv6 Addressing and Basic Connectivity
Information About Implementing IPv6 Addressing and Basic Connectivity
Note With Unicast RPF, all equal-cost “best” return paths are considered valid. Unicast RPF works in cases
where multiple return paths exist, provided that each path is equal to the others in terms of the routing
cost (number of hops, weights, and so on) and as long as the route is in the FIB.
Note IP6.ARPA support was added in the Cisco IOS 12.3(11)T release. IP6.ARPA is not supported in releases
prior to the Cisco IOS 12.3(11)T release.
Note In IPv6, the minimum link MTU is 1280 octets. We recommend using an MTU value of 1500 octets for
IPv6 links.
IPv6C-17
Implementing IPv6 Addressing and Basic Connectivity
Information About Implementing IPv6 Addressing and Basic Connectivity
ICMPv6 Data
52728
IPv6C-18
Implementing IPv6 Addressing and Basic Connectivity
Information About Implementing IPv6 Addressing and Basic Connectivity
The IPv6 static cache entry for neighbor discovery feature allows static entries to be made in the IPv6
neighbor cache. Static routing requires an administrator to manually enter IPv6 addresses, subnet masks,
gateways, and corresponding MAC addresses for each interface of each router into a table. Static routing
enables more control but requires more work to maintain the table. The table must be updated each time
routes are added or changed.
Stateful Switchover
IPv6 neighbor discovery supports stateful switchover (SSO) using Cisco Express Forwarding. When
switchover occurs, the Cisco Express Forwarding adjacency state, which is checkpointed, is used to
reconstruct the neighbor discovery cache.
After receiving the neighbor solicitation message, the destination node replies by sending a neighbor
advertisement message, which has a value of 136 in the Type field of the ICMP packet header, on the
local link. The source address in the neighbor advertisement message is the IPv6 address of the node
(more specifically, the IPv6 address of the node interface) sending the neighbor advertisement message.
The destination address in the neighbor advertisement message is the IPv6 address of the node that sent
the neighbor solicitation message. The data portion of the neighbor advertisement message includes the
link-layer address of the node sending the neighbor advertisement message.
After the source node receives the neighbor advertisement, the source node and destination node can
communicate.
IPv6C-19
Implementing IPv6 Addressing and Basic Connectivity
Information About Implementing IPv6 Addressing and Basic Connectivity
Neighbor solicitation messages are also used to verify the reachability of a neighbor after the link-layer
address of a neighbor is identified. When a node wants to verifying the reachability of a neighbor, the
destination address in a neighbor solicitation message is the unicast address of the neighbor.
Neighbor advertisement messages are also sent when there is a change in the link-layer address of a node
on a local link. When there is such a change, the destination address for the neighbor advertisement is
the all-nodes multicast address.
Neighbor solicitation messages are also used to verify the reachability of a neighbor after the link-layer
address of a neighbor is identified. Neighbor unreachability detection identifies the failure of a neighbor
or the failure of the forward path to the neighbor, and is used for all paths between hosts and neighboring
nodes (hosts or routers). Neighbor unreachability detection is performed for neighbors to which only
unicast packets are being sent and is not performed for neighbors to which multicast packets are being
sent.
A neighbor is considered reachable when a positive acknowledgment is returned from the neighbor
(indicating that packets previously sent to the neighbor have been received and processed). A positive
acknowledgment—from an upper-layer protocol (such as TCP)—indicates that a connection is making
forward progress (reaching its destination) or the receipt of a neighbor advertisement message in
response to a neighbor solicitation message. If packets are reaching the peer, they are also reaching the
next-hop neighbor of the source. Therefore, forward progress is also a confirmation that the next-hop
neighbor is reachable.
For destinations that are not on the local link, forward progress implies that the first-hop router is
reachable. When acknowledgments from an upper-layer protocol are not available, a node probes the
neighbor using unicast neighbor solicitation messages to verify that the forward path is still working.
The return of a solicited neighbor advertisement message from the neighbor is a positive
acknowledgment that the forward path is still working (neighbor advertisement messages that have the
solicited flag set to a value of 1 are sent only in response to a neighbor solicitation message). Unsolicited
messages confirm only the one-way path from the source to the destination node; solicited neighbor
advertisement messages indicate that a path is working in both directions.
Note A neighbor advertisement message that has the solicited flag set to a value of 0 must not be considered
as a positive acknowledgment that the forward path is still working.
Neighbor solicitation messages are also used in the stateless autoconfiguration process to verify the
uniqueness of unicast IPv6 addresses before the addresses are assigned to an interface. Duplicate address
detection is performed first on a new, link-local IPv6 address before the address is assigned to an
interface (the new address remains in a tentative state while duplicate address detection is performed).
Specifically, a node sends a neighbor solicitation message with an unspecified source address and a
tentative link-local address in the body of the message. If another node is already using that address, the
node returns a neighbor advertisement message that contains the tentative link-local address. If another
node is simultaneously verifying the uniqueness of the same address, that node also returns a neighbor
solicitation message. If no neighbor advertisement messages are received in response to the neighbor
solicitation message and no neighbor solicitation messages are received from other nodes that are
attempting to verify the same tentative address, the node that sent the original neighbor solicitation
message considers the tentative link-local address to be unique and assigns the address to the interface.
Every IPv6 unicast address (global or link-local) must be verified for uniqueness on the link; however,
until the uniqueness of the link-local address is verified, duplicate address detection is not performed on
any other IPv6 addresses associated with the link-local address. The Cisco implementation of duplicate
address detection in the Cisco IOS software does not verify the uniqueness of anycast or global addresses
that are generated from 64-bit interface identifiers.
IPv6C-20
Implementing IPv6 Addressing and Basic Connectivity
Information About Implementing IPv6 Addressing and Basic Connectivity
Router Router
advertisement advertisement
52674
Data = options, prefix, lifetime, autoconfig flag
IPv6C-21
Implementing IPv6 Addressing and Basic Connectivity
Information About Implementing IPv6 Addressing and Basic Connectivity
The configured parameters are specific to an interface. The sending of RA messages (with default
values) is automatically enabled on Ethernet and FDDI interfaces when the ipv6 unicast-routing
command is configured. For other interface types, the sending of RA messages must be manually
configured by using the no ipv6 nd ra suppress command. The sending of RA messages can be disabled
on individual interfaces by using the ipv6 nd ra suppress command.
Note As of Cisco IOS Release 12.4(2)T, the ipv6 nd ra suppress and no ipv6 nd ra suppress commands
replace the ipv6 nd suppress-ra and no ipv6 nd suppress-ra commands.
Hosts discover and select default routers by listening to RAs. Typical default router selection
mechanisms are suboptimal in certain cases, such as when traffic engineering is needed. For example,
two routers on a link may provide equivalent but not equal-cost routing, and policy may dictate that one
of the routers is preferred. Some examples are as follows:
• Multiple routers that route to distinct sets of prefixes—Redirects (sent by nonoptimal routers for a
destination) mean that hosts can choose any router and the system will work. However, traffic
patterns may mean that choosing one of the routers would lead to considerably fewer redirects.
• Accidentally deploying a new router—Deploying a new router before it has been fully configured
could lead to hosts adopting the new router as a default router and traffic disappearing. Network
managers may want to indicate that some routers are more preferred than others.
• Multihomed situations—Multihomed situations may become more common, because of multiple
physical links and because of the use of tunneling for IPv6 transport. Some of the routers may not
provide full default routing because they route only to the 6-to-4 prefix or they route only to a
corporate intranet. These situations cannot be resolved with redirects, which operate only over a
single link.
The default router preference (DRP) extension provides a coarse preference metric (low, medium, or
high) for default routers. The DRP of a default router is signaled in unused bits in RA messages. This
extension is backward compatible, both for routers (setting the DRP bits) and hosts (interpreting the
DRP bits). These bits are ignored by hosts that do not implement the DRP extension. Similarly, the
values sent by routers that do not implement the DRP extension will be interpreted by hosts that do
implement it as indicating a “medium” preference.
DRPs need to be configured manually. For information on configuring the optional DRP extension, see
the “Configuring the DRP Extension for Traffic Engineering” section.
IPv6C-22
Implementing IPv6 Addressing and Basic Connectivity
Information About Implementing IPv6 Addressing and Basic Connectivity
Host H
Router B Router A
IPv6 packet
60981
Subsequent IPv6 packets
Note A router must be able to determine the link-local address for each of its neighboring routers in order to
ensure that the target address (the final destination) in a redirect message identifies the neighbor router
by its link-local address. For static routing, the address of the next-hop router should be specified using
the link-local address of the router; for dynamic routing, all IPv6 routing protocols must exchange the
link-local addresses of neighboring routers.
After forwarding a packet, a router should send a redirect message to the source of the packet under the
following circumstances:
• The destination address of the packet is not a multicast address.
• The packet was not addressed to the router.
• The packet is about to be sent out the interface on which it was received.
• The router determines that a better first-hop node for the packet resides on the same link as the
source of the packet.
• The source address of the packet is a global IPv6 address of a neighbor on the same link, or a
link-local address.
Use the ipv6 icmp error-interval command to limit the rate at which the router generates all IPv6 ICMP
error messages, including neighbor redirect messages, which ultimately reduces link-layer congestion.
Note A router must not update its routing tables after receiving a neighbor redirect message, and hosts must
not originate neighbor redirect messages.
IPv6C-23
Implementing IPv6 Addressing and Basic Connectivity
Information About Implementing IPv6 Addressing and Basic Connectivity
A node on the link can automatically configure global IPv6 addresses by appending its interface
identifier (64 bits) to the prefixes (64 bits) included in the RA messages. The resulting 128-bit IPv6
addresses configured by the node are then subjected to duplicate address detection to ensure their
uniqueness on the link. If the prefixes advertised in the RA messages are globally unique, then the IPv6
addresses configured by the node are also guaranteed to be globally unique. Router solicitation
messages, which have a value of 133 in the Type field of the ICMP packet header, are sent by hosts at
system startup so that the host can immediately autoconfigure without needing to wait for the next
scheduled RA message.
IPv6C-24
Implementing IPv6 Addressing and Basic Connectivity
Information About Implementing IPv6 Addressing and Basic Connectivity
MAC address:
00:2c:04:00:FF:56
Host autoconfigured
addresses are: Sends new network-type
new address autoconfigured information
52677
from a new prefix and (prefixes, [old and new] )
old addresses autoconfigured
from an old prefix
IPv6C-25
Implementing IPv6 Addressing and Basic Connectivity
Information About Implementing IPv6 Addressing and Basic Connectivity
Customer
no. 1
2001:0410:0001::/48 Only announces
the /35 prefix
Customer ISP
no. 2 2001:0410::/35
2001:0410:0002::/48
IPv6 Internet
52680
2001::/16
ISP
2001:0410::/32
Announces the
2001:0410::/32 prefix
IPv6C-26
Implementing IPv6 Addressing and Basic Connectivity
Information About Implementing IPv6 Addressing and Basic Connectivity
The following data links are supported for IPv6: ATM permanent virtual circuit (PVC) and ATM LANE,
Ethernet, Fast Ethernet, Gigabit Ethernet, FDDI, Frame Relay PVC, Cisco High-Level Data Link
Control (HDLC), PPP over Packet Over SONET, ISDN, serial interfaces, and dynamic packet transport
(DPT). See the Start Here: Cisco IOS Software Release Specifics for IPv6 Features for release details on
supported data links.
One application program interface (API) supports both IPv4 and IPv6 addresses and DNS requests. An
application can be upgraded to the new API and still use only the IPv4 protocol stack. The Cisco IOS
software supports the dual IPv4 and IPv6 protocol stack technique. When an interface is configured with
both an IPv4 and an IPv6 address, the interface will forward both IPv4 and IPv6 traffic.
In Figure 20, an application that supports dual IPv4 and IPv6 protocol stacks requests all available
addresses for the destination hostname www.a.com from a DNS server. The DNS server replies with all
available addresses (both IPv4 and IPv6 addresses) for www.example.com. The application chooses an
address—in most cases, IPv6 addresses are the default choice—and connects the source node to the
destination using the IPv6 protocol stack.
IPv6C-27
Implementing IPv6 Addressing and Basic Connectivity
How to Implement IPv6 Addressing and Basic Connectivity
www.example.com
=*? IPv4
3ffe:yyyy::1 10.1.1.1
10.1.1.1
DNS
server
52684
IPv6
3ffe:yyyy::1
Note The ipv6-address argument in the ipv6 address command must be in the form documented in RFC 2373
where the address is specified in hexadecimal using 16-bit values between colons.
The ipv6-prefix argument in the ipv6 address command must be in the form documented in RFC 2373
where the address is specified in hexadecimal using 16-bit values between colons.
The /prefix-length keyword and argument in the ipv6 address command is a decimal value that indicates
how many of the high-order contiguous bits of the address comprise the prefix (the network portion of
the address) A slash mark must precede the decimal value.
IPv6C-28
Implementing IPv6 Addressing and Basic Connectivity
How to Implement IPv6 Addressing and Basic Connectivity
Note The solicited-node multicast address is used in the neighbor discovery process.
Restrictions
In Cisco IOS Release 12.2(4)T or later releases, Cisco IOS Release 12.0(21)ST, and Cisco IOS
Release 12.0(22)S or later releases, the ipv6 address or ipv6 address eui-64 command can be used to
configure multiple IPv6 global addresses within the same prefix on an interface. Multiple IPv6 link-local
addresses on an interface are not supported.
Prior to Cisco IOS Releases 12.2(4)T, 12.0(21)ST, and 12.0(22)S, the Cisco IOS command-line interface
(CLI) displays the following error message when multiple IPv6 addresses within the same prefix on an
interface are configured:
Prefix <prefix-number> already assigned to <interface-type>
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ipv6 address ipv6-prefix/prefix-length eui-64
or
ipv6 address ipv6-address/prefix-length link-local
or
ipv6 address ipv6-prefix/prefix-length anycast
or
ipv6 enable
5. exit
6. ipv6 unicast-routing
IPv6C-29
Implementing IPv6 Addressing and Basic Connectivity
How to Implement IPv6 Addressing and Basic Connectivity
DETAILED STEPS
Example:
Router# configure terminal
Step 3 interface type number Specifies an interface type and number, and places the
router in interface configuration mode.
Example:
Router(config)# interface ethernet 0/0
Step 4 ipv6 address ipv6-prefix/prefix-length eui-64 Specifies an IPv6 network assigned to the interface and
or enables IPv6 processing on the interface.
ipv6 address ipv6-address/prefix-length or
link-local
Specifies an IPv6 address assigned to the interface and
or enables IPv6 processing on the interface.
ipv6 address ipv6-prefix/prefix-length anycast or
or
Automatically configures an IPv6 link-local address on the
ipv6 enable
interface while also enabling the interface for IPv6
processing. The link-local address can be used only to
Example: communicate with nodes on the same link.
Router(config-if)# ipv6 address • Specifying the ipv6 address eui-64 command
2001:0DB8:0:1::/64 eui-64
configures global IPv6 addresses with an interface
or
identifier (ID) in the low-order 64 bits of the IPv6
address. Only the 64-bit network prefix for the address
Example: needs to be specified; the last 64 bits are automatically
Router(config-if)# ipv6 address computed from the interface ID.
FE80::260:3EFF:FE11:6770 link-local
• Specifying the ipv6 address link-local command
or configures a link-local address on the interface that is
used instead of the link-local address that is
automatically configured when IPv6 is enabled on the
Example: interface.
Router(config-if) ipv6 address
2001:0DB8:1:1:FFFF:FFFF:FFFF:FFFE/64 anycast • Specifying the ipv6 address anycast command adds an
or IPv6 anycast address.
Example:
Router(config-if)# ipv6 enable
IPv6C-30
Implementing IPv6 Addressing and Basic Connectivity
How to Implement IPv6 Addressing and Basic Connectivity
Example:
Router(config)# ipv6 unicast-routing
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 general-prefix prefix-name [ipv6-prefix/prefix-length] [6to4 interface-type interface-number]
IPv6C-31
Implementing IPv6 Addressing and Basic Connectivity
How to Implement IPv6 Addressing and Basic Connectivity
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 general-prefix prefix-name Defines a general prefix for an IPv6 address.
{ipv6-prefix/prefix-length | 6to4
interface-type interface-number} When defining a general prefix manually, specify both the
ipv6-prefix and /prefix-length arguments.
Example:
Router(config)# ipv6 general-prefix my-prefix
2001:0DB8:2222::/48
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 general-prefix prefix-name [ipv6-prefix/prefix-length] [6to4 interface-type interface-number]
IPv6C-32
Implementing IPv6 Addressing and Basic Connectivity
How to Implement IPv6 Addressing and Basic Connectivity
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 general-prefix prefix-name Defines a general prefix for an IPv6 address.
{ipv6-prefix/prefix-length | 6to4
interface-type interface-number} When defining a general prefix based on a 6to4 interface,
specify the 6to4 keyword and the interface-type
interface-number arguments.
Example:
Router(config)# ipv6 general-prefix my-prefix When defining a general prefix based on an interface used
6to4 ethernet 0 for 6to4 tunneling, the general prefix will be of the form
2001:a.b.c.d::/48, where “a.b.c.d” is the IPv4 address of the
interface referenced.
Defining a General Prefix with the DHCP for IPv6 Prefix Delegation Client Function
You can define a general prefix dynamically using the DHCP for IPv6 prefix delegation client function.
For information on how to perform this task, see the Implementing DHCP for IPv6 module.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ipv6 address {ipv6-address/prefix-length | prefix-name sub-bits/prefix-length}
IPv6C-33
Implementing IPv6 Addressing and Basic Connectivity
How to Implement IPv6 Addressing and Basic Connectivity
DETAILED STEPS
Example:
Router# configure terminal
Step 3 interface type number Specifies an interface type and number, and places the
router in interface configuration mode.
Example:
Router(config)# interface ethernet 0/0
Step 4 ipv6 address {ipv6-address/prefix-length | Configures an IPv6 prefix name for an IPv6 address and
prefix-name sub-bits/prefix-length} enables IPv6 processing on the interface.
Example:
Router(config-if) ipv6 address my-prefix
2001:0DB8:0:7272::/64
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 unicast-routing
4. interface type number
5. ip address ip-address mask [secondary]
6. ipv6 address {ipv6-address/prefix-length | prefix-name sub-bits/prefix-length | [%vrf-name]}
IPv6C-34
Implementing IPv6 Addressing and Basic Connectivity
How to Implement IPv6 Addressing and Basic Connectivity
DETAILED STEPS
Command Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Router> enable
Step 2 configure terminal Enters global configuration mode.
Example:
Router# configure terminal
Step 3 ipv6 unicast-routing Enables the forwarding of IPv6 unicast datagrams.
Example:
Router(config)# ipv6 unicast routing
Step 4 interface type number Specifies the interface type and number, and enters interface
configuration mode.
Example:
Router(config)# interface ethernet 0
Step 5 ip address ip-address mask [secondary Specifies a primary or secondary IPv4 address for an interface.
[vrf vrf-name]]
Example:
Router(config-if)# ip address
192.168.99.1 255.255.255.0
Step 6 ipv6 address {ipv6-address/prefix-length Specifies the IPv6 network assigned to the interface and enables
| prefix-name sub-bits/prefix-length | IPv6 processing on the interface.
[%vrf-name]}
Note See the “Configuring IPv6 Addressing and Enabling IPv6
Routing” section for more information on configuring IPv6
Example: addresses.
Router(config-if)# ipv6 address
2001:0DB8:c18:1::3/64
IPv6C-35
Implementing IPv6 Addressing and Basic Connectivity
How to Implement IPv6 Addressing and Basic Connectivity
message to be sent, one token is removed from the bucket. If a series of error messages is generated,
error messages can be sent until the bucket is empty. When the bucket is empty of tokens, IPv6 ICMP
error messages are not sent until a new token is placed in the bucket. The token bucket algorithm does
not increase the average rate limiting time interval, and it is more flexible than the fixed time interval
scheme.
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 icmp error-interval milliseconds [bucketsize]
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 icmp error-interval milliseconds Configures the interval and bucket size for IPv6 ICMP error
[bucketsize] messages.
• The milliseconds argument specifies the interval
Example: between tokens being added to the bucket.
Router(config)# ipv6 icmp error-interval 50 20
• The optional bucketsize argument defines the maximum
number of tokens stored in the bucket.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ipv6 nd router-preference {high | medium | low}
IPv6C-36
Implementing IPv6 Addressing and Basic Connectivity
How to Implement IPv6 Addressing and Basic Connectivity
DETAILED STEPS
Example:
Router# configure terminal
Step 3 interface type number Specifies the interface type and number, and enters interface
configuration mode.
Example:
Router(config)# interface ethernet 0
Step 4 ipv6 nd router-preference {high | medium | low} Configures a DRP for a router on a specific interface
Example:
Router(config-if)# ipv6 nd router-preference high
IPv6C-37
Implementing IPv6 Addressing and Basic Connectivity
How to Implement IPv6 Addressing and Basic Connectivity
Prerequisites
To enable the router to forward Cisco Express Forwarding and distributed Cisco Express Forwarding
traffic, use the ipv6 unicast-routing command to configure the forwarding of IPv6 unicast datagrams
globally on the router, and use the ipv6 address command to configure IPv6 address and IPv6 processing
on an interface.
You must enable Cisco Express Forwarding for IPv4 globally on the router by using the ip cef command
before enabling Cisco Express Forwarding for IPv6 globally on the router.
You must enable distributed Cisco Express Forwarding for IPv4 by using the ip cef distributed
command before enabling distributed Cisco Express Forwarding for IPv6.
Restrictions
The ipv6 cef and ipv6 cef distributed commands are not supported on the Cisco 12000 series Internet
routers because this distributed platform operates only in distributed Cisco Express Forwarding mode.
In Cisco IOS Release 12.0(22)S or later releases, the following restrictions apply to nondistributed and
distributed architecture platforms configured for Cisco Express Forwarding and distributed Cisco
Express Forwarding:
Note By default, the Cisco 12000 series Internet routers support only distributed Cisco Express
Forwarding (Cisco Express Forwarding switching is performed by the line cards).
• IPv6 packets that have global source and destination addresses are Cisco Express
Forwarding-switched or distributed Cisco Express Forwarding-switched.
• IPv6 packets that have link-local source and destination addresses are process-switched.
• IPv6 packets that are tunneled within manually configured IPv6 tunnels are Cisco Express
Forwarding-switched.
• Only the following interface and encapsulation types are supported:
– ATM PVC and ATM LANE
– Cisco HDLC
– Ethernet, Fast Ethernet, and Gigabit Ethernet
– FDDI
– Frame Relay PVC
– PPP over Packet over SONET, ISDN, and serial (synchronous and asynchronous) interface
types
• The following interface and encapsulation types are not supported:
– HP 100VG-AnyLAN
– Switched Multimegabit Data Service (SMDS)
– Token Ring
– X.25
Note Contact your local Cisco Systems account representative for specific Cisco Express
Forwarding and distributed Cisco Express Forwarding hardware restrictions.
IPv6C-38
Implementing IPv6 Addressing and Basic Connectivity
How to Implement IPv6 Addressing and Basic Connectivity
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 cef
or
ipv6 cef distributed
4. ipv6 cef accounting [non-recursive | per-prefix | prefix-length]
DETAILED STEPS
Example:
Router# configure terminal
IPv6C-39
Implementing IPv6 Addressing and Basic Connectivity
How to Implement IPv6 Addressing and Basic Connectivity
Example:
Router(config)# ipv6 cef distributed
Step 4 ipv6 cef accounting [non-recursive | per-prefix Enables Cisco Express Forwarding and distributed Cisco
| prefix-length] Express Forwarding network accounting globally on the
router.
Example: • Network accounting for Cisco Express Forwarding and
Router(config)# ipv6 cef accounting distributed Cisco Express Forwarding enables you to
better understand Cisco Express Forwarding traffic
patterns within your network by collecting statistics
specific to Cisco Express Forwarding and distributed
Cisco Express Forwarding traffic. For example,
network accounting for Cisco Express Forwarding and
distributed Cisco Express Forwarding enables you to
collect information such as the number of packets and
bytes switched to a destination or the number of packets
switched through a destination.
• The optional per-prefix keyword enables the collection
of the number of packets and bytes express forwarded
to an IPv6 destination (or IPv6 prefix).
• The optional prefix-length keyword enables the
collection of the number of packets and bytes express
forwarded to an IPv6 prefix length.
Note When Cisco Express Forwarding is enabled
globally on the router, accounting information is
collected at the RP; when distributed Cisco Express
Forwarding is enabled globally on the router,
accounting information is collected at the line cards.
Prerequisites
To use Unicast RPF, enable Cisco Express Forwarding switching or distributed Cisco Express
Forwarding switching in the router. There is no need to configure the input interface for Cisco Express
Forwarding switching. As long as Cisco Express Forwarding is running on the router, individual
interfaces can be configured with other switching modes.
IPv6C-40
Implementing IPv6 Addressing and Basic Connectivity
How to Implement IPv6 Addressing and Basic Connectivity
Note It is very important for Cisco Express Forwarding to be configured globally in the router. Unicast
RPF will not work without Cisco Express Forwarding.
Restrictions
Unicast RPF should not be used on interfaces that are internal to the network. Internal interfaces are
likely to have routing asymmetry, meaning that there are multiple routes to the source of a packet.
Unicast RPF should be applied only where there is natural or configured symmetry.
For example, routers at the edge of the network of an ISP are more likely to have symmetrical reverse
paths than routers that are in the core of the ISP network. Routers that are in the core of the ISP network
have no guarantee that the best forwarding path out of the router will be the path selected for packets
returning to the router. Therefore, we do not recommend that you apply Unicast RPF where there is a
chance of asymmetric routing. It is simplest to place Unicast RPF only at the edge of a network or, for
an ISP, at the customer edge of the network.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ipv6 verify unicast source reachable-via {rx | any} [allow-default] [allow-self-ping]
[access-list-name]
DETAILED STEPS
Example:
Router# configure terminal
Step 3 interface type number Specifies an interface type and number, and places the
router in interface configuration mode.
Example:
Router(config)# interface atm 0
Step 4 ipv6 verify unicast source reachable-via {rx | Verifies that a source address exists in the FIB table and
any} [allow-default] [allow-self-ping] enables Unicast RPF.
[access-list-name]
Example:
Router(config-if)# ipv6 verify unicast source
reachable-via any
IPv6C-41
Implementing IPv6 Addressing and Basic Connectivity
How to Implement IPv6 Addressing and Basic Connectivity
Hostname-to-Address Mappings
A name server is used to track information associated with domain names. A name server can maintain
a database of hostname-to-address mappings. Each name can map to one or more IPv4 addresses, IPv6
addresses, or both address types. In order to use this service to map domain names to IPv6 addresses,
you must specify a name server and enable the DNS—the global naming scheme of the Internet that
uniquely identifies network devices.
The Cisco IOS software maintains a cache of hostname-to-address mappings for use by the connect,
telnet, and ping commands, related Telnet support operations, and many other commands that generate
command output. This cache speeds the conversion of names to addresses.
Similar to IPv4, IPv6 uses a naming scheme that allows a network device to be identified by its location
within a hierarchical name space that provides for domains. Domain names are joined with periods (.)
as the delimiting characters. For example, Cisco is a commercial organization that is identified by a com
domain name, so its domain name is cisco.com. A specific device in this domain, the FTP server, for
example, is identified as ftp.cisco.com.
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 host name [port] ipv6-address1 [ipv6-address2...ipv6-address4]
4. ip domain name [vrf vrf-name] name
or
ip domain list [vrf vrf-name] name
5. ip name-server [vrf vrf-name] server-address1 [server-address2...server-address6]
6. ip domain-lookup
DETAILED STEPS
Example:
Router# configure terminal
IPv6C-42
Implementing IPv6 Addressing and Basic Connectivity
How to Implement IPv6 Addressing and Basic Connectivity
IPv6C-43
Implementing IPv6 Addressing and Basic Connectivity
How to Implement IPv6 Addressing and Basic Connectivity
Note This task shows how to configure both ATM and Frame Relay PVCs. Many of the steps are labeled
optional because many networks will require only one type of PVC to be configured. The steps in this
section are not applicable to ATM LANE.
IPv6 for Cisco IOS Software Support for Wide-Area Networking Technologies
IPv6 for Cisco IOS software supports wide-area networking technologies such as Cisco HDLC, PPP over
Packet over SONET (PoS), ISDN, and serial (synchronous and asynchronous) interface types, ATM
PVCs, and Frame Relay PVCs. These technologies function the same in IPv6 as they do in IPv4—IPv6
does not enhance the technologies in any way. However, new commands for mapping protocol
(network-layer) addresses to ATM and Frame Relay PVCs have been introduced for IPv6.
Note Given that IPv6 supports multiple address types, and depending on which applications or protocols are
configured on a point-to-multipoint interface, you may need to configure multiple explicit mappings
between the IPv6 addresses of the interface and the PVC used to reach the addresses. For example,
explicitly mapping both the link-local and global IPv6 address of a point-to-multipoint interface to the
PVC that the interface terminates ensures that the Interior Gateway Protocol (IGP) configured on the
interface forwards traffic to and from the PVC correctly.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. pvc [name] vpi/vci [ces | ilmi | qsaal | smds | l2transport]
5. protocol ipv6 ipv6-address [[no] broadcast]]
6. exit
7. ipv6 address ipv6-address/prefix-length link-local
8. exit
IPv6C-44
Implementing IPv6 Addressing and Basic Connectivity
How to Implement IPv6 Addressing and Basic Connectivity
DETAILED STEPS
Example:
Router# configure terminal
Step 3 interface type number Specifies an interface type and number, and places the
router in interface configuration mode.
Example:
Router(config)# interface atm 0
Step 4 pvc [name] vpi/vci [ces | ilmi | qsaal | smds (Optional) Creates or assigns a name to an ATM PVC and
| l2transport] places the router in ATM VC configuration mode.
Example:
Router(config-if)# pvc 1/32
Step 5 protocol ipv6 ipv6-address [[no] broadcast] (Optional) Maps the IPv6 address of a remote node to the
PVC used to reach the address.
Example: • The ipv6-address argument must be in the form
Router(config-if-atm-vc)# protocol ipv6 documented in RFC 2373 where the address is
2001:0DB8:2222:1003::45 specified in hexadecimal using 16-bit values between
colons.
• The optional [no] broadcast keywords indicate
whether the map entry should be used when IPv6
multicast packets (not broadcast packets) are sent to the
interface. Pseudobroadcasting is supported. The [no]
broadcast keywords in the protocol ipv6 command
take precedence over the broadcast command
configured on the same ATM PVC.
Step 6 exit Exits ATM VC configuration mode, and returns the router
to interface configuration mode.
Example:
Router(config-if-atm-vc)# exit
IPv6C-45
Implementing IPv6 Addressing and Basic Connectivity
How to Implement IPv6 Addressing and Basic Connectivity
IPv6C-46
Implementing IPv6 Addressing and Basic Connectivity
How to Implement IPv6 Addressing and Basic Connectivity
IPv6C-47
Implementing IPv6 Addressing and Basic Connectivity
How to Implement IPv6 Addressing and Basic Connectivity
There are no configuration tasks for the IPv6 Redirect Messages feature. The sending of IPv6 redirect
messages is enabled by default. Use the no ipv6 redirects command to disable the sending of IPv6
redirect messages on an interface. Use the ipv6 redirects command to reenable the sending of IPv6
redirect messages if the Cisco IOS software is forced to resend a packet through the same interface on
which the packet was received.
To verify whether the sending of IPv6 redirect messages is enabled on an interface, enter the show ipv6
interface command.
SUMMARY STEPS
1. enable
2. show ipv6 interface [brief] [type number] [prefix]
3. show ipv6 neighbors [interface-type interface-number | ipv6-address | ipv6-hostname | statistics]
4. show ipv6 route [ipv6-address | ipv6-prefix/prefix-length | protocol | interface-type
interface-number]
5. show ipv6 traffic
6. show frame-relay map [interface type number] [dlci]
7. show atm map
8. show hosts [vrf vrf-name | all | hostname | summary]
9. enable
10. show running-config
DETAILED STEPS
Example:
Router# show ipv6 neighbors ethernet 2
IPv6C-48
Implementing IPv6 Addressing and Basic Connectivity
How to Implement IPv6 Addressing and Basic Connectivity
Example:
Router# show ipv6 route
Step 5 show ipv6 traffic (Optional) Displays statistics about IPv6 traffic.
Example:
Router# show ipv6 traffic
Step 6 show frame-relay map [interface type number] Displays the current map entries and information about the
[dlci] Frame Relay connections.
Example:
Router# show frame-relay map
Step 7 show atm map Displays the list of all configured ATM static maps to
remote hosts on an ATM network and on ATM bundle maps.
Example:
Router# show atm map
Step 8 show hosts [vrf vrf-name | all | hostname | Displays the default domain name, the style of name lookup
summary] service, a list of name server hosts, and the cached list of
hostnames and addresses.
Example:
Router# show hosts
Step 9 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Router> enable
Step 10 show running-config Displays the current configuration running on the router.
Example:
Router# show running-config
Examples
This section provides the following output examples:
• Sample Output for the show ipv6 interface Command
• Sample Output for the show ipv6 neighbors Command
• Sample Output for the show ipv6 route Command
• Sample Output for the show ipv6 traffic Command
• Sample Output for the show frame-relay map Command
• Sample Output for the show atm map Command
• Sample Output for the show hosts Command
• Sample Output for the show running-config Command
IPv6C-49
Implementing IPv6 Addressing and Basic Connectivity
How to Implement IPv6 Addressing and Basic Connectivity
B 2001:0DB8::/35 [20/3]
via FE80::60:5C59:9E00:16, Tunnel1
ICMP statistics:
Rcvd: 188 input, 0 checksum errors, 0 too short
0 unknown info type, 0 unknown error type
IPv6C-50
Implementing IPv6 Addressing and Basic Connectivity
How to Implement IPv6 Addressing and Basic Connectivity
IPv6C-51
Implementing IPv6 Addressing and Basic Connectivity
How to Implement IPv6 Addressing and Basic Connectivity
Building configuration...
In the following example, the show running-config command is used to verify that Cisco Express
Forwarding and network accounting for Cisco Express Forwarding have been enabled globally on a
nondistributed architecture platform, and that Cisco Express Forwarding has been enabled on an IPv6
interface. The following output shows that both that Cisco Express Forwarding and network accounting
for Cisco Express Forwarding have been enabled globally on the router, and that Cisco Express
Forwarding has also been enabled on Ethernet interface 0:
Router# show running-config
Building configuration...
IPv6C-52
Implementing IPv6 Addressing and Basic Connectivity
Configuration Examples for Implementing IPv6 Addressing and Basic Connectivity
In the following example, the show running-config command is used to verify that distributed Cisco
Express Forwarding and network accounting for distributed Cisco Express Forwarding have been
enabled globally on a distributed architecture platform, such as the Cisco 7500 series routers. The
following example shows that both distributed Cisco Express Forwarding and network accounting for
Cisco Express Forwarding have been enabled globally on the router.
Note Distributed Cisco Express Forwarding is enabled by default on the Cisco 12000 series Internet routers
and disabled by default on the Cisco 7500 series routers. Therefore, output from the show
running-config command on the Cisco 12000 series does not show whether distributed Cisco Express
Forwarding is configured globally on the router. The following output is from a Cisco 7500 series router.
Building configuration...
In the following example, the show running-config command is used to verify static
hostname-to-address mappings, default domain names, and name servers in the hostname cache, and to
verify that the DNS service is enabled:
Router# show running-config
Building configuration...
!
ipv6 host cisco-sj 2001:0DB8:20:1::12
!
ip domain-name cisco.com
ip domain-lookup
ip name-server 2001:0DB8:C01F:768::1
IPv6C-53
Implementing IPv6 Addressing and Basic Connectivity
Configuration Examples for Implementing IPv6 Addressing and Basic Connectivity
interface ethernet 0
ipv6 address 2001:0DB8:c18:1::/64 eui-64
In the following example, multiple IPv6 global addresses within the prefix 2001:0DB8::/64 are
configured on Ethernet interface 0:
interface ethernet 0
ipv6 address 2001:0DB8::1/64
ipv6 address 2001:0DB8::/64 eui-64
interface Ethernet0
ip address 192.168.99.1 255.255.255.0
ipv6 address 2001:0DB8:c18:1::3/64
IPv6C-54
Implementing IPv6 Addressing and Basic Connectivity
Configuration Examples for Implementing IPv6 Addressing and Basic Connectivity
interface Ethernet0
ip address 10.4.9.11 255.0.0.0
media-type 10BaseT
ipv6 address 2001:0DB8:C18:1::/64 eui-64
In the following example, both distributed Cisco Express Forwarding for IPv6 and network accounting
for distributed Cisco Express Forwarding for IPv6 have been enabled globally on a distributed
architecture router. The forwarding of IPv6 unicast datagrams has been configured globally on the router
with the ipv6 unicast-routing command and distributed Cisco Express Forwarding for IPv4 has been
configured globally on the router with the ip cef distributed command.
ip cef distributed
ipv6 unicast-routing
ipv6 cef distributed
ipv6 cef accounting prefix-length
IPv6 Address to ATM and Frame Relay PVC Mapping Configuration: Examples
This section provides the following IPv6 ATM and Frame Relay PVC mapping configuration examples:
• IPv6 ATM PVC Mapping Configuration—Point-to-Point Interface: Example
• IPv6 ATM PVC Mapping Configuration—Point-to-Multipoint Interface: Example
• IPv6 Frame Relay PVC Mapping Configuration—Point-to-Point Interface: Example
IPv6C-55
Implementing IPv6 Addressing and Basic Connectivity
Configuration Examples for Implementing IPv6 Addressing and Basic Connectivity
Router 1 Configuration
interface ATM 0
no ip address
!
interface ATM 0.132 point-to-point
pvc 1/32
encapsulation aal5snap
!
ipv6 address 2001:0DB8:2222:1003::72/64
Router 2 Configuration
interface ATM 0
no ip address
!
interface ATM 0.132 point-to-point
pvc 1/32
encapsulation aal5snap
!
ipv6 address 2001:0DB8:2222:1003::45/64
Router 1 Configuration
interface ATM 0
no ip address
pvc 1/32
protocol ipv6 2001:0DB8:2222:1003::45
protocol ipv6 FE80::60:2FA4:8291:2 broadcast
encapsulation aal5snap
!
ipv6 address 2001:0DB8:2222:1003::72/64
Router 2 Configuration
interface ATM 0
no ip address
pvc 1/32
protocol ipv6 FE80::60:3E47:AC8:C broadcast
protocol ipv6 2001:0DB8:2222:1003::72
encapsulation aal5snap
!
IPv6C-56
Implementing IPv6 Addressing and Basic Connectivity
Configuration Examples for Implementing IPv6 Addressing and Basic Connectivity
Note Given that each PVC in the following example is configured on a different point-to-point subinterface,
the configuration in the following example can also be used in a network that is not fully meshed.
Additionally, configuring each PVC on a different point-to-point subinterface can help simplify your
routing protocol configuration. However, the configuration in the following example requires more than
one IPv6 network, whereas configuring each PVC on point-to-multipoint interfaces requires only one
IPv6 network.
Router A Configuration
interface Serial 3
encapsulation frame-relay
!
interface Serial3.17 point-to-point
description to Router B
ipv6 address 2001:0DB8:2222:1017::46/64
frame-relay interface-dlci 17
!
interface Serial 3.19 point-to-point
description to Router C
ipv6 address 2001:0DB8:2222:1019::46/64
frame-relay interface-dlci 19
Router B Configuration
interface Serial 5
encapsulation frame-relay
!
interface Serial5.17 point-to-point
description to Router A
ipv6 address 2001:0DB8:2222:1017::73/64
frame-relay interface-dlci 17
!
interface Serial5.18 point-to-point
description to Router C
ipv6 address 2001:0DB8:2222:1018::73/64
frame-relay interface-dlci 18
Router C Configuration
interface Serial 0
encapsulation frame-relay
!
interface Serial0.18 point-to-point
description to Router B
ipv6 address 2001:0DB8:2222:1018::72/64
frame-relay interface-dlci 18
!
IPv6C-57
Implementing IPv6 Addressing and Basic Connectivity
Where to Go Next
Router A Configuration
interface Serial 3
encapsulation frame-relay
ipv6 address 2001:0DB8:2222:1044::46/64
frame-relay map ipv6 FE80::E0:F727:E400:A 17 broadcast
frame-relay map ipv6 FE80::60:3E47:AC8:8 19 broadcast
frame-relay map ipv6 2001:0DB8:2222:1044::72 19
frame-relay map ipv6 2001:0DB8:2222:1044::73 17
Router B Configuration
interface Serial 5
encapsulation frame-relay
ipv6 address 2001:0DB8:2222:1044::73/64
frame-relay map ipv6 FE80::60:3E59:DA78:C 17 broadcast
frame-relay map ipv6 FE80::60:3E47:AC8:8 18 broadcast
frame-relay map ipv6 2001:0DB8:2222:1044::46 17
frame-relay map ipv6 2001:0DB8:2222:1044::72 18
Router C Configuration
interface Serial 10
encapsulation frame-relay
ipv6 address 2001:0DB8:2222:1044::72/64
frame-relay map ipv6 FE80::60:3E59:DA78:C 19 broadcast
frame-relay map ipv6 FE80::E0:F727:E400:A 18 broadcast
frame-relay map ipv6 2001:0DB8:2222:1044::46 19
frame-relay map ipv6 2001:0DB8:2222:1044::73 18
Where to Go Next
If you want to implement IPv6 routing protocols, see the Implementing RIP for IPv6, Implementing IS-IS
for IPv6, or Implementing Multiprotocol BGP for IPv6 module.
IPv6C-58
Implementing IPv6 Addressing and Basic Connectivity
Additional References
Additional References
The following sections provide references related to the Implementing IPv6 Addressing and Basic
Connectivity feature.
Related Documents
Related Topic Document Title
IPv6 supported feature list “Start Here: Cisco IOS Software Release Specifics for IPv6
Features,” Cisco IOS IPv6 Configuration Guide
IPv6 commands: complete command syntax, command Cisco IOS IPv6 Command Reference
mode, defaults, usage guidelines, and examples
IPv6 DHCP description and configuration “Implementing DHCP for IPv6,” Cisco IOS IPv6 Configuration
Guide
IPv4 addressing configuration tasks “Configuring IPv4 Addresses,” Cisco IOS IP Addressing Services
Configuration Guide
IPv4 services configuration tasks “Configuring IP Services,” Cisco IOS IP Application Services
Configuration Guide
IPv4 addressing commands Cisco IOS IP Addressing Services Command Reference
IPv4 IP services commands Cisco IOS IP Application Services Command Reference
Stateful switchover “Stateful Switchover,” Cisco IOS High Availability Configuration
Guide
Switching configuration tasks “Cisco IOS IP Switching Features Roadmap,” Cisco IOS IP
Switching Configuration Guide
Switching commands Cisco IOS IP Switching Command Reference
Standards
Standards Title
No new or modified standards are supported by this —
feature, and support for existing standards has not been
modified by this feature.
MIBs
MIBs MIBs Link
No new or modified MIBs are supported, and support To locate and download MIBs for selected platforms, Cisco IOS
for existing MIBs has not been modified. releases, and feature sets, use Cisco MIB Locator found at the
following URL:
http://www.cisco.com/go/mibs
IPv6C-59
Implementing IPv6 Addressing and Basic Connectivity
Additional References
RFCs
RFCs Title
RFC 1981 Path MTU Discovery for IP version 6
RFC 2373 IP Version 6 Addressing Architecture
RFC 2374 An Aggregatable Global Unicast Address Format
RFC 2460 Internet Protocol, Version 6 (IPv6) Specification
RFC 2461 Neighbor Discovery for IP Version 6 (IPv6)
RFC 2462 IPv6 Stateless Address Autoconfiguration
RFC 2463 Internet Control Message Protocol (ICMPv6) for the Internet
Protocol Version 6 (IPv6) Specification
RFC 2464 Transmission of IPv6 Packets over Ethernet Networks
RFC 2467 Transmission of IPv6 Packets over FDDI Networks
RFC 2472 IP Version 6 over PPP
RFC 2492 IPv6 over ATM Networks
RFC 2590 Transmission of IPv6 Packets over Frame Relay Networks
Specification
RFC 3152 Delegation of IP6.ARPA
RFC 3162 RADIUS and IPv6
RFC 3513 Internet Protocol Version 6 (IPv6) Addressing Architecture
RFC 3596 DNS Extensions to Support IP version 6
RFC 3879 Deprecating Site Local Addresses
RFC 4193 Unique Local IPv6 Unicast Addresses
Technical Assistance
Description Link
The Cisco Support website provides extensive online http://www.cisco.com/techsupport
resources, including documentation and tools for
troubleshooting and resolving technical issues with
Cisco products and technologies.
To receive security and technical information about
your products, you can subscribe to various services,
such as the Product Alert Tool (accessed from Field
Notices), the Cisco Technical Services Newsletter, and
Really Simple Syndication (RSS) Feeds.
Access to most tools on the Cisco Support website
requires a Cisco.com user ID and password.
IPv6C-60
Implementing IPv6 Addressing and Basic Connectivity
Command Reference
Command Reference
The following commands are introduced or modified in the feature or features documented in this
module. For information about these commands, see the Cisco IOS IPv6 Command Reference at
http://www.cisco.com/en/US/docs/ios/ipv6/command/reference/ipv6_book.html. For information about
all Cisco IOS commands, use the Command Lookup Tool at http://tools.cisco.com/Support/CLILookup
or the Cisco IOS Master Command List, All Releases, at
http://www.cisco.com/en/US/docs/ios/mcl/all_release/all_mcl.html.
• atm route-bridged
• cef table consistency-check
• clear cef table
• clear ipv6 neighbors
• clear ipv6 route
• clear ipv6 traffic
• copy
• debug adjacency
• debug ipv6 cef drop
• debug ipv6 cef events
• debug ipv6 cef hash
• debug ipv6 cef receive
• debug ipv6 cef table
• debug ipv6 icmp
• debug ipv6 nd
• debug ipv6 packet
• debug ipv6 routing
• frame-relay map ipv6
• ip name-server
• ipv6 address
• ipv6 address anycast
• ipv6 address eui-64
• ipv6 address link-local
• ipv6 atm-vc
• ipv6 cef
• ipv6 cef accounting
• ipv6 cef distributed
• ipv6 enable
• ipv6 general-prefix
• ipv6 hop-limit
• ipv6 icmp error-interval
IPv6C-61
Implementing IPv6 Addressing and Basic Connectivity
Command Reference
• ipv6 mtu
• ipv6 nd dad attempts
• ipv6 nd managed-config-flag
• ipv6 nd ns-interval
• ipv6 nd prefix
• ipv6 nd prefix-advertisement
• ipv6 nd ra interval
• ipv6 nd ra lifetime
• ipv6 nd ra suppress
• ipv6 nd reachable-time
• ipv6 nd router-preference
• ipv6 neighbor
• ipv6 redirects
• ipv6 unicast-routing
• ipv6 unnumbered
• ipv6 verify unicast reverse-path
• ipv6 verify unicast source reachable-via
• logging host
• logging origin-id
• logging source-interface
• neighbor activate
• neighbor override-capability-neg
• neighbor send-label
• neighbor translate-update
• neighbor update-source
• ping
• ping ipv6
• protocol ipv6 (ATM)
• show adjacency
• show atm map
• show cdp entry
• show cdp neighbors
• show cef
• show cef interface
• show cef linecard
• show frame-relay map
• show ipv6 cef
• show ipv6 cef adjacency
IPv6C-62
Implementing IPv6 Addressing and Basic Connectivity
Command Reference
IPv6C-63
Implementing IPv6 Addressing and Basic Connectivity
Feature Information for Implementing IPv6 Addressing and Basic Connectivity
Note Table 5 lists only the Cisco IOS software release that introduced support for a given feature in a given
Cisco IOS software release train. Unless noted otherwise, subsequent releases of that Cisco IOS
software release train also support that feature.
IPv6C-64
Implementing IPv6 Addressing and Basic Connectivity
Feature Information for Implementing IPv6 Addressing and Basic Connectivity
Table 5 Feature Information for Implementing IPv6 Addressing and Basic Connectivity
IPv6C-65
Implementing IPv6 Addressing and Basic Connectivity
Feature Information for Implementing IPv6 Addressing and Basic Connectivity
Table 5 Feature Information for Implementing IPv6 Addressing and Basic Connectivity
IPv6C-66
Implementing IPv6 Addressing and Basic Connectivity
Feature Information for Implementing IPv6 Addressing and Basic Connectivity
Table 5 Feature Information for Implementing IPv6 Addressing and Basic Connectivity
IPv6C-67
Implementing IPv6 Addressing and Basic Connectivity
Feature Information for Implementing IPv6 Addressing and Basic Connectivity
Table 5 Feature Information for Implementing IPv6 Addressing and Basic Connectivity
IPv6C-68
Implementing IPv6 Addressing and Basic Connectivity
Feature Information for Implementing IPv6 Addressing and Basic Connectivity
Table 5 Feature Information for Implementing IPv6 Addressing and Basic Connectivity
IPv6C-69
Implementing IPv6 Addressing and Basic Connectivity
Feature Information for Implementing IPv6 Addressing and Basic Connectivity
Table 5 Feature Information for Implementing IPv6 Addressing and Basic Connectivity
IPv6C-70
Implementing IPv6 Addressing and Basic Connectivity
Feature Information for Implementing IPv6 Addressing and Basic Connectivity
Table 5 Feature Information for Implementing IPv6 Addressing and Basic Connectivity
IPv6C-71
Implementing IPv6 Addressing and Basic Connectivity
Feature Information for Implementing IPv6 Addressing and Basic Connectivity
CCDE, CCENT, Cisco Eos, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, Cisco TelePresence, the Cisco logo, DCE, and Welcome to the Human
Network are trademarks; Changing the Way We Work, Live, Play, and Learn and Cisco Store are service marks; and Access Registrar, Aironet,
AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork
Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation,
EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, iQ
Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone, MeetingPlace,
MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare,
SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx logo
are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply
a partnership relationship between Cisco and any other company. (0807R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and
figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and
coincidental.
IPv6C-72
Implementing ADSL and Deploying Dial Access
for IPv6
This module describes the implementation of prefix pools and per-user Remote Access Dial-In User
Service (RADIUS) attributes in IPv6. It also describes the deployment of IPv6 in Digital Subscriber Line
(DSL) and dial-access environments. Asymmetric Digital Subscriber Line (ADSL) and dial deployment
provide the extensions that make large-scale access possible for IPv6 environments, including IPv6
RADIUS attributes, stateless address configuration on Point-to-Point Protocol (PPP) links, per-user
static routes, and access control lists (ACLs).
Finding Support Information for Platforms and Cisco IOS and Catalyst OS Software Images
Use Cisco Feature Navigator to find information about platform support and Cisco IOS and Catalyst OS
software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An
account on Cisco.com is not required.
Contents
• Restrictions for Implementing ADSL and Deploying Dial Access for IPv6, page 2
• Information About Implementing ADSL and Deploying Dial Access for IPv6, page 2
• How to Configure ADSL and Deploy Dial Access in IPv6, page 6
• Configuration Examples for Implementing ADSL and Deploying Dial Access for IPv6, page 13
• Where to Go Next, page 15
Americas Headquarters:
Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA
2
Implementing ADSL and Deploying Dial Access for IPv6
Information About Implementing ADSL and Deploying Dial Access for IPv6
Prefix Delegation
Prefix delegation uses Dynamic Host Configuration Protocol (DHCP). When the user requests a prefix
from the prefix delegator, typically the NAS, the prefix is allocated as described in the “Stateless Address
Autoconfiguration” section on page 3.
An IPv6 prefix delegating router selects IPv6 prefixes to be assigned to a requesting router upon
receiving a request from the client. The delegating router might select prefixes for a requesting router in
the following ways:
• Static assignment based on subscription to an ISP
• Dynamic assignment from a pool of available prefixes
• Selection based on an external authority such as a RADIUS server using the Framed-IPv6-Prefix
attribute (see the “Framed-IPv6-Prefix” section on page 4).
Two DHCP for IPv6 Session Initiation Protocol (SIP) server options describe a local outbound SIP
proxy: one carries a list of domain names, the other a list of IPv6 addresses. These two options can be
configured in a DHCPv6 configuration pool.
3
Implementing ADSL and Deploying Dial Access for IPv6
Information About Implementing ADSL and Deploying Dial Access for IPv6
These attributes can be configured on a RADIUS server and downloaded to access servers where they
can be applied to access connections.
AAA attributes are described in the following sections:
• RADIUS Per-User Attributes for Virtual Access in IPv6 Environments, page 4
• IPv6 Prefix Pools, page 6
Framed-Interface-Id
The Framed-Interface-Id attribute indicates the IPv6 interface identifier to be configured. This per-user
attribute is used during the IPv6CP negotiations and may be used in access-accept packets. If the
Interface-Identifier IPv6CP option has been successfully negotiated, this attribute must be included in
an Acc-0Request packet as a hint by the NAS to the server that it would prefer that value.
Framed-IPv6-Prefix
The Framed-IPv6-Prefix attribute performs the same function as the Cisco VSA: It is used for virtual
access only and indicates an IPv6 prefix (and corresponding route) to be configured. This attribute is a
per-user attribute and lets the user specify which prefixes to advertise in Neighbor Discovery Router
Advertisement messages. The Framed-IPv6-Prefix attribute may be used in access-accept packets and
can appear multiple times. The NAS will create a corresponding route for the prefix.
To use this attribute for DHCP for IPv6 prefix delegation, create a profile for the same user on the
RADIUS server. The user name associated with the second profile has the suffix “-dhcpv6.”
The Framed-IPv6-Prefix attribute in the two profiles is treated differently. If a NAS needs both to send
a prefix in router advertisements (RAs) and delegate a prefix to a remote user’s network, the prefix for
RA is placed in the Framed-IPv6-Prefix attribute in the user’s regular profile, and the prefix used for
prefix delegation is placed in the attribute in the user’s separate profile.
4
Implementing ADSL and Deploying Dial Access for IPv6
Information About Implementing ADSL and Deploying Dial Access for IPv6
Login-IPv6-Host
The Login-IPv6-Host attribute is a per-user attribute that indicates the IPv6 system with which to
connect the user when the Login-Service attribute is included.
Framed-IPv6-Route
The Framed-IPv6-Route attribute performs the same function as the Cisco VSA: It is a per-user attribute
that provides routing information to be configured for the user on the NAS. This attribute is a string
attribute and is specified using the ipv6 route command.
Framed-IPv6-Pool
The IPv6-Pool attribute is a per-user attribute that contains the name of an assigned pool that should be
used to assign an IPv6 prefix for the user. This pool should either be defined locally on the router or
defined on a RADIUS server from which pools can be downloaded.
IPv6 Route
The IPv6 route attribute allows you to specify a per-user static route. A static route is appropriate when
the Cisco IOS software cannot dynamically build a route to the destination. See the description of the
ipv6 route command for more information about building static routes.
The following example shows the IPv6 route attribute used to define a static route.
cisco-avpair = "ipv6:route#1=2001:0DB8:cc00:1::/48",
cisco-avpair = "ipv6:route#2=2001::0DB8:cc00:2::/48",
IPv6 ACL
You can specify a complete IPv6 access list. The unique name of the access list is generated
automatically. The access list is removed when its user logs out. The previous access list on the interface
is reapplied.
The inacl and outacl attributes allow you to a specific existing access list configured on the router. The
following example shows ACL number 1 specified as the access list:
cisco-avpair = "ipv6:inacl#1=permit 2001:0DB8:cc00:1::/48",
cisco-avpair = "ipv6:outacl#1=deny 2001:0DB8::/10",
IPv6 Prefix#
The IPv6 prefix# attribute lets you indicate which prefixes to advertise in Neighbor Discovery Router
Advertisement messages. When the prefix# attribute is used, a corresponding route (marked as a per-user
static route) is installed in the routing information base (RIB) tables for the given prefix.
cisco-avpair = "ipv6:prefix#1=2001:0db8:/64",
cisco-avpair = "ipv6:prefix#2=2001:0db8:/64",
IPv6 Pool
For RADIUS authentication, the IPv6 pool attribute extends the IPv4 address pool attributed to support
the IPv6 protocol. It specifies the name of a local pool on the NAS from which to get the prefix and is
used whenever the service is configured as PPP and whenever the protocol is specified as IPv6. Note that
the address pool works in conjunction with local pooling. It specifies the name of the local pool that has
been preconfigured on the NAS.
5
Implementing ADSL and Deploying Dial Access for IPv6
How to Configure ADSL and Deploy Dial Access in IPv6
SUMMARY STEPS
1. enable
2. configure terminal
3. hostname name
4. aaa new-model
5. aaa authentication ppp {default | list-name} method1 [method2...]
6. aaa authorization configuration default {radius | tacacs+}
7. show ipv6 route [ipv6-address | ipv6-prefix/prefix-length | protocol | interface-type
interface-number]
8. virtual-profile virtual-template number
9. interface serial controller-number:timeslot
10. encapsulation encapsulation-type
11. exit
12. dialer-group group-number
6
Implementing ADSL and Deploying Dial Access for IPv6
How to Configure ADSL and Deploy Dial Access in IPv6
13. ppp authentication {protocol1 [protocol2...]} [if-needed] [list-name | default] [callin] [one-time]
[optional]
14. interface virtual-template number
15. ipv6 enable
16. dialer-list dialer-group protocol protocol-name {permit | deny | list access-list-number |
access-group}
17. radius-server host {hostname | ip-address} [test username user-name] [auth-port port-number]
[ignore-auth-port] [acct-port port-number] [ignore-acct-port] [timeout seconds] [retransmit
retries] [key string] [alias {hostname | ip-address}] [idle-time seconds]
DETAILED STEPS
Example:
Router# configure terminal
Step 3 hostname name Specifies the host name for the network server.
Example:
Router(config)# hostname cust1-53a
Step 4 aaa new-model Enables the AAA server.
Example:
Router(config)# aaa new-model
Step 5 aaa authentication ppp {default | list-name} Specifies one or more AAA authentication methods for use
method1 [method2...] on serial interfaces that are running PPP.
Example:
Router(config)# aaa authentication ppp default
if-needed group radius
Step 6 aaa authorization configuration default Downloads configuration information from the AAA server.
{radius | tacacs+}
Example:
Router(config)# aaa authorization network
default group radius
7
Implementing ADSL and Deploying Dial Access for IPv6
How to Configure ADSL and Deploy Dial Access in IPv6
Example:
Router(config)# show ipv6 route
Step 8 virtual-profile virtual-template number Enables virtual profiles by virtual interface template.
Example:
Router(config)# virtual-profile
virtual-template 1
Step 9 interface serial controller-number:timeslot Specifies a serial interface created on a channelized E1 or
channelized T1 controller (for ISDN PRI,
channel-associated signaling, or robbed-bit signaling).
Example:
Router(config)# interface Serial0:15
Step 10 encapsulation encapsulation-type Sets the encapsulation method used by the interface.
Example:
Router(config-if)# encapsulation ppp
Step 11 exit Returns to global configuration mode.
Example:
Router(config-if)# exit
Step 12 dialer-group group-number Control access by configuring an interface to belong to a
specific dialing group.
Example:
Router(config)# dialer-group 1
Step 13 ppp authentication {protocol1 [protocol2...]} Enables Challenge Handshake Authentication Protocol
[if-needed] [list-name | default] [callin] (CHAP) or Password Authentication Protocol (PAP) or both
[one-time] [optional]
and specifies the order in which CHAP and PAP
authentication are selected on the interface.
Example:
Router(config)# ppp authentication chap
Step 14 interface virtual-template number Creates a virtual template interface that can be configured
and applied dynamically in creating virtual access
interfaces.
Example:
Router(config)# interface virtual-template1
Step 15 ipv6 enable Enables IPv6 processing on an interface that has not been
configured with an explicit IPv6 address.
Example:
Router(config)# ipv6 enable
8
Implementing ADSL and Deploying Dial Access for IPv6
How to Configure ADSL and Deploy Dial Access in IPv6
Example:
Router(config)# dialer-list 1 protocol ipv6
permit
Step 17 radius-server host {hostname | ip-address} Specifies a RADIUS server host.
[test username user-name] [auth-port
port-number] [ignore-auth-port] [acct-port
port-number] [ignore-acct-port] [timeout
seconds] [retransmit retries] [key string]
[alias {hostname | ip-address}] [idle-time
seconds]
Example:
Router(config)# radius-server host 172.17.250.8
auth-port 1812 acct-port 1813 key testing123
Troubleshooting Tips
Verify that the access list is installed correctly before proceeding with the next task. Use the show ipv6
access-list and show ipv6 interface commands.
What to Do Next
Configure the remote customer edge (CE) router as described in the “Configuring the Remote CE
Router” section on page 9
SUMMARY STEPS
1. enable
2. configure terminal
3. hostname name
4. interface bri number.subinterface-number [multipoint | point-to-point]
5. encapsulation encapsulation-type
6. ipv6 address autoconfig [default]
7. isdn switch-type switch-type
8. ppp authentication {protocol1 [protocol2...]} [if-needed] [list-name | default] [callin] [one-time]
9. ppp multilink [bap | required]
10. exit
9
Implementing ADSL and Deploying Dial Access for IPv6
How to Configure ADSL and Deploy Dial Access in IPv6
DETAILED STEPS
Example:
Router# configure terminal
Step 3 hostname name Specifies the host name for the network server.
Example:
Router(config)# hostname cust1-36a
Step 4 interface bri number.subinterface-number Configures a BRI interface and enters interface
[multipoint | point-to-point] configuration mode.
Example:
Router(config)# interface BRI1/0
Step 5 encapsulation encapsulation-type Sets the encapsulation method used by the interface.
Example:
Router(config-if)# encapsulation ppp
Step 6 ipv6 address autoconfig [default] Indicates that the IPv6 address will be generated
automatically.
Example:
Router(config-if)# ipv6 address autoconfig
Step 7 isdn switch-type switch-type Specifies the central office switch type on the ISDN
interface.
Example:
Router(config-if)# isdn switch-type basic-net3
Step 8 ppp authentication {protocol1 [protocol2...]} Enables Challenge Handshake Authentication Protocol
[if-needed] [list-name | default] [callin] (CHAP) or Password Authentication Protocol (PAP) or both
[one-time]
and specifies the order in which CHAP and PAP
authentication are selected on the interface.
Example:
Router(config-if)# ppp authentication chap
optional
10
Implementing ADSL and Deploying Dial Access for IPv6
How to Configure ADSL and Deploy Dial Access in IPv6
Example:
Router(config)# dialer-list 1 protocol ipv6
permit
Step 12 ipv6 route ipv6-prefix/prefix-length Establishes static IPv6 routes. Use one command for each
{ipv6-address | interface-type interface-number route.
[ipv6-address]} [administrative-distance]
[administrative-multicast-distance | unicast |
multicast] [tag tag]
Example:
Router(config)# ipv6 route 2001:0db8:1/128
BRI1/0
What to Do Next
Once you have configured the NAS and CE router, configure RADIUS to establish the AV pairs for
callback. Callback allows remote network users to dial in to the NAS without being charged. When
callback is required, the NAS hangs up the current call and dials the caller back. When the NAS performs
the callback, only information for the outgoing connection is applied. The rest of the attributes from the
preauthentication access-accept message are discarded.
The following example shows a RADIUS profile configuration for a local campus:
campus1 Auth-Type = Local, Password = "mypassword"
User-Service-Type = Framed-User,
Framed-Protocol = PPP,
cisco-avpair = "ipv6:inacl#1=permit dead::/64 any",
cisco-avpair = "ipv6:route=dead::/64",
cisco-avpair = "ipv6:route=cafe::/64",
cisco-avpair = "ipv6:prefix=dead::/64 0 0 onlink autoconfig",
cisco-avpair = "ipv6:prefix=cafe::/64 0 0 onlink autoconfig",
cisco-avpair = "ip:route=10.0.0.0 255.0.0.0",
The RADIUS AV pairs for IPv6 are described in RADIUS Per-User Attributes for Virtual Access in IPv6
Environments, page 4.
Refer to the Cisco IOS Security Configuration Guide for detailed information about configuring
RADIUS.
11
Implementing ADSL and Deploying Dial Access for IPv6
How to Configure ADSL and Deploy Dial Access in IPv6
Configuring the DHCP for IPv6 Server to Obtain Prefixes from RADIUS Servers
The following task describes how to configure the DHCP for IPv6 server to obtain prefixes from
RADIUS servers.
Prerequisites
Before you perform this task, you must configure the AAA client and PPP on the router.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ipv6 nd prefix framed-ipv6-prefix
DETAILED STEPS
Example:
Router# configure terminal
Step 3 interface type number Specifies an interface type and number, and places the
router in interface configuration mode.
Example:
Router(config)# interface ethernet 0/0
Step 4 ipv6 nd prefix framed-ipv6-prefix Adds the prefix in a received RADIUS framed IPv6 prefix
attribute to the interface’s neighbor discovery prefix queue.
Example:
Router(config-if)# ipv6 nd prefix
framed-ipv6-prefix
SUMMARY STEPS
1. enable
2. configure terminal
12
Implementing ADSL and Deploying Dial Access for IPv6
Configuration Examples for Implementing ADSL and Deploying Dial Access for IPv6
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 dhcp pool poolname Configures a DHCP for IPv6 configuration information
pool and enters DHCP for IPv6 pool configuration mode.
Example:
Router(config)# ipv6 dhcp pool pool1
Step 4 prefix-delegation aaa [method-list method-list] Specifies that prefixes are to be acquired from AAA servers.
[lifetime]
Example:
Router(config-dhcp)# prefix-delegation aaa
method-list list1
Step 5 sip address ipv6-address Configures a SIP server IPv6 address to be returned in the
SIP server’s IPv6 address list option to clients.
Example:
Router(config-dhcp)# sip address 2001:0DB8::2
Step 6 sip domain-name domain-name Configures a SIP server domain name to be returned in the
SIP server’s domain name list option to clients.
Example:
Router(config-dhcp)# sip domain sip1.cisco.com
13
Implementing ADSL and Deploying Dial Access for IPv6
Configuration Examples for Implementing ADSL and Deploying Dial Access for IPv6
NAS Configuration
This configuration for the ISP NAS shows the configuration that supports access from the remote CE
router.
hostname cust1-53a
aaa new-model
aaa authentication ppp default if-needed group radius
aaa authorization network default group radius
virtual-profile virtual-template 1
interface Serial0:15
encapsulation ppp
dialer-group 1
ppp authentication chap
!
interface Virtual-Template1
ipv6 enable
!
dialer-list 1 protocol ipv6 permit
radius-server host 172.17.250.8 auth-port 1812 acct-port 1813 key testing123
RADIUS Configuration
This RADIUS configuration shows the definition of AV pairs to establish the static routes.
campus1 Auth-Type = Local, Password = "mypassword"
User-Service-Type = Framed-User,
Framed-Protocol = PPP,
cisco-avpair = "ipv6:inacl#1=permit dead::/64 any",
cisco-avpair = "ipv6:route=library::/64",
cisco-avpair = "ipv6:route=cafe::/64",
cisco-avpair = "ipv6:prefix=library::/64 0 0 onlink autoconfig",
cisco-avpair = "ipv6:prefix=cafe::/64 0 0 onlink autoconfig",
cisco-avpair = "ip:route=11.0.0.0 255.0.0.0",
14
Implementing ADSL and Deploying Dial Access for IPv6
Where to Go Next
Where to Go Next
For information about implementing routing protocols for IPv6, refer to the Implementing RIP for IPv6,
Implementing IS-IS for IPv6, or the Implementing Multiprotocol BGP for IPv6 module. For information
about implementing security for IPv6 environments, refer to the Implementing Security for IPv6 module.
Additional References
The following sections provide references related to the Implementing ADSL and Deploying Dial
Access for IPv6 feature.
Related Documents
15
Implementing ADSL and Deploying Dial Access for IPv6
Feature Information for Implementing ADSL and Deploying Dial Access for IPv6
Standards
Standards Title
No new or modified standards are supported by this —
feature, and support for existing standards has not been
modified by this feature.
MIBs
MIBs MIBs Link
To locate and download MIBs for selected platforms,
Cisco IOS releases, and feature sets, use Cisco MIB Locator
found at the following URL:
http://www.cisco.com/go/mibs
RFCs
RFCs Title
RFC 3162 RADIUS and IPv6
RFC 3177 IAB/IESG Recommendations on IPv6 Address
RFC 3319 Dynamic Host Configuration Protocol (DHCPv6) Options
for Session Initiated Protocol (SIP) Servers
Technical Assistance
Description Link
The Cisco Support website provides extensive online http://www.cisco.com/techsupport
resources, including documentation and tools for
troubleshooting and resolving technical issues with Cisco
products and technologies. Access to most tools on the Cisco
Support website requires a Cisco.com user ID and password.
If you have a valid service contract but do not have a user ID
or password, you can register on Cisco.com.
16
Implementing ADSL and Deploying Dial Access for IPv6
Feature Information for Implementing ADSL and Deploying Dial Access for IPv6
Not all commands may be available in your Cisco IOS software release. For release information about a
specific command, see the command reference documentation.
Use Cisco Feature Navigator to find information about platform support and software image support.
Cisco Feature Navigator enables you to determine which Cisco IOS and Catalyst OS software images
support a specific software release, feature set, or platform. To access Cisco Feature Navigator, go to
http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Note Table 15 lists only the Cisco IOS software release that introduced support for a given feature in a given
Cisco IOS software release train. Unless noted otherwise, subsequent releases of that Cisco IOS
software release train also support that feature.
Table 15 identifies the earliest release for each early-deployment train in which each feature became
available.
Table 15 Feature Information for Implementing ADSL and Deploying Dial Access for IPv6
17
Implementing ADSL and Deploying Dial Access for IPv6
Feature Information for Implementing ADSL and Deploying Dial Access for IPv6
Table 15 Feature Information for Implementing ADSL and Deploying Dial Access for IPv6
18
Implementing ADSL and Deploying Dial Access for IPv6
Feature Information for Implementing ADSL and Deploying Dial Access for IPv6
CCDE, CCENT, Cisco Eos, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, the Cisco logo, DCE, and Welcome to the Human Network are
trademarks; Changing the Way We Work, Live, Play, and Learn is a service mark; and Access Registrar, Aironet, AsyncOS, Bringing the Meeting To
You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS,
Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation, EtherFast, EtherSwitch,
Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, iQ Expertise, the iQ logo,
iQ Net Readiness Scorecard, iQuick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone, MeetingPlace, MGX, Networkers,
Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare, SenderBase, SMARTnet, Spectrum Expert,
StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx logo are registered trademarks of
Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply
a partnership relationship between Cisco and any other company. (0805R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and
figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and
coincidental.
19
Implementing ADSL and Deploying Dial Access for IPv6
Feature Information for Implementing ADSL and Deploying Dial Access for IPv6
20
Implementing Multiprotocol BGP for IPv6
This module describes how to configure multiprotocol Border Gateway Protocol (BGP) for IPv6. BGP
is an Exterior Gateway Protocol (EGP) used mainly to connect separate routing domains that contain
independent routing policies (autonomous systems). Connecting to a service provider for access to the
Internet is a common use for BGP. BGP can also be used within an autonomous system and this variation
is referred to as internal BGP (iBGP). Multiprotocol BGP is an enhanced BGP that carries routing
information for multiple network layer protocol address families, for example, IPv6 address family and
for IP multicast routes. All BGP commands and routing policy capabilities can be used with
multiprotocol BGP.
Finding Support Information for Platforms and Cisco IOS and Catalyst OS Software Images
Use Cisco Feature Navigator to find information about platform support and Cisco IOS and Catalyst OS
software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An
account on Cisco.com is not required.
Contents
• Prerequisites for Implementing Multiprotocol BGP for IPv6, page 2
• Information About Implementing Multiprotocol BGP for IPv6, page 2
• How to Implement Multiprotocol BGP for IPv6, page 3
• Configuration Examples for Multiprotocol BGP for IPv6, page 29
• Where to Go Next, page 32
Americas Headquarters:
Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA
IPv6C-2
Implementing Multiprotocol BGP for IPv6
How to Implement Multiprotocol BGP for IPv6
Multicast BGP functionality is provided through a separate address family context. A subsequent
address family identifier (SAFI) provides information about the type of the network layer reachability
information that is carried in the attribute. Multiprotocol BGP unicast uses SAFI 1 messages, and
multiprotocol BGP multicast uses SAFI 2 messages. SAFI 1 messages indicate that the routes are only
usable for IP unicast, but not IP multicast. Because of this functionality, BGP routes in the IPv6 unicast
RIB must be ignored in the IPv6 multicast RPF lookup.
A separate BGP routing table is maintained to configure incongruent policies and topologies (for
example, IPv6 unicast and multicast) by using IPv6 multicast RPF lookup. Multicast RPF lookup is very
similar to the IP unicast route lookup.
No MRIB is associated with the IPv6 multicast BGP table. However, IPv6 multicast BGP operates on
the unicast IPv6 RIB when needed. Multicast BGP does not insert or update routes into the IPv6 unicast
RIB.
Nonstop Forwarding and Graceful Restart for MP-BGP IPv6 Address Family
The graceful restart capability is supported for IPv6 BGP unicast, multicast, and VPNv6 address
families, enabling Cisco nonstop forwarding (NSF) functionality for BGP IPv6. The BGP graceful
restart capability allows the BGP routing table to be recovered from peers without keeping the TCP state.
NSF continues forwarding packets while routing protocols converge, therefore avoiding a route flap on
switchover. Forwarding is maintained by synchronizing the FIB between the active and standby RP. On
switchover, forwarding is maintained using the FIB. The RIB is not kept synchronized; therefore, the
RIB is empty on switchover. The RIB is repopulated by the routing protocols and subsequently informs
FIB about RIB convergence by using the NSF_RIB_CONVERGED registry call. The FIB tables are
updated from the RIB, removing any stale entries. The RIB starts a failsafe timer during RP switchover,
in case the routing protocols fail to notify the RIB of convergence.
The Cisco BGP address family identifier (AFI) model is designed to be modular and scalable, and to
support multiple AFI and subsequent address family identifier (SAFI) configurations.
6PE Multipath
Internal and external BGP multipath for IPv6 allows the IPv6 router to load balance between several
paths (for example, same neighboring autonomous system [AS] or sub-AS, or the same metric) to reach
its destination. The 6PE multipath feature uses multiprotocol internal BGP (MP-iBGP) to distribute IPv6
routes over the MPLS IPv4 core network and to attach an MPLS label to each route.
When MP-iBGP multipath is enabled on the 6PE router, all labeled paths are installed in the forwarding
table with MPLS information (label stack) when MPLS information is available. This functionality
enables 6PE to perform load balancing.
IPv6C-3
Implementing Multiprotocol BGP for IPv6
How to Implement Multiprotocol BGP for IPv6
Note The following sections describe the configuration tasks for creating an IPv6 multiprotocol BGP routing
process and associating peers, peer groups, and networks to the routing process. The following sections
do not provide in-depth information on customizing multiprotocol BGP because the protocol functions
the same in IPv6 as it does in IPv4. See the “Related Documents” section for further information on BGP
and multiprotocol BGP configuration and command reference information.
The tasks in the following sections explain how to configure multiprotocol BGP extensions for IPv6.
Each task in the list is identified as either required or optional:
• Configuring an IPv6 BGP Routing Process and BGP Router ID, page 4 (required)
• Configuring an IPv6 Multiprotocol BGP Peer, page 6 (required)
• Configuring an IPv6 Multiprotocol BGP Peer Using a Link-Local Address, page 7 (optional)
• Configuring an IPv6 Multiprotocol BGP Peer Group, page 10 (optional)
• Advertising Routes into IPv6 Multiprotocol BGP, page 13 (required)
• Configuring a Route Map for IPv6 Multiprotocol BGP Prefixes, page 14 (optional)
• Redistributing Prefixes into IPv6 Multiprotocol BGP, page 16 (optional)
• Advertising IPv4 Routes Between IPv6 BGP Peers, page 18 (optional)
• Assigning a BGP Administrative Distance, page 20 (optional)
• Generating Translate Updates for IPv6 Multicast BGP, page 21 (optional)
• Configuring the IPv6 BGP Graceful Restart Capability, page 22 (optional)
• Resetting BGP Sessions, page 23 (optional)
• Clearing External BGP Peers, page 24 (optional)
• Clearing IPv6 BGP Route Dampening Information, page 25 (optional)
• Clearing IPv6 BGP Flap Statistics, page 25 (optional)
• Verifying IPv6 Multiprotocol BGP Configuration and Operation, page 26 (optional)
Prerequisites
Before configuring the router to run BGP for IPv6, you must globally enable IPv6 routing using the ipv6
unicast-routing global configuration command. For details on basic IPv6 connectivity tasks, refer to the
Implementing Basic Connectivity for IPv6 module.
IPv6C-4
Implementing Multiprotocol BGP for IPv6
How to Implement Multiprotocol BGP for IPv6
the BGP router ID. When configuring BGP on a router that is enabled only for IPv6 (the router does not
have an IPv4 address), you must manually configure the BGP router ID for the router. The BGP router
ID, which is represented as a 32-bit value using an IPv4 address syntax, must be unique to the BGP peers
of the router.
SUMMARY STEPS
1. enable
2. configure terminal
3. router bgp as-number
4. no bgp default ipv4-unicast
5. bgp router-id ip-address
DETAILED STEPS
Example:
Router# configure terminal
Step 3 router bgp as-number Configures a BGP routing process, and enters router
configuration mode for the specified routing process.
Example:
Router(config)# router bgp 65000
Step 4 no bgp default ipv4-unicast Disables the IPv4 unicast address family for the BGP
routing process specified in the previous step.
Example: Note Routing information for the IPv4 unicast address
Router(config-router)# no bgp default family is advertised by default for each BGP
ipv4-unicast routing session configured with the neighbor
remote-as router configuration command unless
you configure the no bgp default ipv4-unicast
router configuration command before configuring
the neighbor remote-as command.
Step 5 bgp router-id ip-address (Optional) Configures a fixed 32-bit router ID as the
identifier of the local router running BGP.
Example: Note Configuring a router ID using the bgp router-id
Router(config-router)# bgp router-id command resets all active BGP peering sessions.
192.168.99.70
IPv6C-5
Implementing Multiprotocol BGP for IPv6
How to Implement Multiprotocol BGP for IPv6
Restrictions
By default, neighbors that are defined using the neighbor remote-as command in router configuration
mode exchange only IPv4 unicast address prefixes. To exchange other address prefix types, such as IPv6
prefixes, neighbors must also be activated using the neighbor activate command in address family
configuration mode for the other prefix types, as shown for IPv6 prefixes.
SUMMARY STEPS
1. enable
2. configure terminal
3. router bgp as-number
4. neighbor {ip-address | ipv6-address | peer-group-name} remote-as as-number
5. address-family ipv6 [vrf vrf-name] [unicast | multicast | vpnv6]
6. neighbor {ip-address | peer-group-name | ipv6-address} activate
DETAILED STEPS
Example:
Router# configure terminal
Step 3 router bgp as-number Enters router configuration mode for the specified routing
process.
Example:
Router(config)# router bgp 65000
Step 4 neighbor {ip-address | ipv6-address | Adds the IPv6 address of the neighbor in the specified
peer-group-name} remote-as as-number autonomous system to the IPv6 multiprotocol BGP
neighbor table of the local router.
Example: • The ipv6-address argument in the neighbor remote-as
Router(config-router)# neighbor command must be in the form documented in RFC 2373
2001:0DB8:0:CC00::1 remote-as 64600
where the address is specified in hexadecimal using
16-bit values between colons.
IPv6C-6
Implementing Multiprotocol BGP for IPv6
How to Implement Multiprotocol BGP for IPv6
Example:
Router(config-router-af)# neighbor
2001:0DB8:0:CC00::1 activate
Restrictions
• By default, neighbors that are defined using the neighbor remote-as command in router
configuration mode exchange only IPv4 unicast address prefixes. To exchange other address prefix
types, such as IPv6 prefixes, neighbors must also be activated using the neighbor activate command
in address family configuration mode for the other prefix types, as shown for IPv6 prefixes.
• By default, route maps that are applied in router configuration mode using the neighbor route-map
command are applied to only IPv4 unicast address prefixes. Route maps for other address families
must be applied in address family configuration mode using the neighbor route-map command, as
shown for the IPv6 address family. The route maps are applied either as the inbound or outbound
routing policy for neighbors under the specified address family. Configuring separate route maps
under each address family type simplifies managing complicated or different policies for each
address family.
SUMMARY STEPS
1. enable
2. configure terminal
3. router bgp autonomous-system-number
IPv6C-7
Implementing Multiprotocol BGP for IPv6
How to Implement Multiprotocol BGP for IPv6
DETAILED STEPS
Example:
Router# configure terminal
Step 3 router bgp autonomous-system-number Enters router configuration mode for the specified routing
process.
Example:
Router(config)# router bgp 65000
Step 4 neighbor {ip-address | ipv6-address | Adds the link-local IPv6 address of the neighbor in the
peer-group-name} remote-as as-number specified remote autonomous system to the IPv6
multiprotocol BGP neighbor table of the local router.
Example: • The ipv6-address argument in the neighbor remote-as
Router(config-router)# neighbor command must be a link-local IPv6 address in the form
FE80::XXXX:BFF:FE0E:A471 remote-as 64600
documented in RFC 2373 where the address is
specified in hexadecimal using 16-bit values between
colons.
Step 5 neighbor {ip-address | ipv6-address | Specifies the link-local address over which the peering is to
peer-group-name} update-source interface-type occur.
interface-number
• If there are multiple connections to the neighbor and
you do not specify the neighbor interface by using the
Example: interface-type and interface-number arguments in the
Router(config-router)# neighbor
neighbor update-source command, a TCP connection
FE80::XXXX:BFF:FE0E:A471 update-source
fastethernet0 cannot be established with the neighbor using
link-local addresses.
IPv6C-8
Implementing Multiprotocol BGP for IPv6
How to Implement Multiprotocol BGP for IPv6
Example:
Router(config-router-af)# neighbor
FE80::XXXX:BFF:FE0E:A471 route-map nh6 out
Step 9 exit Exits address family configuration mode, and returns the
router to router configuration mode.
Example:
Router(config-router-af)# exit
Step 10 Repeat Step 9. Exits router configuration mode, and returns the router to
global configuration mode.
Example:
Router(config-router)# exit
Step 11 route-map map-tag [permit | deny] Defines a route map and enters route-map configuration
[sequence-number] mode.
• Follow this step with a match command.
Example:
Router(config)# route-map nh6 permit 10
IPv6C-9
Implementing Multiprotocol BGP for IPv6
How to Implement Multiprotocol BGP for IPv6
Troubleshooting Tips
Peering not established by this task may be due to a missing route map set ipv6 next-hop command. Use
the debug bgp ipv6 update command to display debugging information on the updates to help
determine the state of the peering.
IPv6C-10
Implementing Multiprotocol BGP for IPv6
How to Implement Multiprotocol BGP for IPv6
Restrictions
• By default, neighbors that are defined using the neighbor remote-as command in router
configuration mode exchange only IPv4 unicast address prefixes. To exchange other address prefix
types, such as IPv6 prefixes, neighbors must also be activated using the neighbor activate command
in address family configuration mode for the other prefix types, as shown for IPv6 prefixes.
• By default, peer groups that are defined in router configuration mode using the neighbor
peer-group command exchange only IPv4 unicast address prefixes. To exchange other address
prefix types, such as IPv6 prefixes, you must activate peer groups using the neighbor activate
command in address family configuration mode for the other prefix types, as shown for IPv6
prefixes.
• Members of a peer group automatically inherit the address prefix configuration of the peer group.
• IPv4 active neighbors cannot exist in the same peer group as active IPv6 neighbors. Create separate
peer groups for IPv4 peers and IPv6 peers.
SUMMARY STEPS
1. enable
2. configure terminal
3. router bgp as-number
4. neighbor peer-group-name peer-group
5. neighbor {ip-address | ipv6-address | peer-group-name} remote-as as-number
6. address-family ipv6 [vrf vrf-name] [unicast | multicast | vpnv6]
7. neighbor {ip-address | peer-group-name | ipv6-address} activate
8. neighbor {ip-address | ipv6-address} send-label
9. neighbor {ip-address | ipv6-address} peer-group peer-group-name
10. exit
DETAILED STEPS
Example:
Router# configure terminal
Step 3 router bgp as-number Enters router configuration mode for the specified BGP
routing process.
Example:
Router(config)# router bgp 65000
IPv6C-11
Implementing Multiprotocol BGP for IPv6
How to Implement Multiprotocol BGP for IPv6
Example:
Router(config-router)# neighbor group1
peer-group
Step 5 neighbor {ip-address | ipv6-address | Adds the IPv6 address of the neighbor in the specified
peer-group-name} remote-as as-number autonomous system to the IPv6 multiprotocol BGP
neighbor table of the local router.
Example: • The ipv6-address argument in the neighbor remote-as
Router(config-router)# neighbor command must be in the form documented in RFC 2373
2001:0DB8:0:CC00::1 remote-as 64600
where the address is specified in hexadecimal using
16-bit values between colons.
Step 6 address-family ipv6 [vrf vrf-name] [unicast | Specifies the IPv6 address family, and enters address family
multicast | vpnv6] configuration mode.
• The unicast keyword specifies the IPv6 unicast address
Example: family. By default, the router is placed in configuration
Router(config-router)# address-family ipv6 mode for the IPv6 unicast address family if the unicast
unicast
keyword is not specified with the address-family ipv6
command.
• The multicast keyword specifies IPv6 multicast
address prefixes.
Step 7 neighbor {ip-address | peer-group-name | Enables the neighbor to exchange prefixes for the specified
ipv6-address} activate family type with the neighbor and the local router.
• To avoid extra configuration steps for each neighbor,
Example: use the neighbor activate command with the
Router(config-router-af)# neighbor peer-group-name argument as an alternative in this
2001:0DB8:0:CC00::1 activate
step.
Step 8 neighbor {ip-address | ipv6-address} send-label Advertises the capability of the router to send MPLS labels
with BGP routes.
Example: • In IPv6 address family configuration mode, this
Router(config-router-af)# neighbor command enables binding and advertisement of
192.168.99.70 send-label aggregate labels when advertising IPv6 prefixes in
BGP.
Step 9 neighbor {ip-address | ipv6-address} peer-group Assigns the IPv6 address of a BGP neighbor to a peer group.
peer-group-name
Example:
Router(config-router-af)# neighbor
2001:0DB8:0:CC00::1 peer-group group1
Step 10 exit Exits address family configuration mode, and returns the
router to router configuration mode.
Example: • Repeat this step to exit router configuration mode and
Router(config-router-af)# exit return the router to global configuration mode.
IPv6C-12
Implementing Multiprotocol BGP for IPv6
How to Implement Multiprotocol BGP for IPv6
What to Do Next
Refer to the section “Configure BGP Peer Groups” of the “Configuring BGP” chapter in Cisco IOS IP
Configuration Guide, Release 12.4, for more information on assigning options to peer groups and making
a BGP or multiprotocol BGP neighbor a member of a peer group.
Restrictions
By default, networks that are defined in router configuration mode using the network command are
injected into the IPv4 unicast database. To inject a network into another database, such as the IPv6 BGP
database, you must define the network using the network command in address family configuration
mode for the other database, as shown for the IPv6 BGP database.
SUMMARY STEPS
1. enable
2. configure terminal
3. router bgp as-number
4. address-family ipv6 [vrf vrf-name] [unicast | multicast | vpnv6]
5. network {network-number [mask network-mask] | nsap-prefix} [route-map map-tag]
6. exit
DETAILED STEPS
Example:
Router# configure terminal
Step 3 router bgp as-number Enters router configuration mode for the specified BGP
routing process.
Example:
Router(config)# router bgp 65000
IPv6C-13
Implementing Multiprotocol BGP for IPv6
How to Implement Multiprotocol BGP for IPv6
Restrictions
• By default, neighbors that are defined using the neighbor remote-as command in router
configuration mode exchange only IPv4 unicast address prefixes. To exchange other address prefix
types, such as IPv6 prefixes, neighbors must also be activated using the neighbor activate command
in address family configuration mode for the other prefix types, as shown for IPv6 prefixes.
• By default, route maps that are applied in router configuration mode using the neighbor route-map
command are applied to only IPv4 unicast address prefixes. Route maps for other address families
must be applied in address family configuration mode using the neighbor route-map command, as
shown for the IPv6 address family. The route maps are applied either as the inbound or outbound
IPv6C-14
Implementing Multiprotocol BGP for IPv6
How to Implement Multiprotocol BGP for IPv6
routing policy for neighbors under the specified address family. Configuring separate route maps
under each address family type simplifies managing complicated or different policies for each
address family.
SUMMARY STEPS
1. enable
2. configure terminal
3. router bgp as-number
4. neighbor {ip-address | ipv6-address | peer-group-name} remote-as as-number
5. address-family ipv6 [vrf vrf-name] [unicast | multicast | vpnv6]
6. neighbor {ip-address | peer-group-name | ipv6-address} activate
7. neighbor {ip-address | peer-group-name | ipv6-address} route-map map-name {in | out}
8. exit
9. Repeat Step 8.
10. route-map map-tag [permit | deny] [sequence-number]
11. match ipv6 address {prefix-list prefix-list-name | access-list-name}
DETAILED STEPS
Example:
Router# configure terminal
Step 3 router bgp as-number Enters router configuration mode for the specified routing
process.
Example:
Router(config)# router bgp 65000
Step 4 neighbor {ip-address | ipv6-address | Adds the link-local IPv6 address of the neighbor in the
peer-group-name} remote-as as-number specified remote autonomous system to the IPv6
multiprotocol BGP neighbor table of the local router.
Example: • The ipv6-address argument in the neighbor remote-as
Router(config-router)# neighbor command must be a link-local IPv6 address in the form
2001:0DB8:0:cc00::1 remote-as 64600
documented in RFC 2373 where the address is
specified in hexadecimal using 16-bit values between
colons.
IPv6C-15
Implementing Multiprotocol BGP for IPv6
How to Implement Multiprotocol BGP for IPv6
IPv6C-16
Implementing Multiprotocol BGP for IPv6
How to Implement Multiprotocol BGP for IPv6
SUMMARY STEPS
1. enable
2. configure terminal
3. router bgp as-number
4. address-family ipv6 [vrf vrf-name] [unicast | multicast | vpnv6]
5. redistribute bgp [process-id] [[metric metric-value] [route-map map-name]]
[source-protocol-options]
6. exit
DETAILED STEPS
Example:
Router# configure terminal
Step 3 router bgp as-number Enters router configuration mode for the specified BGP
routing process.
Example:
Router(config)# router bgp 65000
Step 4 address-family ipv6 [vrf vrf-name] [unicast | Specifies the IPv6 address family, and enters address family
multicast | vpnv6] configuration mode.
• The unicast keyword specifies the IPv6 unicast address
Example: family. By default, the router is placed in configuration
Router(config-router)# address-family ipv6 mode for the IPv6 unicast address family if the unicast
keyword is not specified with the address-family ipv6
command.
• The multicast keyword specifies IPv6 multicast
address prefixes.
IPv6C-17
Implementing Multiprotocol BGP for IPv6
How to Implement Multiprotocol BGP for IPv6
Example:
Router(config-router-af)# redistribute bgp
64500 metric 5 metric-type external
Step 6 exit Exits address family configuration mode, and returns the
router to router configuration mode.
Example: • Repeat this step to exit router configuration mode and
Router(config-router-af)# exit return the router to global configuration mode.
SUMMARY STEPS
1. enable
2. configure terminal
3. router bgp as-number
4. neighbor peer-group-name peer-group
5. neighbor {ip-address | ipv6-address | peer-group-name} remote-as as-number
6. address-family ipv4 [mdt | multicast | tunnel | unicast [vrf vrf-name] | vrf vrf-name]
7. neighbor ipv6-address peer-group peer-group-name
8. neighbor {ip-address | peer-group-name | ipv6-address} route-map map-name {in | out}
9. exit
10. Repeat Step 11.
11. route-map map-tag [permit | deny] [sequence-number]
12. set ip next-hop ip-address [... ip-address] [peer-address]
IPv6C-18
Implementing Multiprotocol BGP for IPv6
How to Implement Multiprotocol BGP for IPv6
DETAILED STEPS
Example:
Router# configure terminal
Step 3 router bgp as-number Enters router configuration mode for the specified routing
process.
Example:
Router(config)# router bgp 65000
Step 4 neighbor peer-group-name peer-group Creates a multiprotocol BGP peer group.
Example:
Router(config-router)# neighbor 6peers
peer-group
Step 5 neighbor {ip-address | ipv6-address | Adds the IPv6 address of the neighbor in the specified
peer-group-name} remote-as as-number autonomous system to the IPv6 multiprotocol BGP
neighbor table of the local router.
Example: • The ipv6-address argument in the neighbor remote-as
Router(config-router)# neighbor 6peers command must be in the form documented in RFC 2373
remote-as 65002
where the address is specified in hexadecimal using
16-bit values between colons.
Step 6 address-family ipv4 [mdt | multicast | tunnel | Enters address family configuration mode to configure a
unicast [vrf vrf-name] | vrf vrf-name] routing session using standard IPv4 address prefixes.
Example:
Router(config-router)# address-family ipv4
Step 7 neighbor ipv6-address peer-group Assigns the IPv6 address of a BGP neighbor to a peer group.
peer-group-name
Example:
Router(config-router-af)# neighbor
2001:0DB8:yyyy::2 peer-group 6peers
Step 8 neighbor {ip-address | peer-group-name | Applies a route map to incoming or outgoing routes.
ipv6-address} route-map map-name {in | out}
• Changes to the route map will not take effect for
existing peers until the peering is reset or a soft reset is
Example: performed. Using the clear bgp ipv6 command with
Router(config-router-af)# neighbor 6peers the soft and in keywords will perform a soft reset.
route-map rmap out
IPv6C-19
Implementing Multiprotocol BGP for IPv6
How to Implement Multiprotocol BGP for IPv6
Example:
Router(config)# route-map rmap permit 10
Step 12 set ip next-hop ip-address [... ip-address] Overrides the next hop advertised to the peer for IPv4
[peer-address] packets.
Example:
Router(config-route-map)# set ip next-hop
10.21.8.10
Caution Changing the administrative distance of BGP internal routes is considered dangerous and is not
recommended. One problem that can arise is the accumulation of routing table inconsistencies, which
can break routing.
SUMMARY STEPS
1. enable
2. configure terminal
3. router bgp as-number
4. address-family ipv6 [vrf vrf-name] [unicast | multicast | vpnv6]
5. distance bgp external-distance internal-distance local-distance
IPv6C-20
Implementing Multiprotocol BGP for IPv6
How to Implement Multiprotocol BGP for IPv6
DETAILED STEPS
Example:
Router# configure terminal
Step 3 router bgp as-number Enters router configuration mode for the specified routing
process.
Example:
Router(config)# router bgp 65000
Step 4 address-family ipv6 [vrf vrf-name] [unicast | Specifies the IPv6 address family, and enters address family
multicast | vpnv6] configuration mode.
• The unicast keyword specifies the IPv6 unicast address
Example: family. By default, the router is placed in configuration
Router(config-router)# address-family ipv6 mode for the IPv6 unicast address family if the unicast
keyword is not specified with the address-family ipv6
command.
• The multicast keyword specifies IPv6 multicast
address prefixes.
Step 5 distance bgp external-distance Configures the administrative distance for BGP routes.
internal-distance local-distance
Example:
Router(config-router-af)# distance bgp 10 50
100
SUMMARY STEPS
1. enable
2. configure terminal
3. router bgp as-number
IPv6C-21
Implementing Multiprotocol BGP for IPv6
How to Implement Multiprotocol BGP for IPv6
DETAILED STEPS
Example:
Router# configure terminal
Step 3 router bgp as-number Enters router configuration mode for the specified routing
process.
Example:
Router(config)# router bgp 65000
Step 4 address-family ipv6 [vrf vrf-name] [unicast | Specifies the IPv6 address family, and enters address family
multicast | vpnv6] configuration mode.
• The unicast keyword specifies the IPv6 unicast address
Example: family. By default, the router is placed in configuration
Router(config-router)# address-family ipv6 mode for the IPv6 unicast address family if the unicast
keyword is not specified with the address-family ipv6
command.
• The multicast keyword specifies IPv6 multicast
address prefixes.
Step 5 neighbor ipv6-address translate-update ipv6 Generates multiprotocol IPv6 BGP updates that correspond
multicast [unicast] to unicast IPv6 updates received from a peer.
Example:
Router(config-router-af)# neighbor 7000::2
translate-update ipv6 multicast
SUMMARY STEPS
1. enable
2. configure terminal
3. router bgp as-number
4. address-family ipv6 [vrf vrf-name] [unicast | multicast | vpnv6]
IPv6C-22
Implementing Multiprotocol BGP for IPv6
How to Implement Multiprotocol BGP for IPv6
DETAILED STEPS
Example:
Router# configure terminal
Step 3 router bgp as-number Enters router configuration mode for the specified routing
process.
Example:
Router(config)# router bgp 65000
Step 4 address-family ipv6 [vrf vrf-name] [unicast | Specifies the IPv6 address family.
multicast | vpnv6]
Example:
Router(config-router)# address-family ipv6
Step 5 bgp graceful-restart [restart-time seconds | Enables the BGP graceful restart capability.
stalepath-time seconds] [all]
Example:
Router(config-router)# bgp graceful-restart
SUMMARY STEPS
1. enable
2. clear bgp ipv6 {unicast | multicast} {* | autonomous-system-number | ip-address | ipv6-address |
peer-group-name} [soft] [in | out]
IPv6C-23
Implementing Multiprotocol BGP for IPv6
How to Implement Multiprotocol BGP for IPv6
DETAILED STEPS
Example:
Router# clear bgp ipv6 unicast peer-group
marketing soft out
SUMMARY STEPS
1. enable
2. clear bgp ipv6 {unicast | multicast} external [soft] [in | out]
3. clear bgp ipv6 {unicast | multicast} peer-group [name]
DETAILED STEPS
Example:
Router# clear bgp ipv6 unicast external soft in
Step 3 clear bgp ipv6 { unicast | multicast} peer-group Clears all members of an IPv6 BGP peer group.
[name]
Example:
Router# clear bgp ipv6 unicast peer-group
IPv6C-24
Implementing Multiprotocol BGP for IPv6
How to Implement Multiprotocol BGP for IPv6
SUMMARY STEPS
1. enable
2. clear bgp ipv6 {unicast | multicast} dampening [ipv6-prefix/prefix-length]
DETAILED STEPS
Example:
Router# clear bgp ipv6 unicast dampening
2001:0DB8::/64
SUMMARY STEPS
1. enable
2. clear bgp ipv6 {unicast | multicast} flap-statistics [ipv6-prefix/prefix-length | regexp regexp |
filter-list list]
IPv6C-25
Implementing Multiprotocol BGP for IPv6
How to Implement Multiprotocol BGP for IPv6
DETAILED STEPS
Example:
Router# clear bgp ipv6 unicast flap-statistics
filter-list 3
SUMMARY STEPS
DETAILED STEPS
Example:
Router> show bgp ipv6 unicast
Step 2 show bgp ipv6 {unicast | multicast} summary (Optional) Displays the status of all IPv6 BGP connections.
Example:
Router> show bgp ipv6 unicast summary
IPv6C-26
Implementing Multiprotocol BGP for IPv6
How to Implement Multiprotocol BGP for IPv6
Example:
Router> show bgp ipv6 unicast dampening
dampened-paths
Step 4 enable Enables higher privilege levels, such as privileged EXEC
mode.
Example: • Enter your password if prompted.
Router> enable
Step 5 debug bgp ipv6 {unicast | multicast} dampening (Optional) Displays debugging messages for IPv6 BGP
[prefix-list prefix-list-name] dampening packets.
• If no prefix list is specified, debugging messages for all
Example: IPv6 BGP dampening packets are displayed.
Router# debug bgp ipv6 unicast dampening
Step 6 debug bgp ipv6 {unicast | multicast} updates (Optional) Displays debugging messages for IPv6 BGP
[ipv6-address] [prefix-list prefix-list-name] update packets.
[in | out]
• If an ipv6-address argument is specified, debugging
messages for IPv6 BGP updates to the specified
Example: neighbor are displayed.
Router# debug bgp ipv6 unicast updates
• Use the in keyword to display debugging messages for
inbound updates only.
• Use the out keyword to display debugging messages for
outbound updates only.
Examples
This section provides the following output examples:
• Sample Output for the show bgp ipv6 Command
• Sample Output for the show bgp ipv6 summary Command
• Sample Output for the show bgp ipv6 dampened-paths Command
• Sample Output for the debug bgp ipv6 dampening Command
• Sample Output for the debug bgp ipv6 updates Command
IPv6C-27
Implementing Multiprotocol BGP for IPv6
How to Implement Multiprotocol BGP for IPv6
* 2001:0DB8:0:CC00::1
0 1849 1273 1752 i
* 2001:618:3::/48 2001:0DB8:E:4::2 1 0 4554 1849 65002 i
*> 2001:0DB8:0:CC00::1
0 1849 65002 i
*> 2001:620::/35 2001:0DB8:0:F004::1
0 3320 1275 559 i
* 2001:0DB8:E:9::2 0 1251 1930 559 i
* 2001:0DB8::A 0 3462 10566 1930 559 i
* 2001:0DB8:20:1::11
0 293 1275 559 i
* 2001:0DB8:E:4::2 1 0 4554 1849 1273 559 i
* 2001:0DB8:E:B::2 0 237 3748 1275 559 i
* 2001:0DB8:E:C::2 0 3748 1275 559 i
Note For a description of each output display field, refer to the show bgp ipv6 command in the IPv6 for
Cisco IOS Command Reference document.
IPv6C-28
Implementing Multiprotocol BGP for IPv6
Configuration Examples for Multiprotocol BGP for IPv6
Note By default, the system sends the output from debug commands and system error messages to the
console. To redirect debugging output, use the logging command options within configuration mode.
Possible destinations include the console, virtual terminals, internal buffer, and UNIX hosts running a
syslog server. For complete information on debug commands and redirecting debugging output, refer to
Cisco IOS Debug Command Reference, Release 12.4.
IPv6C-29
Implementing Multiprotocol BGP for IPv6
Configuration Examples for Multiprotocol BGP for IPv6
• Configuring an IPv6 Multiprotocol BGP Peer Using a Link-Local Address: Example, page 30
• Configuring an IPv6 Multiprotocol BGP Peer Group: Example, page 31
• Advertising Routes into IPv6 Multiprotocol BGP: Example, page 31
• Configuring a Route Map for IPv6 Multiprotocol BGP Prefixes: Example, page 31
• Redistributing Prefixes into IPv6 Multiprotocol BGP: Example, page 31
• Advertising IPv4 Routes Between IPv6 Peers: Example, page 32
Configuring a BGP Process, BGP Router ID, and IPv6 Multiprotocol BGP Peer:
Example
The following example enables IPv6 globally, configures a BGP process, and establishes a BGP router
ID. Also, the IPv6 multiprotocol BGP peer 2001:0DB8:0:CC00:: is configured and activated.
ipv6 unicast-routing
!
router bgp 65000
no bgp default ipv4-unicast
bgp router-id 192.168.99.70
neighbor 2001:0DB8:0:CC00::1 remote-as 64600
address-family ipv6
neighbor FE80::XXXX:BFF:FE0E:A471 activate
neighbor FE80::XXXX:BFF:FE0E:A471 route-map nh6 out
Note If you specify only the global IPv6 next-hop address (the ipv6-address argument) with the set ipv6
next-hop command after specifying the neighbor interface (the interface-type argument) with the
neighbor update-source command, the link-local address of the interface specified with the
IPv6C-30
Implementing Multiprotocol BGP for IPv6
Configuration Examples for Multiprotocol BGP for IPv6
interface-type argument is included as the next hop in the BGP updates. Therefore, only one route map
that sets the global IPv6 next-hop address in BGP updates is required for multiple BGP peers that use
link-local addresses.
IPv6C-31
Implementing Multiprotocol BGP for IPv6
Where to Go Next
Where to Go Next
If you want to implement more IPv6 routing protocols, refer to the Implementing RIP for IPv6 or the
Implementing IS-IS for IPv6 module.
Additional References
The following sections provide references related to the Implementing Multiprotocol BGP for IPv6
feature.
IPv6C-32
Implementing Multiprotocol BGP for IPv6
Additional References
Related Documents
Related Topic Document Title
IPv4 BGP configuration tasks “BGP Features Roadmap,” Cisco IOS IP Routing Protocols
Configuration Guide
Multiprotocol BGP configuration tasks “BGP Features Roadmap,” Cisco IOS IP Routing Protocols
Configuration Guide
BGP and multiprotocol BGP commands: complete “BGP Commands,” Cisco IOS IP Routing Protocols Command
command syntax, command mode, defaults, usage Reference
guidelines, and examples
Cisco Nonstop Forwarding “Cisco Nonstop Forwarding,” Cisco IOS High Availability
Configuration Guide
IPv6 supported feature list “Start Here: Cisco IOS Software Release Specifics for IPv6
Features,” Cisco IOS IPv6 Configuration Guide
IPv6 commands: complete command syntax, command Cisco IOS IPv6 Command Reference
mode, defaults, usage guidelines, and examples
Standards
Standards Title
No new or modified standards are supported by this —
feature, and support for existing standards has not been
modified by this feature.
MIBs
MIBs MIBs Link
No new or modified MIBs are supported, and support To locate and download MIBs for selected platforms, Cisco IOS
for existing MIBs has not been modified. releases, and feature sets, use Cisco MIB Locator found at the
following URL:
http://www.cisco.com/go/mibs
RFCs
RFCs Title
RFC 2545 Use of BGP-4 Multiprotocol Extensions for IPv6 Inter-Domain
Routing
RFC 2858 Multiprotocol Extensions for BGP-4
RFC 4007 IPv6 Scoped Address Architecture
RFC 4364 BGP MPLS/IP Virtual Private Networks (VPNs)
RFC 4382 MPLS/BGP Layer 3 Virtual Private Network (VPN) Management
Information Base
IPv6C-33
Implementing Multiprotocol BGP for IPv6
Command Reference
RFCs Title
RFC 4659 BGP-MPLS IP Virtual Private Network (VPN) Extension for IPv6
VPN
RFC 4724 Graceful Restart Mechanism for BGP
Technical Assistance
Description Link
The Cisco Support website provides extensive online http://www.cisco.com/techsupport
resources, including documentation and tools for
troubleshooting and resolving technical issues with
Cisco products and technologies.
To receive security and technical information about
your products, you can subscribe to various services,
such as the Product Alert Tool (accessed from Field
Notices), the Cisco Technical Services Newsletter, and
Really Simple Syndication (RSS) Feeds.
Access to most tools on the Cisco Support website
requires a Cisco.com user ID and password.
Command Reference
The following commands are introduced or modified in the feature or features documented in this
module. For information about these commands, see the Cisco IOS IPv6 Command Reference at
http://www.cisco.com/en/US/docs/ios/ipv6/command/reference/ipv6_book.html. For information about
all Cisco IOS commands, use the Command Lookup Tool at http://tools.cisco.com/Support/CLILookup
or the Cisco IOS Master Command List, All Releases, at
http://www.cisco.com/en/US/docs/ios/mcl/all_release/all_mcl.html.
• address-family ipv4 (BGP)
• address-family ipv6
• bgp graceful-restart
• clear bgp ipv6
• clear bgp ipv6 dampening
• clear bgp ipv6 external
• clear bgp ipv6 flap-statistics
• clear bgp ipv6 peer-group
• debug bgp ipv6 dampening
• debug bgp ipv6 updates
• debug ipv6 routing
• distance bgp (IPv6)
• match ipv6 address
IPv6C-34
Implementing Multiprotocol BGP for IPv6
Command Reference
• maximum-paths (IPv6)
• neighbor activate
• neighbor peer-group (assigning members)
• neighbor peer-group (creating)
• neighbor remote-as
• neighbor route-map
• neighbor send-label
• neighbor translate-update
• neighbor update-source
• network (BGP and multiprotocol BGP)
• redistribute (IPv6)
• route-map
• router bgp
• set ipv6 next-hop (BGP)
• show bgp ipv6
• show bgp ipv6 community
• show bgp ipv6 community-list
• show bgp ipv6 dampened-paths
• show bgp ipv6 filter-list
• show bgp ipv6 flap-statistics
• show bgp ipv6 inconsistent-as
• show bgp ipv6 labels
• show bgp ipv6 neighbors
• show bgp ipv6 paths
• show bgp ipv6 peer-group
• show bgp ipv6 prefix-list
• show bgp ipv6 quote-regexp
• show bgp ipv6 regexp
• show bgp ipv6 route-map
• show bgp ipv6 summary
• synchronization (IPv6)
IPv6C-35
Implementing Multiprotocol BGP for IPv6
Feature Information for Implementing Multiprotocol BGP for IPv6
Note Table 6 lists only the Cisco IOS software release that introduced support for a given feature in a given
Cisco IOS software release train. Unless noted otherwise, subsequent releases of that Cisco IOS
software release train also support that feature.
IPv6C-36
Implementing Multiprotocol BGP for IPv6
Feature Information for Implementing Multiprotocol BGP for IPv6
IPv6C-37
Implementing Multiprotocol BGP for IPv6
Feature Information for Implementing Multiprotocol BGP for IPv6
CCDE, CCENT, Cisco Eos, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, Cisco TelePresence, the Cisco logo, DCE, and Welcome to the Human
Network are trademarks; Changing the Way We Work, Live, Play, and Learn and Cisco Store are service marks; and Access Registrar, Aironet,
AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork
Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation,
EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, iQ
Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone, MeetingPlace,
MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare,
SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx logo
are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply
a partnership relationship between Cisco and any other company. (0807R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and
figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and
coincidental.
IPv6C-38
Implementing DHCP for IPv6
The “Implementing DHCP for IPv6” module describes how to configure Dynamic Host Configuration
Protocol (DHCP) for IPv6 prefix delegation on your networking devices.
Finding Support Information for Platforms and Cisco IOS and Catalyst OS Software Images
Use Cisco Feature Navigator to find information about platform support and Cisco IOS and Catalyst OS
software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An
account on Cisco.com is not required.
Contents
• Prerequisites for Implementing DHCP for IPv6, page 2
• Restrictions for Implementing DHCP for IPv6, page 2
• Information About Implementing DHCP for IPv6, page 2
• How to Implement DHCP for IPv6, page 8
• Configuration Examples for Implementing DHCPv6, page 29
• Additional References, page 32
• Command Reference, page 33
• Feature Information for Implementing DHCP for IPv6, page 35
Americas Headquarters:
Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA
IPv6C-2
Implementing DHCP for IPv6
Information About Implementing DHCP for IPv6
Rapid Commit
The DHCPv6 client can obtain configuration parameters from a server either through a rapid
two-message exchange (solicit, reply) or through a normal four-message exchange (solicit, advertise,
request, reply). By default, the four-message exchange is used. When the rapid-commit option is enabled
by both client and server, the two-message exchange is used.
Client Function
The DHCPv6 client function can be enabled on individual IPv6-enabled interfaces.
The DHCPv6 client can request and accept those configuration parameters that do not require a server
to maintain any dynamic state for individual clients, such as DNS server addresses and domain search
list options. The DHCPv6 client will configure the local Cisco IOS stack with the received information.
The DHCPv6 client can also request the delegation of prefixes. The prefixes acquired from a delegating
router will be stored in a local IPv6 general prefix pool. The prefixes in the general prefix pool can then
be referred to from other applications; for example, the general prefix pools can be used to number router
downstream interfaces.
Server Selection
A DHCPv6 client builds a list of potential servers by sending a solicit message and collecting advertise
message replies from servers. These messages are ranked based on preference value, and servers may
add a preference option to their advertise messages explicitly stating their preference value. If the client
needs to acquire prefixes from servers, only servers that have advertised prefixes are considered.
IPv6C-3
Implementing DHCP for IPv6
Information About Implementing DHCP for IPv6
An Identity Association for Prefix Delegation (IAPD) is a collection of prefixes assigned to a requesting
router. A requesting router may have more than one IAPD; for example, one for each of its interfaces.
Each IAPD is identified by an identity association identification (IAID). The IAID is chosen by the
requesting router and is unique among the IAPD IAIDs on the requesting router. IAIDs are made
consistent across reboots by using information from the associated network interface, which is assumed
to be permanently attached to the device.
Server Function
The DHCPv6 server function can be enabled on individual IPv6-enabled interfaces.
The DHCPv6 server can provide those configuration parameters that do not require the server to
maintain any dynamic state for individual clients, such as DNS server addresses and domain search list
options. The DHCPv6 server may be configured to perform prefix delegation.
All the configuration parameters for clients are independently configured into DHCPv6 configuration
pools, which are stored in NVRAM. A configuration pool can be associated with a particular DHCPv6
server on an interface when it is started. Prefixes to be delegated to clients may be specified either as a
list of preassigned prefixes for a particular client or as IPv6 local prefix pools that are also stored in
NVRAM. The list of manually configured prefixes or IPv6 local prefix pools can be referenced and used
by DHCPv6 configuration pools.
The DHCPv6 server maintains an automatic binding table in memory to track the assignment of some
configuration parameters, such as prefixes between the server and its clients. The automatic bindings can
be stored permanently in the database agent, which can be, for example, a remote TFTP server or local
NVRAM file system.
A DHCPv6 configuration information pool is a named entity that includes information about available
configuration parameters and policies that control assignment of the parameters to clients from the pool.
A pool is configured independently of the DHCPv6 service and is associated with the DHCPv6 service
through the command-line interface (CLI).
Each configuration pool can contain the following configuration parameters and operational
information:
• Prefix delegation information, which could include:
– A prefix pool name and associated preferred and valid lifetimes
– A list of available prefixes for a particular client and associated preferred and valid lifetimes
• A list of IPv6 addresses of DNS servers
• A domain search list, which is a string containing domain names for DNS resolution
Prefix Assignment
IPv6C-4
Implementing DHCP for IPv6
Information About Implementing DHCP for IPv6
When the delegating router receives a request from a client, it checks if there is a static binding
configured for the IAPD in the client’s message. If a static binding is present, the prefixes in the binding
are returned to the client. If no such a binding is found, the server attempts to assign prefixes for the
client from other sources.
The Cisco IOS DHCPv6 server can assign prefixes dynamically from an IPv6 local prefix pool. When
the server receives a prefix request from a client, it attempts to obtain unassigned prefixes from the pool.
After the client releases the previously assigned prefixes, the server returns them to the pool for
reassignment.
An IPv6 prefix delegating router can also select prefixes for a requesting router based on an external
authority such as a RADIUS server using the Framed-IPv6-Prefix attribute. For more information on this
feature, see the Implementing ADSL and Deploying Dial Access for IPv6 module.
Automatic Binding
Each DHCPv6 configuration pool has an associated binding table. The binding table contains the records
about all the prefixes in the configuration pool that have been explicitly delegated to clients. Each entry
in the binding table contains the following information:
• Client DUID
• Client IPv6 address
• A list of IAPDs associated with the client
• A list of prefixes delegated to each IAPD
• Preferred and valid lifetimes for each prefix
• The configuration pool to which this binding table belongs
• The network interface on which the server that is using the pool is running
A binding table entry is automatically created whenever a prefix is delegated to a client from the
configuration pool, and it is updated when the client renews, rebinds, or confirms the prefix delegation.
A binding table entry is deleted when the client releases all the prefixes in the binding voluntarily, all
prefixes' valid lifetimes have expired, or administrators run the clear ipv6 dhcp binding command.
Binding Database
The automatic bindings are maintained in RAM and can be saved to some permanent storage so that the
information about configuration such as prefixes assigned to clients is not lost after a system reload or
power down. The bindings are stored as text records for easy maintenance. Each record contains the
following information:
• DHCPv6 pool name from which the configuration was assigned to the client
• Interface identifier from which the client requests were received
• The client IPv6 address
• The client DUID
• IAID of the IAPD
• Prefix delegated to the client
• The prefix length
• The prefix preferred lifetime in seconds
• The prefix valid lifetime in seconds
• The prefix expiration time stamp
IPv6C-5
Implementing DHCP for IPv6
Information About Implementing DHCP for IPv6
• Optional local prefix pool name from which the prefix was assigned
At the beginning of the file, before the text records, a time stamp records the time when the database is
written and a version number, which helps differentiate between newer and older databases. At the end
of the file, after the text records, the text string “*end*” is stored to detect file truncation.
The permanent storage to which the binding database is saved is called the database agent. Database
agents include FTP and TFTP servers, RCP, flash file system, and NVRAM.
Hierarchical DHCPv6 for stateless configuration parameters allows a stateless or stateful DHCPv6 client
to export configuration parameters (DHCPv6 options) to a local DHCPv6 server pool. The local
DHCPv6 server can then provide the imported configuration parameters to other DHCPv6 clients.
Figure 1 shows a typical broadband deployment.
The CPE interface toward the PE can be a stateless or stateful DHCPv6 client. In either case, the ISP-side
DHCPv6 server may provide configuration parameters such as DNS server addresses, domain names,
and Simple Network Time Protocol (SNTP) servers to the DHCP client on the CPE. These information
can be specific to an ISP and may change.
In addition to being a DHCPv6 client (for example, toward the ISP), the CPE may act as a DHCPv6
server to the home network. For example, Neighbor Discovery followed by stateless or stateful DHCPv6
can occur on the link between CPE and the home devices (for example, the home router or PC). In some
cases, the information to be provided to the home network is the same information obtained from the
ISP-side DHCPv6 server. Because this information can be dynamically changed, it cannot be
hard-configured in the CPE’s configuration. Therefore, the DHCPv6 component on the CPE allows
automatic importing of configuration parameters from the DHCPv6 client to the DHCPv6 server pool.
DHCPv6 provides support of the options for IPv6 on the server described in the following sections:
• Information Refresh Server Option, page 7
• NIS- and NIS+-Related Server Options, page 7
• SIP Server Options, page 7
• SNTP Server Option, page 7
IPv6C-6
Implementing DHCP for IPv6
Information About Implementing DHCP for IPv6
DHCPv6 relay agent notification for prefix delegation allows the router working as a DHCPv6 relay
agent to find prefix delegation options by reviewing the contents of a DHCPv6 RELAY-REPLY packet
that is being relayed by the relay agent to the client. When a prefix delegation option is found by the
relay agent, the relay agent extracts the information about the prefix being delegated and inserts an IPv6
static route matching the prefix delegation information onto the relay agent. Future packets destined to
that prefix via relay will be forwarded based on the information contained in the prefix delegation. The
IPv6 static route is then left in the routing table until the prefix delegation lease time expires or the relay
agent receives a release packet from the client releasing the prefix delegation.
No user configuration is required for this feature. Static route management is done automatically by the
relay agent.
The IPv6 routes are added when the relay agent relays a RELAY-REPLY packet, and the IPv6 routes are
deleted when the prefix delegation lease time expires or the relay agent receives a release message. An
IPv6 static route in the routing table of the relay agent can be updated when the prefix delegation lease
time is extended.
IPv6C-7
Implementing DHCP for IPv6
How to Implement DHCP for IPv6
This feature leaves a static IPv6 route on the routing table of the relay agent. This registered IPv6 address
allows unicast reverse packet forwarding (uRPF) to work by allowing the router doing the reverse lookup
to confirm that the IPv6 address on the relay agent is not malformed or spoofed. The static route left in
the routing table of the relay agent can be redistributed to other routing protocols to advertise the subnets
to other nodes. The static routes will be removed when an DHCP_DECLINE message is sent by the
client.
This feature adds the remote identification (remote-ID) option to relayed (RELAY-FORWARD)
DHCPv6 packets.
The remote-ID option provides information to the DHCPv6 server, including port information, the
system’s DUID, and the VLAN ID. Collectively, this information can be used to uniquely identify both
the relay and the port on the relay through which the client’s packet arrived. The DHCPv6 server uses
this information to select parameters specific to a particular user, host, or subscriber modem. This feature
works only for Ethernet interfaces at this time.
This feature introduces no user configuration. Because the addition of the remote-ID option to the
RELAY-FORWARD packet occurs automatically, no user configuration is necessary.
The DHCPv6 server does not need to echo the remote-ID option in the RELAY-REPLY packet. Internet
Assigned Numbers Authority (IANA) has assigned the DHCPv6 option code 37 for the relay agent
remote-ID option.
If the remote-ID option is included in the RELAY-REPLY packet, the option is stripped out of the packet
before the packet is relayed to the client.
This feature makes the interface-ID option, which is used by relay agents to decide which interface
should be used when forwarding a RELAY-REPLY packet, persistent. A persistent interface-ID option
will not change if the router acting as a relay agent goes offline (such as during a reload or a power
outage). When the router acting as a relay agent returns online, it is possible that changes to the internal
interface index of the relay agent may have occurred in certain scenarios (such as cases where the relay
agent reboots and has a change in the number of interfaces in the interface index, or the relay agents
boots up and has more virtual interfaces than it did before the reboot). This feature prevents this scenario
from causing any problems.
This feature changes the DHCPv6 interface-ID option to be expressed as simply the short form of the
interface name. This syntax helps avoid potential problems that could arise due to physical or logical
interfaces changing on the relay agent after a reload.
IPv6C-8
Implementing DHCP for IPv6
How to Implement DHCP for IPv6
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 dhcp pool poolname
4. domain-name domain
5. dns-server ipv6-address
6. prefix-delegation ipv6-prefix/prefix-length client-DUID [iaid iaid] [lifetime]
7. prefix-delegation pool poolname [lifetime {valid-lifetime | preferred-lifetime}]
8. exit
9. interface type number
10. ipv6 dhcp server poolname [rapid-commit] [preference value] [allow-hint]
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 dhcp pool poolname Configures a DHCPv6 configuration information pool and
enters DHCPv6 pool configuration mode.
Example:
Router(config)# ipv6 dhcp pool pool1
Step 4 domain-name domain Configures a domain name for a DHCPv6 client.
Example:
Router(config-dhcp)# domain-name example.com
IPv6C-9
Implementing DHCP for IPv6
How to Implement DHCP for IPv6
Example:
Router(config-dhcp)# prefix-delegation
2001:0DB8:1263::/48 0005000400F1A4D070D03
Step 7 prefix-delegation pool poolname [lifetime Specifies a named IPv6 local prefix pool from which
{valid-lifetime | preferred-lifetime}] prefixes are delegated to DHCPv6 clients.
Example:
Router(config-dhcp)# prefix-delegation pool
prefix-pool 1800 60
Step 8 exit Exits DHCPv6 pool configuration mode configuration
mode, and returns the router to global configuration mode.
Example:
Router(config-dhcp)# exit
Step 9 interface type number Specifies an interface type and number, and places the
router in interface configuration mode.
Example:
Router(config)# interface serial 3
Step 10 ipv6 dhcp server poolname [rapid-commit] Enables DHCPv6 on an interface.
[preference value] [allow-hint]
Example:
Router(config-if)# ipv6 dhcp server dhcp-pool
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 dhcp database agent-URL [write-delay seconds] [timeout seconds]
IPv6C-10
Implementing DHCP for IPv6
How to Implement DHCP for IPv6
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 dhcp database agent-URL [write-delay Specifies DHCPv6 binding database agent parameters.
seconds] [timeout seconds]
Example:
Router(config)# ipv6 dhcp database
tftp://10.0.0.1/dhcp-binding
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ipv6 dhcp client pd {prefix-name | hint ipv6-prefix} [rapid-commit]
DETAILED STEPS
Example:
Router# configure terminal
IPv6C-11
Implementing DHCP for IPv6
How to Implement DHCP for IPv6
Example:
Router(config-if)# ipv6 dhcp client pd
dhcp-prefix
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ipv6 dhcp relay destination ipv6-address [interface-type interface-number]
DETAILED STEPS
Example:
Router# configure terminal
Step 3 interface type number Specifies an interface type and number, and places the
router in interface configuration mode.
Example:
Router(config)# interface ethernet 4/2
Step 4 ipv6 dhcp relay destination ipv6-address Specifies a destination address to which client packets are
[interface-type interface-number] forwarded and enables DHCPv6 relay service on the
interface.
Example:
Router(config-if) ipv6 dhcp relay destination
FE80::250:A2FF:FEBF:A056 ethernet 4/3
IPv6C-12
Implementing DHCP for IPv6
How to Implement DHCP for IPv6
The following task describes how to configure the stateless DHCPv6 server.
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 dhcp pool poolname
4. dns-server ipv6-address
5. domain-name domain
6. exit
7. interface type number
8. ipv6 dhcp server poolname [rapid-commit] [preference value] [allow-hint]
9. ipv6 nd other-config-flag
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 dhcp pool poolname Configures a DHCPv6 configuration information pool and
enters DHCPv6 pool configuration mode.
Example:
Router(config)# ipv6 dhcp pool dhcp-pool
IPv6C-13
Implementing DHCP for IPv6
How to Implement DHCP for IPv6
Example:
Router(config-dhcp)# domain-name domain1.com
Step 6 exit Exits DHCPv6 pool configuration mode configuration
mode, and returns the router to global configuration mode.
Example:
Router(config-dhcp)# exit
Step 7 interface type number Specifies an interface type and number, and places the
router in interface configuration mode.
Example:
Router(config)# interface serial 3
Step 8 ipv6 dhcp server poolname [rapid-commit] Enables DHCPv6 on an interface.
[preference value] [allow-hint]
Example:
Router(config-if)# ipv6 dhcp server dhcp-pool
Step 9 ipv6 nd other-config-flag Sets the “other stateful configuration” flag in IPv6 RAs.
Example:
Router(config-if)# ipv6 nd other-config-flag
The following task describes how to configure the stateless DHCPv6 client.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ipv6 address autoconfig [default]
IPv6C-14
Implementing DHCP for IPv6
How to Implement DHCP for IPv6
DETAILED STEPS
Example:
Router# configure terminal
Step 3 interface type number Specifies an interface type and number, and places the
router in interface configuration mode.
Example:
Router(config)# interface serial 3
Step 4 ipv6 address autoconfig [default] Enables automatic configuration of IPv6 addresses using
stateless autoconfiguration on an interface and enables IPv6
processing on the interface.
Example:
Router(config-if)# ipv6 address autoconfig
The following task describes how to enable the processing of packets with source routing header options.
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 source-route
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 source-route Enables processing of the IPv6 type 0 routing header.
Example:
Router(config)# ipv6 source-route
IPv6C-15
Implementing DHCP for IPv6
How to Implement DHCP for IPv6
The following task describes how to configure the information refresh server option.
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 dhcp pool poolname
4. information refresh {days [hours minutes] | infinity}
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 dhcp pool poolname Configures a DHCPv6 configuration information pool and
enters DHCPv6 pool configuration mode.
Example:
Router(config)# ipv6 dhcp pool pool1
Step 4 information refresh {days [hours minutes] | Specifies the information refresh time to be sent to the
infinity} client.
Example:
Router(config-dhcp)# information refresh 1 1 1
IPv6C-16
Implementing DHCP for IPv6
How to Implement DHCP for IPv6
The following task describes how to import the information refresh server option to the DHCPv6 client.
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 dhcp pool poolname
4. import information refresh
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 dhcp pool poolname Configures a DHCPv6 configuration information pool and
enters DHCPv6 pool configuration mode.
Example:
Router(config)# ipv6 dhcp pool pool1
Step 4 import information refresh Imports the information refresh time option to a DHCPv6
client.
Example:
Router(config-dhcp)# import information refresh
The following task describes how to configure NIS- and NIS+-related server options.
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 dhcp pool poolname
4. nis address ipv6-address
5. nis domain-name domain-name
6. nisp address ipv6-address
7. nisp domain-name domain-name
IPv6C-17
Implementing DHCP for IPv6
How to Implement DHCP for IPv6
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 dhcp pool poolname Configures a DHCPv6 configuration information pool and
enters DHCPv6 pool configuration mode.
Example:
Router(config)# ipv6 dhcp pool pool1
Step 4 nis address ipv6-address Specifies the NIS address of an IPv6 server to be sent to the
client.
Example:
Router(config-dhcp)# nis address
2001:0DB8:1000:1000::30
Step 5 nis domain-name domain-name Enables a server to convey a client’s NIS domain name
information to the client.
Example:
Router(config-dhcp)# nis domain-name domain1
Step 6 nisp address ipv6-address Specifies the NIS+ address of an IPv6 server to be sent to
the DHCPv6 client.
Example:
Router(config-dhcp)# nisp address
2001:0DB8:3000:3000::42
Step 7 nisp domain-name domain-name Enables a server to convey a client’s NIS+ domain name
information to the DHCPv6 client.
Example:
Router(config-dhcp)# nisp domain-name domain2
The following task describes how to import NIS- and NIS+-related server options.
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 dhcp pool poolname
4. import nis address
5. import nis domain-name
IPv6C-18
Implementing DHCP for IPv6
How to Implement DHCP for IPv6
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 dhcp pool poolname Configures a DHCPv6 configuration information pool and
enters DHCPv6 pool configuration mode.
Example:
Router(config)# ipv6 dhcp pool pool1
Step 4 import nis address Imports the NIS servers option to a DHCPv6 client.
Example:
Router(config-dhcp)# import nis address
Step 5 import nis domain-name Imports the NIS domain name option to a DHCPv6 client.
Example:
Router(config-dhcp)# import nis domain-name
Step 6 import nisp address Imports the NISP address option to a DHCPv6 client.
Example:
Router(config-dhcp)# import nisp address
Step 7 import nisp domain-name Imports the NISP domain name option to a DHCPv6 client.
Example:
Router(config-dhcp)# import nisp domain-name
The following task describes how to import SIP server options to the outbound SIP proxy server.
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 dhcp pool poolname
4. import sip address
IPv6C-19
Implementing DHCP for IPv6
How to Implement DHCP for IPv6
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 dhcp pool poolname Configures a DHCPv6 configuration information pool and
enters DHCPv6 pool configuration mode.
Example:
Router(config)# ipv6 dhcp pool pool1
Step 4 import sip address Imports the SIP server IPv6 address list option to the
outbound SIP proxy server.
Example:
Router(config-dhcp)# import sip address
Step 5 import sip domain-name Imports a SIP server domain-name list option to the
outbound SIP proxy server.
Example:
Router(config-dhcp)# import sip domain-name
The following task describes how to configure the SNTP server option.
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 dhcp pool poolname
4. sntp address ipv6-address
5. import sntp address ipv6-address
IPv6C-20
Implementing DHCP for IPv6
How to Implement DHCP for IPv6
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 dhcp pool poolname Configures a DHCPv6 configuration information pool and
enters DHCPv6 pool configuration mode.
Example:
Router(config)# ipv6 dhcp pool pool1
Step 4 sntp address ipv6-address Specifies the SNTP server list to be sent to the client.
Example:
Router(config-dhcp)# sntp address
2001:0DB8:2000:2000::33
Step 5 import sntp address ipv6-address Imports the SNTP server option to a DHCPv6 client.
Example:
Router(config-dhcp)# import sntp address
2001:0DB8:2000:2000::33
The following task describes how to import the SNTP server option.
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 dhcp pool poolname
4. import sntp address ipv6-address
IPv6C-21
Implementing DHCP for IPv6
How to Implement DHCP for IPv6
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 dhcp pool poolname Configures a DHCPv6 configuration information pool and
enters DHCPv6 pool configuration mode.
Example:
Router(config)# ipv6 dhcp pool pool1
Step 4 import sntp address ipv6-address Imports the SNTP server option to a DHCPv6 client.
Example:
Router(config-dhcp)# import sntp address
2001:0DB8:2000:2000::33
The following task describes how to import other stateless DHCPv6 server options.
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 dhcp pool poolname
4. import dns-server
5. import domain-name
DETAILED STEPS
Example:
Router# configure terminal
IPv6C-22
Implementing DHCP for IPv6
How to Implement DHCP for IPv6
Example:
Router(config-dhcp)# import domain-name
Defining a General Prefix with the DHCPv6 Prefix Delegation Client Function
The following task describes how to configure the DHCPv6 client function on an interface and enable
prefix delegation on an interface. The delegated prefix is stored in a general prefix.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ipv6 dhcp client pd {prefix-name | hint ipv6-prefix} [rapid-commit]
DETAILED STEPS
Example:
Router# configure terminal
IPv6C-23
Implementing DHCP for IPv6
How to Implement DHCP for IPv6
SUMMARY STEPS
1. enable
2. clear ipv6 dhcp client interface-type interface-number
DETAILED STEPS
Example:
Router# clear ipv6 dhcp client Ethernet 1/0
SUMMARY STEPS
1. enable
2. clear ipv6 dhcp binding [ipv6-address]
IPv6C-24
Implementing DHCP for IPv6
How to Implement DHCP for IPv6
DETAILED STEPS
Troubleshooting DHCPv6
This task provides commands you can use as needed to troubleshoot your DHCPv6 configuration.
SUMMARY STEPS
1. enable
2. debug ipv6 dhcp [detail]
3. debug ipv6 dhcp database
4. debug ipv6 dhcp relay
DETAILED STEPS
Example:
Router# debug ipv6 dhcp
Step 3 debug ipv6 dhcp database Enables debugging for the DHCPv6 binding database.
Example:
Router# debug ipv6 dhcp database
Step 4 debug ipv6 dhcp relay Enables DHCPv6 relay agent debugging.
Example:
Router# debug ipv6 dhcp relay
IPv6C-25
Implementing DHCP for IPv6
How to Implement DHCP for IPv6
SUMMARY STEPS
1. enable
2. show ipv6 dhcp
3. show ipv6 dhcp binding [ipv6-address]
4. show ipv6 dhcp database [agent-URL]
5. show ipv6 dhcp interface [type number]
6. show ipv6 dhcp pool [poolname]
7. show running-config
DETAILED STEPS
Example:
Router# show ipv6 dhcp
Step 3 show ipv6 dhcp binding [ipv6-address] Displays automatic client bindings from the DHCPv6
database.
Example:
Router# show ipv6 dhcp binding
Step 4 show ipv6 dhcp database [agent-URL] Displays the DHCPv6 binding database agent information.
Example:
Router# show ipv6 dhcp database
Step 5 show ipv6 dhcp interface [type number] Displays DHCPv6 interface information.
Example:
Router# show ipv6 dhcp interface
IPv6C-26
Implementing DHCP for IPv6
How to Implement DHCP for IPv6
Example:
Router# show ipv6 dhcp pool
Step 7 show running-config Displays the current configuration running on the router.
Example:
Router# show running-config
Examples
This section provides the following output examples:
• Sample Output for the show ipv6 dhcp Command, page 27
• Sample Output for the show ipv6 dhcp binding Command, page 27
• Sample Output for the show ipv6 dhcp database Command, page 27
• Sample Output for the show ipv6 dhcp interface Command, page 28
• Sample Output for the show ipv6 dhcp pool Command, page 29
IPv6C-27
Implementing DHCP for IPv6
How to Implement DHCP for IPv6
IPv6C-28
Implementing DHCP for IPv6
Configuration Examples for Implementing DHCPv6
IPv6C-29
Implementing DHCP for IPv6
Configuration Examples for Implementing DHCPv6
IPv6C-30
Implementing DHCP for IPv6
Configuration Examples for Implementing DHCPv6
The client has no obvious DHCPv6 configuration. However, the ipv6 address autoconfig command on
the uplink to the service provider (Ethernet 0/0) causes two things to happen:
• Addresses are autoconfigured on the interface, based on prefixes in RA messages received from the
server.
• If received RA messages have the “other configuration” flag set, the interface will attempt to acquire
other (for example, nonaddress) configuration from any DHCPv6 servers.
interface Ethernet 0/0
description Access link up to provider
ipv6 address autoconfig
IPv6C-31
Implementing DHCP for IPv6
Additional References
Additional References
The following sections provide references related to the Implementing DHCPv6 feature:
Related Documents
Related Topic Document Title
IPv6 supported feature list “Start Here: Cisco IOS Software Release Specifics for IPv6
Features,” Cisco IOS IPv6 Configuration Guide
IPv6 basic connectivity “Implementing IPv6 Addressing and Basic Connectivity,” Cisco IOS
IPv6 Configuration Guide
IPv6 prefix delegation “Implementing IPv6 Addressing and Basic Connectivity,” Cisco IOS
IPv6 Configuration Guide
“Implementing ADSL and Deploying Dial Access for IPv6,” Cisco
IOS IPv6 Configuration Guide
IPv6 commands: complete command syntax, command Cisco IOS IPv6 Command Reference
mode, defaults, usage guidelines, and examples
Standards
Standards Title
No new or modified standards are supported by this —
feature, and support for existing standards has not been
modified by this feature.
MIBs
MIBs MIBs Link
No new or modified MIBs are supported, and support To locate and download MIBs for selected platforms, Cisco IOS
for existing MIBs has not been modified. releases, and feature sets, use Cisco MIB Locator found at the
following URL:
http://www.cisco.com/go/mibs
RFCs
RFCs Title
RFC 3315 Dynamic Host Configuration Protocol for IPv6
RFC 3319 Dynamic Host Configuration Protocol (DHCPv6) Options for
Session Initiation Protocol (SIP) Servers
RFC 3633 IPv6 Prefix Options for Dynamic Host Configuration Protocol
(DHCP) Version 6
IPv6C-32
Implementing DHCP for IPv6
Command Reference
RFCs Title
RFC 3646 DNS Configuration Options for Dynamic Host Configuration
Protocol for IPv6 (DHCPv6)
RFC 3898 Network Information Service (NIS) Configuration Options for
Dynamic Host Configuration Protocol for IPv6 (DHCPv6)
RFC 4075 Simple Network Time Protocol (SNTP) Configuration Option for
DHCPv6
RFC 4242 Information Refresh Time Option for Dynamic Host Configuration
Protocol for IPv6 (DHCPv6)
RFC 4649 Dynamic Host Configuration Protocol for IPv6 (DHCPv6) Relay
Agent Remote-ID Option
Technical Assistance
Description Link
The Cisco Support website provides extensive online http://www.cisco.com/techsupport
resources, including documentation and tools for
troubleshooting and resolving technical issues with
Cisco products and technologies.
To receive security and technical information about
your products, you can subscribe to various services,
such as the Product Alert Tool (accessed from Field
Notices), the Cisco Technical Services Newsletter, and
Really Simple Syndication (RSS) Feeds.
Access to most tools on the Cisco Support website
requires a Cisco.com user ID and password.
Command Reference
The following commands are introduced or modified in the feature or features documented in this
module. For information about these commands, see the Cisco IOS IPv6 Command Reference at
http://www.cisco.com/en/US/docs/ios/ipv6/command/reference/ipv6_book.html. For information about
all Cisco IOS commands, use the Command Lookup Tool at http://tools.cisco.com/Support/CLILookup
or the Cisco IOS Master Command List, All Releases, at
http://www.cisco.com/en/US/docs/ios/mcl/all_release/all_mcl.html.
• clear ipv6 dhcp binding
• clear ipv6 dhcp client
• debug ipv6 dhcp
• debug ipv6 dhcp database
• debug ipv6 dhcp relay
• dns-server (IPv6)
• domain-name (IPv6)
• import dns-server
IPv6C-33
Implementing DHCP for IPv6
Command Reference
• import domain-name
• import information refresh
• import nis address
• import nis domain-name
• import nisp address
• import nisp domain-name
• import sip address
• import sip domain-name
• import sntp address
• information refresh
• ipv6 address autoconfig
• ipv6 dhcp client information refresh minimum
• ipv6 dhcp client pd
• ipv6 dhcp database
• ipv6 dhcp pool
• ipv6 dhcp relay destination
• ipv6 dhcp server
• ipv6 nd other-config-flag
• ipv6 source-route
• nis address
• nis domain-name
• nisp address
• nisp domain-name
• prefix-delegation
• prefix-delegation pool
• show ipv6 dhcp
• show ipv6 dhcp binding
• show ipv6 dhcp database
• show ipv6 dhcp interface
• show ipv6 dhcp pool
• sntp address
IPv6C-34
Implementing DHCP for IPv6
Feature Information for Implementing DHCP for IPv6
Note Table 1 lists only the Cisco IOS software release that introduced support for a given feature in a given
Cisco IOS software release train. Unless noted otherwise, subsequent releases of that Cisco IOS
software release train also support that feature.
IPv6C-35
Implementing DHCP for IPv6
Feature Information for Implementing DHCP for IPv6
IPv6C-36
Implementing DHCP for IPv6
Feature Information for Implementing DHCP for IPv6
CCDE, CCENT, Cisco Eos, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, Cisco TelePresence, the Cisco logo, DCE, and Welcome to the Human
Network are trademarks; Changing the Way We Work, Live, Play, and Learn and Cisco Store are service marks; and Access Registrar, Aironet,
AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork
Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation,
EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, iQ
Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone, MeetingPlace,
MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare,
SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx logo
are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply
a partnership relationship between Cisco and any other company. (0807R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and
figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and
coincidental.
IPv6C-37
Implementing DHCP for IPv6
Feature Information for Implementing DHCP for IPv6
IPv6C-38
Implementing IPsec in IPv6 Security
Cisco IOS IPv6 security features for your Cisco networking devices can protect your network against
degradation or failure and also against data loss or compromise resulting from intentional attacks and
from unintended but damaging mistakes by well-meaning network users.
Cisco IOS IPsec functionality provides network data encryption at the IP packet level, offering a robust,
standards-based security solution. IPsec provides data authentication and anti-replay services in addition
to data confidentiality services.
IPsec is a mandatory component of IPv6 specification. OSPF for IPv6 provides IPsec authentication
support and protection, and IPv6 IPsec tunnel mode and encapsulation is used to protect IPv6 unicast
and multicast traffic.
Finding Support Information for Platforms and Cisco IOS and Catalyst OS Software Images
Use Cisco Feature Navigator to find information about platform support and Cisco IOS and Catalyst OS
software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An
account on Cisco.com is not required.
Contents
• Prerequisites for Implementing IPsec for IPv6 Security, page 2
• Information About Implementing IPsec for IPv6 Security, page 2
• How to Implement IPsec for IPv6 Security, page 4
• Configuration Examples for IPsec for IPv6 Security, page 19
Americas Headquarters:
Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA
IPv6C-2
Implementing IPsec in IPv6 Security
Information About Implementing IPsec for IPv6 Security
IPv6C-3
Implementing IPsec in IPv6 Security
How to Implement IPsec for IPv6 Security
146001
Native IPv6-AH/ESP-IPv6
encapsulation
When the IPsec tunnel is configured, IKE and IPsec security associations (SAs) are negotiated and set
up before the line protocol for the tunnel interface is changed to the UP state. The remote IKE peer is
the same as the tunnel destination address; the local IKE peer will be the address picked from tunnel
source interface which has the same IPv6 address scope as tunnel destination address.
Figure 2 shows the IPsec packet format.
146205
(except for mutable fields)
For further information on IPsec VTI, see the IPsec Virtual Tunnel Interface module in Cisco IOS
Release 12.3(14)T.
IPv6C-4
Implementing IPsec in IPv6 Security
How to Implement IPsec for IPv6 Security
Note If you are interoperating with a device that supports only one of the values for a parameter, your choice
is limited to the value supported by the other device. Aside from this limitation, there is often a trade-off
between security and performance, and many of these parameter values represent such a trade-off. You
should evaluate the level of security risks for your network and your tolerance for these risks.
When the IKE negotiation begins, IKE searches for an IKE policy that is the same on both peers. The
peer that initiates the negotiation will send all its policies to the remote peer, and the remote peer will
try to find a match. The remote peer looks for a match by comparing its own highest priority policy
against the policies received from the other peer. The remote peer checks each of its policies in order of
its priority (highest priority first) until a match is found.
A match is made when both policies from the two peers contain the same encryption, hash,
authentication, and Diffie-Hellman parameter values, and when the remote peer’s policy specifies a
lifetime that is less than or equal to the lifetime in the policy being compared. (If the lifetimes are not
identical, the shorter lifetime—from the remote peer’s policy—will be used.)
If a match is found, IKE will complete negotiation, and IPsec security associations will be created. If no
acceptable match is found, IKE refuses negotiation and IPsec will not be established.
Note Depending on which authentication method is specified in a policy, additional configuration might be
required. If a peer’s policy does not have the required companion configuration, the peer will not submit
the policy when attempting to find a matching policy with the remote peer.
IPv6C-5
Implementing IPsec in IPv6 Security
How to Implement IPsec for IPv6 Security
You should set the ISAKMP identity for each peer that uses preshared keys in an IKE policy.
When two peers use IKE to establish IPsec SAs, each peer sends its identity to the remote peer. Each
peer sends either its hostname or its IPv6 address, depending on how you have set the ISAKMP identity
of the router.
By default, a peer’s ISAKMP identity is the IPv6 address of the peer. If appropriate, you could change
the identity to be the peer’s hostname instead. As a general rule, set the identities of all peers the same
way—either all peers should use their IPv6 addresses or all peers should use their hostnames. If some
peers use their hostnames and some peers use their IPv6 addresses to identify themselves to each other,
IKE negotiations could fail if the identity of a remote peer is not recognized and a DNS lookup is unable
to resolve the identity.
SUMMARY STEPS
1. enable
2. configure terminal
3. crypto isakmp policy priority
4. authentication {rsa-sig | rsa-encr | pre-share}
5. hash {sha | md5}
6. group {1 | 2 | 5}
7. encryption {des | 3des | aes | aes 192 | aes 256}
8. lifetime seconds
9. exit
10. crypto isakmp key password-type keystring {address peer-address [mask] | ipv6
{ipv6-address/ipv6-prefix} | hostname hostname} [no-xauth]
11. crypto keyring keyring-name [vrf fvrf-name]
12. pre-shared-key {address address [mask] | hostname hostname | ipv6 {ipv6-address | ipv6-prefix}}
key key
DETAILED STEPS
Example:
Router# configure terminal
IPv6C-6
Implementing IPsec in IPv6 Security
How to Implement IPsec for IPv6 Security
Example:
Router(config-isakmp-policy)# hash md5
Step 6 group {1 | 2 | 5} Specifies the Diffie-Hellman group identifier within an IKE
policy.
Example:
Router(config-isakmp-policy)# group 2
Step 7 encryption {des | 3des | aes | aes 192 | aes Specifies the encryption algorithm within an IKE policy.
256}
Example:
Router(config-isakmp-policy)# encryption 3des
Step 8 lifetime seconds Specifies the lifetime of an IKE SA. Setting the IKE
lifetime value is optional.
Example:
Router(config-isakmp-policy)# lifetime 43200
Step 9 exit Enter this command to exit ISAKMP policy configuration
mode and enter global configuration mode.
Example:
Router(config-isakmp-policy)# exit
Step 10 crypto isakmp key enc-type-digit keystring Configures a preshared authentication key.
{address peer-address [mask] | ipv6
{ipv6-address/ipv6-prefix} | hostname hostname}
[no-xauth]
Example:
Router(config)# crypto isakmp key 0
my-preshare-key-0 address ipv6 3ffe:1001::2/128
IPv6C-7
Implementing IPsec in IPv6 Security
How to Implement IPsec for IPv6 Security
Example:
Router (config-keyring)# pre-shared-key ipv6
3FFE:2002::A8BB:CCFF:FE01:2C02/128
Note You likely do not need to configure aggressive mode in a site-to-site scenario. The default mode is
typically used.
SUMMARY STEPS
1. enable
2. configure terminal
3. crypto isakmp peer {address {ipv4-address | ipv6 ipv6-address ipv6-prefix-length} | hostname
fqdn-hostname}
4. set aggressive-mode client-endpoint {client-endpoint | ipv6 ipv6-address}
DETAILED STEPS
Example:
Router# configure terminal
IPv6C-8
Implementing IPsec in IPv6 Security
How to Implement IPsec for IPv6 Security
Example:
Router(config)# crypto isakmp peer address ipv6
3FFE:2002::A8BB:CCFF:FE01:2C02/128
Step 4 set aggressive-mode client-endpoint Defines the remote peer’s IPv6 address, which will be used
{client-endpoint | ipv6 ipv6-address} by aggressive mode negotiation. The remote peer’s address
is usually the client side’s end-point address.
Example:
Router(config-isakmp-peer)# set aggressive mode
client-endpoint ipv6
3FFE:2002::A8BB:CCFF:FE01:2C02/128
SUMMARY STEPS
1. enable
2. configure terminal
3. crypto ipsec transform-set transform-set-name transform1 [transform2] [transform3]
[transform4]
4. crypto ipsec profile name
5. set transform-set transform-set-name [transform-set-name2...transform-set-name6]
DETAILED STEPS
Example:
Router# configure terminal
IPv6C-9
Implementing IPsec in IPv6 Security
How to Implement IPsec for IPv6 Security
Example:
Router(config)# crypto ipsec transform-set
myset0 ah-sha-hmac esp-3des
Step 4 crypto ipsec profile name Defines the IPsec parameters that are to be used for IPsec
encryption between two IPsec routers.
Example:
Router(config)# crypto ipsec profile profile0
Step 5 set transform-set transform-set-name Specifies which transform sets can be used with the crypto
[transform-set-name2...transform-set-name6] map entry.
Example:
Router
(config-crypto-transform)# set-transform-set
myset0
SUMMARY STEPS
1. enable
2. configure terminal
3. crypto isakmp profile profile-name [accounting aaalist]
4. self-identity {address | address ipv6] | fqdn | user-fqdn user-fqdn}
5. match identity {group group-name | address {address [mask] [fvrf] | ipv6 ipv6-address} | host
host-name | host domain domain-name | user user-fqdn | user domain domain-name}
DETAILED STEPS
Example:
Router# configure terminal
IPv6C-10
Implementing IPsec in IPv6 Security
How to Implement IPsec for IPv6 Security
Example:
Router(config)# crypto ipsec profile profile1
Step 4 self-identity {address | address ipv6] | fqdn | Defines the identity that the local IKE uses to identify itself
user-fqdn user-fqdn} to the remote peer.
Example:
Router(config-isakmp-profile)# self-identity
address ipv6
Step 5 match identity {group group-name | address Matches an identity from a remote peer in an ISAKMP
{address [mask] [fvrf] | ipv6 ipv6-address} | profile.
host host-name | host domain domain-name | user
user-fqdn | user domain domain-name}
Example:
Router(config-isakmp-profile)# match identity
address ipv6 3FFE:2002::A8BB:CCFF:FE01:2C02/128
Prerequisites
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 unicast-routing
4. interface tunnel tunnel-number
5. ipv6 address ipv6-address/prefix
6. ipv6 enable
7. tunnel source {ip-address | ipv6-address | interface-type interface-number}
8. tunnel destination {host-name | ip-address | ipv6-address}
9. tunnel mode {aurp | cayman | dvmrp | eon | gre | gre multipoint | gre ipv6 | ipip
[decapsulate-any] | ipsec ipv4 | iptalk | ipv6 | ipsec ipv6 | mpls | nos | rbscp}
10. tunnel protection ipsec profile name [shared]
IPv6C-11
Implementing IPsec in IPv6 Security
How to Implement IPsec for IPv6 Security
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 unicast-routing Enables IPv6 unicast routing. You only need to enable IPv6
unicast routing once, not matter how many interface tunnels
you want to configure.
Example:
Router(config)# ipv6 unicast-routing
Step 4 interface tunnel tunnel-number Specifies a tunnel interface and number, and enters interface
configuration mode.
Example:
Router(config)# interface tunnel 0
Step 5 ipv6 address ipv6-address/prefix Provides an IPv6 address to this tunnel interface, so that
IPv6 traffic can be routed to this tunnel.
Example:
Router(config-if)# ipv6 address
3FFE:C000:0:7::/64 eui-64
Step 6 ipv6 enable Enables IPv6 on this tunnel interface.
Example:
Router(config-if)# ipv6 enable
Step 7 tunnel source {ip-address | ipv6-address | Sets the source address for a tunnel interface.
interface-type interface-number}
Example:
Router(config-if)# tunnel source ethernet0
Step 8 tunnel destination {host-name | ip-address | Specifies the destination for a tunnel interface.
ipv6-address}
Example:
Router(config-if)# tunnel destination
2001:0DB8:1111:2222::1
IPv6C-12
Implementing IPsec in IPv6 Security
How to Implement IPsec for IPv6 Security
Example:
Router(config-if)# tunnel mode ipsec ipv6
Step 10 tunnel protection ipsec profile name [shared] Associates a tunnel interface with an IPsec profile. IPv6
does not support the shared keyword.
Example:
Router(config-if)# tunnel protection ipsec
profile profile1
SUMMARY STEPS
IPv6C-13
Implementing IPsec in IPv6 Security
How to Implement IPsec for IPv6 Security
DETAILED STEPS
Example:
Router# show adjacency detail
Step 2 show crypto engine {accelerator | brief | Displays a summary of the configuration information for
configuration | connections [active | dh | the crypto engines.
dropped-packet | show] | qos}
Example:
Router# show crypto engine connection active
Step 3 show crypto ipsec sa [ipv6] [interface-type Displays the settings used by current SAs in IPv6.
interface-number] [detailed]
Example:
Router# show crypto ipsec sa ipv6
Step 4 show crypto isakmp peer [config | detail] Displays peer descriptions.
Example:
Router# show crypto isakmp peer detail
Step 5 show crypto isakmp policy Displays the parameters for each IKE policy.
Example:
Router# show crypto isakmp policy
Step 6 show crypto map [interface interface | tag Displays the crypto map configuration.
map-name]
The crypto maps shown in this command output are
dynamically generated. The user does not have to configure
Example: crypto maps.
Router# show crypto map
Step 7 show crypto session [detail] | [local Displays status information for active crypto sessions.
ip-address [port local-port] | [remote
ip-address [port remote-port]] | [detail]] | IPv6 does not support the fvfr or ivrf keywords or the
[fvfr vrf-name] | [ivrf vrf-name] vrf-name argument.
Example:
Router# show crypto session
Step 8 show crypto socket Lists crypto sockets.
Example:
Router# show crypto socket
IPv6C-14
Implementing IPsec in IPv6 Security
How to Implement IPsec for IPv6 Security
Example:
Router# show ipv6 access-list
Step 10 show ipv6 cef [ipv6-prefix/prefix-length] | Displays entries in the IPv6 Forwarding Information Base
[interface-type interface-number] (FIB).
[longer-prefixes | similar-prefixes | detail |
internal | platform | epoch | source]]
Example:
Router# show ipv6 cef
Step 11 show interface type number stats Displays numbers of packets that were process switched,
fast switched, and distributed switched.
Example:
Router# show interface fddi 3/0/0 stats
SUMMARY STEPS
1. enable
2. debug crypto ipsec [error]
3. debug crypto engine packet [detail] [error]
DETAILED STEPS
Example:
Router# debug crypto ipsec
Step 3 debug crypto engine packet [detail] Displays the contents of IPv6 packets.
Example:
Caution Using this command could flood the system and
Router# debug crypto engine packet
increase CPU if several packets are being
encrypted.
IPv6C-15
Implementing IPsec in IPv6 Security
How to Implement IPsec for IPv6 Security
Examples
This section provides the following output examples:
• Sample Output for the show crypto ipsec sa Command, page 16
• Sample Output for the show crypto isakmp peer Command, page 17
• Sample Output for the show crypto isakmp profile Command, page 17
• Sample Output for the show crypto isakmp sa Command, page 18
• Sample Output for the show crypto map Command, page 18
• Sample Output for the show crypto session Command, page 18
interface: Tunnel0
Crypto map tag: Tunnel0-head-0, local addr 3FFE:2002::A8BB:CCFF:FE01:9002
inbound ah sas:
spi: 0x967698CB(2524354763)
transform: ah-sha-hmac ,
in use settings ={Tunnel, }
conn id: 93, flow_id: SW:93, crypto map: Tunnel0-head-0
sa timing: remaining key lifetime (k/sec): (4397507/147)
replay detection support: Y
Status: ACTIVE
IPv6C-16
Implementing IPsec in IPv6 Security
How to Implement IPsec for IPv6 Security
transform: esp-des ,
in use settings ={Tunnel, }
conn id: 94, flow_id: SW:94, crypto map: Tunnel0-head-0
sa timing: remaining key lifetime (k/sec): (4397508/147)
IV size: 8 bytes
replay detection support: Y
Status: ACTIVE
outbound ah sas:
spi: 0xA83E05B5(2822636981)
transform: ah-sha-hmac ,
in use settings ={Tunnel, }
conn id: 94, flow_id: SW:94, crypto map: Tunnel0-head-0
sa timing: remaining key lifetime (k/sec): (4397508/147)
replay detection support: Y
Status: ACTIVE
IPv6C-17
Implementing IPsec in IPv6 Security
How to Implement IPsec for IPv6 Security
dst: 3FFE:2002::A8BB:CCFF:FE01:2C02
src: 3FFE:2002::A8BB:CCFF:FE01:9002
conn-id: 1001 I-VRF: Status: ACTIVE Encr: des Hash: sha Auth:
psk
DH: 1 Lifetime: 23:45:00 Cap: D Engine-id:Conn-id = SW:1
dst: 3FFE:2002::A8BB:CCFF:FE01:2C02
src: 3FFE:2002::A8BB:CCFF:FE01:9002
conn-id: 1002 I-VRF: Status: ACTIVE Encr: des Hash: sha Auth: psk
DH: 1 Lifetime: 23:45:01 Cap: D Engine-id:Conn-id = SW:2
IPv6C-18
Implementing IPsec in IPv6 Security
Configuration Examples for IPsec for IPv6 Security
Interface: Tunnel1
Session status: UP-ACTIVE
Peer: 2001:1::1 port 500 fvrf: (none) ivrf: (none)
Phase1_id: 2001:1::1
Desc: (none)
IKE SA: local 2001:1::2/500
remote 2001:1::1/500 Active
Capabilities:(none) connid:14001 lifetime:00:04:32
IPSEC FLOW: permit ipv6 ::/0 ::/0
Active SAs: 4, origin: crypto map
Inbound: #pkts dec'ed 42641 drop 0 life (KB/Sec) 4534375/72
Outbound: #pkts enc'ed 6734980 drop 0 life (KB/Sec) 2392402/72
IPv6C-19
Implementing IPsec in IPv6 Security
Additional References
Additional References
The following sections provide references related to the Implementing IPsec in IPv6 Security feature.
Related Documents
Standards
Standards Title
No new or modified standards are supported by this —
feature, and support for existing standards has not been
modified by this feature.
MIBs
IPv6C-20
Implementing IPsec in IPv6 Security
Additional References
RFCs
RFCs Title
RFC 2401 Security Architecture for the Internet Protocol
RFC 2402 IP Authentication Header
RFC 2404 The Use of Hash Message Authentication Code Federal Information
Processing Standard 180-1 within Encapsulating Security Payload
and Authentication Header
RFC 2406 IP Encapsulating Security Payload (ESP)
RFC 2407 The Internet Security Domain of Interpretation for ISAKMP
RFC 2408 Internet Security Association and Key Management Protocol
(ISAKMP)
RFC 2409 Internet Key Exchange (IKE)
RFC 2460 Internet Protocol, Version 6 (IPv6) Specification
RFC 2474 Definition of the Differentiated Services Field (DS Field) in the IPv4
and IPv6 Headers
RFC 3576 Change of Authorization
RFC 4109 Algorithms for Internet Key Exchange version 1 (IKEv1)
RFC 4302 IP Authentication Header
RFC 4306 Internet Key Exchange (IKEv2) Protocol
RFC 4308 Cryptographic Suites for IPsec
Technical Assistance
Description Link
The Cisco Support website provides extensive online http://www.cisco.com/techsupport
resources, including documentation and tools for
troubleshooting and resolving technical issues with
Cisco products and technologies.
To receive security and technical information about
your products, you can subscribe to various services,
such as the Product Alert Tool (accessed from Field
Notices), the Cisco Technical Services Newsletter, and
Really Simple Syndication (RSS) Feeds.
Access to most tools on the Cisco Support website
requires a Cisco.com user ID and password.
IPv6C-21
Implementing IPsec in IPv6 Security
Command Reference
Command Reference
The following commands are introduced or modified in the feature or features documented in this
module. For information about these commands, see the Cisco IOS IPv6 Command Reference at
http://www.cisco.com/en/US/docs/ios/ipv6/command/reference/ipv6_book.html. For information about
all Cisco IOS commands, use the Command Lookup Tool at http://tools.cisco.com/Support/CLILookup
or the Cisco IOS Master Command List, All Releases, at
http://www.cisco.com/en/US/docs/ios/mcl/all_release/all_mcl.html.
• authentication (IKE policy)
• crypto ipsec profile
• crypto isakmp identity
• crypto isakmp key
• crypto isakmp peer
• crypto isakmp policy
• crypto isakmp profile
• crypto keyring
• debug crypto ipv6 ipsec
• debug crypto ipv6 packet
• deny (IPv6)
• encryption (IKE policy)
• group (IKE policy)
• hash (IKE policy)
• lifetime (IKE policy)
• match identity
• permit (IPv6)
• pre-shared-key
• self-identity
• set aggressive-mode client-endpoint
• set transform-set
• show crypto engine
• show crypto ipsec policy
• show crypto ipsec sa
• show crypto isakmp key
• show crypto isakmp peers
• show crypto isakmp policy
• show crypto isakmp profile
• show crypto map (IPsec)
• show crypto session
• show crypto socket
IPv6C-22
Implementing IPsec in IPv6 Security
Feature Information for Implementing IPsec in IPv6 Security
Note Table 1 lists only the Cisco IOS software release that introduced support for a given feature in a given
Cisco IOS software release train. Unless noted otherwise, subsequent releases of that Cisco IOS
software release train also support that feature.
CCDE, CCENT, Cisco Eos, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, Cisco TelePresence, the Cisco logo, DCE, and Welcome to the Human
Network are trademarks; Changing the Way We Work, Live, Play, and Learn and Cisco Store are service marks; and Access Registrar, Aironet,
AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork
Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation,
EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, iQ
Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone, MeetingPlace,
MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare,
SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx logo
are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
IPv6C-23
Implementing IPsec in IPv6 Security
Feature Information for Implementing IPsec in IPv6 Security
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply
a partnership relationship between Cisco and any other company. (0807R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and
figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and
coincidental.
IPv6C-24
Implementing IS-IS for IPv6
This module describes how to configure Integrated Intermediate System-to-Intermediate System (IS-IS)
for IPv6. IS-IS is an Interior Gateway Protocol (IGP) that advertises link-state information throughout
the network to create a picture of the network topology. IS-IS is an Open Systems Interconnection (OSI)
hierarchical routing protocol that designates an intermediate system as a Level 1 or Level 2 device.
Level 2 devices route between Level 1 areas to create an intradomain routing backbone. Integrated IS-IS
uses a single routing algorithm to support several network address families, such as IPv6, IPv4, and OSI.
Finding Support Information for Platforms and Cisco IOS and Catalyst OS Software Images
Use Cisco Feature Navigator to find information about platform support and Cisco IOS and Catalyst OS
software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An
account on Cisco.com is not required.
Contents
• Prerequisites for Implementing IS-IS for IPv6, page 2
• Restrictions for Implementing IS-IS for IPv6, page 2
• Information About Implementing IS-IS for IPv6, page 2
• How to Implement IS-IS for IPv6, page 4
• Configuration Examples for IPv6 IS-IS, page 19
• Additional References, page 20
• Command Reference, page 22
• Feature Information for Implementing IS-IS for IPv6, page 24
Americas Headquarters:
Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA
2
Implementing IS-IS for IPv6
Information About Implementing IS-IS for IPv6
3
Implementing IS-IS for IPv6
How to Implement IS-IS for IPv6
For further information on the IPv6 IS-IS local RIB, see the Verifying IPv6 IS-IS Configuration and
Operation section.
Note The following sections describe the configuration tasks for creating an IPv6 IS-IS routing process and
enabling the routing process on interfaces. The following sections do not provide in-depth information
on customizing IS-IS because the protocol functions the same in IPv6 as it does in IPv4. Refer to the
publications referenced in the “Related Documents” section for further IPv6 and IPv4 configuration and
command reference information.
The tasks in the following sections explain how to configure IPv6 IS-IS. Each task in the list is identified
as either required or optional:
• Configuring Single-Topology IS-IS for IPv6, page 4 (required)
• Configuring Multitopology IS-IS for IPv6, page 6 (optional)
• Customizing IPv6 IS-IS, page 7 (optional)
• Redistributing Routes into an IPv6 IS-IS Routing Process, page 10 (optional)
• Redistributing IPv6 IS-IS Routes Between IS-IS Levels, page 11 (optional)
• Disabling IPv6 Protocol-Support Consistency Checks, page 12 (optional)
• Verifying IPv6 IS-IS Configuration and Operation, page 14 (optional)
Prerequisites
Before configuring the router to run IPv6 IS-IS, globally enable IPv6 using the ipv6 unicast-routing
global configuration command. For details on basic IPv6 connectivity tasks, refer to the Implementing
Basic Connectivity for IPv6 module.
Restrictions
If you are using IS-IS single-topology support for IPv6, IPv4, or both IPv6 and IPv4, you may configure
both IPv6 and IPv4 on an IS-IS interface for Level 1, Level 2, or both Level 1 and Level 2. However, if
both IPv6 and IPv4 are configured on the same interface, they must be running the same IS-IS level. That
is, IPv4 cannot be configured to run on IS-IS Level 1 only on a specified Ethernet interface while IPv6
is configured to run IS-IS Level 2 only on the same Ethernet interface.
4
Implementing IS-IS for IPv6
How to Implement IS-IS for IPv6
SUMMARY STEPS
1. enable
2. configure terminal
3. router isis area-tag
4. net network-entity-title
5. exit
6. interface type number
7. ipv6 address {ipv6-address/prefix-length | prefix-name sub-bits/prefix-length}
8. ipv6 router isis area-name
DETAILED STEPS
Example:
Router# configure terminal
Step 3 router isis area-tag Enables IS-IS for the specified IS-IS routing process, and
enters router configuration mode.
Example:
Router(config)# router isis area2
Step 4 net network-entity-title Configures an IS-IS network entity title (NET) for the
routing process.
Example: • The network-entity-title argument defines the area
Router(config-router)# net addresses for the IS-IS area and the system ID of the
49.0001.0000.0000.000c.00 router.
Note For more details about the format of the
network-entity-title argument, refer to the
“Configuring ISO CLNS” chapter in Cisco IOS
Apollo Domain, Banyan VINES, DECnet, IOS
CLNS, XNS Configuration Guide, Release 12.4.
Step 5 exit Exits router configuration mode and enters global
configuration mode.
Example:
Router(config-router)# exit
Step 6 interface type number Specifies the interface type and number, and enters
interface configuration mode.
Example:
Router(config)# interface Ethernet 0/0/1
5
Implementing IS-IS for IPv6
How to Implement IS-IS for IPv6
Prerequisites
Perform the following steps after you have configured IS-IS for IPv6.
SUMMARY STEPS
1. enable
2. configure terminal
3. router isis area-tag
4. metric-style wide [transition] [level-1 | level-2 | level-1-2]
5. address-family ipv6 [unicast | multicast]
6. multi-topology [transition]
6
Implementing IS-IS for IPv6
How to Implement IS-IS for IPv6
DETAILED STEPS
Example:
Router# configure terminal
Step 3 router isis area-tag Enables IS-IS for the specified IS-IS routing process, and
enters router configuration mode.
Example:
Router(config)# router isis area2
Step 4 metric-style wide [transition] [level-1 | Configures a router running IS-IS to generate and accept
level-2 | level-1-2] only new-style TLVs.
Example:
Router(config-router)# metric-style wide
level-1
Step 5 address-family ipv6 [unicast | multicast] Specifies the IPv6 address family, and enters address
family configuration mode.
Example: • The unicast keyword specifies the unicast IPv6 unicast
Router(config-router)# address-family ipv6 address family. By default, the router is placed in
configuration mode for the unicast IPv6 address family
if the unicast keyword is not specified with the
address-family ipv6 command.
Step 6 multi-topology [transition] Enables multitopology IS-IS for IPv6.
• The optional transition keyword allows an IS-IS IPv6
Example: user to continue to use single-topology mode while
Router(config-router-af)# multi-topology upgrading to multitopology mode.
7
Implementing IS-IS for IPv6
How to Implement IS-IS for IPv6
SUMMARY STEPS
1. enable
2. configure terminal
3. router isis area-tag
4. address-family ipv6 [unicast | multicast]
5. default-information originate [route-map map-name]
6. distance value
7. maximum-paths number-paths
8. summary-prefix ipv6-prefix/prefix-length [level-1 | level-1-2 | level-2]
9. prc-interval seconds [initial-wait] [secondary-wait]
10. spf-interval [level-1 | level-2] seconds [initial-wait] [secondary-wait]
11. exit
12. interface type number
13. isis ipv6 metric metric-value [level-1 | level-2 | level-1-2]
DETAILED STEPS
Example:
Router# configure terminal
Step 3 router isis area-tag Enables IS-IS for the specified IS-IS routing process, and
enters router configuration mode.
Example:
Router(config)# router isis area2
Step 4 address-family ipv6 [unicast | multicast] Specifies the IPv6 address family, and enters address family
configuration mode.
Example: • The unicast keyword specifies the unicast IPv6 unicast
Router(config-router)# address-family ipv6 address family. By default, the router is placed in
configuration mode for the unicast IPv6 address family
if the unicast keyword is not specified with the
address-family ipv6 command.
8
Implementing IS-IS for IPv6
How to Implement IS-IS for IPv6
Example:
Router(config-router-af)# prc-interval 20
Step 10 spf-interval [level-1 | level-2] seconds (Optional) Configures how often Cisco IOS software
[initial-wait] [secondary-wait] performs the SPF calculation for multitopology IS-IS for
IPv6.
Example:
Router(config-router-af)# spf-interval 30
9
Implementing IS-IS for IPv6
How to Implement IS-IS for IPv6
Example:
Router(config-if)# isis ipv6 metric 20
SUMMARY STEPS
1. enable
2. configure terminal
3. router isis area-tag
4. address-family ipv6 [unicast | multicast]
5. redistribute source-protocol [process-id] [include-connected] [target-protocol-options]
[source-protocol-options]
DETAILED STEPS
Example:
Router# configure terminal
Step 3 router isis area-tag Enables IS-IS for the specified IS-IS routing process, and
enters router configuration mode.
Example:
Router(config)# router isis area2
10
Implementing IS-IS for IPv6
How to Implement IS-IS for IPv6
SUMMARY STEPS
1. enable
2. configure terminal
3. router isis area-tag
4. address-family ipv6 [unicast | multicast]
5. redistribute isis [process-id] {level-1 | level-2} into {level-1 | level-2} distribute-list list-name
DETAILED STEPS
Example:
Router# configure terminal
Step 3 router isis area-tag Enables IS-IS for the specified IS-IS routing process, and
enters router configuration mode.
Example:
Router(config)# router isis area2
11
Implementing IS-IS for IPv6
How to Implement IS-IS for IPv6
Note Disabling the adjacency-check command can adversely affect your network configuration. Enter the no
adjacency-check command only when you are running IPv4 IS-IS on all your routers and you want to
add IPv6 IS-IS to your network but you need to maintain all your adjacencies during the transition. When
the IPv6 IS-IS configuration is complete, remove the no adjacency-check command from the
configuration.
SUMMARY STEPS
1. enable
2. configure terminal
3. router isis area-tag
4. address-family ipv6 [unicast | multicast]
5. no adjacency-check
12
Implementing IS-IS for IPv6
How to Implement IS-IS for IPv6
DETAILED STEPS
Example:
Router# configure terminal
Step 3 router isis area-tag Enables IS-IS for the specified IS-IS routing process, and
enters router configuration mode.
Example:
Router(config)# router isis area2
Step 4 address-family ipv6 [unicast | multicast] Specifies the IPv6 address family, and enters address family
configuration mode.
Example: • The unicast keyword specifies the unicast IPv6 unicast
Router(config-router)# address-family ipv6 address family. By default, the router is placed in
configuration mode for the unicast IPv6 address family
if the unicast keyword is not specified with the
address-family ipv6 command.
Step 5 no adjacency-check Disables the IPv6 protocol-support consistency checks
performed on hello packets, allowing IPv6 to be introduced
into an IPv4-only network without disrupting existing
Example:
Router(config-router-af)# no adjacency-check
adjacencies.
• The adjacency-check command is enabled by default.
SUMMARY STEPS
1. enable
2. configure terminal
3. router isis area-tag
4. no adjacency-check
13
Implementing IS-IS for IPv6
How to Implement IS-IS for IPv6
DETAILED STEPS
Example:
Router# configure terminal
Step 3 router isis area-tag Enables IS-IS for the specified IS-IS routing process, and
enters router configuration mode.
Example:
Router(config)# router isis area2
Step 4 no adjacency-check Disables the IPv6 protocol-support consistency checks
performed on hello packets, allowing IPv6 to be introduced
into an IPv4-only network without disrupting existing
Example:
Router(config-router-af)# no adjacency-check
adjacencies.
• The adjacency-check command is enabled by default.
SUMMARY STEPS
1. enable
2. show ipv6 protocols [summary]
3. show isis [process-tag] [ipv6 | *] topology
4. show clns [process-tag] neighbors [interface-type interface-number] [area] [detail]
5. show clns area-tag is-neighbors [type number] [detail]
6. show isis [process-tag] database [level-1] [level-2] [l1] [l2] [detail] [lspid]
7. show isis ipv6 rib [ipv6-prefix]
14
Implementing IS-IS for IPv6
How to Implement IS-IS for IPv6
DETAILED STEPS
Example:
Router# show clns neighbors detail
Step 5 show clns area-tag is-neighbors [type number] Displays IS-IS adjacency information for IS-IS neighbors.
[detail]
• Use the detail keyword to display the IPv6 link-local
addresses of the neighbors.
Example:
Router# show clns is-neighbors detail
Step 6 show isis [process-tag] database [level-1] Displays the IS-IS link-state database.
[level-2] [l1] [l2] [detail] [lspid]
• In this example, the contents of each LSP are displayed
using the detail keyword.
Example:
Router# show isis database detail
Step 7 show isis ipv6 rib [ipv6-prefix] Displays the IPv6 local RIB.
Example:
Router# show isis ipv6 rib
Troubleshooting Tips
You can use several system debugging commands to check your IS-IS for IPv6 implementation.
If adjacencies are not coming up properly, use the debug isis adj-packets command.
If you are using IS-IS multitopology for IPv6 and want to display statistical information about building
routes between intermediate systems, use the debug isis spf-statistics command.
To display a log of significant events during an IS-IS SPF computation, use the debug isis spf-events
command.
15
Implementing IS-IS for IPv6
How to Implement IS-IS for IPv6
Examples
This section provides the following output examples:
• Sample Output for the show ipv6 protocols Command
• Sample Output for the show isis topology Command
• Sample Output for the show clns is-neighbors Command
• Sample Output for the show isis database Command
• Sample Output for the show isis ipv6 rib Command
16
Implementing IS-IS for IPv6
How to Implement IS-IS for IPv6
17
Implementing IS-IS for IPv6
How to Implement IS-IS for IPv6
18
Implementing IS-IS for IPv6
Configuration Examples for IPv6 IS-IS
19
Implementing IS-IS for IPv6
Additional References
Where to Go Next
If you want to implement more IPv6 routing protocols, refer to the Implementing RIP for IPv6 or
Implementing Multiprotocol BGP for IPv6 module.
Additional References
The following sections provide references related to the Implementing IS-IS for IPv6 feature.
20
Implementing IS-IS for IPv6
Additional References
Related Documents
Related Topic Document Title
IPv6 supported feature list “Start Here: Cisco IOS Software Release Specifics for IPv6
Features,” Cisco IOS IPv6 Configuration Guide
IPv6 commands: complete command syntax, command Cisco IOS IPv6 Command Reference
mode, command history, defaults, usage guidelines,
and examples
IS-IS configuration tasks “Integrated IS-IS Feature Roadmap,” Cisco IOS IP Routing
Protocols Configuration Guide
IS-IS commands: complete command syntax, Cisco IOS IP Routing Protocols Command Reference
command mode, defaults, usage guidelines, and
examples
Standards
Standards Title
Draft-ietf-isis-ipv6.txt Routing IPv6 with IS-IS, October 31, 2002
Draft-ietf-isis-wg-multi-topology.txt M-ISIS: Multi-Topology (MT) Routing in IS-IS, October 2, 2002
MIBs
MIBs MIBs Link
• CISCO-IETF-IP-FORWARD-MIB To locate and download MIBs for selected platforms, Cisco IOS
• CISCO-IETF-IP-MIB releases, and feature sets, use Cisco MIB Locator found at the
following URL:
http://www.cisco.com/go/mibs
RFCs
RFCs Title
RFC 1195 Use of OSI IS-IS for Routing in TCP/IP and Dual Environments
21
Implementing IS-IS for IPv6
Command Reference
Technical Assistance
Description Link
The Cisco Support website provides extensive online http://www.cisco.com/techsupport
resources, including documentation and tools for
troubleshooting and resolving technical issues with
Cisco products and technologies.
To receive security and technical information about
your products, you can subscribe to various services,
such as the Product Alert Tool (accessed from Field
Notices), the Cisco Technical Services Newsletter, and
Really Simple Syndication (RSS) Feeds.
Access to most tools on the Cisco Support website
requires a Cisco.com user ID and password.
Command Reference
The following commands are introduced or modified in the feature or features documented in this
module. For information about these commands, see the Cisco IOS IPv6 Command Reference at
http://www.cisco.com/en/US/docs/ios/ipv6/command/reference/ipv6_book.html. For information about
all Cisco IOS commands, use the Command Lookup Tool at http://tools.cisco.com/Support/CLILookup
or the Cisco IOS Master Command List, All Releases, at
http://www.cisco.com/en/US/docs/ios/mcl/all_release/all_mcl.html.
• address-family ipv6 (IS-IS)
• adjacency-check
• debug isis spf-events
• default-information originate (IPv6 IS-IS)
• distance (IPv6)
• ipv6 router isis
• isis ipv6 metric
• multi-topology
• prc-interval (IPv6)
• redistribute isis (IPv6)
• router-id (IPv6)
• show clns neighbors
• show ipv6 protocols
• show isis database
• show isis ipv6 rib
• show isis spf-log
• show isis topology
• spf-interval (IPv6)
22
Implementing IS-IS for IPv6
Command Reference
23
Implementing IS-IS for IPv6
Feature Information for Implementing IS-IS for IPv6
Note Table 7 lists only the Cisco IOS software release that introduced support for a given feature in a given
Cisco IOS software release train. Unless noted otherwise, subsequent releases of that Cisco IOS
software release train also support that feature.
24
Implementing IS-IS for IPv6
Feature Information for Implementing IS-IS for IPv6
CCDE, CCENT, Cisco Eos, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, Cisco TelePresence, the Cisco logo, DCE, and Welcome to the Human
Network are trademarks; Changing the Way We Work, Live, Play, and Learn and Cisco Store are service marks; and Access Registrar, Aironet,
AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork
Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation,
EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, iQ
Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone, MeetingPlace,
MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare,
SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx logo
are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply
a partnership relationship between Cisco and any other company. (0807R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and
figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and
coincidental.
25
Implementing IS-IS for IPv6
Feature Information for Implementing IS-IS for IPv6
26
Implementing IPv6 for Network Management
This document describes the concepts and commands used to manage Cisco applications over IPv6 and
to implement IPv6 for network management. The copy, ping, telnet, and traceroute commands were
modified to provide IPv6 management capability. Secure Shell (SSH) has been enhanced to provide
support for IPv6 addresses that enable a Cisco router to accept and establish secure, encrypted
connections with remote IPv6 nodes over an IPv6 transport.
Cisco IOS IPv6 embedded management components have IPv6-compliant operability in IPv6 and hybrid
IPv6 and IPv4 networks. Cisco IOS embedded management components include system message
logging (syslog), Cisco Networking Services (CNS) agents, Config logger, Hypertext Transfer Protocol
server (HTTP(S)), tool command language (TCL), Network Configuration Protocol (NETCONF),
Service-Oriented Access Protocol (SOAP), and IP Service Level Agreements (SLAs).
Finding Support Information for Platforms and Cisco IOS and Catalyst OS Software Images
Use Cisco Feature Navigator to find information about platform support and Cisco IOS and Catalyst OS
software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An
account on Cisco.com is not required.
Contents
• Prerequisites for Implementing IPv6 for Network Management, page 2
• Information About Implementing IPv6 for Network Management, page 2
• How to Implement IPv6 for Network Management, page 8
• Configuration Examples for Implementing IPv6 for Network Management, page 15
Americas Headquarters:
Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA
Note In Cisco IOS Release 12.2(8)T or later releases, a literal IPv6 address specified with a port number must
be enclosed in square brackets ([ ]) when the address is used in TFTP source or destination URLs; a
literal IPv6 address specified without a port number need not be enclosed in square brackets. Refer to
RFC 2732, Format for Literal IPv6 Addresses in URLs, for more information on the use of square
brackets with literal IPv6 address in URLs.
IPv6C-2
Implementing IPv6 for Network Management
Information About Implementing IPv6 for Network Management
Note The SSH client runs in user EXEC mode and has no specific configuration tasks or commands.
On Cisco.com, refer to the “Configuring Secure Shell” chapter in the Cisco IOS Security Configuration
Guide for additional SSH configuration information. Refer to the “Secure Shell Commands” chapter in
the Cisco IOS Security Command Reference for additional SSH command information.
IPv6C-3
Implementing IPv6 for Network Management
Information About Implementing IPv6 for Network Management
IPv6C-4
Implementing IPv6 for Network Management
Information About Implementing IPv6 for Network Management
Syslog
The Cisco IOS system message logging (syslog) process in IPv6 allows users to log syslog messages to
external syslog servers and hosts with IPv6 addresses. This implementation allows user to specify an
IPv4-based logging host (syslog server) by providing the host’s IP address in IPv4 format (for example,
192.168.0.0) or IPv6 format (for example, 2001:0DB8:A00:1::1/64).
As of 12.4(4)T and 12.2(33)SRC, this feature is backward-compatible with existing IPv4 and new IPv6
addresses and hostnames.
CNS Agents
IPv6 addressing is supported in the Cisco Networking Services (CNS) subsystem. CNS is a foundation
technology for linking users to networking services and provides the infrastructure for the automated
configuration of large numbers of network devices. Many IPv6 networks are complex, with many
devices, and each device must be configured individually. When standard configurations do not exist or
have been modified, the time involved in initial installation and subsequent upgrading is considerable.
Internet service providers (ISPs) need a method for sending out partial configurations to introduce new
services.
To address all these issues, CNS was designed to provide “plug-and-play” network services using a
central directory service and distributed agents. CNS features include CNS agents and a flow-through
provisioning structure. CNS flow-through provisioning uses the CNS configuration and event agents to
provide an automated workflow, eliminating the need for an onsite technician.
IPv6 addressing supports the CNS agents described in the following sections:
• CNS Configuration Agent, page 5
• CNS Event Agent, page 5
• CNS EXEC Agent, page 5
• CNS Image Agent, page 6
The CNS configuration agent is involved in the initial configuration and subsequent partial
configurations on a Cisco IOS device. The configuration agent uses a CNS configuration engine to
provide methods for automating initial Cisco IOS device configurations, incremental configurations, and
synchronized configuration updates, and the configuration engine reports the status of the configuration
load as an event to which a network monitoring or workflow application can subscribe.
The CNS event agent provides a transport connection to the CNS event bus for all other CNS agents. No
event can be sent to the router by the configuration engine until the CNS event agent is operational and
has successfully built a connection between the configuration engine and the router.
The event agent uses a CNS configuration engine to provide methods for automating initial Cisco IOS
device configurations, incremental configurations, and synchronized configuration updates.
The CNS EXEC agent allows a remote application to execute a CLI command in EXEC mode on a
Cisco IOS device by sending an event message that contains the command.
IPv6C-5
Implementing IPv6 for Network Management
Information About Implementing IPv6 for Network Management
Administrators maintaining large networks of Cisco IOS devices need an automated mechanism to load
image files onto large numbers of remote devices. Network management applications are useful to
determine which images to run and how to manage images received from the Cisco online software
center. Other image distribution solutions do not scale to cover thousands of devices and cannot
distribute images to devices behind a firewall or using Network Address Translation (NAT). The CNS
image agent enables the managed device to initiate a network connection and request an image download
allowing devices using NAT, or behind firewalls, to access the image server.
The CNS image agent can be configured to use the CNS event bus. To use the CNS event bus, the CNS
event agent must be enabled and connected to the CNS event gateway in the CNS Configuration Engine.
The CNS image agent can also use an HTTP server that understands the CNS image agent protocol.
Deployment of CNS image agent operations can use both the CNS event bus and an HTTP server.
For further information about CNS agents, see the “Cisco Networking Services” chapter in the
Cisco IOS Network Management Configuration Guide, Release 12.4T.
Config Logger
Config logger tracks and reports configuration changes. Config logger supports two content types:
• Plain text—With plain-text format, the config logger reports configuration changes only.
• XML—The config logger uses Extensible Markup Language (XML) to report the configuration
change details (for example, what changed, who changed it, when changes were made, parser return
code (PRC) values, and incremental NVGEN results).
TCL
Tool command language (TCL) is used in Cisco IOS IPv6 to support features such as embedded syslog
manager (ESM), embedded event manager (EEM), interactive voice response (IVR), and tclsh parser
mode. TCL supports both initiating (client) and listening (server) sockets.
NETCONF
The Network Configuration Protocol (NETCONF) defines a mechanism through which a network device
can be managed, configuration data information can be retrieved, and new configuration data can be
uploaded and manipulated. NETCONF uses XML-based data encoding for the configuration data and
protocol messages.
For more information about NETCONF, see “Network Configuration Protocol,” Cisco IOS Network
Management Configuration Guide, Release 12.4T.
IPv6C-6
Implementing IPv6 for Network Management
Information About Implementing IPv6 for Network Management
IPv6C-7
Implementing IPv6 for Network Management
How to Implement IPv6 for Network Management
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 host name [port] ipv6-address1 [ipv6-address2...ipv6-address4]
4. line [aux | console | tty | vty] line-number [ending-line-number]
5. password password
6. login [local | tacacs]
7. ipv6 access-class ipv6-access-list-name {in | out}
8. telnet host [port] [keyword]
DETAILED STEPS
Example:
Router# configure terminal
IPv6C-8
Implementing IPv6 for Network Management
How to Implement IPv6 for Network Management
Example:
Router(config)# ipv6 host cisco-sj
2001:0DB8:20:1::12
Step 4 line [aux | console | tty | vty] line-number Works with the vty keyword to create a vty interface.
[ending-line-number]
Example:
Router(config)# line vty 0 4
Step 5 password password Creates a password that enables Telnet.
Example:
Router(config)# password hostword
Step 6 login [local | tacacs] (Optional) Enables password checking at login.
Example:
Router(config)# login tacacs
Step 7 ipv6 access-class ipv6-access-list-name {in | (Optional) Adds an IPv6 access list to the line interface.
out}
• Using this command restricts remote access to sessions
that match the access list.
Example:
Router(config)# ipv6 access-list hostlist
Step 8 telnet host [port] [keyword] Establishes a Telnet session from a router to a remote host
using either the host name or the IPv6 address.
Example: The Telnet session can be established to a router name or to
Router(config)# telnet cisco-sj an IPv6 address.
Prerequisites
Prior to configuring SSH over an IPv6 transport, ensure that the following conditions exist:
• An IPSec (Data Encryption Standard (DES) or 3DES) encryption software image from Cisco IOS
Release 12.2(8)T or later releases or Cisco IOS Release 12.0(22)S or later releases is loaded on your
router. IPv6 transport for the SSH server and SSH client requires an IPSec encryption software
image. Refer to the “Loading and Maintaining System Images” chapter of Cisco IOS Configuration
Fundamentals Configuration Guide, Release 12.4, for information on downloading a software
image to your router.
IPv6C-9
Implementing IPv6 for Network Management
How to Implement IPv6 for Network Management
• A host name and host domain are configured for your router. Refer to the “Mapping Host Names to
IPv6 Addresses” section of the Implementing Basic Connectivity for IPv6 module for information
on assigning host names to IPv6 addresses and specifying default domain names that can be used by
both IPv4 and IPv6.
• A Rivest, Shamir, and Adelman (RSA) key pair, which automatically enables SSH, is generated for
your router. Refer to the “Configuring Certification Authority Interoperability” chapter of Cisco IOS
Security Configuration Guide, Release 12.4, for information on generating an RSA key pair.
Note RSA is the public key cryptographic system developed by Ron Rivest, Adi Shamir, and
Leonard Adelman. RSA keys come in pairs: one public key and one private key.
• A user authentication mechanism for local or remote access is configured on your router. Refer to
the “Restrictions” section of the Start Here: Cisco IOS Software Release Specifics for IPv6 Features
document for authentication mechanism restrictions for SSH over an IPv6 transport.
Restrictions
The basic restrictions for SSH over an IPv4 transport listed in the “Configuring Secure Shell” chapter of
Cisco IOS Security Configuration Guide, Release 12.4, apply to SSH over an IPv6 transport. In addition
to the restrictions listed in that chapter, the use of locally stored usernames and passwords is the only
user authentication mechanism supported by SSH over an IPv6 transport; the TACACS+ and RADIUS
user authentication mechanisms are not supported over an IPv6 transport.
Note To authenticate SSH clients, configure TACACS+ or RADIUS over an IPv4 transport and then
connect to an SSH server over an IPv6 transport.
SUMMARY STEPS
1. enable
2. configure terminal
3. ip ssh [timeout seconds | authentication-retries integer]
4. exit
5. ssh [-v 1 | 2] [-c {3des | aes128-cbc | aes192-cbc | aes256-cbc}] [-l userid | -l userid:number
ip-address | -l userid:rotary number ip-address ] [-m {hmac-md5 | hmac-md5-96 | hmac-sha1 |
hmac-sha1-96}] [-o numberofpasswordprompts n] [-p port-num] {ip-addr | hostname}
[command]
IPv6C-10
Implementing IPv6 for Network Management
How to Implement IPv6 for Network Management
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ip ssh [timeout seconds | Configures SSH control variables on your router.
authentication-retries integer]
• You can specify the timeout in seconds, not to exceed
120 seconds. The default is 120. This setting applies to
Example: the SSH negotiation phase. Once the EXEC session
Router(config)# ip ssh timeout 100 starts, the standard timeouts configured for the vty
authentication-retries 2
apply.
By default, five vty lines are defined (0–4); therefore,
five terminal sessions are possible. After the SSH
executes a shell, the vty timeout starts. The vty timeout
defaults to 10 minutes.
• You can also specify the number of authentication
retries, not to exceed five authentication retries. The
default is three.
Step 4 exit Exits configuration mode, and returns the router to
privileged EXEC mode.
Example:
Router(config)# exit
Step 5 ssh [-v {1 | 2}] [-c {3des | aes128-cbc | Starts an encrypted session with a remote networking
aes192-cbc | aes256-cbc}] [-l userid | -l device.
userid:{number} {ip-address} | -l
userid:rotary{number} {ip-address}] [-m
{hmac-md5 | hmac-md5-96 | hmac-sha1 |
hmac-sha1-96}] [-o numberofpasswordprompts n]
[-p port-num] {ip-addr | hostname} [command]
Example:
Router# ssh
IPv6C-11
Implementing IPv6 for Network Management
How to Implement IPv6 for Network Management
• A MIB view, which defines the subset of all MIB objects accessible to the given community.
• Read and write or read-only permission for the MIB objects accessible to the community.
You can configure one or more community strings. To remove a specific community string, use the no
snmp-server community command.
The snmp-server host command specifies which hosts will receive SNMP notifications, and whether
you want the notifications sent as traps or inform requests. The snmp-server enable traps command
globally enables the production mechanism for the specified notification types (such as Border Gateway
Protocol [BGP] traps, config traps, entity traps, and Hot Standby Router Protocol [HSRP] traps).
SUMMARY STEPS
1. enable
2. configure terminal
3. snmp-server community string [view view-name] [ro | rw] [ipv6 nacl] [access-list-number]
4. snmp-server engineID remote {ipv4-ip-address | ipv6 address}[udp-port udp-port-number] [vrf
vrf-name] engineid-string
5. snmp-server group group-name {v1 | v2c | v3 {auth | noauth | priv}} [context context-name]
[read read-view] [write write-view] [notify notify-view] [access [ipv6
named-access-list]{acl-number | acl-name}]
6. snmp-server host {hostname | ip-address} [vrf vrf-name] [traps | informs] [version {1 | 2c | 3
[auth | noauth | priv]}] community-string [udp-port port] [notification-type]
7. snmp-server user username group-name [remote host [udp-port port]]
{v1 | v2c | v3 [encrypted] [auth {md5 | sha} auth-password]} [access [ipv6 nacl]
[priv {des | 3des | aes {128 | 192 |256}} privpassword] {acl-number | acl-name}]
8. snmp-server enable traps [notification-type] [vrrp]
DETAILED STEPS
Example:
Router# configure terminal
Step 3 snmp-server community string [view view-name] Defines the community access string.
[ro | rw] [ipv6 nacl] [access-list-number]
Example:
Router(config)# snmp-server community mgr view
restricted rw ipv6 mgr2
IPv6C-12
Implementing IPv6 for Network Management
How to Implement IPv6 for Network Management
Example:
Router(config)# snmp-server engineID remote
3ffe:b00:c18:1::3/127 remotev6
Step 5 snmp-server group group-name {v1 | v2c | v3 (Optional) Configures a new SNMP group, or a table that
{auth | noauth | priv}} [context context-name] maps SNMP users to SNMP views.
[read read-view] [write write-view] [notify
notify-view] [access [ipv6
named-access-list]{acl-number | acl-name}]
Example:
Router(config)# snmp-server group public v2c
access ipv6 public2
Step 6 snmp-server host {hostname | ip-address} [vrf Specifies the recipient of an SNMP notification operation.
vrf-name] [traps | informs] [version { 1 | 2c | 3
[auth | noauth | priv]}] community-string Specifies whether you want the SNMP notifications sent as
[udp-port port] [notification-type] traps or informs, the version of SNMP to use, the security
level of the notifications (for SNMPv3), and the recipient
(host) of the notifications.
Example:
Router(config)# snmp-server host host1.com 2c
vrf trap-vrf
Step 7 snmp-server user username group-name [remote (Optional) Configures a new user to an existing SNMP
host [udp-port port]] group.
{v1 | v2c | v3 [encrypted] [auth {md5 |
sha} auth-password]} [access [ipv6 nacl] Note You cannot configure a remote user for an address
[priv {des | 3des | aes {128 | 192 | 256}} without first configuring the engine ID for that
privpassword] {acl-number | acl-name}]
remote host. This is a restriction imposed in the
design of these commands; if you try to configure
Example: the user before the host, you will receive a warning
Router(config)# snmp-server user user1 bldg1 message and the command will not be executed
remote 3ffe:b00:c18:1::3/127 v2c access ipv6
public2
Step 8 snmp-server enable traps [notification-type] Enables sending of traps or informs, and specifies the type
[vrrp] of notifications to be sent.
• If a notification-type is not specified, all supported
Example: notification will be enabled on the router.
Router(config)# snmp-server enable traps bgp
• To discover which notifications are available on your
router, enter the snmp-server enable traps ?
command.
IPv6C-13
Implementing IPv6 for Network Management
How to Implement IPv6 for Network Management
SUMMARY STEPS
1. enable
2. configure terminal
3. logging host {{ip-address | hostname} | {ipv6 ipv6-address | hostname}} [transport {udp [port
port-number] | tcp [port port-number] [audit]}] [xml | filtered [stream stream-id]] [alarm
[severity]]
DETAILED STEPS
Command Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Router> enable
Step 2 configure terminal Enters global configuration mode.
Example:
Router# configure terminal
Step 3 logging host {{ip-address | hostname} | Logs system messages and debug output to a remote host.
{ipv6 ipv6-address | hostname}}
[transport {udp [port port-number] | tcp
[port port-number] [audit]}] [xml |
filtered [stream stream-id]] [alarm
[severity]]
Example:
Router(config)# logging host ipv6
AAAA:BBBB:CCCC:DDDD::FFFF
SUMMARY STEPS
1. enable
2. configure terminal
3. no ip http server
IPv6C-14
Implementing IPv6 for Network Management
Configuration Examples for Implementing IPv6 for Network Management
DETAILED STEPS
Example:
Router# configure terminal
Step 3 no ip http server Disables HTTP access.
Example:
Router(config)# no ip http server
password lab
IPv6C-15
Implementing IPv6 for Network Management
Configuration Examples for Implementing IPv6 for Network Management
login
To use Telnet to access the router, you must enter the password:
Router# telnet cisco-sj
Password:
cisco-sj
.
.
.
verification
It is not necessary to use the telnet command. Specifying either the host name or the address is sufficient,
as shown in the following examples:
Router# cisco-sj
or
Router# 2001:0db8:20:1::12
To display the IPv6 connected user (line 130) on the router to which you are connected, use the show
users command:
Router# show users
Note that the address displayed is the IPv6 address of the source of the connection. If the host name of
the source is known (either through a domain name server (DNS) or locally in the host cache), then it is
displayed instead:
Router# show users
If the user at the connecting router suspends the session with ^6x and then enters the show sessions
command, the IPv6 connection is displayed:
Router# show sessions
The Conn Name field shows the host name of the destination only if it is known. If it is not known, the
output might look similar to the following:
Router# show sessions
IPv6C-16
Implementing IPv6 for Network Management
Configuration Examples for Implementing IPv6 for Network Management
Building configuration...
!
Current configuration : 1490 bytes
!
version 12.2
!
hostname Router
!
no ip http server
!
line con 0
line aux 0
line vty 0 4
IPv6C-17
Implementing IPv6 for Network Management
Where to Go Next
Where to Go Next
To implement IPv6 routing protocols, refer to the Implementing RIP for IPv6, Implementing IS-IS for
IPv6, or Implementing Multiprotocol BGP for IPv6 module.
Additional References
The following sections provide references related to the Managing Cisco IOS Applications over IPv6
feature.
Related Documents
IPv6C-18
Implementing IPv6 for Network Management
Additional References
Standards
Standards Title
No new or modified standards are supported by this —
feature, and support for existing standards has not been
modified by this feature.
MIBs
RFCs
RFCs Title
RFC 2732 Format for Literal IPv6 Addresses in URLs
RFC 3414 User-based Security Model (USM) for version 3 of the Simple
Network Management Protocol (SNMPv3)
RFC 3484 Default Address Selection for Internet Protocol version 6 (IPv6)
RFC 4292 IP Forwarding Table MIB
RFC 4293 Management Information Base for the Internet Protocol (IP)
IPv6C-19
Implementing IPv6 for Network Management
Command Reference
Technical Assistance
Description Link
The Cisco Support website provides extensive online http://www.cisco.com/techsupport
resources, including documentation and tools for
troubleshooting and resolving technical issues with
Cisco products and technologies.
To receive security and technical information about
your products, you can subscribe to various services,
such as the Product Alert Tool (accessed from Field
Notices), the Cisco Technical Services Newsletter, and
Really Simple Syndication (RSS) Feeds.
Access to most tools on the Cisco Support website
requires a Cisco.com user ID and password.
Command Reference
The following commands are introduced or modified in the feature or features documented in this
module. For information about these commands, see the Cisco IOS IPv6 Command Reference at
http://www.cisco.com/en/US/docs/ios/ipv6/command/reference/ipv6_book.html. For information about
all Cisco IOS commands, use the Command Lookup Tool at http://tools.cisco.com/Support/CLILookup
or the Cisco IOS Master Command List, All Releases, at
http://www.cisco.com/en/US/docs/ios/mcl/all_release/all_mcl.html.
• ip http server
• ipv6 access-class
• ipv6 host
• ipv6 traffic interface-statistics
• logging host
• show interfaces accounting
• show ip sockets
• show ipv6 routers
• show ipv6 traffic
• snmp-server community
• snmp-server engineID remote
• snmp-server group
• snmp-server host
• snmp-server user
• ssh
• telnet
• traceroute
IPv6C-20
Implementing IPv6 for Network Management
Feature Information for Implementing IPv6 for Network Management
Note Table 12 lists only the Cisco IOS software release that introduced support for a given feature in a given
Cisco IOS software release train. Unless noted otherwise, subsequent releases of that Cisco IOS
software release train also support that feature.
Table 12 Feature Information for Managing Cisco IOS Applications over IPv6
IPv6C-21
Implementing IPv6 for Network Management
Feature Information for Implementing IPv6 for Network Management
Table 12 Feature Information for Managing Cisco IOS Applications over IPv6
IPv6C-22
Implementing IPv6 for Network Management
Feature Information for Implementing IPv6 for Network Management
Table 12 Feature Information for Managing Cisco IOS Applications over IPv6
IPv6C-23
Implementing IPv6 for Network Management
Feature Information for Implementing IPv6 for Network Management
Table 12 Feature Information for Managing Cisco IOS Applications over IPv6
CCDE, CCENT, Cisco Eos, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, Cisco TelePresence, the Cisco logo, DCE, and Welcome to the Human
Network are trademarks; Changing the Way We Work, Live, Play, and Learn and Cisco Store are service marks; and Access Registrar, Aironet,
AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork
Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation,
EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, iQ
Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone, MeetingPlace,
MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare,
SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx logo
are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply
a partnership relationship between Cisco and any other company. (0807R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and
figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and
coincidental.
IPv6C-24
Implementing Mobile IPv6
Mobile IP is part of both IPv4 and IPv6 standards. Mobile IP allows a host device to be identified by a
single IP address even though the device may move its physical point of attachment from one network
to another. Regardless of movement between different networks, connectivity at the different points is
achieved seamlessly without user intervention. Roaming from a wired network to a wireless or wide-area
network is also done with ease. Mobile IP provides ubiquitous connectivity for users, whether they are
within their enterprise networks or away from home.
Finding Support Information for Platforms and Cisco IOS and Catalyst OS Software Images
Use Cisco Feature Navigator to find information about platform support and Cisco IOS and Catalyst OS
software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An
account on Cisco.com is not required.
Contents
• Restrictions for Implementing Mobile IPv6, page 2
• Information About Implementing Mobile IPv6, page 2
• How to Implement Mobile IPv6, page 7
• Configuration Examples for Implementing Mobile IPv6, page 24
• Additional References, page 27
• Command Reference, page 28
• Feature Information for Implementing Mobile IPv6, page 30
Americas Headquarters:
Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA
IPv6 NEMO
The NEMO basic support protocol enables mobile IPv6 networks to attach to different points in the
Internet. This protocol is an extension of Mobile IPv6 and allows session continuity for every node in
the mobile network as the network moves. NEMO also allows every node in the mobile network to be
IPv6-2
Implementing Mobile IPv6
Information About Implementing Mobile IPv6
reachable while the user is moving around. The mobile router, which connects the network to the
Internet, runs the NEMO basic support protocol with its home agent (HA). NEMO allows network
mobility to be transparent to the nodes inside the mobile network.
The NEMO router maintains the following type of route:
• Mobile route: The default route for IPv6 over the roaming interface.
IPv6-3
Implementing Mobile IPv6
Information About Implementing Mobile IPv6
When using implicit prefix registration, the mobile router does not register any prefixes as part of the
binding update with its home agent. This function requires a static configuration at the home agent, and
the home agent must have the information of the associated prefixes with the given mobile router for it
to set up route forwarding.
When using explicit prefix registration, the mobile router presents a list of prefixes to the home agent as
part of the binding update procedure. If the home agent determines that the mobile router is authorized
to use these prefixes, it sends a bind acknowledgment message.
IPv6-4
Implementing Mobile IPv6
Information About Implementing Mobile IPv6
Mobile IPv6 uses the routing and destination option headers for communications between the mobile
node and the correspondent node. The new mobility option header is used only for the BU process.
Several ICMP message types have been defined to support Mobile IPv6. IPv6 access lists can be
configured to allow IPv6 access list entries matching Mobile-IPv6-specific ICMP messages to be
configured and to allow the definition of entries to match packets containing Mobile IPv6 extension
headers.
For further information on IPv6 packet headers, refer to the Implementing IPv6 Addressing and Basic
Connectivity module.
IPv6-5
Implementing Mobile IPv6
Information About Implementing Mobile IPv6
IPv6-6
Implementing Mobile IPv6
How to Implement Mobile IPv6
IPv6-7
Implementing Mobile IPv6
How to Implement Mobile IPv6
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ipv6 mobile home-agent [preference preference-value]
5. exit
6. exit
7. show ipv6 mobile globals
8. show ipv6 mobile home-agent [interface-type interface-number [prefix]]
DETAILED STEPS
Example:
Router# configure terminal
Step 3 interface type number Specifies an interface type and number, and places the
router in interface configuration mode.
Example:
Router(config)# interface Ethernet 2
IPv6-8
Implementing Mobile IPv6
How to Implement Mobile IPv6
Example:
Router(config-if)# ipv6 mobile home-agent
Step 5 exit Exits interface configuration mode, and returns the router to
global configuration mode.
Example:
Router(config-if)# exit
Step 6 exit Exits global configuration mode, and returns the router to
privileged EXEC mode.
Example:
Router(config)# exit
Step 7 show ipv6 mobile globals Displays global Mobile IPv6 parameters.
Example:
Router# show ipv6 mobile globals
Step 8 show ipv6 mobile home-agent [interface-type Displays local and discovered neighboring home agents.
interface-number [prefix]]
Example:
Router# show ipv6 mobile home-agent
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 mobile home-agent
4. binding [access access-list-name | auth-option | seconds | maximum | refresh]
5. exit
6. exit
7. show ipv6 mobile binding [care-of-address address | home-address address | interface-type
interface-number]
8. show ipv6 mobile traffic
IPv6-9
Implementing Mobile IPv6
How to Implement Mobile IPv6
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 mobile home-agent Places the router in home-agent configuration mode.
Example:
Router(config)# ipv6 mobile home-agent
Step 4 binding [access access-list-name | auth-option Configures binding options for the Mobile IPv6 home agent
| seconds | maximum | refresh] feature.
Example:
Router(config-ha)# binding
Step 5 exit Exits home-agent configuration mode, and returns the
router to global configuration mode.
Example:
Router(config-ha)# exit
Step 6 exit Exits global configuration mode, and returns the router to
privileged EXEC mode.
Example:
Router(config)# exit
Step 7 show ipv6 mobile binding [care-of-address Displays information about the binding cache.
address | home-address address | interface-type
interface-number]
Example:
Router# show ipv6 mobile binding
Step 8 show ipv6 mobile traffic Displays information about BUs received and BAs sent.
Example:
Router# show ipv6 mobile traffic
IPv6-10
Implementing Mobile IPv6
How to Implement Mobile IPv6
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 mobile router
4. home-network ipv6-prefix [discover] [priority priority-number]
5. home-address home-network {ipv6-address-identifier | eui-64}
6. explicit-prefix
7. register {extend expire seconds retry number interval seconds | lifetime seconds | retransmit
initial milliseconds maximum milliseconds retry number}
8. exit
9. exit
10. show ipv6 mobile router [running-config | status]
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 mobile router Enables IPv6 NEMO functionality on a router, and places
the router in IPv6 mobile router configuration mode.
Example:
Router(config)# ipv6 mobile router
Step 4 home-network ipv6-prefix [discover] [priority Specifies the home network’s IPv6 prefix on the mobile
priority-number] router.
Example:
Router(IPv6-mobile-router)# home-network
2001::/32
Step 5 home-address home-network Specifies the home address using the home network or
{ipv6-address-identifier | eui-64} interface identifier.
Example:
Router(IPv6-mobile-router)# home-address
home-network eui-64
Step 6 explicit-prefix Registers IPv6 prefixes connected to the IPv6 mobile router.
Example:
Router(IPv6-mobile-router)# explicit-prefix
IPv6-11
Implementing Mobile IPv6
How to Implement Mobile IPv6
Example:
Router(IPv6-mobile-router)# register lifetime
600
Step 8 exit Exits IPv6 mobile router configuration mode, and returns
the router to global configuration mode.
Example:
Router(IPv6-mobile-router)# exit
Step 9 exit Exits global configuration mode, and returns the router to
privileged EXEC mode.
Example:
Router(config)# exit
Step 10 show ipv6 mobile router [running-config | Displays configuration information and monitoring
status] statistics about the IPv6 mobile router.
Example:
Router# show ipv6 mobile router
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 router nemo
4. distance [mobile-distance]
DETAILED STEPS
Example:
Router# configure terminal
IPv6-12
Implementing Mobile IPv6
How to Implement Mobile IPv6
Example:
Router(config-rtr)# distance 10
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ipv6 mobile router-service roam [bandwidth-efficient | cost-efficient | optimistic |
semi-optimistic | priority value]
DETAILED STEPS
Example:
Router# configure terminal
Step 3 interface type number Specifies the interface type and number, and enters interface
configuration mode.
Example:
Router(config)# interface ethernet 0/0
Step 4 ipv6 mobile router-service roam Enables the IPv6 mobile router interface to roam.
[bandwidth-efficient | cost-efficient | optimistic
| semi-optimistic | priority value]
Example:
Router(config-if)# ipv6 mobile router-service
roam
IPv6-13
Implementing Mobile IPv6
How to Implement Mobile IPv6
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 access-list access-list-name
4. permit icmp {source-ipv6-prefix/prefix-length | any | host source-ipv6-address | auth} [operator
[port-number]] {destination-ipv6-prefix/prefix-length | any | host destination-ipv6-address | auth}
[operator [port-number]] [icmp-type [icmp-code] | icmp-message] [dest-option-type [doh-number
| doh-type]] [dscp value] [flow-label value] [fragments] [log] [log-input] [mobility]
[mobility-type [mh-number | mh-type]] [routing] [routing-type routing-number] [sequence value]
[time-range name]
or
deny icmp {source-ipv6-prefix/prefix-length | any | host source-ipv6-address | auth} [operator
[port-number]] {destination-ipv6-prefix/prefix-length | any | host destination-ipv6-address | auth}
[operator [port-number]] [icmp-type [icmp-code] | icmp-message] [dest-option-type [doh-number
| doh-type]] [dscp value] [flow-label value] [fragments] [log] [log-input] [mobility]
[mobility-type [mh-number | mh-type]] [routing] [routing-type routing-number] [sequence value]
[time-range name]
DETAILED STEPS
Example:
Router# configure terminal
IPv6-14
Implementing Mobile IPv6
How to Implement Mobile IPv6
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ipv6 unreachables
IPv6-15
Implementing Mobile IPv6
How to Implement Mobile IPv6
DETAILED STEPS
Example:
Router# configure terminal
Step 3 interface type number Specifies the interface type and number, and enters interface
configuration mode.
Example:
Router(config)# interface ethernet 0/0
Step 4 ipv6 unreachables Enables the generation of ICMPv6 unreachable messages
for any packets arriving on the specified interface.
Example:
Router(config-if)# ipv6 unreachables
SUMMARY STEPS
1. enable
2. show ipv6 mobile tunnels [summary | tunnel if-number]
IPv6-16
Implementing Mobile IPv6
How to Implement Mobile IPv6
DETAILED STEPS
Example:
Router# show ipv6 mobile tunnels
Restrictions
• You cannot configure two host group profiles with the same IPv6 address when using the IPv6
address option.
• You cannot configure a profile with the NAI option set to a realm name and the address option set
to a specific IPv6 address. You can either remove the NAI option or specify a fully qualified user
name for the NAI option.
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 mobile home-agent
4. binding [access access-list-name | auth-option | seconds | maximum | refresh]
5. host group profile-name
6. address {ipv6-address | autoconfig}
7. nai [realm | user | macaddress] {user@realm | @realm}
IPv6-17
Implementing Mobile IPv6
How to Implement Mobile IPv6
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 mobile home-agent Places the router in home-agent configuration mode.
Example:
Router(config)# ipv6 mobile home-agent
Step 4 binding [access access-list-name | auth-option Configures binding options for the Mobile IPv6 home agent
| seconds | maximum | refresh] feature.
Example:
Router(config-ha)# binding 15
Step 5 host group profile-name Creates a host configuration in Mobile IPv6. Multiple
instances with different profile names can be created and
used.
Example:
Router(config-ha)# host group profile1
Step 6 address {ipv6-address | autoconfig} Specifies the home address of the IPv6 mobile node.
Example:
Router(config-ha)# address baba::1
Step 7 nai [realm | user | macaddress] {user@realm | Specifies the NAI for the IPv6 mobile node.
@realm}
Example:
Router(config-ha)# nai @cisco.com
IPv6-18
Implementing Mobile IPv6
How to Implement Mobile IPv6
Example:
Router(config-ha)# authentication spi 500 key
ascii cisco
Step 9 exit Exits home-agent configuration mode, and returns the
router to global configuration mode.
Example:
Router(config-ha)# exit
Step 10 exit Exits global configuration mode, and returns the router to
privileged EXEC mode.
Example:
Router(config)# exit
Step 11 show ipv6 mobile host groups [profile-name] Displays information about Mobile IPv6 host groups.
Example:
Router# show ipv6 mobile host groups
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ipv6 mobile home-agent [preference preference-value] (interface configuration)
5. ipv6 nd advertisement-interval
6. ipv6 nd prefix {ipv6-prefix/prefix-length | default} [[valid-lifetime preferred-lifetime | at valid-date
preferred-date] | infinite | no-advertise | off-link | no-rtr-address | no-autoconfig]
7. ipv6 nd ra interval {maximum-secs [minimum-secs] | msec maximum-msecs [minimum-msecs]}
IPv6-19
Implementing Mobile IPv6
How to Implement Mobile IPv6
DETAILED STEPS
Example:
Router# configure terminal
Step 3 interface type number Specifies an interface type and number, and places the
router in interface configuration mode.
Example:
Router(config)# interface serial 3
Step 4 ipv6 mobile home-agent [preference Configures the Mobile IPv6 home agent preference value on
preference-value] (interface configuration) the interface.
Example:
Router(config-if)# ipv6 mobile home-agent
preference 10
Step 5 ipv6 nd advertisement-interval Configures the advertisement interval option to be sent in
router advertisements (RAs).
Example:
Router(config-if)# ipv6 nd
advertisement-interval
Step 6 ipv6 nd prefix {ipv6-prefix/prefix-length | Configures which IPv6 prefixes are included in IPv6 RAs.
default} [[valid-lifetime preferred-lifetime |
at valid-date preferred-date] | infinite |
no-advertise | off-link | no-rtr-address |
no-autoconfig]
Example:
Router(config-if)# ipv6 nd prefix
2001:0DB8::/35 1000 900
Step 7 ipv6 nd ra interval {maximum-secs Configures the interval between IPv6 RA transmissions on
[minimum-secs] | msec maximum-msecs an interface.
[minimum-msecs]}
Example:
Router(config-if)# ipv6 nd ra interval 201
IPv6-20
Implementing Mobile IPv6
How to Implement Mobile IPv6
SUMMARY STEPS
1. enable
2. clear ipv6 mobile binding [care-of-address prefix | home-address prefix | interface-type
interface-number]
3. clear ipv6 mobile home-agents [interface-type interface-number]
4. clear ipv6 mobile traffic
5. debug ipv6 mobile {binding-cache | forwarding | home-agent | registration}
6. debug ipv6 mobile networks
7. debug ipv6 mobile router [detail]
DETAILED STEPS
Example:
Router# clear ipv6 mobile binding
Step 3 clear ipv6 mobile home-agents [interface-type Clears the neighboring home agents list.
interface-number]
Example:
Router# clear ipv6 mobile home-agents
Step 4 clear ipv6 mobile traffic Clears the counters associated with Mobile IPv6.
Example:
Router# clear ipv6 mobile traffic
Step 5 debug ipv6 mobile {binding-cache | forwarding | Enables the display of debugging information for Mobile
home-agent | registration} IPv6.
Example:
Router# debug ipv6 mobile registration
IPv6-21
Implementing Mobile IPv6
How to Implement Mobile IPv6
Example:
Router# debug ipv6 mobile networks
Step 7 debug ipv6 mobile router [detail] Displays debugging messages for the IPv6 mobile router.
Example:
Router# debug ipv6 mobile router
Examples
The following sections provides sample show command output to verify Mobile IPv6 configuration and
operation:
• Sample Output from the show ipv6 mobile binding Command, page 22
• Sample Output from the show ipv6 mobile globals Command, page 22
• Sample Output from the show ipv6 mobile home-agent Command, page 23
• Sample Output from the show ipv6 mobile host groups Command, page 23
• Sample Output from the show ipv6 mobile router Command, page 23
• Sample Output from the show ipv6 mobile traffic Command, page 23
• Sample Output from the show ipv6 mobile tunnels Command, page 24
IPv6-22
Implementing Mobile IPv6
How to Implement Mobile IPv6
Sample Output from the show ipv6 mobile host groups Command
In the following example, information about a host group named localhost is displayed:
Router# show ipv6 mobile host groups
MIPv6 statistics:
Rcvd: 6477 total
0 truncated, 0 format errors
IPv6-23
Implementing Mobile IPv6
Configuration Examples for Implementing Mobile IPv6
0 checksum errors
Binding Updates received:6477
0 no HA option, 0 BU's length
0 options' length, 0 invalid CoA
Sent: 6477 generated
Binding Acknowledgements sent:6477
6477 accepted (0 prefix discovery required)
0 reason unspecified, 0 admin prohibited
0 insufficient resources, 0 home reg not supported
0 not home subnet, 0 not home agent for node
0 DAD failed, 0 sequence number
Binding Errors sent:0
0 no binding, 0 unknown MH
Tunnel1:
Source: 2001:0DB1:1:1
Destination: 2001:0DB1:2:1
Encapsulation Mode: IPv6/IPv6
Egress Interface: Ethernet 1/0
Switching Mode: Process
Keep-Alive: Not Supported
Path MTU Discovery: Enabled
Input: 20 packets, 1200 bytes, 0 drops
Output: 20 packets, 1200 bytes, 0 drops
NEMO Options: Not Supported
IPv6-24
Implementing Mobile IPv6
Configuration Examples for Implementing Mobile IPv6
IPv6-25
Implementing Mobile IPv6
Configuration Examples for Implementing Mobile IPv6
exit
home-network 2001:0DB8:2000::/64 discover priority 127
home-network 2001:0DB8:1000::/64 discover
home-address home-network ::1111
explicit-prefix
register lifetime 60
register retransmit initial 1000 maximum 1000 retry 1
register extend expire 20 retry 1 interval 1
IPv6-26
Implementing Mobile IPv6
Additional References
Additional References
The following sections provide references related to the Implementing Mobile IPv6 feature.
Related Documents
Related Topic Document Title
IPv6 supported feature list Start Here: Cisco IOS Software Release Specifics for IPv6 Features
IPv6 commands: complete command syntax, command Cisco IOS IPv6 Command Reference
mode, defaults, usage guidelines, and examples
IPv6 simplified packet headers, IPv6 neighbor “Implementing IPv6 Addressing and Basic Connectivity” module of
discovery, IPv6 stateless autoconfiguration, IPv6 the Cisco IOS IPv6 Configuration Guide
stateful autoconfiguration
IPv6 access lists “Implementing Traffic Filters and Firewalls for IPv6 Security”
module of the Cisco IOS IPv6 Configuration Guide
IPv6 tunneling “Implementing Tunneling for IPv6” module of the Cisco IOS IPv6
Configuration Guide
IPv4 mobility configuration and commands Cisco IOS IP Mobility Configuration Guide and Cisco IOS IP
Mobility Command Reference
Standards
Standards Title
No new or modified standards are supported by this —
feature, and support for existing standards has not been
modified by this feature.
IPv6-27
Implementing Mobile IPv6
Command Reference
MIBs
MIBs MIBs Link
No new or modified MIBs are supported, and support To locate and download MIBs for selected platforms, Cisco IOS
for existing MIBs has not been modified. releases, and feature sets, use Cisco MIB Locator found at the
following URL:
http://www.cisco.com/go/mibs
RFCs
RFCs Title
RFC 3775 Mobility Support in IPv6
RFC 3846 Mobile IPv4 Extension for Carrying Network Access Identifiers
RFC 3963 Network Mobility (NEMO) Basic Support Protocol
RFC 4282 The Network Access Identifier
RFC 4283 Mobile Node Identifier Option for Mobile IPv6 (MIPv6)
RFC 4285 Authentication Protocol for Mobile IPv6
draft-ietf-nemo-terminology Network Mobility Support Terminology
draft-ietf-nemo-home-network-models NEMO Home Network Models
draft-thubert-nemo-ipv4-traversal IPv4 Traversal for MIPv6 Mobile Routers
Technical Assistance
Description Link
The Cisco Support website provides extensive online http://www.cisco.com/techsupport
resources, including documentation and tools for
troubleshooting and resolving technical issues with
Cisco products and technologies.
To receive security and technical information about
your products, you can subscribe to various services,
such as the Product Alert Tool (accessed from Field
Notices), the Cisco Technical Services Newsletter, and
Really Simple Syndication (RSS) Feeds.
Access to most tools on the Cisco Support website
requires a Cisco.com user ID and password.
Command Reference
The following commands are introduced or modified in the feature or features documented in this
module. For information about these commands, see the Cisco IOS IPv6 Command Reference at
http://www.cisco.com/en/US/docs/ios/ipv6/command/reference/ipv6_book.html. For information about
IPv6-28
Implementing Mobile IPv6
Command Reference
all Cisco IOS commands, use the Command Lookup Tool at http://tools.cisco.com/Support/CLILookup
or the Cisco IOS Master Command List, All Releases, at
http://www.cisco.com/en/US/docs/ios/mcl/all_release/all_mcl.html.
• address (Mobile IPv6)
• authentication (Mobile IPv6)
• binding
• clear ipv6 mobile binding
• clear ipv6 mobile home-agents
• clear ipv6 mobile traffic
• debug ipv6 mobile
• debug ipv6 mobile networks
• debug ipv6 mobile router
• distance (IPv6 Mobile)
• eui-interface
• explicit-prefix
• home-address home-network
• home-network
• host group
• ipv6 mobile home-agent (global configuration)
• ipv6 mobile home-agent (interface configuration)
• ipv6 mobile router
• ipv6 mobile router-service roam
• ipv6 nd advertisement-interval
• ipv6 nd prefix
• ipv6 nd ra interval
• ipv6 router nemo
• ipv6 unreachables
• nai
• register (mobile router)
• show ipv6 mobile binding
• show ipv6 mobile globals
• show ipv6 mobile home-agent
• show ipv6 mobile host groups
• show ipv6 mobile router
• show ipv6 mobile traffic
• show ipv6 mobile tunnels
IPv6-29
Implementing Mobile IPv6
Feature Information for Implementing Mobile IPv6
Note Table 1 lists only the Cisco IOS software release that introduced support for a given feature in a given
Cisco IOS software release train. Unless noted otherwise, subsequent releases of that Cisco IOS
software release train also support that feature.
IPv6-30
Implementing Mobile IPv6
Feature Information for Implementing Mobile IPv6
CCDE, CCENT, Cisco Eos, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, Cisco TelePresence, the Cisco logo, DCE, and Welcome to the Human
Network are trademarks; Changing the Way We Work, Live, Play, and Learn and Cisco Store are service marks; and Access Registrar, Aironet,
AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork
IPv6-31
Implementing Mobile IPv6
Feature Information for Implementing Mobile IPv6
Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation,
EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, iQ
Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone, MeetingPlace,
MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare,
SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx logo
are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply
a partnership relationship between Cisco and any other company. (0807R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and
figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and
coincidental.
IPv6-32
Implementing IPv6 over MPLS
Multiprotocol Label Switching (MPLS) is deployed by many service providers in their IPv4 networks.
Service providers want to introduce IPv6 services to their customers, but changes to their existing IPv4
infrastructure can be expensive and the cost benefit for a small amount of IPv6 traffic does not make
economic sense. Several integration scenarios have been developed to leverage an existing IPv4 MPLS
infrastructure and add IPv6 services without requiring any changes to the network backbone.
Finding Support Information for Platforms and Cisco IOS and Catalyst OS Software Images
Use Cisco Feature Navigator to find information about platform support and Cisco IOS and Catalyst OS
software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An
account on Cisco.com is not required.
Contents
• Prerequisites for Implementing IPv6 over MPLS, page 2
• Information About Implementing IPv6 over MPLS, page 2
• How to Implement IPv6 over MPLS, page 6
• Configuration Examples for IPv6 over MPLS, page 14
• Where to Go Next, page 17
• Additional References, page 17
• Command Reference, page 18
• Feature Information for Implementing IPv6 over MPLS, page 20
Americas Headquarters:
Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA
IPv6C-2
Implementing IPv6 over MPLS
Information About Implementing IPv6 over MPLS
IPv6C-3
Implementing IPv6 over MPLS
Information About Implementing IPv6 over MPLS
Refer to the Implementing Tunnels for IPv6 module for configuration information on manually
configured tunnels, automatic tunnels, and 6to4 tunnels.
Limitations on using tunnels involve the manual configuring of a mesh of tunnels on the CE routers,
creating scaling issues for large networks.
IPv6C-4
Implementing IPv6 over MPLS
Information About Implementing IPv6 over MPLS
6PE and core routers—P routers in Figure 3—within the MPLS domain share a common IPv4 Interior
Gateway Protocol (IGP) such as Open Shortest Path First (OSPF) or Integrated Intermediate
System-to-Intermediate System (IS-IS).
The interfaces on the 6PE routers connecting to the CE router can be configured to forward IPv6 traffic,
IPv4 traffic, or both types of traffic depending on the customer requirements. 6PE routers advertise IPv6
reachability information learned from their 6PE peers over the MPLS cloud. Service providers can
delegate an IPv6 prefix from their registered IPv6 prefixes over the 6PE infrastructure; otherwise, there
is no impact on the CE router.
The P routers in the core of the network are not aware that they are switching IPv6 packets. Core routers
are configured to support MPLS and the same IPv4 IGP as the PE routers to establish internal
reachability inside the MPLS cloud. Core routers also use LDP, TDP, or RSVP for binding IPv4 labels.
Implementing the Cisco 6PE feature does not have any impact on the MPLS core devices.
Within the MPLS network, IPv6 traffic is forwarded using label switching, making the IPv6 traffic
transparent to the core of the MPLS network. No IPv6 over IPv4 tunnels or Layer 2 encapsulation
methods are required.
6PE Multipath
Internal and external Border Gateway Protocol (BGP) multipath for IPv6 allows the IPv6 router to load
balance between several paths (for example, same neighboring autonomous system [AS] or sub-AS, or
the same metric) to reach its destination. The 6PE multipath feature uses multiprotocol internal BGP
(MP-iBGP) to distribute IPv6 routes over the MPLS IPv4 core network and to attach an MPLS label to
each route.
When MP-iBGP multipath is enabled on the 6PE router, all labeled paths are installed in the forwarding
table with MPLS information (label stack) when MPLS information is available. This functionality
enables 6PE to perform load balancing.
IPv6C-5
Implementing IPv6 over MPLS
How to Implement IPv6 over MPLS
IPv6C-6
Implementing IPv6 over MPLS
How to Implement IPv6 over MPLS
Prerequisites
• The 6PE routers—the 6PE1 and 6PE2 routers in Figure 24—must be members of the core IPv4
network. The 6PE router interfaces attached to the core network must be running MPLS, the same
label distribution protocol, and the same IPv4 IGP, as in the core network.
• The 6PE routers must also be configured to be dual stack to run both IPv4 and IPv6.
Restrictions
Note As of Cisco IOS Release 12.2(22)S, the following restrictions do not apply to Cisco IOS 12.2 S releases.
The following restrictions apply when implementing the IPv6 Provider Edge Router over MPLS (6PE)
feature:
• Core MPLS routers are supporting MPLS and IPv4 only, so they cannot forward or create any IPv6
Internet Control Message Protocol (ICMP) messages.
• Load balancing ability is not provided by Cisco 6PE between an MPLS path and an IPv6 path. If
both are available, the MPLS path is always preferred. Load balancing between two MPLS paths is
possible.
• BGP multipath is not supported for Cisco 6PE routes. If two BGP peers advertise the same prefix
with an equal cost, Cisco 6PE will use the last route to cross the MPLS core.
• 6PE feature is not supported over tunnels other than RSVP-TE tunnels.
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 unicast-routing
4. ipv6 cef
5. interface type number
6. ipv6 address {ipv6-address/prefix-length | prefix-name sub-bits/prefix-length}
7. exit
8. mpls ipv6 source-interface type number
IPv6C-7
Implementing IPv6 over MPLS
How to Implement IPv6 over MPLS
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 unicast-routing Enables the forwarding of IPv6 unicast datagrams.
Example:
Router(config)# ipv6 unicast-routing
Step 4 ipv6 cef Enables IPv6 CEF.
Example:
Router(config)# ipv6 cef
Step 5 interface type number Specifies an interface type and number and enters interface
configuration mode.
Example: • In the context of this feature, the interface to be
Router(config)# interface Serial 0/0 configured is the interface communicating with the CE
router.
Step 6 ipv6 address {ipv6-address/prefix-length | Configures an IPv6 address based on an IPv6 general prefix
prefix-name sub-bits/prefix-length} and enable IPv6 processing on an interface.
Example:
Router(config-if)# ipv6 address
2001:0DB8:FFFF::2/64
Step 7 exit Exits interface configuration mode and enters global
configuration mode.
Example:
Router(config-if)# exit
Step 8 mpls ipv6 source-interface type number Specifies the interface type and number from which MPLS
will take the IPv6 address as a source address.
Example: Note Effective with release 12.2(25)S, the mpls ipv6
Router(config)# mpls ipv6 source-interface source-interface command is no longer available in
Loopback 0 Cisco IOS software.
IPv6C-8
Implementing IPv6 over MPLS
How to Implement IPv6 over MPLS
SUMMARY STEPS
1. enable
2. configure terminal
3. router bgp as-number
4. no bgp default ipv4-unicast
5. neighbor {ip-address | ipv6-address | peer-group-name} remote-as as-number
6. neighbor {ip-address | ipv6-address | peer-group-name} update-source interface-type
interface-number
7. address-family ipv6 [unicast]
8. neighbor {ip-address | peer-group-name | ipv6-address} activate
9. neighbor {ip-address | ipv6-address} send-label
DETAILED STEPS
Example:
Router# configure terminal
Step 3 router bgp as-number Enters router configuration mode for the specified routing
process.
Example:
Router(config)# router bgp 65000
Step 4 no bgp default ipv4-unicast Disables the IPv4 unicast address family for the BGP
routing process specified in the previous step.
Example: Note Routing information for the IPv4 unicast address
Router(config-router)# no bgp default family is advertised by default for each BGP routing
ipv4-unicast session configured with the neighbor remote-as
router configuration command unless you configure
the no bgp default ipv4-unicast router
configuration command before configuring the
neighbor remote-as command.
Step 5 neighbor {ip-address | ipv6-address | Adds the IP address of the neighbor in the specified
peer-group-name} remote-as as-number autonomous system to the BGP neighbor table of the local
router.
Example:
Router(config-router)# neighbor 192.168.99.70
remote-as 65000
IPv6C-9
Implementing IPv6 over MPLS
How to Implement IPv6 over MPLS
Example:
Router(config-router-af)# neighbor
192.168.99.70 activate
Step 9 neighbor {ip-address | ipv6-address} send-label Advertises the capability of the router to send MPLS labels
with BGP routes.
Example: • In IPv6 address family configuration mode this
Router(config-router-af)# neighbor command enables binding and advertisement of
192.168.99.70 send-label aggregate labels when advertising IPv6 prefixes in
BGP.
SUMMARY STEPS
1. enable
2. configure terminal
3. router bgp as-number
4. maximum-paths ibgp number-of-paths
IPv6C-10
Implementing IPv6 over MPLS
How to Implement IPv6 over MPLS
DETAILED STEPS
Example:
Router# configure terminal
Step 3 router bgp as-number Enters router configuration mode for the specified routing
process.
Example:
Router(config)# router bgp 65000
Step 4 maximum-paths ibgp number-of-paths Controls the maximum number of parallel iBGP routes that
can be installed in a routing table.
Example:
Router(config-router)# maximum-paths ibgp 3
SUMMARY STEPS
IPv6C-11
Implementing IPv6 over MPLS
How to Implement IPv6 over MPLS
DETAILED STEPS
Example:
Router> show bgp ipv6 unicast
2001:0DB8:DDDD::/48
Step 2 show bgp ipv6 {unicast | multicast} neighbors (Optional) Displays information about IPv6 BGP
[ipv6-address] [received-routes | routes | connections to neighbors.
flap-statistics | advertised-routes | paths
regular-expression | dampened-routes] • In this example, information including the IPv6 label
capability is displayed for the BGP peer at
192.168.99.70.
Example:
Router> show bgp ipv6 neighbors unicast
192.168.99.70
Step 3 show mpls forwarding-table [network {mask | (Optional) Displays the contents of the MPLS Forwarding
length} | labels label [-label] | interface Information Base (FIB).
interface | nexthop address | lsp-tunnel
[tunnel-id]] [vrf vrf-name] [detail] • In this example, information linking the MPLS label
with IPv6 prefixes is displayed where the labels are
shown as aggregate and the prefix is shown as IPv6.
Example:
Router> show mpls forwarding-table
Step 4 show ipv6 cef [ipv6-prefix/prefix-length] | (Optional) Displays FIB entries based on IPv6 address
[interface-type interface-number] information.
[longer-prefixes | similar-prefixes | detail |
internal | platform | epoch | source]] • In this example, label information from the CEF table
for prefix 2001:0DB8:DDDD::/64 is displayed.
Example:
Router> show ipv6 cef 2001:0DB8:DDDD::/64
Step 5 show ipv6 route [ipv6-address | (Optional) Displays the current contents of the IPv6 routing
ipv6-prefix/prefix-length | protocol | table.
interface-type interface-number]
Example:
Router> show ipv6 route
Output Examples
This section provides the following output examples:
• Sample Output for the show bgp ipv6 Command, page 13
• Sample Output for the show bgp ipv6 neighbors Command, page 13
• Sample Output for the show mpls forwarding-table Command, page 13
• Sample Output for the show bgp ipv6 Command, page 14
• Sample Output for the show ipv6 cef Command, page 14
• Sample Output for the show ipv6 route Command, page 14
IPv6C-12
Implementing IPv6 over MPLS
How to Implement IPv6 over MPLS
IPv6C-13
Implementing IPv6 over MPLS
Configuration Examples for IPv6 over MPLS
2001:0DB8:DDDD::/64
nexthop ::FFFF:192.168.99.70
fast tag rewrite with Se0/0, point2point, tags imposed {19 20}
Note For a description of each output display field, refer to the relevant show command in the IPv6 for
Cisco IOS Command Reference.
IPv6C-14
Implementing IPv6 over MPLS
Configuration Examples for IPv6 over MPLS
IPv6C-15
Implementing IPv6 over MPLS
Configuration Examples for IPv6 over MPLS
ip router isis
tag-switching ip
!
interface Serial0/0
description to_CE_router
no ip address
ipv6 address 2001:0DB8:FFFF::1/64
!
router isis
passive-interface Loopback0
net 49.0001.1921.6809.9005.00
!
router bgp 65000
no bgp default ipv4-unicast
bgp log-neighbor-changes
neighbor 192.168.99.70 remote-as 65000
neighbor 192.168.99.70 description to_6PE2
neighbor 192.168.99.70 update-source Loopback0
!
address-family ipv6
neighbor 192.168.99.70 activate
neighbor 192.168.99.70 send-label
network 2001:0DB8:FFFF::/48
exit-address-family
!
ipv6 route 2001:0DB8:FFFF::/48 Ethernet0/0 2001:0DB8:FFFF::2
router isis
passive-interface Loopback0
net 49.0001.1921.6809.9200.00
IPv6C-16
Implementing IPv6 over MPLS
Where to Go Next
Where to Go Next
If you want to further customize your MPLS network, refer to the Cisco IOS Switching Services
Configuration Guide, Release 12.4.
Additional References
The following sections provide references related to the Implementing IPv6 over MPLS feature.
Related Documents
Related Topic Document Title
IPv6 using tunnels on the CE routers “Implementing Tunneling for IPv6,” Cisco IOS IPv6 Configuration
Guide
IPv6 supported feature list “Start Here: Cisco IOS Software Release Specifics for IPv6
Features,” Cisco IOS IPv6 Configuration Guide
IPv6 commands: complete command syntax, command Cisco IOS IPv6 Command Reference
mode, defaults, usage guidelines, and examples
MPLS configuration tasks “Multiprotocol Label Switching Overview,” Cisco IOS
Multiprotocol Label Switching Configuration Guide
MPLS commands: complete command syntax, Cisco IOS Multiprotocol Label Switching Command Reference
command mode, defaults, usage guidelines, and
examples
Standards
Standards Title
Draft-ietf-ngtrans-bgp-tunnel-04.txt Connecting IPv6 Islands Across IPv4 Clouds with BGP
MIBs
MIBs MIBs Link
No new or modified MIBs are supported, and support To locate and download MIBs for selected platforms, Cisco IOS
for existing MIBs has not been modified. releases, and feature sets, use Cisco MIB Locator found at the
following URL:
http://www.cisco.com/go/mibs
IPv6C-17
Implementing IPv6 over MPLS
Command Reference
RFCs
RFCs Title
No new or modified RFCs are supported by this —
feature, and support for existing RFCs has not been
modified by this feature.
Technical Assistance
Description Link
The Cisco Support website provides extensive online http://www.cisco.com/techsupport
resources, including documentation and tools for
troubleshooting and resolving technical issues with
Cisco products and technologies.
To receive security and technical information about
your products, you can subscribe to various services,
such as the Product Alert Tool (accessed from Field
Notices), the Cisco Technical Services Newsletter, and
Really Simple Syndication (RSS) Feeds.
Access to most tools on the Cisco Support website
requires a Cisco.com user ID and password.
Command Reference
The following commands are introduced or modified in the feature or features documented in this
module. For information about these commands, see the Cisco IOS IPv6 Command Reference at
http://www.cisco.com/en/US/docs/ios/ipv6/command/reference/ipv6_book.html. For information about
all Cisco IOS commands, use the Command Lookup Tool at http://tools.cisco.com/Support/CLILookup
or the Cisco IOS Master Command List, All Releases, at
http://www.cisco.com/en/US/docs/ios/mcl/all_release/all_mcl.html.
• address-family ipv6
• ipv6 cef
• ipv6 unicast-routing
• maximum-paths ibgp
• mpls ipv6 source-interface
• neighbor activate
• neighbor remote-as
• neighbor send-label
• neighbor update-source
• router bgp
• show bgp ipv6
• show bgp ipv6 neighbors
IPv6C-18
Implementing IPv6 over MPLS
Command Reference
IPv6C-19
Implementing IPv6 over MPLS
Feature Information for Implementing IPv6 over MPLS
Note Table 8 lists only the Cisco IOS software release that introduced support for a given feature in a given
Cisco IOS software release train. Unless noted otherwise, subsequent releases of that Cisco IOS
software release train also support that feature.
IPv6C-20
Implementing IPv6 over MPLS
Feature Information for Implementing IPv6 over MPLS
CCDE, CCENT, Cisco Eos, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, the Cisco logo, DCE, and Welcome to the Human Network are
trademarks; Changing the Way We Work, Live, Play, and Learn is a service mark; and Access Registrar, Aironet, AsyncOS, Bringing the Meeting To
You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS,
Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation, EtherFast, EtherSwitch,
Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, iQ Expertise, the iQ logo,
iQ Net Readiness Scorecard, iQuick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone, MeetingPlace, MGX, Networkers,
Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare, SenderBase, SMARTnet, Spectrum Expert,
StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx logo are registered trademarks of
Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply
a partnership relationship between Cisco and any other company. (0805R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and
figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and
coincidental.
IPv6C-21
Implementing IPv6 over MPLS
Feature Information for Implementing IPv6 over MPLS
IPv6C-22
Implementing IPv6 Multicast
Traditional IP communication allows a host to send packets to a single host (unicast transmission) or to
all hosts (broadcast transmission). IPv6 multicast provides a third scheme, allowing a host to send a
single data stream to a subset of all hosts (group transmission) simultaneously.
This module describes the concepts and tasks you need to implement IPv6 multicast on your network.
Finding Support Information for Platforms and Cisco IOS and Catalyst OS Software Images
Use Cisco Feature Navigator to find information about platform support and Cisco IOS and Catalyst OS
software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An
account on Cisco.com is not required.
Contents
• Prerequisites for IPv6 Multicast, page 2
• Restrictions for IPv6 Multicast, page 2
• Information About IPv6 Multicast, page 3
• How to Implement IPv6 Multicast, page 18
• Configuration Examples for IPv6 Multicast, page 68
• Additional References, page 71
• Command Reference, page 73
• Feature Information for Implementing IPv6 Multicast, page 77
Americas Headquarters:
Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA
In Cisco IOS Release 12.0(26)S, IPv6 Multicast is supported on the Cisco 12000 series Internet router
only on the following line cards:
• IP Service Engine (ISE):
– 4-port Gigabit Ethernet ISE
– 4-port OC-3c/STM-1c POS/SDH ISE
– 8-port OC-3c/STM-1c POS/SDH ISE
– 16-port OC-3c/STM-1c POS/SDH ISE
– 4-port OC-12c/STM-4c POS/SDH ISE
– 1-port OC-48c/STM-16c POS/SDH ISE
• Engine 4 Plus (E4+) Packet-over-SONET (POS):
– 4-port OC-48c/STM-16c POS/SDH
– 1-port OC-192c/STM-64c POS/SDH
Note In future Cisco IOS releases, IPv6 Multicast will be supported on other Cisco 12000 series line
cards. IPv6 Multicast will not, however, be supported on the following Cisco 12000 series line
cards:
Engine 1:
- 8-port Fast Ethernet
- 1-port Gigabit Ethernet
Engine 2:
- 3-port Gigabit Ethernet
On Cisco 12000 series line cards, the IPv6 multicast feature includes support for Protocol Independent
Multicast sparse mode (PIM-SM), Multicast Listener Discovery (MLDv2), static mroutes, and the IPv6
distributed Multicast Forwarding Information Base (MFIB).
Forwarding of IPv6 multicast traffic is hardware-based on Cisco 12000 series IP Service Engine (ISE)
line cards that support IPv6 multicast and software-based on all other supported Cisco 12000 series line
cards.
On Cisco 12000 series ISE line cards, IPv6 multicast is implemented so that if the number of IPv6
multicast routes exceeds the hardware capacity of the ternary content addressable memory (TCAM), the
following error message is displayed to describe how to increase the TCAM hardware capacity for IPv6
multicast routes:
EE48-3-IPV6_TCAM_CAPACITY_EXCEEDED: IPv6 multicast pkts will be software switched.
To support more IPv6 multicast routes in hardware:
Get current TCAM usage with: show controllers ISE <slot> tcam
In config mode, reallocate TCAM regions e.g. reallocate Netflow TCAM to IPv6 Mcast
hw-module slot <num> tcam carve rx_ipv6_mcast <v6-mcast-percent>
hw-module slot <num> tcam carve rx_top_nf <nf-percent>
Verify with show command that sum of all TCAM regions = 100%
Reload the linecard for the new TCAM carve config to take effect
WARNING: Recarve may affect other input features(ACL,CAR,MQC,Netflow)
TCAM is used for IPv6 multicast forwarding lookups. To increase TCAM capacity for handling IPv6
multicast routes, you must use the hw-module slot number tcam carve rx_ipv6_mcast
v6-mcast-percentage command in privileged EXEC mode, where v6-mcast-percentage specifies the
percentage of TCAM hardware used by IPv6 multicast prefix.
For example, you can change the IPv6 multicast region from 1 percent (default) to 16 percent of the
TCAM hardware by reallocating the NetFlow region from 35 percent (default) to 20 percent as follows:
Router# hw-module slot 3 tcam carve rx_ipv6_mcast 16
Router# hw-module slot 3 tcam carve rx_nf 20
IPv6 multicast hardware forwarding is support on the Cisco Catalyst 6500 and 7600 series in Cisco IOS
Release 12.2(18)SXE.
128 bits
0 Interface ID
4 bits 4 bits
1111 1111
0 if permanent
F F Lifetime Scope Lifetime =
1 if temporary
1 = node
8 bits 8 bits 2 = link
Scope = 5 = site
8 = organization
52671
E = global
IPv6 nodes (hosts and routers) are required to join (receive packets destined for) the following multicast
groups:
• All-nodes multicast group FF02:0:0:0:0:0:0:1 (scope is link-local)
• Solicited-node multicast group FF02:0:0:0:0:1:FF00:0000/104 for each of its assigned unicast and
anycast addresses
IPv6 routers must also join the all-routers multicast group FF02:0:0:0:0:0:0:2 (scope is link-local).
The solicited-node multicast address is a multicast group that corresponds to an IPv6 unicast or anycast
address. IPv6 nodes must join the associated solicited-node multicast group for every unicast and
anycast address to which it is assigned. The IPv6 solicited-node multicast address has the prefix
FF02:0:0:0:0:1:FF00:0000/104 concatenated with the 24 low-order bits of a corresponding IPv6 unicast
or anycast address (see Figure 2). For example, the solicited-node multicast address corresponding to the
IPv6 address 2037::01:800:200E:8C6C is FF02::1:FF0E:8C6C. Solicited-node addresses are used in
neighbor solicitation messages.
128 bits
52672
Note There are no broadcast addresses in IPv6. IPv6 multicast addresses are used instead of broadcast
addresses.
Note The solicited-node multicast address is used in the neighbor discovery process.
For further information on configuring IPv6 addresses, refer to the Implementing Basic Connectivity for
IPv6 process module.
• Zone boundaries cut through nodes, not links (the global zone has no boundary, and the boundary
of an interface-local zone encloses just a single interface.)
• Zones of the same scope cannot overlap; that is, they can have no links or interfaces in common.
• A zone of a given scope (less than global) falls completely within zones of larger scope; that is, a
smaller scope zone cannot include more topology than any larger scope zone with which it shares
any links or interfaces.
• Each interface belongs to exactly one zone of each possible scope.
Host
Router Router
Host
PIM-SM
95365
MLD
discovering local group and source-specific group membership. The MLD protocol provides a means to
automatically control and limit the flow of multicast traffic throughout your network with the use of
special multicast queriers and hosts.
The difference between multicast queriers and hosts is as follows:
• A querier is a network device, such as a router, that sends query messages to discover which network
devices are members of a given multicast group.
• A host is a receiver, including routers, that send report messages to inform the querier of a host
membership.
A set of queriers and hosts that receive multicast data streams from the same source is called a multicast
group. Queriers and hosts use MLD reports to join and leave multicast groups and to begin receiving
group traffic.
MLD uses the Internet Control Message Protocol (ICMP) to carry its messages. All MLD messages are
link-local with a hop limit of 1, and they all have the router alert option set. The router alert option
implies an implementation of the hop-by-hop option header.
MLD has three types of messages:
• Query—General, group-specific, and multicast-address-specific. In a query message, the multicast
address field is set to 0 when MLD sends a general query. The general query learns which multicast
addresses have listeners on an attached link.
Group-specific and multicast-address-specific queries are the same. A group address is a multicast
address.
• Report—In a report message, the multicast address field is that of the specific IPv6 multicast address
to which the sender is listening.
• Done—In a done message, the multicast address field is that of the specific IPv6 multicast address
to which the source of the MLD message is no longer listening.
An MLD report must be sent with a valid IPv6 link-local source address, or the unspecified address (::),
if the sending interface has not yet acquired a valid link-local address. Sending reports with the
unspecified address is allowed to support the use of IPv6 multicast in the Neighbor Discovery Protocol.
For stateless autoconfiguration, a node is required to join several IPv6 multicast groups in order to
perform duplicate address detection (DAD). Prior to DAD, the only address the reporting node has for
the sending interface is a tentative one, which cannot be used for communication. Therefore, the
unspecified address must be used.
MLD states that result from MLD version 2 or MLD version 1 membership reports can be limited
globally or by interface. The MLD group limits feature provides protection against denial of service
(DoS) attacks caused by MLD packets. Membership reports in excess of the configured limits will not
be entered in the MLD cache, and traffic for those excess membership reports will not be forwarded.
MLD provides support for source filtering. Source filtering allows a node to report interest in listening
to packets only from specific source addresses (as required to support SSM), or from all addresses except
specific source addresses sent to a particular multicast address.
When a host using MLD version 1 sends a leave message, the router needs to send query messages to
reconfirm that this host was the last MLD version 1 host joined to the group before it can stop forwarding
traffic. This function takes about 2 seconds. This so-called “leave latency” is also present in IGMP
version 2 for IPv4 multicast.
PIM-Sparse Mode
IPv6 multicast provides support for intradomain multicast routing using PIM-SM. PIM-SM uses unicast
routing to provide reverse-path information for multicast tree building, but it is not dependent on any
particular unicast routing protocol.
PIM-SM is used in a multicast network when relatively few routers are involved in each multicast and
these routers do not forward multicast packets for a group, unless there is an explicit request for the
traffic. PIM-SM distributes information about active sources by forwarding data packets on the shared
tree. PIM-SM initially uses shared trees, which requires the use of an RP.
Requests are accomplished via PIM joins, which are sent hop by hop toward the root node of the tree.
The root node of a tree in PIM-SM is the RP in the case of a shared tree or the first-hop router that is
directly connected to the multicast source in the case of a shortest path tree (SPT). The RP keeps track
of multicast groups and the hosts that send multicast packets are registered with the RP by that host’s
first-hop router.
As a PIM join travels up the tree, routers along the path set up multicast forwarding state so that the
requested multicast traffic will be forwarded back down the tree. When multicast traffic is no longer
needed, a router sends a PIM prune up the tree toward the root node to prune (or remove) the unnecessary
traffic. As this PIM prune travels hop by hop up the tree, each router updates its forwarding state
appropriately. Ultimately, the forwarding state associated with a multicast group or source is removed.
A multicast data sender sends data destined for a multicast group. The designated router (DR) of the
sender takes those data packets, unicast-encapsulates them, and sends them directly to the RP. The RP
receives these encapsulated data packets, de-encapsulates them, and forwards them onto the shared tree.
The packets then follow the (*, G) multicast tree state in the routers on the RP tree, being replicated
wherever the RP tree branches, and eventually reaching all the receivers for that multicast group. The
process of encapsulating data packets to the RP is called registering, and the encapsulation packets are
called PIM register packets.
Designated Router
Cisco routers use PIM-SM to forward multicast traffic and follow an election process to select a
designated router when there is more than one router on a LAN segment.
The designated router is responsible for sending PIM register and PIM join and prune messages toward
the RP to inform it about host group membership.
If there are multiple PIM-SM routers on a LAN, a designated router must be elected to avoid duplicating
multicast traffic for connected hosts. The PIM router with the highest IPv6 address becomes the DR for
the LAN unless you choose to force the DR election by use of the ipv6 pim dr-priority command. This
command allows you to specify the DR priority of each router on the LAN segment (default priority = 1)
so that the router with the highest priority will be elected as the DR. If all routers on the LAN segment
have the same priority, then the highest IPv6 address is again used as the tiebreaker.
Figure 4 illustrates what happens on a multiaccess segment. Router A and Router B are connected to a
common multiaccess Ethernet segment with Host A as an active receiver for Group A. Only Router A,
operating as the DR, sends joins to the RP to construct the shared tree for Group A. If Router B was also
permitted to send (*, G) joins to the RP, parallel paths would be created and Host A would receive
duplicate multicast traffic. Once Host A begins to source multicast traffic to the group, the DR’s
responsibility is to send register messages to the RP. If both routers were assigned the responsibility, the
RP would receive duplicate multicast packets.
RP
(*,G) Join
Router A Router B
(DR)
Host
Member of
Group A
95366
If the DR should fail, the PIM-SM provides a way to detect the failure of Router A and elect a failover
DR. If the DR (Router A) became inoperable, Router B would detect this situation when its neighbor
adjacency with Router A timed out. Because Router B has been hearing MLD membership reports from
Host A, it already has MLD state for Group A on this interface and would immediately send a join to the
RP when it became the new DR. This step reestablishes traffic flow down a new branch of the shared
tree via Router B. Additionally, if Host A were sourcing traffic, Router B would initiate a new register
process immediately after receiving the next multicast packet from Host A. This action would trigger the
RP to join the SPT to Host A via a new branch through Router B.
Tip Two PIM routers are neighbors if there is a direct connection between them. To display your PIM
neighbors, use the show ipv6 pim neighbor command in privileged EXEC mode.
Note DR election process is required only on multiaccess LANs. The last-hop router directly connected to the
host is the DR.
Rendezvous Point
IPv6 PIM provides embedded RP support. Embedded RP support allows the router to learn RP
information using the multicast group destination address instead of the statically configured RP. For
routers that are the RP, the router must be statically configured as the RP.
The router searches for embedded RP group addresses in MLD reports or PIM messages and data
packets. On finding such an address, the router learns the RP for the group from the address itself. It then
uses this learned RP for all protocol activity for the group. For routers that are the RP, the router is
advertised as an embedded RP must be configured as the RP.
To select a static RP over an embedded RP, the specific embedded RP group range or mask must be
configured in the access list of the static RP. When PIM is configured in sparse mode, you must also
choose one or more routers to operate as an RP. An RP is a single common root placed at a chosen point
of a shared distribution tree and is configured statically in each box.
PIM DRs forward data from directly connected multicast sources to the RP for distribution down the
shared tree. Data is forwarded to the RP in one of two ways:
• Data is encapsulated in register packets and unicast directly to the RP by the first-hop router
operating as the DR.
• If the RP has itself joined the source tree, it is multicast-forwarded per the RPF forwarding
algorithm described in the “PIM-Sparse Mode” section.
The RP address is used by first-hop routers to send PIM register messages on behalf of a host sending a
packet to the group. The RP address is also used by last-hop routers to send PIM join and prune messages
to the RP to inform it about group membership. You must configure the RP address on all routers
(including the RP router).
A PIM router can be an RP for more than one group. Only one RP address can be used at a time within
a PIM domain for a certain group. The conditions specified by the access list determine for which groups
the router is an RP.
IPv6 multicast supports the PIM accept register feature, which is the ability to perform PIM-SM register
message filtering at the RP. The user can match an access list or compare the AS path for the registered
source with the AS path specified in a route map.
IPv6 BSR
PIM routers in a domain must be able to map each multicast group to the correct RP address. The BSR
protocol for PIM-SM provides a dynamic, adaptive mechanism to distribute group-to-RP mapping
information rapidly throughout a domain. With the IPv6 BSR feature, if an RP becomes unreachable, it
will be detected and the mapping tables will be modified so that the unreachable RP is no longer used,
and the new tables will be rapidly distributed throughout the domain.
Every PIM-SM multicast group needs to be associated with the IP or IPv6 address of an RP. When a new
multicast sender starts sending, its local DR will encapsulate these data packets in a PIM register
message and send them to the RP for that multicast group. When a new multicast receiver joins, its local
DR will send a PIM join message to the RP for that multicast group. When any PIM router sends a (*, G)
join message, the PIM router needs to know which is the next router toward the RP so that G (Group)
can send a message to that router. Also, when a PIM router is forwarding data packets using (*, G) state,
the PIM router needs to know which is the correct incoming interface for packets destined for G, because
it needs to reject any packets that arrive on other interfaces.
A small set of routers from a domain are configured as candidate bootstrap routers (C-BSRs) and a single
BSR is selected for that domain. A set of routers within a domain are also configured as candidate RPs
(C-RPs); typically, these routers are the same routers that are configured as C-BSRs. Candidate RPs
periodically unicast candidate-RP-advertisement (C-RP-Adv) messages to the BSR of that domain,
advertising their willingness to be an RP. A C-RP-Adv message includes the address of the advertising
C-RP, and an optional list of group addresses and mask length fields, indicating the group prefixes for
which the candidacy is advertised. The BSR then includes a set of these C-RPs, along with their
corresponding group prefixes, in bootstrap messages (BSMs) it periodically originates. BSMs are
distributed hop-by-hop throughout the domain.
The IPv6 BSR ability to configure RP mapping allows IPv6 multicast routers to be statically configured
to announce scope-to-RP mappings directly from the BSR instead of learning them from candidate-RP
messages. Announcing RP mappings from the BSR is useful in several situations:
• When an RP address never changes because there is only a single RP or the group range uses an
anycast RP, it may be less complex to configure the RP address announcement statically on the
candidate BSRs.
• When an RP address is a virtual RP address (such as when using bidirectional PIM), it cannot be
learned by the BSR from a candidate-RP. Instead, the virtual RP address must be configured as an
announced RP on the candidate BSRs.
Cisco IOS IPv6 routers provide support for the RPF flooding of BSR packets so that a Cisco IOS IPv6
router will not disrupt the flow of BSMs. The router will recognize and parse enough of the BSM to
identify the BSR address. The router performs an RPF check for this BSR address and forwards the
packet only if it is received on the RPF interface. The router also creates a BSR entry containing RPF
information to use for future BSMs from the same BSR. When BSMs from a given BSR are no longer
received, the BSR entry is timed out.
Bidirectional BSR support allows bidirectional RPs to be advertised in C-RP messages and bidirectional
ranges in the BSM. All routers in a system must be able to use the bidirectional range in the BSM;
otherwise, the bidirectional RP feature will not function.
BSR provides scoped zone support by distributing group-to-RP mappings in networks using
administratively scoped multicast. The user can configure candidate BSRs and a set of candidate RPs for
each administratively scoped region in the user’s domain.
For BSR to function correctly with administrative scoping, a BSR and at least one C-RP must be within
every administratively scoped region. Administratively scoped zone boundaries must be configured at
the zone border routers (ZBRs), because they need to filter PIM join messages that might inadvertently
cross the border due to error conditions. In addition, at least one C-BSR within the administratively
scoped zone must be configured to be a C-BSR for the administratively scoped zone’s address range.
A separate BSR election will then take place (using BSMs) for every administratively scoped range, plus
one for the global range. Administratively scoped ranges are identified in the BSM because the group
range is marked to indicate that this is an administrative scope range, not just a range that a particular
set of RPs is configured to handle.
Unless the C-RP is configured with a scope, it discovers the existence of the administratively scoped
zone and its group range through reception of a BSM from the scope zone’s elected BSR containing the
scope zone’s group range. A C-RP stores each elected BSR's address and the administratively scoped
range contained in its BSM. It separately unicasts C-RP-Adv messages to the appropriate BSR for every
administratively scoped range within which it is willing to serve as an RP.
All PIM routers within a PIM bootstrap domain where administratively scoped ranges are in use must
be able to receive BSMs and store the winning BSR and RP set for all administratively scoped zones that
apply.
MLD version 2 is required for SSM to operate. MLD allows the host to provide source information.
Before SSM will run with MLD, SSM must be supported in the Cisco IOS IPv6 router, the host where
the application is running, and the application itself.
SSM mapping for IPv6 supports both static and dynamic Domain Name System (DNS) mapping for
MLD version 1 receivers. This feature allows deployment of IPv6 SSM with hosts that are incapable of
providing MLD version 2 support in their TCP/IP host stack and their IP multicast receiving application.
SSM mapping allows the router to look up the source of a multicast MLD version 1 report either in the
running configuration of the router or from a DNS server. The router can then initiate an (S, G) join
toward the source.
By default, members of a group receive data from senders to the group across a single data distribution
tree rooted at the RP. This type of distribution tree is called shared tree or rendezvous point tree (RPT),
as illustrated in Figure 5. Data from senders is delivered to the RP for distribution to group members
joined to the shared tree.
Source
Router A Router B
Source tree
Shared tree
(shortest
from RP
path tree)
Router C RP
52647
Receiver
If the data threshold warrants, leaf routers on the shared tree may initiate a switch to the data distribution
tree rooted at the source. This type of distribution tree is called a shortest path tree or source tree. By
default, the Cisco IOS software switches to a source tree upon receiving the first data packet from a
source.
The following process describes the move from shared tree to source tree in more detail:
1. Receiver joins a group; leaf Router C sends a join message toward the RP.
The routable address hello option allows the PIM protocol avoid such situations by adding a PIM hello
message option that includes all the addresses on the interface on which the PIM hello message is
advertised. When a PIM router finds an upstream router for some address, the result of RPF calculation
is compared with the addresses in this option, in addition to PIM neighbor’s address itself. Because this
option includes all the possible addresses of a PIM router on that link, it always includes the RPF
calculation result if it refers to the PIM router supporting this option.
Bidirectional PIM
Bidirectional PIM allows multicast routers to keep reduced state information, as compared with
unidirectional shared trees in PIM-SM. Bidirectional shared trees convey data from sources to the RP
and distribute them from the RP to the receivers. Unlike PIM-SM, bidirectional PIM does not switch over
to the source tree, and there is no register encapsulation of data from the source to the RP.
Bidirectional PIM offers advantages when there are many moderate or low-rate sources. However, the
bidirectional source trees have worse delay characteristics than do the source trees built in PIM-SM.
Only static configuration of bidirectional RPs is supported in IPv6.
Static Mroutes
IPv6 static mroutes behave much in the same way as do IPv6 static routes. IPv6 static mroutes share the
same database as IPv6 static routes and are implemented by extending static route support. Static
mroutes support equal-cost multipath mroutes, and they also support unicast-only static routes.
For further information on IPv6 static routes, see the Implementing Static Routes for IPv6 module.
MRIB
The Multicast Routing Information Base (MRIB) is a protocol-independent repository of multicast
routing entries instantiated by multicast routing protocols (routing clients). Its main function is to
provide independence between routing protocols and the Multicast Forwarding Information Base
(MFIB). It also acts as a coordination and communication point among its clients.
Routing clients use the services provided by the MRIB to instantiate routing entries and retrieve changes
made to routing entries by other clients. Besides routing clients, MRIB also has forwarding clients
(MFIB instances) and special clients such as MLD. MFIB retrieves its forwarding entries from MRIB
and notifies the MRIB of any events related to packet reception. These notifications can either be
explicitly requested by routing clients or spontaneously generated by the MFIB.
Another important function of the MRIB is to allow for the coordination of multiple routing clients in
establishing multicast connectivity within the same multicast session. MRIB also allows for the
coordination between MLD and routing protocols.
MFIB
The MFIB is a platform-independent and routing-protocol-independent library for IPv6 software. Its
main purpose is to provide a Cisco IOS platform with an interface with which to read the IPv6 multicast
forwarding table and notifications when the forwarding table changes. The information provided by the
MFIB has clearly defined forwarding semantics and is designed to make it easy for the platform to
translate to its specific hardware or software forwarding mechanisms.
When routing or topology changes occur in the network, the IPv6 routing table is updated, and those
changes are reflected in the MFIB. The MFIB maintains next-hop address information based on the
information in the IPv6 routing table. Because there is a one-to-one correlation between MFIB entries
and routing table entries, the MFIB contains all known routes and eliminates the need for route cache
maintenance that is associated with switching paths such as fast switching and optimum switching.
Distributed MFIB
Distributed MFIB (dMFIB) is used to switch multicast IPv6 packets on distributed platforms. dMFIB
may also contain platform-specific information on replication across line cards. The basic MFIB
routines that implement the core of the forwarding logic are common to all forwarding environments.
dMFIB implements the following functionalities:
• Distributes a copy of the MFIB to the line cards.
• Relays data-driven protocol events generated in the line cards to PIM.
• Provides an MFIB platform application program interface (API) to propagate MFIB changes to
platform-specific code responsible for programming the hardware acceleration engine. This API
also includes entry points to switch a packet in software (necessary if the packet is triggering a
data-driven event) and to upload traffic statistics to the software.
• Provides hooks to allow clients residing on the RP to read traffic statistics on demand. (dMFIB does
not periodically upload these statistics to the RP.)
The combination of dMFIB and MRIB subsystems also allows the router to have a “customized” copy
of the MFIB database in each line card and to transport MFIB-related platform-specific information from
the RP to the line cards.
A route might have several paths to a destination prefix, such as when a router is configured for
simultaneous load balancing and redundancy. For each resolved path, a pointer is added for the
adjacency corresponding to the next-hop interface for that path. This mechanism is used for load
balancing across several paths.
Prerequisites
In order to enable IPv6 multicast routing on a router, you must first enable IPv6 unicast routing on the
router. For information on how to enable IPv6 unicast routing on a router, refer to Implementing Basic
Connectivity for IPv6.
If you are already using an IPv6 unicast router, use the following tasks to enable IPv6 multicast routing
and configure IPv6 multicast routing options.
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 multicast-routing
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 multicast-routing Enables multicast routing on all IPv6-enabled interfaces
and enables multicast forwarding for PIM and MLD on all
enabled interfaces of the router.
Example:
Router(config)# ipv6 multicast-routing
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ipv6 mld join-group [group-address] [[include | exclude] {source-address | source-list [acl]}
5. ipv6 mld access-group access-list-name
6. ipv6 mld static-group [group-address] [[include | exclude] {source-address | source-list [acl]}
7. ipv6 mld query-max-response-time seconds
8. ipv6 mld query-timeout seconds
9. ipv6 mld query-interval seconds
10. exit
11. show ipv6 mld groups [link-local] [group-name | group-address] [interface-type
interface-number] [detail | explicit]
12. show ipv6 mld groups summary
13. show ipv6 mld interface [type number]
DETAILED STEPS
Example:
Router# configure terminal
Step 3 interface type number Specifies an interface type and number, and places the
router in interface configuration mode.
Example:
Router(config)# interface FastEthernet 1/0
Step 4 ipv6 mld join-group [group-address] [[include | Configures MLD reporting for a specified group and source.
exclude] {source-address | source-list [acl]}
Example:
Router(config-if)# ipv6 mld join-group FF04::12
exclude 2001:0DB8::10::11
Example:
Router# show ipv6 mld groups FastEthernet 2/1
Step 12 show ipv6 mld groups summary Displays the number of (*, G) and (S, G) membership
reports present in the MLD cache.
Example:
Router# show ipv6 mld groups summary
Step 13 show ipv6 mld interface [type number] Displays multicast-related information about an interface.
Example:
Router# show ipv6 mld interface FastEthernet
2/1
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 mld state-limit number
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 mld state-limit number Limits the number of MLD states globally.
Example:
Router(config)# ipv6 mld state-limit 300
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
DETAILED STEPS
Example:
Router# configure terminal
Step 3 interface type number Specifies an interface type and number, and places the
router in interface configuration mode.
Example:
Router(config)# interface FastEthernet 1/0
Step 4 ipv6 mld limit number [except access-list] Limits the number of MLD states on a per-interface basis.
Example:
Router(config-if)# ipv6 mld limit 100
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ipv6 mld explicit-tracking access-list-name
DETAILED STEPS
Example:
Router# configure terminal
Step 3 interface type number Specifies an interface type and number, and places the
router in interface configuration mode.
Example:
Router(config)# interface FastEthernet 1/0
Step 4 ipv6 mld explicit-tracking access-list-name Enables explicit tracking of hosts.
Example:
Router(config-if)# ipv6 mld explicit-tracking list1
Prerequisites
Before you configure multicast user authentication and profile support, you may configure the following
receiver access control functions in IPv6 multicast.
• To limit MLD groups globally, see the “Implementing MLD Group Limits Globally” section on
page 22.
• To limit MLD groups on a per-interface basis, see the “Implementing MLD Group Limits per
Interface” section on page 22
• To specify the MLD groups and sources allowed on an interface, see the “Customizing and Verifying
MLD on an Interface” section on page 20, step 5.
Restrictions
• The port, interface, VC, or VLAN ID is the user or subscriber identity. User identity by hostname,
user ID or password is not supported.
To configure multicast user authentication and profile support, perform the following tasks:
• Enabling AAA Access Control for IPv6 Multicast, page 25
• Specifying Method Lists and Enabling Multicast Accounting, page 25
• Disabling the Router from Receiving Unauthenticated Multicast Traffic, page 26
• Resetting Authorization Status on an MLD Interface, page 27
SUMMARY STEPS
1. enable
2. configure terminal
3. aaa new-model
DETAILED STEPS
Example:
Router# configure terminal
Step 3 aaa new-model Enables the AAA access control system.
Example:
Router(config)# aaa new-model
The following task describes how to specify the method lists used for AAA authorization and accounting
and how to enable multicast accounting on specified groups or channels on an interface.
SUMMARY STEPS
1. enable
2. configure terminal
3. aaa authorization multicast default [method3 | method4]
4. aaa accounting multicast default [start-stop | stop-only] [broadcast] [method1] [method2]
[method3] [method4]
5. interface type number
6. ipv6 multicast aaa account receive access-list-name [throttle throttle-number]
DETAILED STEPS
Example:
Router# configure terminal
Step 3 aaa authorization multicast default [method3 | Enables AAA authorization and sets parameters that restrict
method4] user access to an IPv6 multicast network.
Example:
Router(config)# aaa authorization multicast
default
Step 4 aaa accounting multicast default [start-stop | Enables AAA accounting of IPv6 multicast services for
stop-only] [broadcast] [method1] [method2] billing or security purposes when you use RADIUS.
[method3] [method4]
Example:
Router(config)# aaa accounting multicast
default
Step 5 interface type number Specifies an interface type and number, and places the
router in interface configuration mode.
Example:
Router(config)# interface FastEthernet 1/0
Step 6 ipv6 multicast aaa account receive Enables AAA accounting on specified groups or channels.
access-list-name [throttle throttle-number]
Example:
Router(config-if)# ipv6 multicast aaa account
receive list1
In some situations, access control may be needed to prevent multicast traffic from being received unless
the subscriber is authenticated and the channels are authorized as per access control profiles. That is,
there should be no traffic at all unless specified otherwise by access control profiles.
The following task describes how to disable the router from receiving multicast traffic to be received
from unauthenticated groups or unauthorized channels.
SUMMARY STEPS
1. enable
2. configure terminal
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 multicast group-range [access-list-name] Disables multicast protocol actions and traffic forwarding
for unauthorized groups or channels on all the interfaces in
Example: a router.
Router(config)# ipv6 multicast group-range
The following task shows how to reset the authorization status of an interface. If no interface is specified,
authorization is reset on all MLD interfaces.
SUMMARY STEPS
1. enable
2. clear ipv6 multicast aaa authorization [interface-type interface-number]
DETAILED STEPS
Example:
Router# clear ipv6 multicast aaa authorization
FastEthernet 1/0
SUMMARY STEPS
1. enable
2. clear ipv6 mld traffic
3. show ipv6 mld traffic
DETAILED STEPS
Example:
Router# clear ipv6 mld traffic
Step 3 show ipv6 mld traffic Displays the MLD traffic counters.
Example:
Router# show ipv6 mld traffic
SUMMARY STEPS
1. enable
2. clear ipv6 mld counters [interface-type]
DETAILED STEPS
Example:
Router# clear ipv6 mld counters Ethernet1/0
Configuring PIM
The following tasks explains how to configure PIM-SM and display PIM-SM configuration and
information.
• Configuring PIM-SM and Displaying PIM-SM Information for a Group Range, page 29
• Configuring PIM Options, page 30
• Configuring Bidirectional PIM and Displaying Bidirectional PIM Information, page 32
• Resetting the PIM Traffic Counters, page 33
• Clearing the PIM Topology Table to Reset the MRIB Connection, page 34
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 pim rp-address ipv6-address [group-access-list] [bidir]
4. exit
5. show ipv6 pim interface [state-on] [state-off] [type number]
6. show ipv6 pim group-map [group-name | group-address] | [group-range | group-mask]
[info-source {bsr | default | embedded-rp | static}]
7. show ipv6 pim neighbor [detail] [interface-type interface-number | count]
8. show ipv6 pim range-list [config] [rp-address | rp-name]
9. show ipv6 pim tunnel [interface-type interface-number]
DETAILED STEPS
Example:
Router# configure terminal
Example:
Router(config)# ipv6 pim rp-address
2001:0DB8::01:800:200E:8C6C acc-grp-1
Step 4 exit Exits global configuration mode, and returns the router to
privileged EXEC mode.
Example:
Router(config-if)# exit
Step 5 show ipv6 pim interface [state-on] [state-off] Displays information about interfaces configured for PIM.
[type number]
Example:
Router# show ipv6 pim interface
Step 6 show ipv6 pim group-map [group-name | Displays an IPv6 multicast group mapping table.
group-address] | [group-range | group-mask]
[info-source {bsr | default | embedded-rp |
static}]
Example:
Router# show ipv6 pim group-map
Step 7 show ipv6 pim neighbor [detail] [interface-type Displays the PIM neighbors discovered by the Cisco IOS
interface-number | count] software.
Example:
Router# show ipv6 pim neighbor
Step 8 show ipv6 pim range-list [config] [rp-address Displays information about IPv6 multicast range lists.
| rp-name]
Example:
Router# show ipv6 pim range-list
Step 9 show ipv6 pim tunnel [interface-type Displays information about the PIM register encapsulation
interface-number] and de-encapsulation tunnels on an interface.
Example:
Router# show ipv6 pim tunnel
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 pim spt-threshold infinity [group-list access-list-name]
4. ipv6 pim accept-register {list access-list | route-map map-name}
5. interface type number
6. ipv6 pim dr-priority value
7. ipv6 pim hello-interval seconds
8. ipv6 pim join-prune-interval seconds
9. exit
10. show ipv6 pim join-prune statistic [interface-type]
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 pim spt-threshold infinity [group-list Configures when a PIM leaf router joins the SPT for the
access-list-name] specified groups.
Example:
Router(config)# ipv6 pim spt-threshold infinity
group-list acc-grp-1
Step 4 ipv6 pim accept-register {list access-list | Accepts or rejects registers at the RP.
route-map map-name}
Example:
Router(config)# ipv6 pim accept-register
route-map reg-filter
Step 5 interface type number Specifies an interface type and number, and places the
router in interface configuration mode.
Example:
Router(config)# interface FastEthernet 1/0
Step 6 ipv6 pim dr-priority value Configures the DR priority on a PIM router.
Example:
Router(config-if)# ipv6 pim dr-priority 3
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 pim rp-address ipv6-address [group-access-list] [bidir]
4. exit
5. show ipv6 pim df [interface-type interface-number] [rp-address]
6. show ipv6 pim df winner [interface-type interface-number] [rp-address]
DETAILED STEPS
Example:
Router# configure terminal
Example:
Router# show ipv6 pim df
Step 6 show ipv6 pim df winner [interface-type Displays the DF-election winner on each interface for each
interface-number] [rp-address] RP.
Example:
Router# show ipv6 pim df winner ethernet 1/0
200::1
SUMMARY STEPS
1. enable
2. clear ipv6 pim counters
3. show ipv6 pim traffic
DETAILED STEPS
Example:
Router# clear ipv6 pim counters
Step 3 show ipv6 pim traffic Displays the PIM traffic counters.
Example:
Router# show ipv6 pim traffic
SUMMARY STEPS
1. enable
2. clear ipv6 pim topology [group-name | group-address]
3. show ipv6 mrib client [filter] [name {client-name | client-name:client-id}]
4. show ipv6 mrib route [link-local | summary | source-address | source-name | *] [group-name |
group-address [prefix-length]]
5. show ipv6 pim topology [link-local | route-count | group-name | group-address] [source-address |
source-name]
DETAILED STEPS
Example:
Router# clear ipv6 pim topology FF04::10
Example:
Router# show ipv6 mrib client
Step 4 show ipv6 mrib route [link-local | summary | Displays the MRIB route information.
source-address | source-name | *] [group-name |
group-address [prefix-length]]
Example:
Router# show ipv6 mrib route
Step 5 show ipv6 pim topology [link-local | Displays PIM topology table information for a specific
route-count | group-name | group-address] group or all groups.
[source-address | source-name]
Example:
Router# show ipv6 pim topology
Configuring a BSR
The following tasks explains how to perform BSR configuration and to verify BSR configuration and
information:
• Configuring a BSR and Verifying BSR Information, page 35
• Sending PIM RP Advertisements to the BSR, page 36
• Configuring BSR for Use Within Scoped Zones, page 37
• Configuring BSR Routers to Announce Scope-to-RP Mappings, page 38
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 pim bsr candidate bsr ipv6-address [hash-mask-length] [priority priority-value]
4. interface type number
5. ipv6 pim bsr border
6. exit
7. show ipv6 pim bsr {election | rp-cache | candidate-rp}
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 pim bsr candidate bsr ipv6-address Configures a router to be a candidate BSR.
[hash-mask-length] [priority priority-value]
Example:
Router(config)# ipv6 pim bsr candidate bsr
2001:0DB8:3000:3000::42 124 priority 10
Step 4 interface type number Specifies an interface type and number, and places the
router in interface configuration mode.
Example:
Router(config)# interface FastEthernet 1/0
Step 5 ipv6 pim bsr border Configures a border for all BSMs of any scope on a
specified interface.
Example:
Router(config-if)# ipv6 pim bsr border
Step 6 exit Enter this command twice to exit interface configuration
mode and enter privileged EXEC mode.
Example:
Router(config-if)# exit
Step 7 show ipv6 pim bsr {election | rp-cache | Displays information related to PIM BSR protocol
candidate-rp} processing.
Example:
Router# show ipv6 pim bsr election
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 pim bsr candidate rp ipv6-address [group-list access-list-name] [priority priority-value]
[interval seconds] [scope scope-value] [bidir]
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 pim bsr candidate rp ipv6-address Sends PIM RP advertisements to the BSR.
[group-list access-list-name] [priority
priority-value] [interval seconds] [scope
scope-value] [bidir]
Example:
Router(config)# ipv6 pim bsr candidate rp
2001:0DB8:3000:3000::42 priority 0
Step 4 interface type number Specifies an interface type and number, and places the
router in interface configuration mode.
Example:
Router(config)# interface FastEthernet 1/0
Step 5 ipv6 pim bsr border Configures a border for all BSMs of any scope on a
specified interface.
Example:
Router(config-if)# ipv6 pim bsr border
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 pim bsr candidate bsr ipv6-address [hash-mask-length] [priority priority-value]
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 pim bsr candidate bsr ipv6-address Configures a router to be a candidate BSR.
[hash-mask-length] [priority priority-value]
Example:
Router(config)# ipv6 pim bsr candidate bsr
2001:0DB8:1:1:4
Step 4 ipv6 pim bsr candidate rp ipv6-address Configures the candidate RP to send PIM RP
[group-list access-list-name] [priority advertisements to the BSR.
priority-value] [interval seconds] [scope
scope-value] [bidir]
Example:
Router(config)# ipv6 pim bsr candidate rp
2001:0DB8:1:1:1 group-list list scope 6
Step 5 interface type number Specifies an interface type and number, and places the
router in interface configuration mode.
Example:
Router(config)# interface FastEthernet 1/0
Step 6 ipv6 multicast boundary scope scope-value Configures a multicast boundary on the interface for a
specified scope.
Example:
Router(config-if)# ipv6 multicast boundary scope 6
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 pim bsr announced rp ipv6-address [group-list access-list-name] [priority priority-value]
[bidir] [scope scope-value]
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 pim bsr announced rp ipv6-address Announces scope-to-RP mappings directly from the BSR
[group-list access-list-name] [priority for the specified candidate RP.
priority-value] [bidir] [scope scope-value]
Example:
Router(config)# ipv6 pim bsr announced rp
2001:0DB8:3000:3000::42 priority 0
Restrictions
To use DNS-based SSM mapping, the router needs to find at least one correctly configured DNS server,
to which the router may be directly attached.
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 mld [vrf vrf-name] ssm-map enable
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 mld [vrf vrf-name] ssm-map enable Enables the SSM mapping feature for groups in the
configured SSM range.
Example:
Router(config)# ipv6 mld ssm-map enable
Step 4 no ipv6 mld [vrf vrf-name] ssm-map query dns Disables DNS-based SSM mapping.
Example:
Router(config)# no ipv6 mld ssm-map query dns
Step 5 ipv6 mld ssm-map [vrf vrf-name] static Configures static SSM mappings.
access-list source-address
Example:
Router(config)# ipv6 mld ssm-map static
SSM_MAP_ACL_2 2001:0DB8:1::1
Step 6 exit Exits global configuration mode, and returns the router to
privileged EXEC mode.
Example:
Router(config-if)# exit
Step 7 show ipv6 mld ssm-map [source-address] Displays SSM mapping information.
Example:
Router# show ipv6 mld ssm-map
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 route ipv6-prefix/prefix-length {ipv6-address | interface-type interface-number
[ipv6-address]} [administrative-distance] [administrative-multicast-distance | unicast | multicast]
[tag tag]
4. exit
5. show ipv6 mroute [link-local | [group-name | group-address [source-address | source-name]]
[summary] [count]
6. show ipv6 mroute [link-local | group-name | group-address] active [kbps]
7. show ipv6 rpf ipv6-prefix
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 route ipv6-prefix/prefix-length Establishes static IPv6 routes. The example shows a static
{ipv6-address | interface-type interface-number route used for both unicast routing and multicast RPF
[ipv6-address]} [administrative-distance]
[administrative-multicast-distance | unicast |
selection.
multicast] [tag tag]
Example:
Router(config)# ipv6 route 2001:0DB8::/64 6::6
100
Step 4 exit Exits global configuration mode, and returns the router to
privileged EXEC mode.
Example:
Router(config-if)# exit
Example:
Router# show ipv6 mroute ff07::1
Step 6 show ipv6 mroute [link-local | group-name | Displays the active multicast streams on the router.
group-address] active [kbps]
Example:
Router# show ipv6 mroute active
Step 7 show ipv6 rpf ipv6-prefix Checks RPF information for a given unicast host address
and prefix.
Example:
Router# show ipv6 rpf 2001:0DB8::1:1:2
SUMMARY STEPS
1. enable
2. configure terminal
3. router bgp as-number
4. neighbor peer-group-name peer-group
5. neighbor {ip-address | ipv6-address | peer-group-name} remote-as as-number
DETAILED STEPS
Example:
Router# configure terminal
Step 3 router bgp as-number Enters router configuration mode for the specified BGP
routing process.
Example:
Router(config)# router bgp 65000
Step 4 neighbor peer-group-name peer-group Creates an multicast BGP peer group.
Example:
Router(config-router)# neighbor group1
peer-group
Step 5 neighbor {ip-address | ipv6-address | Adds the IPv6 address of the neighbor in the specified
peer-group-name} remote-as as-number autonomous system to the IPv6 multicast BGP neighbor
table of the local router.
Example: • The ipv6-address argument in the neighbor remote-as
Router(config-router)# neighbor command must be in the form documented in RFC 2373
2001:0DB8:0:CC00::1 remote-as 64600
where the address is specified in hexadecimal using
16-bit values between colons.
Step 6 address-family ipv6 [unicast | multicast] Specifies the IPv6 address family, and enters address family
configuration mode.
Example: • The unicast keyword specifies the IPv6 unicast address
Router(config-router)# address-family ipv6 family. By default, the router is placed in configuration
multicast mode for the IPv6 unicast address family if the unicast
keyword is not specified with the address-family ipv6
command.
• The multicast keyword specifies IPv6 multicast
address prefixes.
Example:
Router(config-router-af)# neighbor
2001:0DB8:0:CC00::1 peer-group group1
What to Do Next
Refer to the section “Configuring an IPv6 Multiprotocol BGP Peer Group” in the Implementing
Multiprotocol BGP for IPv6 implementation guide and the “Configure BGP Peer Groups” section of the
“Configuring BGP” chapter in the Cisco IOS IP Configuration Guide, Release 12.4, for more information
on assigning options to peer groups and making a BGP or multicast BGP neighbor a member of a peer
group.
SUMMARY STEPS
1. enable
2. configure terminal
3. router bgp as-number
4. address-family ipv6 [unicast | multicast]
5. network ipv6-address/prefix-length
DETAILED STEPS
Example:
Router# configure terminal
What to Do Next
Refer to the section “Advertising Routes into IPv6 Multiprotocol BGP” in the Implementing
Multiprotocol BGP for IPv6 implementation guide for more information on assigning options to peer
groups and making a BGP or multicast BGP neighbor a member of a peer group.
SUMMARY STEPS
1. enable
2. configure terminal
DETAILED STEPS
Example:
Router# configure terminal
Step 3 router bgp as-number Enters router configuration mode for the specified BGP
routing process.
Example:
Router(config)# router bgp 65000
Step 4 address-family ipv6 {unicast | multicast} Specifies the IPv6 address family, and enters address family
configuration mode.
Example: • The unicast keyword specifies the IPv6 unicast address
Router(config-router)# address-family ipv6 family. By default, the router is placed in configuration
multicast mode for the IPv6 unicast address family if the unicast
keyword is not specified with the address-family ipv6
command.
• The multicast keyword specifies IPv6 multicast
address prefixes.
Step 5 redistribute protocol [process-id] [level-1 | Specifies the routing protocol from which prefixes should
level-1-2 | level-2] [metric metric-value] be redistributed into IPv6 multicast BGP.
[metric-type {internal | external}] [route-map
map-name] • The protocol argument can be one of the following
keywords: bgp, connected, isis, rip, or static.
Example: Note The connected keyword refers to routes that are
Router(config-router-af)# redistribute rip established automatically by IPv6 having been
enabled on an interface.
What to Do Next
Refer to the section “Redistributing Prefixes into IPv6 Multiprotocol BGP” in the Implementing
Multiprotocol BGP for IPv6 implementation guide for more information on assigning options to peer
groups and making a BGP or multicast BGP neighbor a member of a peer group.
To configure aggregate addresses for Multicast BGP, refer to the “Configuring Aggregate Addresses”
section of the “Configuring BGP” chapter in the Cisco IOS IP Configuration Guide, Release 12.4.
Caution Changing the administrative distance of BGP internal routes is considered dangerous and is not
recommended. One problem that can arise is the accumulation of routing table inconsistencies, which
can break routing.
SUMMARY STEPS
1. enable
2. configure terminal
3. router bgp as-number
4. address-family ipv6 [unicast | multicast}
5. distance bgp external-distance internal-distance local-distance
DETAILED STEPS
Example:
Router# configure terminal
Step 3 router bgp as-number Enters router configuration mode for the specified routing
process.
Example:
Router(config)# router bgp 100
Example:
Router(config-router)# distance bgp 20 20 200
SUMMARY STEPS
1. enable
2. configure terminal
3. router bgp as-number
4. address-family ipv6 [unicast | multicast}
5. neighbor ipv6-address translate-update ipv6 multicast [unicast]
DETAILED STEPS
Example:
Router# configure terminal
Step 3 router bgp as-number Enters router configuration mode for the specified routing
process.
Example:
Router(config)# router bgp 100
Example:
Router(config-router)# neighbor
2001:0DB8:7000::2 translate-update ipv6
multicast
SUMMARY STEPS
1. enable
2. clear bgp ipv6 {unicast | multicast} {* | autonomous-system-number | ip-address | ipv6-address |
peer-group-name} [soft] [in | out]
DETAILED STEPS
Example:
Router# clear bgp ipv6 unicast peer-group
marketing soft out
SUMMARY STEPS
1. enable
2. clear bgp ipv6 {unicast | multicast} external [soft] [in | out]
DETAILED STEPS
Example:
Router# clear bgp ipv6 unicast external soft in
Step 3 clear bgp ipv6 {unicast | multicast} peer-group Clears all members of an IPv6 BGP peer group.
[name]
Example:
Router# clear bgp ipv6 unicast peer-group
SUMMARY STEPS
1. enable
2. clear bgp ipv6 {unicast | multicast} dampening [ipv6-prefix/prefix-length]
DETAILED STEPS
Example:
Router# clear bgp ipv6 unicast dampening
2001:0DB8:7000::/64
SUMMARY STEPS
1. enable
2. clear bgp ipv6 {unicast | multicast} flap-statistics [ipv6-prefix/prefix-length | regexp regexp |
filter-list list]
DETAILED STEPS
Example:
Router# clear bgp ipv6 multicast
flap-statistics
SUMMARY STEPS
1. enable
2. show ipv6 mfib [link-local | ipv6-prefix/prefix-length | group-name | group-address [source-name |
source-address]] [verbose]
3. show ipv6 mfib [link-local | group-name | group-address] active [kbps]
4. show ipv6 mfib [link-local | group-name | group-address [source-name | source-address]] count
5. show ipv6 mfib interface
6. show ipv6 mfib status
DETAILED STEPS
Example:
Router# show ipv6 mfib
Step 3 show ipv6 mfib [link-local | group-name | Displays the rate at which active sources are sending to
group-address] active [kbps] multicast groups.
Example:
Router# show ipv6 mfib active
Step 4 show ipv6 mfib [link-local | group-name | Displays summary traffic statistics from the MFIB about the
group-address [source-name | source-address]] group and source.
count
Example:
Router# show ipv6 mfib count
Step 5 show ipv6 mfib interface Displays information about IPv6 multicast-enabled
interfaces and their forwarding status.
Example:
Router# show ipv6 mfib interface
Step 6 show ipv6 mfib status Displays general MFIB configuration and operational
status.
Example:
Router# show ipv6 mfib status
Step 7 show ipv6 mfib summary Displays summary information about the number of IPv6
MFIB entries and interfaces.
Example:
Router# show ipv6 mfib summary
SUMMARY STEPS
1. enable
DETAILED STEPS
Example:
Router# clear ipv6 mfib counters FF04::10
Note This task disables PIM completely, not just embedded RP support in IPv6 PIM.
SUMMARY STEPS
1. enable
2. configure terminal
3. no ipv6 pim rp embedded
4. interface type number
5. no ipv6 pim
DETAILED STEPS
Example:
Router# configure terminal
Step 3 no ipv6 pim rp embedded Disables embedded RP support in IPv6 PIM.
Example:
Router(config)# no ipv6 pim rp embedded
Step 4 interface type number Specifies an interface type and number, and places the
router in interface configuration mode.
Example:
Router(config)# interface FastEthernet 1/0
Step 5 no ipv6 pim Turns off IPv6 PIM on a specified interface.
Example:
Router(config-if)# no ipv6 pim
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. no ipv6 pim
DETAILED STEPS
Example:
Router# configure terminal
Step 3 interface type number Specifies an interface type and number, and places the
router in interface configuration mode.
Example:
Router(config)# interface FastEthernet 1/0
Step 4 no ipv6 pim Turns off IPv6 PIM on a specified interface.
Example:
Router(config-if)# no ipv6 pim
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. no ipv6 mld router
DETAILED STEPS
Example:
Router# configure terminal
SUMMARY STEPS
1. enable
2. configure terminal
3. no ipv6 mfib
DETAILED STEPS
Example:
Router# configure terminal
Step 3 no ipv6 mfib Disables IPv6 multicast forwarding on the router.
Example:
Router(config)# no ipv6 mfib
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 mfib-mode centralized-only
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 mfib-mode centralized-only Disables distributed forwarding on a distributed platform.
Example:
Router(config)# ipv6 mfib-mode centralized-only
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. no ipv6 mfib cef output
DETAILED STEPS
Example:
Router# configure terminal
Step 3 interface type number Specifies an interface type and number, and places the
router in interface configuration mode.
Example:
Router(config)# interface FastEthernet 1/0
Step 4 no ipv6 mfib cef output Disables MFIB interrupt-level IPv6 multicast forwarding of
outgoing packets on a specific interface.
Example:
Router(config-if)# no ipv6 mfib cef output
SUMMARY STEPS
1. enable
2. debug ipv6 mfib [group-name | group-address] [adjacency | signal | db | init | mrib | pak | ps]
3. debug ipv6 mld [group-name | group-address | interface-type]
4. debug ipv6 mld explicit [group-name | group-address]
5. debug ipv6 pim [group-name | group-address | interface-type | neighbor | bsr]
6. debug bgp ipv6 {unicast | multicast} dampening [prefix-list prefix-list-name]
7. debug bgp ipv6 {unicast | multicast} updates [ipv6-address] [prefix-list prefix-list-name] [in |
out]
8. debug ipv6 mrib client
9. debug ipv6 mrib io
10. debug ipv6 mrib proxy
11. debug ipv6 mrib route [group-name | group-address]
12. debug ipv6 mrib table
DETAILED STEPS
Example:
Router# debug ipv6 mfib pak FF04::10
Step 3 debug ipv6 mld [group-name | group-address | Enables debugging on MLD protocol activity.
interface-type]
Example:
Router# debug ipv6 mld
Step 4 debug ipv6 mld explicit [group-name | Displays information related to the explicit tracking of
group-address] hosts.
Example:
Router# debug ipv6 mld explicit
Step 5 debug ipv6 pim [group-name | group-address | Enables debugging on PIM protocol activity.
interface-type | neighbor | bsr]
Example:
Router# debug ipv6 pim
Step 6 debug bgp ipv6 {unicast | multicast} dampening Displays debugging messages for IPv6 BGP dampening.
[prefix-list prefix-list-name]
Example:
Router# debug bgp ipv6 multicast
Step 7 debug bgp ipv6 {unicast | multicast} updates Displays debugging messages for IPv6 BGP update packets.
[ipv6-address] [prefix-list prefix-list-name]
[in | out]
Example:
Router# debug bgp ipv6 multicast updates
Step 8 debug ipv6 mrib client Enables debugging on MRIB client management activity.
Example:
Router# debug ipv6 mrib client
Step 9 debug ipv6 mrib io Enables debugging on MRIB I/O events.
Example:
Router# debug ipv6 mrib io
Example:
Router# debug ipv6 mrib route
Step 12 debug ipv6 mrib table Enables debugging on MRIB table management activity.
Example:
Router# debug ipv6 mrib table
Examples
This section provides the following output examples:
• Sample Output for the show ipv6 mfib Command, page 61
• Sample Output for the show ipv6 mfib active Command, page 61
• Sample Output for the show ipv6 mfib count Command, page 61
• Sample Output for the show ipv6 mfib interface Command, page 62
• Sample Output for the show ipv6 mfib summary Command, page 62
• Sample Output for the show ipv6 mld groups Command, page 62
• Sample Output for the show ipv6 mld groups summary Command, page 63
• Sample Output for the show ipv6 mld interface Command, page 63
• Sample Output for the show ipv6 mld traffic Command, page 63
• Sample Output for the show ipv6 mld traffic Command, page 63
• Sample Output for the show ipv6 mrib client Command, page 64
• Sample Output for the show ipv6 mrib route Command, page 64
• Sample Output for the show ipv6 mroute Command, page 64
• Sample Output for the show ipv6 mroute active Command, page 64
• Sample Output for the show ipv6 pim bsr Command, page 65
• Sample Output for the show ipv6 pim group-map Command, page 65
• Sample Output for the show ipv6 pim interface Command, page 65
• Sample Output for the show ipv6 pim join-prune statistic Command, page 65
• Sample Output for the show ipv6 pim neighbor Command, page 66
• Sample Output for the show ipv6 pim range-list Command, page 66
• Sample Output for the show ipv6 pim topology Command, page 66
• Sample Output for the show ipv6 pim traffic Command, page 67
• Sample Output for the show ipv6 pim tunnel Command, page 67
IP Multicast Statistics
54 routes, 7 groups, 0.14 average sources per group
Forwarding Counts: Pkt Count/Pkts per second/Avg Pkt Size/Kilobits per second
Other counts: Total/RPF failed/Other drops(OIF-null, rate-limit etc)
Group: FF00::/8
RP-tree: Forwarding: 0/0/0/0, Other: 0/0/0
Group: FF00::/15
RP-tree: Forwarding: 0/0/0/0, Other: 0/0/0
Group: FF05::1
RP-tree: Forwarding: 2/0/100/0, Other: 0/0/0
Source: 10::1:1:200, Forwarding: 367/10/100/7, Other: 0/0/0
Tot. shown: Source count: 1, pkt count: 369
Group: FF10::/15
RP-tree: Forwarding: 0/0/0/0, Other: 0/0/0
Group: FF20::/15
RP-tree: Forwarding: 0/0/0/0, Other: 0/0/0
Sample Output for the show ipv6 mld groups summary Command
The following is sample output from the show ipv6 mld groups summary command:
Router# show ipv6 mld groups summary
Received Sent
Valid MLD Packets 3 1
Queries 1 0
Reports 2 1
Leaves 0 0
Mtrace packets 0 0
Errors:
Malformed Packets 0
Bad Checksums 0
Martian source 0
Packets Received on MLD-disabled Interface 0
IP MRIB client-connections
igmp:145 (connection id 0)
pim:146 (connection id 1)
mfib ipv6:3 (connection id 2)
slot 3 mfib ipv6 rp agent:16 (connection id 3)
slot 1 mfib ipv6 rp agent:16 (connection id 4)
slot 0 mfib ipv6 rp agent:16 (connection id 5)
slot 4 mfib ipv6 rp agent:16 (connection id 6)
slot 2 mfib ipv6 rp agent:16 (connection id 7)
Source:2001:0DB8:1:1:1
Rate:11 pps/8 kbps(1sec), 8 kbps(last 8 sec)
FF33::/32*
SSM
Info source:Static
Uptime:00:08:32, Groups:0
FF34::/32*
SSM
Info source:Static
Uptime:00:09:42, Groups:0
Ethernet0 on 0 30 1
Address:FE80::208:20FF:FE08:D7FF
DR :this system
POS1/0 on 0 30 1
Address:FE80::208:20FF:FE08:D554
DR :this system
POS4/0 on 1 30 1
Address:FE80::208:20FF:FE08:D554
DR :FE80::250:E2FF:FE8B:4C80
POS4/1 on 0 30 1
Address:FE80::208:20FF:FE08:D554
DR :this system
Loopback0 on 0 30 1
Address:FE80::208:20FF:FE08:D554
DR :this system
Sample Output for the show ipv6 pim join-prune statistic Command
The following example provides the join/prune aggregation on Ethernet interface 0/0/0:
Router# show ipv6 pim join-prune statistic Ethernet0/0/0
Ethernet0/0/0 0 / 0 / 0 1 / 0 / 0
(*,FF05::1)
SM UP:02:26:56 JP:Join(now) Flags:LH
RP:2001:0DB8:1:1:2
RPF:Ethernet1/1,FE81::1
Ethernet0/1 02:26:56 fwd LI LH
(2001:0DB8:1:1:200,FF05::1)
SM UP:00:00:07 JP:Null(never) Flags:
RPF:Ethernet1/1,FE80::30:1:4
Ethernet1/1 00:00:07 off LI
Received Sent
Valid PIM Packets 22 22
Hello 22 22
Join-Prune 0 0
Register 0 0
Register Stop 0 0
Assert 0 0
Bidir DF Election 0 0
Errors:
Malformed Packets 0
Bad Checksums 0
Send Errors 0
Packet Sent on Loopback Errors 0
Packets Received on PIM-disabled Interface 0
Packets Received with Unknown PIM Version 0
Tunnel0*
Type :PIM Encap
RP :100::1
Source:100::1
Tunnel0*
Type :PIM Decap
RP :100::1
Source: -
The following is sample output from the show ipv6 pim tunnel command on a non-RP:
Router# show ipv6 pim tunnel
Tunnel0*
Type :PIM Encap
RP :100::1
Source:2001::1:1:1
The following example configures MLD reporting for a specified group and source, allows the user to
perform IPv6 multicast receiver access control, and statically forwards traffic for the multicast group
onto FastEthernet interface 1/0:
Router> enable
Router# configure terminal
Router(config)# interface FastEthernet 1/0
Router(config)# ipv6 mld join-group FF04::10
Router(config)# ipv6 mld static-group FF04::10 100::1
Router(config)# ipv6 mld access-group acc-grp-1
Additional References
The following sections provide references related to the Implementing IPv6 Multicast feature.
Related Documents
Related Topic Document Title
IPv6 multicast addresses “Implementing IPv6 Addressing and Basic Connectivity,” Cisco IOS
IPv6 Configuration Guide
IPv6 supported feature list “Start Here: Cisco IOS Software Release Specifics for IPv6
Features,” Cisco IOS IPv6 Configuration Guide
Multicast BGP for IPv6 “Implementing Multiprotocol BGP for IPv6,” Cisco IOS IPv6
Configuration Guide
IPv6 static routes “Implementing Static Routes for IPv6,” Cisco IOS IPv6
Configuration Guide
IPv6 tunnels “Implementing Tunneling for IPv6,” Cisco IOS IPv6 Configuration
Guide
IPv6 commands: complete command syntax, command Cisco IOS IPv6 Command Reference
mode, defaults, usage guidelines, and examples
IPv4 configuration information “IP Multicast Features Roadmap,” Cisco IOS IP Multicast
Configuration Guide
IPv4 command reference Cisco IOS IP Multicast Command Reference
MIBs
MIBs MIBs Link
No new or modified MIBs are supported, and support To locate and download MIBs for selected platforms, Cisco IOS
for existing MIBs has not been modified. releases, and feature sets, use Cisco MIB Locator found at the
following URL:
http://www.cisco.com/go/mibs
RFCs
RFCs Title
RFC 2373 IP Version 6 Addressing Architecture
RFC 2460 Internet Protocol, Version 6 (IPv6) Specification
RFC 2461 Neighbor Discovery for IP version 6 (IPv6)
RFC 2462 IPv6 Stateless Address Autoconfiguration
RFC 3576 Change of Authorization
RFC 3590 Source Address Selection for the Multicast Listener Discovery
(MLD) Protocol
RFC 3810 Multicast Listener Discovery Version 2 (MLDv2) for IPv6
RFC 4007 IPv6 Scoped Address Architecture
Technical Assistance
Description Link
The Cisco Support website provides extensive online http://www.cisco.com/techsupport
resources, including documentation and tools for
troubleshooting and resolving technical issues with
Cisco products and technologies.
To receive security and technical information about
your products, you can subscribe to various services,
such as the Product Alert Tool (accessed from Field
Notices), the Cisco Technical Services Newsletter, and
Really Simple Syndication (RSS) Feeds.
Access to most tools on the Cisco Support website
requires a Cisco.com user ID and password.
Command Reference
The following commands are introduced or modified in the feature or features documented in this
module. For information about these commands, see the Cisco IOS IPv6 Command Reference at
http://www.cisco.com/en/US/docs/ios/ipv6/command/reference/ipv6_book.html. For information about
all Cisco IOS commands, use the Command Lookup Tool at http://tools.cisco.com/Support/CLILookup
or the Cisco IOS Master Command List, All Releases, at
http://www.cisco.com/en/US/docs/ios/mcl/all_release/all_mcl.html.
• aaa accounting multicast default
• aaa authorization multicast default
• aaa new-model
• clear ipv6 mfib counters
• clear ipv6 mld counters
• clear ipv6 mld traffic
Note Table 1 lists only the Cisco IOS software release that introduced support for a given feature in a given
Cisco IOS software release train. Unless noted otherwise, subsequent releases of that Cisco IOS
software release train also support that feature.
IPv6 multicast: address family support for 12.0(26)S This feature provides multicast BGP extensions for IPv6
multiprotocol BGP 12.2(25)S and supports the same features and functionality as IPv4
12.2(28)SB BGP.
12.2(25)SG The following sections provide information about this
12.2(33)SRA feature:
12.2(33)SXH
12.3(4)T • Multiprotocol BGP for the IPv6 Multicast Address
12.4 Family, page 18
12.4(2)T • Configuring IPv6 Multiprotocol BGP, page 42
Cisco IOS XE
Release 2.1 • Troubleshooting IPv6 Multicast, page 58
CCDE, CCENT, Cisco Eos, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, Cisco TelePresence, the Cisco logo, DCE, and Welcome to the Human
Network are trademarks; Changing the Way We Work, Live, Play, and Learn and Cisco Store are service marks; and Access Registrar, Aironet,
AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork
Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation,
EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, iQ
Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone, MeetingPlace,
MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare,
SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx logo
are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply
a partnership relationship between Cisco and any other company. (0807R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and
figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and
coincidental.
Finding Support Information for Platforms and Cisco IOS and Catalyst OS Software Images
Use Cisco Feature Navigator to find information about platform support and Cisco IOS and Catalyst OS
software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An
account on Cisco.com is not required.
Contents
• Prerequisites for Implementing NAT-PT, page 2
• Restrictions for Implementing NAT-PT, page 2
• Information About Implementing NAT-PT, page 2
• How to Implement NAT-PT, page 5
• Configuration Examples for NAT-PT, page 18
• Where to Go Next, page 19
• Additional References, page 19
• Command Reference, page 21
• Feature Information for Implementing NAT-PT, page 22
Americas Headquarters:
Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA
NAT-PT
NAT-PT for Cisco IOS software was designed using RFC 2766 and RFC 2765 as a migration tool to help
customers transition their IPv4 networks to IPv6 networks. Using a protocol translator between IPv6 and
IPv4 allows direct communication between hosts speaking a different network protocol. Users can use
either static definitions or IPv4-mapped definitions for NAT-PT operation.
Figure 30 shows NAT-PT runs on a router between an IPv6 network and an IPv4 network to connect an
IPv6-only node with an IPv4-only node.
IPv6C-2
Implementing NAT Protocol Translation
Information About Implementing NAT-PT
82874
IPv6
IPv4
network
NAT-PT
IPv4-only
IPv6-only node
node
Although IPv6 solves addressing issues for customers, a long transition period is likely before customers
move to an exclusive IPv6 network environment. During the transition period any new IPv6-only
networks will need to continue to communicate with existing IPv4 networks. NAT-PT is designed to be
deployed to allow direct communication between IPv6-only networks and IPv4-only networks. For a
service provider customer an example could be an IPv6-only client trying to access an IPv4-only web
server. Enterprise customers will also migrate to IPv6 in stages, and many of their IPv4-only networks
will be operational for several years. Dual stack networks may have some IPv6-only hosts configured to
take advantage of the IPv6 autoconfiguration, global addressing, and simpler management, and these
hosts can use NAT-PT to communicate with existing IPv4-only networks in the same organization.
One of the benefits of NAT-PT is that no changes are required to existing hosts because all the NAT-PT
configurations are performed at the NAT-PT router. Customers with existing stable IPv4 networks can
introduce an IPv6 network and use NAT-PT to allow communication without disrupting the existing
network. To further illustrate the seamless transition, File Transfer Protocol (FTP) can be used between
IPv4 and IPv6 networks just as within an IPv4 network. Packet fragmentation is enabled by default when
IPv6 is configured, allowing IPv6 and IPv4 networks to resolve fragmentation problems between the
networks. Without the ability to resolve fragmentation, connectivity could become intermittent when
fragmented packets might be dropped or improperly interpreted.
Cisco has developed other transition techniques including dual stack, IPv6 over MPLS, and tunneling.
NAT-PT should not be used when other native communication techniques exist. If a host is configured
as a dual stack host with both IPv4 and IPv6, we do not recommend using NAT-PT to communicate
between the dual stack host and an IPv6-only or IPv4-only host. NAT-PT is not recommended for a
scenario in which an IPv6-only network is trying to communicate to another IPv6-only network via an
IPv4 backbone or vice versa, because NAT-PT would require a double translation to be performed. In
this scenario, tunneling techniques would be recommended.
The following sections describe the operations that may be used to configure NAT-PT. Users have the
option to use one of the following operations for NAT-PT operation, but not all four.
IPv6C-3
Implementing NAT Protocol Translation
Information About Implementing NAT-PT
If you have multiple IPv6-only or IPv4-only hosts that need to communicate, you may need to configure
many static NAT-PT mappings. Static NAT-PT is useful when applications or servers require access to a
stable IPv4 address. Accessing an external IPv4 DNS server is an example where static NAT PT can be
used.
82874
IPv6
network IPv4
NAT-PT
IPv4-only
IPv6-only node
node
IPv6-only IPv4-only
node node
82876
B IPv6 D
IPv4
network
NAT-PT
2001:0DB8:bbbb:1::1 192.168.30.1
Dynamic NAT-PT translation operation requires at least one static mapping for the IPv4 DNS server.
After the IPv6 to IPv4 connection is established, the reply packets going from IPv4 to IPv6 take
advantage of the previously established dynamic mapping to translate back from IPv4 to IPv6. If the
connection is initiated by an IPv4-only host then the explanation is reversed.
IPv6C-4
Implementing NAT Protocol Translation
How to Implement NAT-PT
V61
V62 e0-190.1.1.101
IPv4 Network
NAT-PT Router
V63
95669
IPv6 Network
IPv4-Mapped Operation
Customers can also send traffic from their IPv6 network to an IPv4 network without configuring IPv6
destination address mapping. A packet arriving at an interface is checked to discover if it has a NAT-PT
prefix that was configured with the ipv6 nat prefix v4-mapped command. If the prefix does match, then
an access-list check is performed to discover if the source address matches the access list or prefix list.
If the prefix does not match, the packet is dropped.
If the prefix matches, source address translation is performed. If a rule has been configured for the source
address translation, the last 32 bits of the destination IPv6 address is used as the IPv4 destination and a
flow entry is created.
IPv6C-5
Implementing NAT Protocol Translation
How to Implement NAT-PT
NAT-PT Prefix
An IPv6 prefix with a prefix length of 96 must be specified for NAT-PT to use. The IPv6 prefix can be
a unique local unicast prefix, a subnet of your allocated IPv6 prefix, or even an extra prefix obtained
from your Internet service provider (ISP). The NAT-PT prefix is used to match a destination address of
an IPv6 packet. If the match is successful, NAT-PT will use the configured address mapping rules to
translate the IPv6 packet to an IPv4 packet. The NAT-PT prefix can be configured globally or with
different IPv6 prefixes on individual interfaces. Using a different NAT-PT prefix on several interfaces
allows the NAT-PT router to support an IPv6 network with multiple exit points to IPv4 networks.
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 nat prefix ipv6-prefix/prefix-length
4. interface type number
5. ipv6 address ipv6-prefix {/prefix-length | link-local}
6. ipv6 nat
7. exit
8. interface type number
9. ip address ip-address mask [secondary]
10. ipv6 nat
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 nat prefix ipv6-prefix/prefix-length Assigns an IPv6 prefix as a global NAT-PT prefix.
• Matching destination prefixes in IPv6 packets are
Example: translated by NAT-PT.
Router# ipv6 nat prefix 2001:0db8::/96
• The only prefix length supported is 96.
IPv6C-6
Implementing NAT Protocol Translation
How to Implement NAT-PT
Example:
Router(config-if)# ipv6 address
2001:0db8:yyyy:1::9/64
Step 6 ipv6 nat Enables NAT-PT on the interface.
Example:
Router(config-if)# ipv6 nat
Step 7 exit Exits interface configuration mode, and returns the router to
global configuration mode.
Example:
Router(config-if)# exit
Step 8 interface type number Specifies an interface type and number, and places the
router in interface configuration mode.
Example:
Router(config)# interface ethernet 3/3
Step 9 ip address ip-address mask [secondary] Specifies an IP address and mask assigned to the interface
and enables IP processing on the interface.
Example:
Router(config-if)# ip address 192.168.30.9
255.255.255.0
Step 10 ipv6 nat Enables NAT-PT on the interface.
Example:
Router(config-if)# ipv6 nat
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ipv6 nat prefix ipv6-prefix v4-mapped {access-list-name | ipv6-prefix}
IPv6C-7
Implementing NAT Protocol Translation
How to Implement NAT-PT
DETAILED STEPS
Example:
Router# configure terminal
Step 3 interface type number Specifies an interface type and number, and places the
router in interface configuration mode.
Example:
Router(config)# interface ethernet 3/1
Step 4 ipv6 nat prefix ipv6-prefix v4-mapped Enables customers to send traffic from their IPv6 network
{access-list-name | ipv6-prefix} to an IPv4 network without configuring IPv6 destination
address mapping.
Example:
Router(config-if)# ipv6 nat prefix 2001::/96
v4-mapped v4map_acl
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 nat v6v4 source ipv6-address ipv4-address
or
ipv6 nat v6v4 source {list access-list-name | route-map map-name} pool name
4. ipv6 nat v6v4 pool name start-ipv4 end-ipv4 prefix-length prefix-length
5. ipv6 nat translation [max-entries number] {timeout | udp-timeout | dns-timeout | tcp-timeout |
finrst-timeout | icmp-timeout} {seconds | never}
6. ipv6 access-list access-list-name
7. permit {protocol} {source-ipv6-prefix/prefix-length | any | host source-ipv6-address} [operator
[port-number]] {destination-ipv6-prefix/prefix-length | any | host destination-ipv6-address}
8. exit
9. show ipv6 nat translations [icmp | tcp | udp] [verbose]
10. show ipv6 nat statistics
IPv6C-8
Implementing NAT Protocol Translation
How to Implement NAT-PT
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 nat v6v4 source ipv6-address ipv4-address Enables a static IPv6 to IPv4 address mapping using
or NAT-PT.
ipv6 nat v6v4 source {list access-list-name |
route-map map-name} pool name or
Enables a dynamic IPv6 to IPv4 address mapping using
Example: NAT-PT.
Router(config)# ipv6 nat v6v4 source
• Use the list or route-map keyword to specify a prefix
2001:0db8:yyyy:1::1 10.21.8.10
list, access list, or a route map to define which packets
are translated.
Example:
• Use the pool keyword to specify the name of a pool of
Router(config)# ipv6 nat v6v4 source list
pt-list1 pool v4pool addresses, created by the ipv6 nat v6v4 pool command,
to be used in dynamic NAT-PT address mapping.
Step 4 ipv6 nat v6v4 pool name start-ipv4 end-ipv4 Specifies a pool of IPv4 addresses to be used by NAT-PT for
prefix-length prefix-length dynamic address mapping.
Example:
Router(config)# ipv6 nat v6v4 pool v4pool
10.21.8.1 10.21.8.10 prefix-length 24
Step 5 ipv6 nat translation [max-entries number] (Optional) Specifies the time after which NAT-PT
{timeout | udp-timeout | dns-timeout | translations time out.
tcp-timeout | finrst-timeout | icmp-timeout}
{seconds | never}
Example:
Router(config)# ipv6 nat translation
udp-timeout 600
Step 6 ipv6 access-list access-list-name (Optional) Defines an IPv6 access list and enters IPv6
access list configuration mode. The router prompt changes
to Router(config-ipv6-acl)#.
Example:
Router(config)# ipv6 access-list pt-list1 • The access-list name argument specifies the name of
the IPv6 access control list (ACL). IPv6 ACL names
cannot contain a space or quotation mark, or begin with
a numeral.
IPv6C-9
Implementing NAT Protocol Translation
How to Implement NAT-PT
Example:
Router> show ipv6 nat statistics
What to Do Next
If you do not require any IPv4 to IPv6 mappings, proceed to the “Verifying NAT-PT Configuration and
Operation” task.
IPv6C-10
Implementing NAT Protocol Translation
How to Implement NAT-PT
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 nat v4v6 source ipv4-address ipv6-address
or
ipv6 nat v4v6 source list {access-list-number | name} pool name
4. ipv6 nat v4v6 pool name start-ipv6 end-ipv6 prefix-length prefix-length
5. access-list {access-list-name | number} {deny | permit} [source source-wildcard] [log]
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 nat v4v6 source ipv6-address ipv4-address Enables a static IPv4 to IPv6 address mapping using
or NAT-PT.
ipv6 nat v4v6 source list {access-list-number |
name} pool name or
Enables a dynamic IPv4 to IPv6 address mapping using
Example: NAT-PT.
Router(config)# ipv6 nat v4v6 source 10.21.8.11
• Use the list keyword to specify an access list to define
2001:0db8:yyyy::2
or which packets are translated.
Router(config)# ipv6 nat v4v6 source list 1 • Use the pool keyword to specify the name of a pool of
pool v6pool
addresses, created by the ipv6 nat v4v6 pool command,
to be used in dynamic NAT-PT address mapping.
IPv6C-11
Implementing NAT Protocol Translation
How to Implement NAT-PT
Example:
Router(config)# ipv6 nat v4v6 pool v6pool
2001:0db8:yyyy::1 2001:0db8:yyyy::2
prefix-length 128
Step 5 access-list {access-list-name | number} {deny | Specifies an entry in a standard IPv4 access list.
permit} [source source-wildcard] [log]
Example:
Router(config)# access-list 1 permit
192.168.30.0 0.0.0.255
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 nat v6v4 source {list access-list-name | route-map map-name} pool name overload
or
ipv6 nat v6v4 source {list access-list-name | route-map map-name} interface interface name
overload
4. ipv6 nat v6v4 pool name start-ipv4 end-ipv4 prefix-length prefix-length
5. ipv6 nat translation [max-entries number] {timeout | udp-timeout | dns-timeout | tcp-timeout |
finrst-timeout | icmp-timeout} {seconds | never}
6. ipv6 access-list access-list-name
7. permit {protocol} {source-ipv6-prefix/prefix-length | any | host source-ipv6-address} [operator
[port-number]] {destination-ipv6-prefix/prefix-length | any | host destination-ipv6-address}
IPv6C-12
Implementing NAT Protocol Translation
How to Implement NAT-PT
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 nat v6v4 source {list access-list-name | Enables a dynamic IPv6 to IPv4 address overload mapping
route-map map-name} pool name overload using a pool address.
or
ipv6 nat v6v4 source {list access-list-name | or
route-map map-name} interface interface name
overload Enables a dynamic IPv6 to IPv4 address overload mapping
using an interface address.
Example:
Router(config)# ipv6 nat v6v4 pool v4pool
10.21.8.1 10.21.8.10 prefix-length 24
Step 5 ipv6 nat translation [max-entries number] (Optional) Specifies the time after which NAT-PT
{timeout | udp-timeout | dns-timeout | translations time out.
tcp-timeout | finrst-timeout | icmp-timeout}
{seconds | never}
Example:
Router(config)# ipv6 nat translation
udp-timeout 600
IPv6C-13
Implementing NAT Protocol Translation
How to Implement NAT-PT
What to Do Next
If you do not require any Ipv6-to-IPv4 or IPv4-to-IPv6 mappings, proceed to the “Verifying NAT-PT
Configuration and Operation” task.
SUMMARY STEPS
IPv6C-14
Implementing NAT Protocol Translation
How to Implement NAT-PT
2. enable
3. debug ipv6 nat [detailed]
4. debug ipv6 nat [port]
DETAILED STEPS
Output Examples
This section provides the following output examples:
• Sample Output for the show ipv6 nat translations Command
• Sample Output for the show ipv6 nat statistics Command
• Sample Output for the clear ipv6 nat translation Command
• Sample Output for the debug ipv6 nat Command
IPv6C-15
Implementing NAT Protocol Translation
How to Implement NAT-PT
192.168.122.10 2001:0db8::10
IPv6C-16
Implementing NAT Protocol Translation
How to Implement NAT-PT
IPv6C-17
Implementing NAT Protocol Translation
Configuration Examples for NAT-PT
Dynamic NAT-PT Configuration for IPv6 Hosts Accessing IPv4 Hosts: Example
The following example configures the NAT-PT prefix globally, enables NAT-PT on two interfaces, and
configures one static NAT-PT mapping (used, for example, to access a DNS server). A dynamic NAT-PT
mapping is also configured to map IPv6 addresses to IPv4 addresses using a pool of IPv4 addresses
named v4pool. The packets to be translated by NAT-PT are filtered using an IPv6 access list named
pt-list1. The User Datagram Protocol (UDP) translation entries are configured to time out after 10
minutes. Ethernet interface 3/1 is configured as IPv6 only, and Ethernet interface 3/3 is configured as
IPv4 only.
IPv6C-18
Implementing NAT Protocol Translation
Where to Go Next
interface Ethernet3/1
ipv6 address 2001:0db8:bbbb:1::9/64
ipv6 enable
ipv6 nat
!
interface Ethernet3/3
ip address 192.168.30.9 255.255.255.0
ipv6 nat
!
ipv6 nat v4v6 source 192.168.30.1 2001:0db8:0::2
ipv6 nat v6v4 source list pt-list1 pool v4pool
ipv6 nat v6v4 pool v4pool 10.21.8.1 10.21.8.10 prefix-length 24
ipv6 nat translation udp-timeout 600
ipv6 nat prefix 2001:0db8:1::/96
!
ipv6 access-list pt-list1
permit ipv6 2001:0db8:bbbb:1::/64 any
Dynamic NAT-PT Configuration for IPv4 Hosts Accessing IPv6 Hosts Example
The following example configures the NAT-PT prefix globally, enables NAT-PT on two interfaces, and
configures one static NAT-PT mapping (used, for example, to access a DNS server). A dynamic NAT-PT
mapping is also configured to map IPv4 addresses to IPv6 addresses using a pool of IPv6 addresses
named v6pool. The packets to be translated by NAT-PT are filtered using an access list named pt-list2.
Ethernet interface 3/1 is configured as IPv6 only, and Ethernet interface 3/3 is configured as IPv4 only.
interface Ethernet3/1
ipv6 address 2001:0db8:bbbb:1::9/64
ipv6 enable
ipv6 nat
!
interface Ethernet3/3
ip address 192.168.30.9 255.255.255.0
ipv6 nat
!
ipv6 nat v4v6 source list pt-list2 pool v6pool
ipv6 nat v4v6 pool v6pool 2001:0db8:0::1 2001:0db8:0::2 prefix-length 128
ipv6 nat v6v4 source 2001:0db8:bbbb:1::1 10.21.8.0
ipv6 nat prefix 2001:0db8:0::/96
!
access-list pt-list2 permit 192.168.30.0 0.0.0.255
Where to Go Next
If you want to implement IPv6 routing protocols, refer to the Implementing RIP for IPv6, Implementing
IS-IS for IPv6, or the Implementing Multiprotocol BGP for IPv6 module.
Additional References
The following sections provide references related to the Implementing NAT Protocol Translation feature.
IPv6C-19
Implementing NAT Protocol Translation
Additional References
Related Documents
Related Topic Document Title
IPv6 supported feature list “Start Here: Cisco IOS Software Release Specifics for IPv6
Features,” Cisco IOS IPv6 Configuration Guide
IPv6 commands: complete command syntax, command Cisco IOS IPv6 Command Reference
mode, defaults, usage guidelines, and examples
IP addressing and IP addressing services “Configuring IPv6 Addresses,” Cisco IOS IP Addressing Services
Configuration Guide
IP addressing and IP addressing services commands Cisco IOS IP Addressing Services Command Reference
Standards
Standards Title
No new or modified standards are supported by this —
feature, and support for existing standards has not been
modified by this feature.
MIBs
MIBs MIBs Link
No new or modified MIBs are supported, and support To locate and download MIBs for selected platforms, Cisco IOS
for existing MIBs has not been modified. releases, and feature sets, use Cisco MIB Locator found at the
following URL:
http://www.cisco.com/go/mibs
RFCs
RFCs Title
RFC 2765 Stateless IP/ICMP Translation Algorithm (SIIT)
RFC 2766 Network Address Translation - Protocol Translation (NAT-PT)
IPv6C-20
Implementing NAT Protocol Translation
Command Reference
Technical Assistance
Description Link
The Cisco Support website provides extensive online http://www.cisco.com/techsupport
resources, including documentation and tools for
troubleshooting and resolving technical issues with
Cisco products and technologies.
To receive security and technical information about
your products, you can subscribe to various services,
such as the Product Alert Tool (accessed from Field
Notices), the Cisco Technical Services Newsletter, and
Really Simple Syndication (RSS) Feeds.
Access to most tools on the Cisco Support website
requires a Cisco.com user ID and password.
Command Reference
The following commands are introduced or modified in the feature or features documented in this
module. For information about these commands, see the Cisco IOS IPv6 Command Reference at
http://www.cisco.com/en/US/docs/ios/ipv6/command/reference/ipv6_book.html. For information about
all Cisco IOS commands, use the Command Lookup Tool at http://tools.cisco.com/Support/CLILookup
or the Cisco IOS Master Command List, All Releases, at
http://www.cisco.com/en/US/docs/ios/mcl/all_release/all_mcl.html.
• clear ipv6 nat translation
• debug ipv6 nat
• ipv6 nat
• ipv6 nat max-entries
• ipv6 nat prefix
• ipv6 nat prefix v4-mapped
• ipv6 nat translation
• ipv6 nat v4v6 pool
• ipv6 nat v4v6 source
• ipv6 nat v6v4 pool
• ipv6 nat v6v4 source
• show ipv6 nat statistics
• show ipv6 nat translations
IPv6C-21
Implementing NAT Protocol Translation
Feature Information for Implementing NAT-PT
Note Table 16 lists only the Cisco IOS software release that introduced support for a given feature in a given
Cisco IOS software release train. Unless noted otherwise, subsequent releases of that Cisco IOS
software release train also support that feature.
IPv6C-22
Implementing NAT Protocol Translation
Feature Information for Implementing NAT-PT
CCDE, CCENT, Cisco Eos, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, Cisco TelePresence, the Cisco logo, DCE, and Welcome to the Human
Network are trademarks; Changing the Way We Work, Live, Play, and Learn and Cisco Store are service marks; and Access Registrar, Aironet,
AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork
Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation,
EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, iQ
Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone, MeetingPlace,
MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare,
SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx logo
are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply
a partnership relationship between Cisco and any other company. (0807R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and
figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and
coincidental.
IPv6C-23
Implementing NAT Protocol Translation
Feature Information for Implementing NAT-PT
IPv6C-24
Implementing NetFlow for IPv6
Note Effective with Cisco IOS Release 12.4(20)T, the NetFlow for IPv6 feature has been replaced by the IPv6
Flexible NetFlow feature. For information on this feature, see the Cisco IOS Flexible NetFlow Features
Roadmap.
NetFlow for IPv6 provides basic NetFlow functionality for IPv6 without affecting IPv4 NetFlow
performance.
Finding Support Information for Platforms and Cisco IOS and Catalyst OS Software Images
Use Cisco Feature Navigator to find information about platform support and Cisco IOS and Catalyst OS
software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An
account on Cisco.com is not required.
Contents
• Prerequisites for Implementing NetFlow for IPv6, page 2
• Information About Implementing NetFlow for IPv6, page 2
• How to Implement NetFlow for IPv6, page 2
• Configuration Examples for Implementing NetFlow for IPv6, page 11
• Additional References, page 12
• Command Reference, page 13
• Feature Information for Implementing NetFlow for IPv6, page 14
Americas Headquarters:
Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA
Defining the Exporting Scheme Used to Gather NetFlow for IPv6 Statistics
This task describes how to define the exporting scheme that is used to gather NetFlow for IPv6 statistics.
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 flow-export version 9 [origin-as | peer-as] [bgp-nexthop]
4. ipv6 flow-export destination ip-address udp-port
5. ipv6 flow-export template {refresh-rate packet-refresh-rate | timeout timeout-value}
6. ipv6 flow-export template options {export-stats | refresh-rate packet-refresh-rate | timeout
timeout-value}
7. interface type number
8. ipv6 flow {ingress | egress}
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 flow-export version 9 [origin-as | Enables NetFlow routing.
peer-as] [bgp-nexthop]
Example:
Router(config)# ipv6 flow-export version 9
Step 4 ipv6 flow-export destination ip-address Enables the exporting of information in NetFlow cache
udp-port entries to a specific address or port.
Example:
Router(config)# ipv6 flow-export destination
10.0.101.254 9991
Step 5 ipv6 flow-export template {refresh-rate Enables the exporting of information in NetFlow cache
packet-refresh-rate | timeout timeout-value} entries.
Example:
Router(config)# ipv6 flow-export template
timeout 60
Example:
Router(config)# ipv6 flow-export template
options export-stats
Step 7 interface type number Specifies an interface type and number, and places the router
in interface configuration mode.
Example:
Router(config)# interface atm 0
Step 8 ipv6 flow {ingress | egress} (Optional) Enables IPv6 flow capture for incoming (ingress)
or outgoing (egress) packets.
Example: Commands for ingress and egress can be specified on the
Router(config-if)# ipv6 flow ingress same interface. If a switched packet belongs to a flow that is
captured at both ingress and egress, it will be counted twice.
This command must be entered on each interface and for each
direction in which NetFlow capture is needed.
Caution Cisco recommends that you not change the number of NetFlow cache entries. Improper use of this
feature could cause network problems. To return to the default NetFlow cache entries, use the
no ip flow-cache entries global configuration command.
The following task describes how to customize the number of entries in the NetFlow cache.
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 flow-cache entries number
4. ipv6 flow-cache timeout {active minutes | inactive seconds}
5. ipv6 flow-aggregation cache {as | bgp-nexthop | destination-prefix | prefix | protocol-port |
source-prefix}
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 flow-cache entries number Changes the number of entries maintained in the NetFlow
cache.
Example:
Router(config)# ipv6 flow-cache entries
131072
Step 4 ipv6 flow-cache timeout {active minutes | Changes the timeout values for the NetFlow cache.
inactive seconds}
Example:
Router(config)# ipv6 flow-cache timeout
active 10
Step 5 ipv6 flow-aggregation cache {as | Configures the aggregation cache configuration scheme.
bgp-nexthop | destination-prefix | prefix |
protocol-port | source-prefix}
Example:
Router(config)# ipv6 flow-aggregation cache
as
SUMMARY STEPS
1. enable
2. show ip cache flow
3. clear ip flow stats
DETAILED STEPS
Example:
Router# show ip cache flow
Step 3 clear ip flow stats Clears the NetFlow statistics.
Example:
Router# clear ip flow stats
Prerequisites
To configure an aggregation cache, you must enter aggregation cache configuration mode, and you must
decide which type of aggregation scheme you want to configure: Autonomous System, Destination
Prefix, Prefix, Protocol Prefix, or Source Prefix aggregation cache. Once you define the aggregation
scheme, the following task lets you define the operational parameters for that scheme.
SUMMARY STEPS
1. enable
2. configure terminal
DETAILED STEPS
Command Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Router> enable
Step 2 configure terminal Enters global configuration mode.
Example:
Router# configure terminal
Step 3 ipv6 flow-export destination ip-address Enables the exporting of information in NetFlow cache
udp-port entries to a specific address or port.
Example:
Router(config)# ipv6 flow-export destination
10.42.42.1 9991
Step 4 ipv6 flow-aggregation cache {as | Configures the aggregation cache configuration scheme, and
bgp-nexthop | destination-prefix | prefix | places the router in NetFlow aggregation cache configuration
protocol-port | source-prefix}
mode.
Example:
Router(config)# ipv6 flow-aggregation cache
as
Step 5 cache {entries number | timeout {active Specifies the number (in this example, 2046) of cache entries
minutes | inactive seconds}} to allocate for the autonomous system aggregation cache.
Example:
Router(config-flow-cache)# cache entries 2046
Step 6 cache {entries number | timeout {active Specifies the number of seconds (in this example, 199) that
minutes | inactive seconds}} an inactive entry is allowed to remain in the aggregation
cache before it is deleted.
Example:
Router(config-flow-cache)# cache timeout
inactive 199
Command Purpose
Step 7 exit Exits NetFlow aggregation cache configuration mode, and
places the router in global configuration mode.
Example:
Router(config-flow-cache)# exit
Step 8 ipv6 flow-export destination ip-address Enables the data export.
udp-port
Example:
Router(config)# ipv6 flow-export destination
10.0.101.254 9991
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 flow-aggregation cache {as | bgp-nexthop | destination-prefix | prefix | protocol-port |
source-prefix}
4. mask {destination | source} minimum value
DETAILED STEPS
Command Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Router> enable
Step 2 configure terminal Enters global configuration mode.
Example:
Router# configure terminal
Command Purpose
Step 3 ipv6 flow-aggregation cache {as | Configures the aggregation cache configuration scheme, and
bgp-nexthop | destination-prefix | prefix | places the router in NetFlow aggregation cache configuration
protocol-port | source-prefix}
mode.
Example:
Router(config)# ipv6 flow-aggregation cache
prefix
Step 4 mask {destination | source} minimum value Configures the minimum value for the source mask.
Example:
Router(config-flow-cache)# mask source
minimum value
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 flow-aggregation cache {as | bgp-nexthop | destination-prefix | prefix | protocol-port |
source-prefix}
4. mask {destination | source} minimum value
DETAILED STEPS
Command Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Router> enable
Step 2 configure terminal Enters global configuration mode.
Example:
Router# configure terminal
Command Purpose
Step 3 ipv6 flow-aggregation cache {as | Configures the aggregation cache configuration scheme, and
bgp-nexthop | destination-prefix | prefix | places the router in NetFlow aggregation cache configuration
protocol-port | source-prefix}
mode.
Example:
Router(config)# ipv6 flow-aggregation cache
destination-prefix
Step 4 mask {destination | source} minimum value Configures the minimum value for the destination mask.
Example:
Router(config-flow-cache)# mask destination
minimum 32
Note If the minimum mask has not been explicitly configured, no minimum mask information is displayed.
The default value of the minimum mask is zero. The configurable range for the minimum mask is
from 1 to 32. An appropriate value should be chosen by the user depending on the traffic. A higher
value of the minimum mask will provide more detailed network addresses, but it may also result in
an increased number of flows in the aggregation cache.
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 flow-aggregation cache {as | bgp-nexthop | destination-prefix | prefix | protocol-port |
source-prefix}
4. mask {destination | source} minimum value
DETAILED STEPS
Command Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Router> enable
Step 2 configure terminal Enters global configuration mode.
Example:
Router# configure terminal
Command Purpose
Step 3 ipv6 flow-aggregation cache {as | Configures the aggregation cache configuration scheme, and
bgp-nexthop | destination-prefix | prefix | places the router in NetFlow aggregation cache configuration
protocol-port | source-prefix}
mode.
Example:
Router(config)# ipv6 flow-aggregation cache
source-prefix
Step 4 mask {destination | source} minimum value Configures the minimum value for the source mask.
Example:
Router(config-flow-cache)# mask source
minimum 5
The following example shows the configuration for a loopback source interface. The loopback interface
has the IPv6 address 2001:0DB8:1:1:FFFF:FFFF:FFFF:FFFE/64 and is used by the serial interface in
slot 5, port 0.
Router# configure terminal
Router(config)# interface loopback 0
Router(config-if)# ipv6 address 2001:0DB8:1:1:FFFF:FFFF:FFFF:FFFE/64
Router(config-if)# exit
Router(config)# interface serial 5/0:0
Router(config-if)# ip unnumbered loopback0
Router(config-if)# encapsulation ppp
Router(config-if)# ipv6 flow cache
Router(config-if)# exit
Router(config)# ipv6 flow-export source loopback 0
Router(config)# exit
Additional References
The following sections provide references related to the Implementing NetFlow for IPv6 feature.
Related Documents
Related Topic Document Title
Cisco IOS Flexible NetFlow Cisco IOS Flexible NetFlow Features Roadmap
NetFlow for IPv4 commands: complete command Cisco IOS NetFlow Command Reference
syntax, command mode, defaults, usage guidelines,
and examples
NetFlow for IPv6 commands Cisco IOS IPv6 Command Reference
IPv6 supported feature list Start Here: Cisco IOS Software Release Specifics for IPv6 Features
Standards
Standard Title
No new or modified standards are supported by this —
feature, and support for existing standards has not been
modified by this feature.
MIBs
MIB MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS
releases, and feature sets, use Cisco MIB Locator found at the
following URL:
http://www.cisco.com/go/mibs
RFCs
RFC Title
No new or modified RFCs are supported by this —
feature, and support for existing RFCs has not been
modified by this feature.
Technical Assistance
Description Link
The Cisco Support website provides extensive online http://www.cisco.com/techsupport
resources, including documentation and tools for
troubleshooting and resolving technical issues with
Cisco products and technologies.
To receive security and technical information about
your products, you can subscribe to various services,
such as the Product Alert Tool (accessed from Field
Notices), the Cisco Technical Services Newsletter, and
Really Simple Syndication (RSS) Feeds.
Access to most tools on the Cisco Support website
requires a Cisco.com user ID and password.
Command Reference
The following commands are introduced or modified in the feature or features documented in this
module. For information about these commands, see the Cisco IOS IPv6 Command Reference at
http://www.cisco.com/en/US/docs/ios/ipv6/command/reference/ ipv6_book.html. For information
about all Cisco IOS commands, use the Command Lookup Tool at
http://tools.cisco.com/Support/CLILookup or the Cisco IOS Master Command List, All Releases, at
http://www.cisco.com/en/US/docs/ios/mcl/all_release/all_mcl.html.
• ipv6 flow
• ipv6 flow ingress
• ipv6 flow-aggregation cache
• ipv6 flow-cache entries
• ipv6 flow-cache timeout
• ipv6 flow-export destination
• ipv6 flow-export source
• ipv6 flow-export template
• ipv6 flow-export template options
• ipv6 flow-export version 9
Note Table 1 lists only the Cisco IOS software release that introduced support for a given feature in a given
Cisco IOS software release train. Unless noted otherwise, subsequent releases of that Cisco IOS
software release train also support that feature.
CCDE, CCENT, Cisco Eos, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, Cisco TelePresence, the Cisco logo, DCE, and Welcome to the Human
Network are trademarks; Changing the Way We Work, Live, Play, and Learn and Cisco Store are service marks; and Access Registrar, Aironet,
AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork
Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation,
EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, iQ
Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone, MeetingPlace,
MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare,
SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx logo
are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply
a partnership relationship between Cisco and any other company. (0807R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and
figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and
coincidental.
The Implementing OSPF for IPv6 module expands on Open Shortest Path First (OSPF) to provide
support for IPv6 routing prefixes. This module describes the concepts and tasks you need to implement
OSPF for IPv6 on your network.
Finding Support Information for Platforms and Cisco IOS and Catalyst OS Software Images
Use Cisco Feature Navigator to find information about platform support and Cisco IOS and Catalyst OS
software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An
account on Cisco.com is not required.
Contents
• Prerequisites for Implementing OSPF for IPv6, page 2
• Restrictions for Implementing OSPF for IPv6, page 2
• Information About Implementing OSPF for IPv6, page 2
• How to Implement OSPF for IPv6, page 11
• Configuration Examples for Implementing OSPF for IPv6, page 29
• Additional References, page 30
• Command Reference, page 32
• Feature Information for Implementing OSPF for IPv6, page 35
Americas Headquarters:
Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA
The link-state ID in network LSAs and link LSAs is always the interface ID of the originating router on
the link being described. For this reason, network LSAs and link LSAs are now the only LSAs whose
size cannot be limited. A network LSA must list all routers connected to the link, and a link LSA must
list all of the address prefixes of a router on the link.
Caution Be careful when changing the defaults. Changing defaults will affect your OSPF for IPv6 network,
possibly adversely.
To configure IPSec, users configure a security policy, which is a combination of the security policy index
(SPI) and the key (the key is used to create and validate the hash value). IPSec for OSPF for IPv6 can be
configured on an interface or on an OSPF area. For higher security, users should configure a different
policy on each interface configured with IPSec. If a user configures IPSec for an OSPF area, the policy
is applied to all of the interfaces in that area, except for the interfaces that have IPSec configured directly.
Once IPSec is configured for OSPF for IPv6, IPSec is invisible to the user.
The secure socket API is used by applications to secure traffic. The API needs to allow the application
to open, listen, and close secure sockets. The binding between the application and the secure socket layer
also allows the secure socket layer to inform the application of changes to the socket, such as connection
open and close events. The secure socket API is able to identify the socket; that is, it can identify the
local and remote addresses, masks, ports, and protocol that carry the traffic requiring security.
Each interface has a secure socket state, which can be one of the following:
• NULL: Do not create a secure socket for the interface if authentication is configured for the area.
• DOWN: IPSec has been configured for the interface (or the area that contains the interface), but
OSPF for IPv6 either has not requested IPSec to create a secure socket for this interface, or there is
an error condition.
• GOING UP: OSPF for IPv6 has requested a secure socket from IPSec and is waiting for a
CRYPTO_SS_SOCKET_UP message from IPSec.
• UP: OSPF has received a CRYPTO_SS_SOCKET_UP message from IPSec.
• CLOSING: The secure socket for the interface has been closed. A new socket may be opened for the
interface, in which case the current secure socket makes the transition to the DOWN state.
Otherwise, the interface will become UNCONFIGURED.
• UNCONFIGURED: Authentication is not configured on the interface.
OSPF will not send or accept packets while in the DOWN state.
For further information on IPSec, refer to the Implementing IPSec in IPv6 Security document.
While each network might have unique characteristics that require different settings to optimize actual
network performance, these are recommended values intended as a starting point for optimizing a
OSPFv3 network. Table 2 lists the recommended value settings for OSPF cost metrics.
Using this formula, the default path costs were calculated as noted in the following list. If these values
do not suit your network, you can use your own method of calculating path costs.
• 56-kbps serial link—Default cost is 1785.
• 64-kbps serial link—Default cost is 1562.
• T1 (1.544-Mbps serial link)—Default cost is 64.
• E1 (2.048-Mbps serial link)—Default cost is 48.
• 4-Mbps Token Ring—Default cost is 25.
• Ethernet—Default cost is 10.
• 16-Mbps Token Ring—Default cost is 6.
• FDDI—Default cost is 1.
• X25—Default cost is 5208.
• Asynchronous—Default cost is 10,000.
• ATM—Default cost is 1.
To illustrate these settings, the following example shows how OSPF cost metrics might be defined for a
VMI interface:
interface vmi1
ipv6 ospf cost dynamic weight throughput 0
ipv6 ospf cost dynamic weight resources 29
ipv6 ospf cost dynamic weight latency 29
ipv6 ospf cost dynamic weight L2-factor 29
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ipv6 ospf process-id area area-id [instance instance-id]
DETAILED STEPS
Example:
Router# configure terminal
Step 3 interface type number Specifies an interface type and number, and places the
router in interface configuration mode.
Example:
Router(config)# interface ethernet 0/0
Step 4 ipv6 ospf process-id area area-id [instance Enables OSPF for IPv6 on an interface.
instance-id]
Example:
Router(config-if)# ipv6 ospf 1 area 0
This task explains how to consolidate or summarize routes for an OSPF area.
Prerequisites
OSPF for IPv6 routing must be enabled.
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 router ospf process-id
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 router ospf process-id Enables OSPF router configuration mode.
Example:
Router(config)# ipv6 router ospf 1
Step 4 area area-id range ipv6-prefix/prefix-length Consolidates and summarizes routes at an area boundary.
[advertise | not-advertise] [cost cost]
Example:
Router(config-rtr)# area range 1 2001:0DB8::/48
Prerequisites
Before you configure IPSec on an interface, you must configure OSPF for IPv6 on that interface.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ipv6 ospf authentication ipsec spi spi md5 [key-encryption-type {key | null}]
DETAILED STEPS
Example:
Router# configure terminal
Step 3 interface type number Specifies an interface type and number, and places the
router in interface configuration mode.
Example:
Router(config)# interface ethernet 0/0
Step 4 ipv6 ospf authentication ipsec spi spi md5 Specifies the authentication type for an interface.
[key-encryption-type {key | null}]
Example:
Router(config-if)# ipv6 ospf authentication
ipsec spi 500 md5
1234567890abcdef1234567890abcdef
Prerequisites
Before you configure IPSec on an interface, you must configure OSPF for IPv6 on that interface.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ipv6 ospf encryption {ipsec spi spi esp encryption-algorithm [[key-encryption-type] key]
authentication-algorithm [key-encryption-type] key | null}
DETAILED STEPS
Example:
Router# configure terminal
Step 3 interface type number Specifies an interface type and number, and places the
router in interface configuration mode.
Example:
Router(config)# interface ethernet 0/0
Step 4 ipv6 ospf encryption {ipsec spi spi esp Specifies the encryption type for an interface.
encryption-algorithm [[key-encryption-type]
key] authentication-algorithm
[key-encryption-type] key | null}
Example:
Router(config-if) ipv6 ospf encryption ipsec
spi 1001 esp null sha1
123456789A123456789B123456789C123456789D
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 router ospf process-id
4. area area-id authentication ipsec spi spi md5 [key-encryption-type] key
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 router ospf process-id Enables OSPF router configuration mode.
Example:
Router(config)# ipv6 router ospf 1
Step 4 area area-id authentication ipsec spi spi md5 Enables authentication in an OSPF area.
[key-encryption-type] key
Example:
Router(config-rtr)# area 1 authentication ipsec
spi 678 md5 1234567890ABCDEF1234567890ABCDEF
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 router ospf process-id
4. area area-id encryption ipsec spi spi esp encryption-algorithm [[key-encryption-type] key]
authentication-algorithm [key-encryption-type] key
DETAILED STEPS
Example:
Router# configure terminal
Example:
Router(config)# ipv6 router ospf 1
Step 4 area area-id encryption ipsec spi spi esp Enables encryption in an OSPF area.
encryption-algorithm [[key-encryption-type]
key] authentication-algorithm
[key-encryption-type] key
Example:
Router(config-rtr)# area 1 encryption ipsec spi
500 esp null md5
1aaa2bbb3ccc4ddd5eee6fff7aaa8bbb
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 router ospf process-id
4. area area-id virtual-link router-id authentication ipsec spi spi authentication-algorithm
[key-encryption-type] key
5. area area-id virtual-link router-id encryption ipsec spi spi esp encryption-algorithm
[[key-encryption-type] key] authentication-algorithm [key-encryption-type] key
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 router ospf process-id Enables OSPF router configuration mode.
Example:
Router(config)# ipv6 router ospf 1
Example:
Router(config-rtr)# area 1 virtual-link
10.0.0.1 authentication ipsec spi 940 md5
1234567890ABCDEF1234567890ABCDEF
Step 5 area area-id virtual-link router-id encryption Enables encryption for virtual links in an OSPF area.
ipsec spi spi esp encryption-algorithm
[[key-encryption-type] key]
authentication-algorithm [key-encryption-type]
key
Example:
Router(config-rtr)# area 1 virtual-link
10.1.0.1 hello-interval 2 dead-interval 10
encryption ipsec spi 3944 esp null sha1
123456789A123456789B123456789C123456789D
Prerequisites
Before you configure NBMA interfaces, you must perform the following tasks:
• Configure your network to be an NBMA network
• Identify each neighbor
Restrictions
• You cannot automatically detect neighbors when using NBMA interfaces. You must manually
configure your router to detect neighbors when using an NBMA interface.
• When configuring the ipv6 ospf neighbor command, the IPv6 address used must be the link-local
address of the neighbor.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
DETAILED STEPS
Example:
Router# configure terminal
Step 3 interface type number Specifies an interface type and number, and places the
router in interface configuration mode.
Example:
Router(config)# interface serial 0
Step 4 frame-relay map ipv6 ipv6-address dlci Defines the mapping between a destination IPv6 address
[broadcast] [cisco] [ietf] [payload-compression and the data-link connection identifier (DLCI) used to
{packet-by-packet | frf9 stac
[hardware-options] | data-stream stac
connect to the destination address.
[hardware-options]}] • In this example, the NBMA link is frame relay. For
other kinds of NBMA links, different mapping
Example: commands are used.
Router(config-if)# frame-relay map ipv6
FE80::A8BB:CCFF:FE00:C01 120
Step 5 ipv6 ospf neighbor ipv6-address [priority Configures an OSPF for IPv6 neighboring router.
number] [poll-interval seconds] [cost number]
[database-filter all out]
Example:
Router(config-if) ipv6 ospf neighbor
FE80::A8BB:CCFF:FE00:C01
Configuring LSA and SPF Throttling for OSPF for IPv6 Fast Convergence
This task explains how to configure LSA and SPF throttling for the OSPF for IPv6 Fast Convergence
feature.
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 router ospf process-id
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 router ospf process-id Enables OSPF router configuration mode.
Example:
Router(config)# ipv6 router ospf 1
Step 4 timers throttle spf spf-start spf-hold Turns on SPF throttling.
spf-max-wait
Example:
Router(config-rtr)# timers throttle spf 200 200
200
Step 5 timers throttle lsa start-interval Sets rate-limiting values for OSPF for IPv6 LSA
hold-interval max-interval generation.
Example:
Router(config-rtr)# timers throttle lsa 300 300
300
Step 6 timers lsa arrival milliseconds Sets the minimum interval at which the software accepts the
same LSA from OSPF neighbors.
Example:
Router(config-rtr)# timers lsa arrival 300
Step 7 timers pacing flood milliseconds Configures LSA flood packet pacing.
Example:
Router(config-rtr)# timers pacing flood 30
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 router ospf process-id
4. event-log [size [number of events]] [one-shot] [pause]
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 router ospf process-id Enables OSPF router configuration mode.
Example:
Router(config)# ipv6 router ospf 1
Step 4 event-log [size [number of events]] [one-shot] Enables event logging.
[pause]
Example:
Router(config-rtr)# event-log size 10000
one-shot
SUMMARY STEPS
1. enable
2. clear ipv6 ospf [process-id] events
DETAILED STEPS
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 router ospf process-id
4. graceful-restart [restart-interval interval]
DETAILED STEPS
Example:
Router# configure terminal
Example:
Router(config)# ipv6 router ospf 1
Step 4 graceful-restart [restart-interval interval] Enables the OSPFv3 graceful restart feature on a
graceful-restart-capable router.
Example:
Router(config-rtr)# graceful-restart
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 router ospf process-id
4. graceful-restart helper {disable | strict-lsa-checking}
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 router ospf process-id Enables OSPF router configuration mode.
Example:
Router(config)# ipv6 router ospf 1
Step 4 graceful-restart helper {disable | Enables the OSPFv3 graceful restart feature on a
strict-lsa-checking} graceful-restart-aware router.
Example:
Router(config-rtr)# graceful-restart helper
strict-lsa-checking
SUMMARY STEPS
1. enable
2. clear ipv6 ospf [process-id] {process | force-spf | redistribution}
Example:
Router# clear ipv6 ospf force-spf
SUMMARY STEPS
1. enable
2. show ipv6 ospf [process-id] [area-id] interface [interface-type interface-number]
3. show ipv6 ospf [process-id] [area-id]
4. show crypto ipsec policy [name policy-name]
5. show crypto ipsec sa [map map-name | address | identity | interface type number | peer
[vrf fvrf-name] address | vrf ivrf-name | ipv6 [interface-type interface-number]] [detail]
6. show ipv6 ospf [process-ID] event [generic | interface | lsa | neighbor | reverse | rib | spf]
DETAILED STEPS
Example:
Router# show ipv6 ospf interface
Step 3 show ipv6 ospf [process-id] [area-id] Displays general information about OSPF routing
processes.
Example:
Router# show ipv6 ospf
Step 4 show crypto ipsec policy [name policy-name] Displays the parameters for each IPSec parameter.
Example:
Router# show crypto ipsec policy
Step 5 show crypto ipsec sa [map map-name | address | Displays the settings used by current security associations
identity | interface type number | peer (SAs).
[vrf fvrf-name] address | vrf ivrf-name | ipv6
[interface-type interface-number]] [detail]
Example:
Router# show crypto ipsec sa ipv6
Step 6 show ipv6 ospf [process-ID] event [generic | Displays detailed information about OSPF for IPv6 events.
interface | lsa | neighbor | reverse | rib |
spf]
Example:
Router# show ipv6 ospf event spf
Examples
This section provides the following output examples:
• Sample Output for the show ipv6 ospf interface Command, page 25
• Sample Output for the show ipv6 ospf Command, page 27
• Sample Output for the show crypto ipsec policy Command, page 27
• Sample Output for the show crypto ipsec sa ipv6 Command, page 28
• Sample Output for the show ipv6 ospf graceful-restart Command, page 28
inbound AH SAs:
spi:0x3E8(1000)
transform:ah-md5-hmac ,
in use settings ={Transport, }
slot:0, conn_id:2000, flow_id:1, crypto map:N/R
no sa timing (manual-keyed)
replay detection support:N
outbound AH SAs:
spi:0x3E8(1000)
transform:ah-md5-hmac ,
in use settings ={Transport, }
slot:0, conn_id:2001, flow_id:2, crypto map:N/R
no sa timing (manual-keyed)
replay detection support:N
interface Ethernet0/0
ipv6 enable
Configuring LSA and SPF Throttling for OSPF for IPv6 Fast Convergence:
Example
The following example displays the configuration values for SPF and LSA throttling timers:
Router# show ipv6 ospf
Additional References
The following sections provide additional references related to the Implementing OSPF for IPv6 feature.
Related Documents
Standards
Standards Title
No new or modified standards are supported by this —
feature, and support for existing standards has not been
modified by this feature.
MIBs
RFCs
RFCs Title
RFC 2401 Security Architecture for the Internet Protocol
RFC 2402 IP Authentication Header
RFC 2406 IP Encapsulating Security Payload (ESP)
RFC 2740 OSPF for IPv6
RFC 4552 Authentication/Confidentiality for OSPFv3
Technical Assistance
Description Link
The Cisco Support website provides extensive online http://www.cisco.com/techsupport
resources, including documentation and tools for
troubleshooting and resolving technical issues with
Cisco products and technologies.
To receive security and technical information about
your products, you can subscribe to various services,
such as the Product Alert Tool (accessed from Field
Notices), the Cisco Technical Services Newsletter, and
Really Simple Syndication (RSS) Feeds.
Access to most tools on the Cisco Support website
requires a Cisco.com user ID and password.
Command Reference
The following commands are introduced or modified in the feature or features documented in this
module. For information about these commands, see the Cisco IOS IPv6 Command Reference at
http://www.cisco.com/en/US/docs/ios/ipv6/command/reference/ipv6_book.html. For information about
all Cisco IOS commands, use the Command Lookup Tool at http://tools.cisco.com/Support/CLILookup
or the Cisco IOS Master Command List, All Releases, at
http://www.cisco.com/en/US/docs/ios/mcl/all_release/all_mcl.html.
• area authentication (IPv6)
• area encryption
• area range
• area virtual-link
• area virtual-link authentication
• area virtual-link encryption
• auto-cost (IPv6)
• clear ipv6 ospf
• clear ipv6 ospf counters
• clear ipv6 ospf events
• debug ipv6 ospf
• debug ipv6 ospf database-timer rate-limit
• debug ipv6 ospf events
• debug ipv6 ospf lsdb
• debug ipv6 ospf monitor
• debug ipv6 ospf packet
• debug ipv6 ospf spf statistic
• default (IPv6 OSPF)
• default-information originate (IPv6 OSPF)
• default-metric (IPv6)
• discard-route (IPv6)
• distribute-list prefix-list (IPv6 OSPF)
• event-log
• graceful-restart
• graceful-restart helper
• ipv6 ospf area
• ipv6 ospf authentication
• ipv6 ospf cost
• ipv6 ospf database-filter all out
• ipv6 ospf dead-interval
• ipv6 ospf demand-circuit
• ipv6 ospf encryption
• ipv6 ospf flood-reduction
• ipv6 ospf hello-interval
• ipv6 ospf mtu-ignore
Note Table 3 lists only the Cisco IOS software release that introduced support for a given feature in a given
Cisco IOS software release train. Unless noted otherwise, subsequent releases of that Cisco IOS
software release train also support that feature.
CCDE, CCENT, Cisco Eos, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, Cisco TelePresence, the Cisco logo, DCE, and Welcome to the Human
Network are trademarks; Changing the Way We Work, Live, Play, and Learn and Cisco Store are service marks; and Access Registrar, Aironet,
AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork
Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation,
EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, iQ
Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone, MeetingPlace,
MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare,
SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx logo
are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply
a partnership relationship between Cisco and any other company. (0807R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and
figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and
coincidental.
Policy-based routing (PBR) for both IPv6 and IPv4 in Cisco IOS software allows a user to manually
configure how received packets should be routed. PBR allows the user to identify packets using several
attributes and to specify the next hop or output interface to which the packet should be sent. PBR also
provides a basic packet-marking capability.
Finding Support Information for Platforms and Cisco IOS and Catalyst OS Software Images
Use Cisco Feature Navigator to find information about platform support and Cisco IOS and Catalyst OS
software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An
account on Cisco.com is not required.
Contents
• Prerequisites for Implementing Policy-Based Routing for IPv6, page 2
• Restrictions for Implementing Policy-Based Routing for IPv6, page 2
• Information About Implementing Policy-Based Routing for IPv6, page 2
• How to Implement Policy-Based Routing for IPv6, page 4
• Configuration Examples for Implementing Policy-Based Routing for IPv6, page 10
• Additional References, page 11
• Command Reference, page 12
• Feature Information for Implementing Policy-Based Routing for IPv6, page 13
Americas Headquarters:
Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA
IPv6C-2
Implementing Policy-Based Routing for IPv6
Information About Implementing Policy-Based Routing for IPv6
PBR allows you to classify and mark packets at the edge of the network. PBR marks a packet by setting
its precedence value. The precedence value can be used directly by routers in the network core to apply
the appropriate QoS to a packet, which keeps packet classification at your network edge.
Packet Matching
PBR for IPv6 will match packets using the match ipv6 address command in the associated PBR route
map. Packet match criteria are those criteria supported by IPv6 access lists, as follows:
• Input interface
• Source IPv6 address (using a prefix list or a standard or extended access list [ACL])
• Destination IPv6 address (standard or extended ACL)
• Protocol (extended ACL)
• Source port and destination port (extended ACL)
• Differentiated services code point (DSCP) (extended ACL)
• Flow-label (extended ACL)
• Fragment (extended ACL)
Packets may also be matched by length using the match length statement in the PBR route map.
Match statements are evaluated first by the criteria specified in the match ipv6 address command and
then by criteria specified in the match length command. Therefore, if both an ACL and a length
statement are used, a packet will first be subject to an ACL match. Only packets that pass the ACL match
will then be subject to the length match. Finally, only packets that pass both the ACL and the length
statement will be policy routed.
IPv6C-3
Implementing Policy-Based Routing for IPv6
How to Implement Policy-Based Routing for IPv6
Note The order in which PBR evaluates the set statements is the order in which they are listed above. This
order may differ from the order in which route-map set statements are listed by Cisco IOS show
commands.
IPv6C-4
Implementing Policy-Based Routing for IPv6
How to Implement Policy-Based Routing for IPv6
SUMMARY STEPS
1. enable
2. configure terminal
3. route-map map-tag [permit | deny] [sequence-number]
4. match length minimum-length maximum-length
or
match ipv6 address {prefix-list prefix-list-name | access-list-name}
5. set ipv6 precedence precedence-value
or
set ipv6 next-hop global-ipv6-address [global-ipv6-address...]
or
set interface type number [...type number]
or
set ipv6 default next-hop global-ipv6-address [global-ipv6-address...]
or
set default interface type number [...type number]
6. exit
7. interface type number
8. ipv6 policy route-map route-map-name
IPv6C-5
Implementing Policy-Based Routing for IPv6
How to Implement Policy-Based Routing for IPv6
DETAILED STEPS
Example:
Router# configure terminal
Step 3 route-map map-tag [permit | deny] Defines the conditions for redistributing routes from one
[sequence-number] routing protocol into another, or enables policy routing.
• Use the route-map command to enter route-map
Example: configuration mode.
Router(config)# route-map rip-to-ospf permit
Step 4 match length minimum-length maximum-length Specifies the match criteria.
or
• You can specify any or all of the following:
match ipv6 address {prefix-list
prefix-list-name | access-list-name} – Matches the Level 3 length of the packet.
– Matches a specified IPv6 access list.
Example: – If you do not specify a match command, the route
Router(config-route-map)# match length 3 200 map applies to all packets.
or
Router(config-route-map)# match ipv6 address
marketing
IPv6C-6
Implementing Policy-Based Routing for IPv6
How to Implement Policy-Based Routing for IPv6
Example:
Router(config-route-map)# exit
Step 7 interface type number Specifies an interface type and number, and places the
router in interface configuration mode.
Example:
Router(config)# interface FastEthernet 1/0
Step 8 ipv6 policy route-map route-map-name Identifies a route map to use for IPv6 PBR on an interface.
Example:
Router(config-if)# ipv6 policy-route-map
interactive
IPv6C-7
Implementing Policy-Based Routing for IPv6
How to Implement Policy-Based Routing for IPv6
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 local policy route-map route-map-name
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 local policy route-map route-map-name Configures PBR for IPv6 for packets generated by the
router.
Example:
Router(config)# ipv6 local policy route-map
pbr-src-90
SUMMARY STEPS
1. enable
2. show ipv6 policy
IPv6C-8
Implementing Policy-Based Routing for IPv6
How to Implement Policy-Based Routing for IPv6
DETAILED STEPS
Example:
Router# show ipv6 policy
SUMMARY STEPS
1. enable
2. debug ipv6 policy [access-list-name]
3. show route-map [map-name | dynamic [dynamic-map-name | application [application-name]] |
all] [detailed]
DETAILED STEPS
Example:
Router# debug ipv6 policy
Step 3 show route-map [map-name | dynamic Displays all route maps configured or only the one
[dynamic-map-name | application specified.
[application-name]] | all] [detailed]
Example:
Router# show route-map
Examples
This section provides the following output examples:
IPv6C-9
Implementing Policy-Based Routing for IPv6
Configuration Examples for Implementing Policy-Based Routing for IPv6
Interface Routemap
Ethernet0/0 src-1
interface Ethernet0/0
ipv6 policy-route-map interactive
IPv6C-10
Implementing Policy-Based Routing for IPv6
Additional References
Additional References
The following sections provide references related to the Implementing Policy-Based Routing for IPv6
feature.
Related Documents
Related Topic Document Title
QoS for IPv6 “Implementing QoS for IPv6,” Cisco IOS IPv6 Configuration Guide
Multicast Border Gateway Protocol (BGP) for IPv6 “Implementing Multiprotocol BGP for IPv6,” Cisco IOS IPv6
Configuration Guide
Access control lists for IPv6 “Implementing Traffic Filters and Firewalls for IPv6 Security,”
Cisco IOS IPv6 Configuration Guide
IPv6 supported feature list “Start Here: Cisco IOS Software Release Specifics for IPv6
Features,” Cisco IOS IPv6 Configuration Guide
IPv6 commands: complete command syntax, command Cisco IOS IPv6 Command Reference
mode, defaults, usage guidelines, and examples
IPv4 Quality of Service “Quality of Service Overview,” Cisco IOS Quality of Service
Solutions Configuration Guide
Standards
Standards Title
No new or modified standards are supported by this —
feature, and support for existing standards has not been
modified by this feature.
MIBs
MIBs MIBs Link
No new or modified MIBs are supported, and support To locate and download MIBs for selected platforms, Cisco IOS
for existing MIBs has not been modified. releases, and feature sets, use Cisco MIB Locator found at the
following URL:
http://www.cisco.com/go/mibs
IPv6C-11
Implementing Policy-Based Routing for IPv6
Command Reference
RFCs
RFCs Title
No new or modified RFCs are supported by this —
feature.
Technical Assistance
Description Link
The Cisco Support website provides extensive online http://www.cisco.com/techsupport
resources, including documentation and tools for
troubleshooting and resolving technical issues with
Cisco products and technologies.
To receive security and technical information about
your products, you can subscribe to various services,
such as the Product Alert Tool (accessed from Field
Notices), the Cisco Technical Services Newsletter, and
Really Simple Syndication (RSS) Feeds.
Access to most tools on the Cisco Support website
requires a Cisco.com user ID and password.
Command Reference
The following commands are introduced or modified in the feature or features documented in this
module. For information about these commands, see the Cisco IOS IPv6 Command Reference at
http://www.cisco.com/en/US/docs/ios/ipv6/command/reference/ipv6_book.html. For information about
all Cisco IOS commands, use the Command Lookup Tool at http://tools.cisco.com/Support/CLILookup
or the Cisco IOS Master Command List, All Releases, at
http://www.cisco.com/en/US/docs/ios/mcl/all_release/all_mcl.html.
• debug ipv6 policy
• ipv6 local policy route-map
• ipv6 policy route-map
• match ipv6 address
• match length
• route-map
• set default interface
• set interface
• set ipv6 default next-hop
• set ipv6 next-hop (PBR)
• set ipv6 precedence
• show ipv6 policy
IPv6C-12
Implementing Policy-Based Routing for IPv6
Feature Information for Implementing Policy-Based Routing for IPv6
Note Table 17 lists only the Cisco IOS software release that introduced support for a given feature in a given
Cisco IOS software release train. Unless noted otherwise, subsequent releases of that Cisco IOS
software release train also support that feature.
CCDE, CCENT, Cisco Eos, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, the Cisco logo, DCE, and Welcome to the Human Network are
trademarks; Changing the Way We Work, Live, Play, and Learn is a service mark; and Access Registrar, Aironet, AsyncOS, Bringing the Meeting To
You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS,
Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation, EtherFast, EtherSwitch,
Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, iQ Expertise, the iQ logo,
iQ Net Readiness Scorecard, iQuick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone, MeetingPlace, MGX, Networkers,
Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare, SenderBase, SMARTnet, Spectrum Expert,
StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx logo are registered trademarks of
Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply
a partnership relationship between Cisco and any other company. (0805R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and
figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and
coincidental.
IPv6C-13
Implementing Policy-Based Routing for IPv6
Feature Information for Implementing Policy-Based Routing for IPv6
IPv6C-14
Implementing QoS for IPv6
This module provides tasks for implementing quality of service (QoS) features in IPv6 environments,
specifically the application of the Differentiated Services (DiffServ) QoS features to IPv6 packets.
Finding Support Information for Platforms and Cisco IOS and Catalyst OS Software Images
Use Cisco Feature Navigator to find information about platform support and Cisco IOS and Catalyst OS
software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An
account on Cisco.com is not required.
Contents
• Prerequisites for Implementing QoS for IPv6, page 2
• Restrictions for Implementing QoS for IPv6, page 2
• Information About Implementing QoS in IPv6, page 2
• How to Implement QoS for IPv6, page 4
• Configuration Examples for Implementing QoS for IPv6, page 14
• Additional References, page 16
• Command Reference, page 17
• Feature Information for Implementing QoS for IPv6, page 18
Americas Headquarters:
Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA
IPv6C-2
Implementing QoS for IPv6
Information About Implementing QoS in IPv6
2. Understand the characteristics of the applications so that you can make decisions about which QoS
features would be appropriate.
3. Know your network topology so that you know how link layer header sizes are affected by changes
and forwarding.
4. Create classes based on the criteria you establish for your network. In particular, if the same network
is also carrying IPv4 traffic along with IPv6, decide if you want to treat both of them the same way
or treat them separately and specify match criteria accordingly. If you want to treat them the same,
use match statements such as match precedence, match dscp, set precedence, and set dscp. If you
want to treat them separately, add match criteria such as match protocol ip and match protocol
ipv6 in a match-all class map.
5. Create a policy to mark each class.
6. Work from the edge toward the core in applying QoS features.
7. Build the policy to treat the traffic.
8. Apply the policy.
IPv6C-3
Implementing QoS for IPv6
How to Implement QoS for IPv6
IPv6C-4
Implementing QoS for IPv6
How to Implement QoS for IPv6
SUMMARY STEPS
1. enable
2. configure terminal
3. policy map policy-map-name
4. class {class-name | class-default}
5. set precedence {precedence-value | from-field [table table-map-name]}
or
set [ip] dscp {dscp-value | from-field [table table-map-name]}
DETAILED STEPS
Example:
Router# configure terminal
IPv6C-5
Implementing QoS for IPv6
How to Implement QoS for IPv6
Troubleshooting Tips
Confirm That CEF Is Enabled
Use the show cef interface, show ipv6 cef, show ipv6 interface neighbors, and show interface
statistics commands to confirm that CEF is enabled and that packets are being CEF switched.
SUMMARY STEPS
1. enable
2. configure terminal
3. class-map {class-name | class-default}
4. match precedence precedence-value [precedence-value precedence-value]
or
match access-group name ipv6-access-group
IPv6C-6
Implementing QoS for IPv6
How to Implement QoS for IPv6
or
match [ip] dscp dscp-value [dscp-value dscp-value dscp-value dscp-value dscp-value dscp-value
dscp-value]
DETAILED STEPS
Example:
Router# configure terminal
Step 3 class-map {class-name | class-default} Creates the specified class and enters QoS class-map
configuration mode.
Example:
Router(config-pmap-c)# class clsl
Step 4 match precedence precedence-value Matches the precedence value. The precedence applies to
[precedence-value precedence-value] both IPv4 and IPv6 packets.
or or
match access-group name ipv6-access-group Specifies the name of an IPv6 access list against whose
contents packets are checked to determine if they belong to
or the traffic class.
match [ip] dscp dscp-value [dscp-value
or
dscp-value dscp-value dscp-value dscp-value
dscp-value dscp-value] Identifies a specific IP DSCP value as a match criterion.
Example:
Router(config-pmap-c)# match precedence 5
Router(config-pmap-c)# match access-group name
ipv6acl
Router(config-pmap-c)# match ip dscp 15
Configuration Examples for Using the Match Criteria to Manage IPv6 Traffic Flows
The following example shows how to use the match precedence command to manage IPv6 traffic flows.
Router# configure terminal
IPv6C-7
Implementing QoS for IPv6
How to Implement QoS for IPv6
Policy Map p1
Class c1
police 10000 1500 1500 conform-action set-prec-transmit 4 exceed-action drop
Serial4/1
Service-policy output: p1
Class-map: c1 (match-all)
0 packets, 0 bytes
5 minute offered rate 0 bps, drop rate 0 bps
Match: precedence 5
police:
10000 bps, 1500 limit, 1500 extended limit
conformed 0 packets, 0 bytes; action: set-prec-transmit 4
exceeded 0 packets, 0 bytes; action: drop
conformed 0 bps, exceed 0 bps violate 0 bps
IPv6C-8
Implementing QoS for IPv6
How to Implement QoS for IPv6
Cisco IOS software (also referred to as the Layer 3 processor) and the interface driver use the transmit
ring when moving packets to the physical media. The two processors collaborate in the following way:
• The interface sends packets according to the interface rate or a shaped rate.
• The interface maintains a hardware queue or transmit ring, where it stores the packets waiting for
transmission onto the physical wire.
• When the hardware queue or transmit ring fills, the interface provides explicit back pressure to the
Layer 3 processor system. It notifies the Layer 3 processor to stop dequeuing packets to the
interface’s transmit ring because the transmit ring is full. The Layer 3 processor now stores the
excess packets in the Layer 3 queues.
• When the interface sends the packets on the transmit ring and empties the ring, it once again has
sufficient buffers available to store the packets. It releases the back pressure, and the Layer 3
processor dequeues new packets to the interface.
The most important aspect of this communication system is that the interface recognizes that its transmit
ring is full and throttles the receipt of new packets from the Layer 3 processor system. Thus, when the
interface is congested, the drop decision is moved from a random, last-in, first-dropped decision in the
first in, first out (FIFO) queue of the transmit ring to a differentiated decision based on IP-level service
policies implemented by the Layer 3 processor.
Service policies apply only to packets stored in the Layer 3 queues. Table 18 illustrates which packets
sit in the Layer 3 queue. Locally generated packets are always process switched and are delivered first
to the Layer 3 queue before being passed on to the interface driver. Fast-switched and CEF-switched
packets are delivered directly to the transmit ring and sit in the L3 queue only when the transmit ring is
full.
The following example shows these guidelines applied to the show policy-map interface command
output. The four key counters are shown in boldface type.
Router# show policy-map interface atm 1/0.1
IPv6C-9
Implementing QoS for IPv6
How to Implement QoS for IPv6
ATM1/0.1: VC 0/100 -
Service-policy output: cbwfq (1283)
Class-map: A (match-all) (1285/2)
28621 packets, 7098008 bytes
5 minute offered rate 10000 bps, drop rate 0 bps
Match: access-group 101 (1289)
Weighted Fair Queueing
Output Queue: Conversation 73
Bandwidth 500 (kbps) Max Threshold 64 (packets)
(pkts matched/bytes matched) 28621/7098008
(depth/total drops/no-buffer drops) 0/0/0
Class-map: B (match-all) (1301/4)
2058 packets, 148176 bytes
5 minute offered rate 0 bps, drop rate 0 bps
Match: access-group 103 (1305)
Weighted Fair Queueing
Output Queue: Conversation 75
Bandwidth 50 (kbps) Max Threshold 64 (packets)
(pkts matched/bytes matched) 0/0
(depth/total drops/no-buffer drops) 0/0/0
Class-map: class-default (match-any) (1309/0)
19 packets, 968 bytes
5 minute offered rate 0 bps, drop rate 0 bps
Match: any (1313)
Table 19 defines the counters that appear in the example in boldfaced type.
Counter Explanation
28621 packets, 7098008 bytes The number of packets matching the criteria of the
class. This counter increments whether or not the
interface is congested.
(pkts matched/bytes matched) 28621/709800 The number of packets matching the criteria of the
class when the interface was congested. In other
words, the interface’s transmit ring was full, and
the driver and the L3 processor system worked
together to queue the excess packets in the L3
queues, where the service policy applies. Packets
that are process switched always go through the
L3 queuing system and therefore increment the
“packets matched” counter.
Class-map: B (match-all) (1301/4) These numbers define an internal ID used with the
CISCO-CLASS-BASED-QOS-MIB Management
Information Base (MIB). They no longer appear
in the show policy-map command output in
current releases of Cisco IOS.
5 minute offered rate 0 bps, drop rate 0 bps Use the load-interval command to change this
value and make it a more instantaneous value. The
lowest value is 30 seconds; however, statistics
displayed in the show policy-map interface
command output are updated every 10 seconds.
Because the command effectively provides a
snapshot at a specific moment, the statistics may
not reflect a temporary change in queue size.
IPv6C-10
Implementing QoS for IPv6
How to Implement QoS for IPv6
Without congestion, there is no need to queue any excess packets. When congestion occurs, packets,
including CEF- and fast-switched packets, might go into the Layer 3 queue. If you use congestion
management features, packets accumulating at an interface are queued until the interface is free to send
them; they are then scheduled according to their assigned priority and the queueing mechanism
configured for the interface.
Normally, the packets counter is much larger than the packets matched counter. If the values of the two
counters are nearly equal, then the interface is receiving a large number of process-switched packets or
is heavily congested. Both of these conditions should be investigated to ensure optimal packet
forwarding.
Routers allocate conversation numbers for the queues that are created when the service policy is applied.
The following example shows the queues and related information.
Router# show policy-map interface s1/0.1 dlci 100
IPv6C-11
Implementing QoS for IPv6
How to Implement QoS for IPv6
Table 21 lists the default number of dynamic queues in relation to ATM PVC bandwidth.
Based on the number of reserved queues for WFQ, Cisco IOS software assigns a conversation or queue
number as shown in Table 22.
IPv6C-12
Implementing QoS for IPv6
How to Implement QoS for IPv6
SUMMARY STEPS
1. enable
2. configure terminal
3. interface atm slot/0. subinterface-number {multipoint | point-to-point}
4. ip address ip-address mask [secondary]
5. pvc [name] vpi/vci [ces | ilmi | qsaal | smds]
6. tx-ring-limit ring-limit
7. service-policy {input | output} policy-map-name
DETAILED STEPS
IPv6C-13
Implementing QoS for IPv6
Configuration Examples for Implementing QoS for IPv6
Example:
Router# configure terminal
Step 4 interface atm slot/0. subinterface-number Enters interface configuration mode.
{multipoint | point-to-point}
Example:
Router(config)# interface atm 1/0.1
point-to-point}
Step 5 ip address ip-address mask [secondary] Specifies the IP address of the interface you want to test.
Example:
Router(config-if)# ip address 10.1.1.1
255.255.255.0
Step 6 pvc [name] vpi/vci [ces | ilmi | qsaal | smds] Creates or assigns a name to an ATM PVC, optionally
specifies the encapsulation type on an ATM PVC, and
enters interface-ATM-VC configuration mode.
Example:
Router(config-if)# pvc cisco 0/5
Step 7 tx-ring-limit ring-limit Reduces the size of the transmit ring of the interface.
Lowering this value accelerates the use of the QoS in the
Cisco IOS software.
• Specify the ring limit as the number of packets for 2600
Example: and 3600 series routers, or as the number of memory
Router(config-if-atm-vc)# tx-ring-limit 10
particles for 7200 and 7500 series routers.
Step 8 service-policy {input | output} policy-map-name Attaches a policy map to an input interface or VC, or an
output interface or VC, to be used as the service policy for
that interface or VC.
Example:
Router(config-if-atm-vc)# service-policy output • Note that the packets matched counter is a part of
policy9 queueing feature and is available only on service
policies attached in output direction.
IPv6C-14
Implementing QoS for IPv6
Configuration Examples for Implementing QoS for IPv6
Ethernet1/0/0 is up (if_number 9)
Corresponding hwidb fast_if_number 9
Corresponding hwidb firstsw->if_number 9
Internet address is 10.2.61.8/24
ICMP redirects are always sent
Per packet load-sharing is disabled
IP unicast RPF check is disabled
Inbound access list is not set
Outbound access list is not set
IP policy routing is disabled
Hardware idb is Ethernet1/0/0
Fast switching type 1, interface type 5
IP Distributed CEF switching enabled
IP Feature Fast switching turbo vector
IP Feature CEF switching turbo vector
Input fast flags 0x0, Output fast flags 0x0
ifindex 7(7)
Slot 1 Slot unit 0 VC -1
Transmit limit accumulator 0x48001A82 (0x48001A82)
IP MTU 1500
To match on IPv6 packets only, use the match dscp command without the ip keyword preceded by the
match protocol command. Ensure that the class map has the match-all attribute (which is the default).
Router(config)# class-map ipdscp15
Router(config-cmap)# match protocol ipv6
Router(config-cmap)# match dscp 15
Router(config)# exit
To match packets on both IPv4 and IPv6 protocols, use the match dscp command:
Router(config)# class-map ipdscp15
Router(config-cmap)# match dscp 15
IPv6C-15
Implementing QoS for IPv6
Additional References
Router(config)# exit
Additional References
The following sections provide references related to the Implementing QoS for IPv6 feature.
Related Documents
Related Topic Document Title
IPv6 supported feature list “Start Here: Cisco IOS Software Release Specifics for IPv6
Features,” Cisco IOS IPv6 Configuration Guide
IPv6 commands: complete command syntax, command Cisco IOS IPv6 Command Reference
mode, defaults, usage guidelines, and examples
Standards
Standards Title
No new or modified standards are supported by this —
feature, and support for existing standards has not been
modified by this feature.
MIBs
MIBs MIBs Link
No new or modified MIBs are supported, and support for To locate and download MIBs for selected platforms,
existing MIBs has not been modified. Cisco IOS releases, and feature sets, use Cisco MIB Locator
found at the following URL:
http://www.cisco.com/go/mibs
RFCs
RFCs Title
RFC 2474 Definition of the Differentiated Services Field (DS Field) in
the IPv4 and IPv6 Headers
RFC 2475 An Architecture for Differentiated Services Framework
RFC 2597 Assured Forwarding PHB
RFC 2598 An Expedited Forwarding PHB
RFC 2640 Internet Protocol, Version 6 Specification
RFC 2697 A Single Rate Three Color Marker
RFC 2698 A Two Rate Three Color Marker
IPv6C-16
Implementing QoS for IPv6
Command Reference
Technical Assistance
Description Link
The Cisco Support website provides extensive online http://www.cisco.com/techsupport
resources, including documentation and tools for
troubleshooting and resolving technical issues with Cisco
products and technologies.
To receive security and technical information about your
products, you can subscribe to various services, such as the
Product Alert Tool (accessed from Field Notices), the Cisco
Technical Services Newsletter, and Really Simple
Syndication (RSS) Feeds.
Access to most tools on the Cisco Support website requires a
Cisco.com user ID and password.
Command Reference
The following commands are introduced or modified in the feature or features documented in this
module. For information about these commands, see the Cisco IOS IPv6 Command Reference at
http://www.cisco.com/en/US/docs/ios/ipv6/command/reference/ipv6_book.html. For information about
all Cisco IOS commands, use the Command Lookup Tool at http://tools.cisco.com/Support/CLILookup
or the Cisco IOS Master Command List, All Releases, at
http://www.cisco.com/en/US/docs/ios/mcl/all_release/all_mcl.html.
• match access-group name
• match dscp
• match precedence
• set dscp
• set precedence
IPv6C-17
Implementing QoS for IPv6
Feature Information for Implementing QoS for IPv6
Note Table 23 lists only the Cisco IOS software release that introduced support for a given feature in a given
Cisco IOS software release train. Unless noted otherwise, subsequent releases of that Cisco IOS
software release train also support that feature.
IPv6C-18
Implementing QoS for IPv6
Feature Information for Implementing QoS for IPv6
IPv6C-19
Implementing QoS for IPv6
Feature Information for Implementing QoS for IPv6
1. Feature is supported on Cisco 12000 series Internet routers in Cisco IOS Release 12.0(28)S.
2. Cisco IOS Release 12.2(18)SXE provides support for this feature. Cisco IOS Release 12.2(18)SXE is specific to Cisco Catalyst 6500 and Cisco 7600 series
routers.
CCDE, CCENT, Cisco Eos, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, Cisco TelePresence, the Cisco logo, DCE, and Welcome to the Human
Network are trademarks; Changing the Way We Work, Live, Play, and Learn and Cisco Store are service marks; and Access Registrar, Aironet,
AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork
Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation,
EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, iQ
Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone, MeetingPlace,
MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare,
SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx logo
are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply
a partnership relationship between Cisco and any other company. (0807R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and
figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and
coincidental.
IPv6C-20
Implementing RIP for IPv6
This module describes how to configure Routing Information Protocol for IPv6. RIP is a distance-vector
routing protocol that uses hop count as a routing metric. RIP is an Interior Gateway Protocol (IGP) most
commonly used in smaller networks.
Finding Support Information for Platforms and Cisco IOS and Catalyst OS Software Images
Use Cisco Feature Navigator to find information about platform support and Cisco IOS and Catalyst OS
software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An
account on Cisco.com is not required.
Contents
• Prerequisites for Implementing RIP for IPv6, page 2
• Information About Implementing RIP for IPv6, page 2
• How to Implement RIP for IPv6, page 3
• Configuration Examples for IPv6 RIP, page 13
• Additional References, page 13
• Command Reference, page 15
• Feature Information for Implementing RIP for IPv6, page 16
Americas Headquarters:
Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA
IPv6C-2
Implementing RIP for IPv6
How to Implement RIP for IPv6
Note The following sections describe the configuration tasks for creating an IPv6 RIP routing process and
enabling the routing process on interfaces. The following sections do not provide in-depth information
on customizing RIP because the protocol functions the same in IPv6 as it does in IPv4. Refer to the
publications referenced in the “Related Documents” section for further IPv6 and IPv4 configuration and
command reference information.
The tasks in the following sections explain how to configure IPv6 RIP. Each task in the list is identified
as either required or optional:
This section contains the following procedures:
• Enabling IPv6 RIP, page 3 (required)
• Customizing IPv6 RIP, page 4 (optional)
• Redistributing Routes into an IPv6 RIP Routing Process, page 6 (optional)
• Configuring Tags for RIP Routes, page 7 (optional)
• Filtering IPv6 RIP Routing Updates, page 8 (optional)
• Verifying IPv6 RIP Configuration and Operation, page 10 (optional)
Prerequisites
Before configuring the router to run IPv6 RIP, globally enable IPv6 using the ipv6 unicast-routing
global configuration command, and enable IPv6 on any interfaces on which IPv6 RIP is to be enabled.
For details on basic IPv6 connectivity tasks, refer to the Implementing Basic Connectivity for IPv6
module.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ipv6 rip name enable
IPv6C-3
Implementing RIP for IPv6
How to Implement RIP for IPv6
DETAILED STEPS
Example:
Router# configure terminal
Step 3 interface type number Specifies the interface type and number, and enters interface
configuration mode.
Example:
Router(config)# interface Ethernet 0/0
Step 4 ipv6 rip name enable Enables the specified IPv6 RIP routing process on an
interface.
Example:
Router(config-if)# ipv6 rip process1 enable
If you want to set or change a global value, follow steps 1 and 2, and then use the optional ipv6 router
rip name command in global configuration mode.
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 router rip word
4. maximum-paths number-paths
5. exit
6. interface type number
7. ipv6 rip name default-information {only | originate} [metric metric-value]
IPv6C-4
Implementing RIP for IPv6
How to Implement RIP for IPv6
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 router rip word Configures an IPv6 RIP routing process and enters router
configuration mode for the IPv6 RIP routing process.
Example: • Use the word argument to identify a specific IPv6 RIP
Router(config)# ipv6 router rip cisco routing process.
Step 4 maximum-paths number-paths (Optional) Defines the maximum number of equal-cost
routes that IPv6 RIP can support.
Example: • The number-paths argument is an integer from 1 to 64.
Router(config-router)# maximum-paths 1 The default for RIP is four paths.
Step 5 exit Exits interface configuration mode and enters global
configuration mode.
Example:
Router(config-if)# exit
Step 6 interface type number Specifies the interface type and number, and enters interface
configuration mode.
Example:
Router(config)# interface Ethernet 0/0
Step 7 ipv6 rip name default-information {only | (Optional) Originates the IPv6 default route (::/0) into the
originate} [metric metric-value] specified RIP routing process updates sent out of the
specified interface.
Example: Note To avoid routing loops after the IPv6 default route
Router(config-if)# ipv6 rip cisco (::/0) is originated out of any interface, the routing
default-information originate
process ignores all default routes received on any
interface.
IPv6C-5
Implementing RIP for IPv6
How to Implement RIP for IPv6
Note You must to advertise a route with metric of 15 or less. A RIP router always adds an interface cost—the
default is 1—onto the metric of a received route. If you advertise a route with metric 15, your neighbor
will add 1 to it, making a metric of 16. Because a metric of 16 is unreachable, your neighbor will not
install the route in the routing table.
If no metric is specified, then the current metric of the route is used. To find the current metric of the
route, enter the show ipv6 route command.
This task explains how to redistribute tagged routes into an IPv6 RIP routing process.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ipv6 rip name enable
5. redistribute protocol [process-id] {level-1 | level-1-2 | level-2} [metric metric-value] [metric-type
{internal | external}] [route-map map-name]
DETAILED STEPS
Example:
Router# configure terminal
Step 3 interface type number Specifies the interface type and number, and enters interface
configuration mode.
Example:
Router(config)# interface Ethernet 0/0
IPv6C-6
Implementing RIP for IPv6
How to Implement RIP for IPv6
SUMMARY STEPS
1. enable
2. configure terminal
3. route-map map-tag [permit | deny] [sequence-number]
4. match ipv6 address {prefix-list prefix-list-name | access-list-name}
5. set tag tag-value
DETAILED STEPS
Example:
Router# configure terminal
IPv6C-7
Implementing RIP for IPv6
How to Implement RIP for IPv6
Example:
Router(config-route-map)# match ipv6 address
prefix-list bgp-to-rip-flt
Step 5 set tag tag-value Sets the tag value to associate with the redistributed routes.
Example:
Router(config-route-map)# set tag 4
IPv6C-8
Implementing RIP for IPv6
How to Implement RIP for IPv6
• The value of the optional le keyword specifies the range of allowed prefix lengths from the
prefix-length argument up to, and including, the value of the le keyword.
• The value of the optional ge keyword specifies the range of allowed prefix lengths from the value of
the ge keyword up to, and including, 128.
Note Note that the first condition must match before the other conditions take effect.
An exact match is assumed when the ge or le keywords are not specified. If only one keyword operand
is specified then the condition for that keyword is applied, and the other condition is not applied. The
prefix-length value must be less than the ge value. The ge value must be less than, or equal to, the le
value. The le value must be less than or equal to 128.
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 prefix list prefix-list-name [seq seq-number] {deny ipv6-prefix/prefix-length | description
text} [ge ge-value] [le le-value]
4. ipv6 prefix list prefix-list-name [seq seq-number] {permit ipv6-prefix/prefix-length | description
text} [ge ge-value] [le le-value]
5. Repeat Steps 3 and 4 as many times as necessary to build the prefix list.
6. ipv6 router rip name
7. distribute-list prefix-list prefix-list-name {in | out} [interface-type interface-number]
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 prefix list prefix-list-name [seq Creates an entry in the IPv6 prefix list.
seq-number] {deny ipv6-prefix/prefix-length |
description text} [ge ge-value] [le le-value]
Example:
Router(config)# ipv6 prefix-list abc permit
2001:0db8::/16
IPv6C-9
Implementing RIP for IPv6
How to Implement RIP for IPv6
Example:
Router(config)# ipv6 prefix-list abc deny ::/0
Step 5 Repeat Steps 3 and 4 as many times as necessary to —
build the prefix list.
Step 6 ipv6 router rip name Configures an IPv6 RIP routing process.
Example:
Router(config)# ipv6 router rip cisco
Step 7 distribute-list prefix-list prefix-list-name Applies a prefix list to IPv6 RIP routing updates that are
{in | out} [interface-type interface-number] received or sent on an interface.
Example:
Router(config-rtr-rip)# distribute-list
prefix-list cisco in ethernet 0/0
SUMMARY STEPS
DETAILED STEPS
Example:
Router> show ipv6 route rip
IPv6C-10
Implementing RIP for IPv6
How to Implement RIP for IPv6
Example:
Router# debug ipv6 rip
Examples
This section provides the following output examples:
• show ipv6 rip Command: Example, page 11
• show ipv6 route Command: Example, page 12
• debug ipv6 rip Command: Example, page 12
In the following example, output information about a specified IPv6 RIP process database is displayed
using the show ipv6 rip command with the name argument and the database keyword. In the following
output for the IPv6 RIP process named cisco, timer information is displayed, and route 2001:0db8::16/64
has a route tag set:
Router> show ipv6 rip cisco database
IPv6C-11
Implementing RIP for IPv6
How to Implement RIP for IPv6
In the following example, output information for a specified IPv6 RIP process is displayed using the
show ipv6 rip user EXEC command with the name argument and the next-hops keyword:
Router> show ipv6 rip cisco next-hops
Note For a description of each output display field, refer to the show ipv6 rip command in the IPv6 for
Cisco IOS Command Reference.
Note By default, the system sends the output from debug commands and system error messages to the
console. To redirect debugging output, use the logging command options within privileged EXEC mode.
Possible destinations include the console, virtual terminals, internal buffer, and UNIX hosts running a
syslog server. For complete information on debug commands and redirecting debugging output, refer to
the Cisco IOS Debug Command Reference, Release 12.4.
IPv6C-12
Implementing RIP for IPv6
Configuration Examples for IPv6 RIP
Where to Go Next
If you want to implement more IPv6 routing protocols, see the Implementing IS-IS for IPv6 or
Implementing Multiprotocol BGP for IPv6 module.
Additional References
The following sections provide references related to the Implementing RIP for IPv6 feature.
IPv6C-13
Implementing RIP for IPv6
Additional References
Related Documents
Related Topic Document Title
IPv4 RIP configuration tasks “Configuring Routing Information Protocol,” Cisco IOS IP Routing
Protocols Configuration Guide
RIP commands: complete command syntax, command “RIP Commands,” Cisco IOS IP Routing Protocols Command
mode, defaults, usage guidelines, and examples Reference
IPv6 supported feature list “Start Here: Cisco IOS Software Release Specifics for IPv6
Features,” Cisco IOS IPv6 Configuration Guide
IPv6 commands: complete command syntax, command Cisco IOS IPv6 Command Reference
mode, defaults, usage guidelines, and examples
Standards
Standards Title
No new or modified standards are supported by this —
feature, and support for existing standards has not been
modified by this feature.
MIBs
MIBs MIBs Link
No new or modified MIBs are supported, and support To locate and download MIBs for selected platforms, Cisco IOS
for existing MIBs has not been modified. releases, and feature sets, use Cisco MIB Locator found at the
following URL:
http://www.cisco.com/go/mibs
RFCs
RFCs Title
RFC 2080 RIPng for IPv6
IPv6C-14
Implementing RIP for IPv6
Command Reference
Technical Assistance
Description Link
The Cisco Support website provides extensive online http://www.cisco.com/techsupport
resources, including documentation and tools for
troubleshooting and resolving technical issues with
Cisco products and technologies.
To receive security and technical information about
your products, you can subscribe to various services,
such as the Product Alert Tool (accessed from Field
Notices), the Cisco Technical Services Newsletter, and
Really Simple Syndication (RSS) Feeds.
Access to most tools on the Cisco Support website
requires a Cisco.com user ID and password.
Command Reference
The following commands are introduced or modified in the feature or features documented in this
module. For information about these commands, see the Cisco IOS IPv6 Command Reference at
http://www.cisco.com/en/US/docs/ios/ipv6/command/reference/ipv6_book.html. For information about
all Cisco IOS commands, use the Command Lookup Tool at http://tools.cisco.com/Support/CLILookup
or the Cisco IOS Master Command List, All Releases, at
http://www.cisco.com/en/US/docs/ios/mcl/all_release/all_mcl.html.
• clear ipv6 rip
• debug ipv6 rip
• distribute-list prefix-list (IPv6 RIP)
• ipv6 rip default-information
• ipv6 rip enable
• ipv6 rip metric-offset
• ipv6 rip summary-address
• ipv6 router rip
• match ipv6 next-hop
• match ipv6 route-source
• poison-reverse (IPv6 RIP)
• port (IPv6 RIP)
• show ipv6 rip
• split-horizon (IPv6 RIP)
• timers (IPv6 RIP)
IPv6C-15
Implementing RIP for IPv6
Feature Information for Implementing RIP for IPv6
Note Table 10 lists only the Cisco IOS software release that introduced support for a given feature in a given
Cisco IOS software release train. Unless noted otherwise, subsequent releases of that Cisco IOS
software release train also support that feature.
IPv6 routing: RIPng nonstop forwarding Cisco IOS XE IPv6 RIP supports NSF.
Release 2.1
The following section provides information about this
feature:
• Nonstop Forwarding for IPv6 RIP, page 2
IPv6C-16
Implementing RIP for IPv6
Feature Information for Implementing RIP for IPv6
CCDE, CCENT, Cisco Eos, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, Cisco TelePresence, the Cisco logo, DCE, and Welcome to the Human
Network are trademarks; Changing the Way We Work, Live, Play, and Learn and Cisco Store are service marks; and Access Registrar, Aironet,
AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork
Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation,
EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, iQ
Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone, MeetingPlace,
MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare,
SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx logo
are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply
a partnership relationship between Cisco and any other company. (0807R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and
figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and
coincidental.
IPv6C-17
Implementing RIP for IPv6
Feature Information for Implementing RIP for IPv6
IPv6C-18
Implementing Static Routes for IPv6
This module describes how to configure static routes for IPv6. Routing defines the paths over which
packets travel in the network. Manually configured static routes may be used instead of dynamic routing
protocols for smaller networks or for sections of a network that have only one path to an outside network.
Lack of redundancy limits the usefulness of static routes, and in larger networks manual reconfiguration
of routes can become a large administrative overhead.
Finding Support Information for Platforms and Cisco IOS and Catalyst OS Software Images
Use Cisco Feature Navigator to find information about platform support and Cisco IOS and Catalyst OS
software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An
account on Cisco.com is not required.
Contents
• Prerequisites for Implementing Static Routes for IPv6, page 2
• Restrictions for Implementing Static Routes for IPv6, page 2
• Information About Implementing Static Routes for IPv6, page 2
• How to Implement Static Routes for IPv6, page 5
• Configuration Examples for Implementing Static Routes for IPv6, page 10
• Additional References, page 16
• Command Reference, page 17
• Feature Information for Implementing Static Routes for IPv6, page 18
Americas Headquarters:
Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA
Static Routes
Networking devices forward packets using route information that is either manually configured or
dynamically learned using a routing protocol. Static routes are manually configured and define an
explicit path between two networking devices. Unlike a dynamic routing protocol, static routes are not
automatically updated and must be manually reconfigured if the network topology changes. The benefits
of using static routes include security and resource efficiency. Static routes use less bandwidth than
dynamic routing protocols and no CPU cycles are used to calculate and communicate routes. The main
disadvantage to using static routes is the lack of automatic reconfiguration if the network topology
changes.
Static routes can be redistributed into dynamic routing protocols but routes generated by dynamic
routing protocols cannot be redistributed into the static routing table. No algorithm exists to prevent the
configuration of routing loops that use static routes.
IPv6C-2
Implementing Static Routes for IPv6
Information About Implementing Static Routes for IPv6
Static routes are useful for smaller networks with only one path to an outside network and to provide
security for a larger network for certain types of traffic or links to other networks that need more control.
In general, most networks use dynamic routing protocols to communicate between networking devices
but may have one or two static routes configured for special cases.
The example specifies that all destinations with address prefix 2001:0DB8::/32 are directly reachable
through interface Ethernet1/0.
Directly attached static routes are candidates for insertion in the IPv6 routing table only if they refer to
a valid IPv6 interface; that is, an interface that is both up and has IPv6 enabled on it.
This example specifies that all destinations with address prefix 2001:0DB8::/32 are reachable via the
host with address 2001:0DB8:3000:1.
A recursive static route is valid (that is, it is a candidate for insertion in the IPv6 routing table) only when
the specified next hop resolves, either directly or indirectly, to a valid IPv6 output interface, provided
the route does not self-recurse, and the recursion depth does not exceed the maximum IPv6 forwarding
recursion depth.
A route self-recurses if it is itself used to resolve its own next hop. For example, suppose we have the
following routes in the IPv6 routing table:
IPv6 Routing Table - 9 entries
Codes: C - Connected, L - Local, S - Static, R - RIP, B - BGP
U - Per-user Static route
I1 - ISIS L1, I2 - ISIS L2, IA - ISIS interarea
O - OSPF intra, OI - OSPF inter, OE1 - OSPF ext 1, OE2 - OSPF ext 2
R 2001:0DB8::/32 [130/0]
via ::, Serial2/0
B 2001:0DB8:3000:0/16 [200/45]
Via 2001:0DB8::0104
This static route will not be inserted into the IPv6 routing table because it is self-recursive. The next hop
of the static route, 2001:0DB8:3000:1, resolves via the BGP route 2001:0DB8:3000:0/16, which is itself
a recursive route (that is, it only specifies a next hop). The next hop of the BGP route, 2001:0DB8::0104,
resolves via the static route. Therefore, the static route would be used to resolve its own next hop.
IPv6C-3
Implementing Static Routes for IPv6
Information About Implementing Static Routes for IPv6
It is not normally useful to manually configure a self-recursive static route, although it is not prohibited.
However, a recursive static route that has been inserted in the IPv6 routing table may become
self-recursive as a result of some transient change in the network learned through a dynamic routing
protocol. If this occurs, the fact that the static route has become self-recursive will be detected and it will
be removed from the IPv6 routing table, although not from the configuration. A subsequent network
change may cause the static route to no longer be self-recursive, in which case it will be re-inserted in
the IPv6 routing table.
IPv6 recursive static routes are checked at one-minute intervals. So, a recursive static route may take up
to a minute to be inserted into the routing table once its next hop becomes valid. Likewise, it may take
a minute or so for the route to disappear from the table if its next hop becomes invalid.
A fully specified route is valid (that is, a candidate for insertion into the IPv6 routing table) when the
specified IPv6 interface is IPv6-enabled and up.
Any of the three types of IPv6 static routes can be used as a floating static route. A floating static route
must be configured with an administrative distance that is greater than the administrative distance of the
dynamic routing protocol, because routes with smaller administrative distances are preferred.
Note By default, static routes have smaller administrative distances than dynamic routes, so static routes will
be used in preference to dynamic routes.
IPv6C-4
Implementing Static Routes for IPv6
How to Implement Static Routes for IPv6
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 route ipv6-prefix/prefix-length {ipv6-address | interface-type interface-number
[ipv6-address]} [administrative-distance] [administrative-multicast-distance | unicast | multicast]
[tag tag]
IPv6C-5
Implementing Static Routes for IPv6
How to Implement Static Routes for IPv6
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 route ipv6-prefix/prefix-length Configures a static IPv6 route.
{ipv6-address | interface-type interface-number
[ipv6-address]} [administrative-distance] • A static default IPv6 route is being configured on a
[administrative-multicast-distance | unicast | serial interface.
multicast] [tag tag]
• See the syntax examples that immediately follow this
table for specific uses of the ipv6 route command for
Example: configuring static routes.
Router(config)# ipv6 route ::/0 serial 2/0
• Refer to the ipv6 route command entry in the IPv6 for
Cisco IOS Software Command Reference for more
details on the arguments and keywords used in this
command.
Examples
In addition to the syntax example included in the DETAILED STEPS, page 6, the following syntax
examples illustrate use of the ipv6 route for configuring the various types of static routes.
IPv6C-6
Implementing Static Routes for IPv6
How to Implement Static Routes for IPv6
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 route ipv6-prefix/prefix-length {ipv6-address | interface-type interface-number
[ipv6-address]} [administrative-distance] [administrative-multicast-distance | unicast | multicast]
[tag tag]
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 route ipv6-prefix/prefix-length Configures a static IPv6 route.
{ipv6-address | interface-type interface-number
[ipv6-address]} [administrative-distance] • In this example, a floating static IPv6 route is being
[administrative-multicast-distance | unicast | configured. An administrative distance of 200 is
multicast] [tag tag] configured.
• Default administrative distances are as follows:
Example:
– Connected interface—0
Router(config)# ipv6 route 2001:0DB8::/32
serial 2/0 201 – Static route—1
– Enhanced Interior Gateway Routing Protocol
(EIGRP) summary route—5
– External Border Gateway Protocol (eBGP)—20
– Internal Enhanced IGRP—90
– IGRP—100
– Open Shortest Path First—110
– Intermediate System-to-Intermediate System
(IS-IS)—115
– Routing Information Protocol (RIP)—120
– Exterior Gateway Protocol (EGP)—140
– EIGRP external route—170
– Internal BGP—200
– Unknown—255
IPv6C-7
Implementing Static Routes for IPv6
How to Implement Static Routes for IPv6
SUMMARY STEPS
1. enable
2. show ipv6 static [ipv6-address | ipv6-prefix/prefix-length][interface interface-type
interface-number] [recursive] [detail]
or
show ipv6 route [ipv6-address | ipv6-prefix/prefix-length | protocol | interface-type
interface-number]
3. debug ipv6 routing
IPv6C-8
Implementing Static Routes for IPv6
How to Implement Static Routes for IPv6
DETAILED STEPS
Example:
Router# show ipv6 static
Example:
Router# show ipv6 route static
Step 3 debug ipv6 routing Displays debugging messages for IPv6 routing table
updates and route cache updates.
Example:
Router# debug ipv6 routing
IPv6C-9
Implementing Static Routes for IPv6
Configuration Examples for Implementing Static Routes for IPv6
IPv6C-10
Implementing Static Routes for IPv6
Configuration Examples for Implementing Static Routes for IPv6
IPv6C-11
Implementing Static Routes for IPv6
Configuration Examples for Implementing Static Routes for IPv6
Using the show ipv6 static, show ipv6 route, and debug ipv6 routing Commands:
Examples
The following examples show the various forms and output for the show ipv6 static and the debug ipv6
routing commands. The following examples are included:
• show ipv6 static Command when No Options Are Specified in the Command Syntax: Example,
page 13
• show ipv6 static Command with the IPv6 Address and Prefix Command: Example, page 13
IPv6C-12
Implementing Static Routes for IPv6
Configuration Examples for Implementing Static Routes for IPv6
show ipv6 static Command when No Options Are Specified in the Command Syntax: Example
When no options are specified in the command, those routes installed in the IPv6 routing table are
marked with an asterisk, as shown in the following example:
Router# show ipv6 static
Field Description
4000:0/16 Indicates the IPv6 prefix of the remote network.
via nexthop 2001:0DB8:1:1 Specifies the address of the next router in the path to the remote
network.
interface Ethernet1/0 When an interface is specified, only those static routes with the
specified interface as outgoing interface are displayed.
distance n Indicates the administrative distance to the specified route.
show ipv6 static Command with the IPv6 Address and Prefix Command: Example
When the ipv6-address or ipv6-prefix/prefix-length argument is specified, only information about static
routes for that address or network is displayed. The following is sample output from the show ipv6 static
command when entered with the IPv6 prefix 2001:0DB8:200::/35:
Router# show ipv6 static 2001:0DB8:5555:0/16
IPv6C-13
Implementing Static Routes for IPv6
Configuration Examples for Implementing Static Routes for IPv6
IPv6C-14
Implementing Static Routes for IPv6
Configuration Examples for Implementing Static Routes for IPv6
In the following example, the show ipv6 route command is used to verify the configuration of a static
route on a multiaccess interface. An IPv6 link-local address—FE80::1—is the next-hop router.
Router# show ipv6 route
To display all static routes in the IPv6 routing table, use the show ipv6 route static command is used
with static as the value of the protocol argument:
Router# show ipv6 route static
Where to Go Next
If you want to implement routing protocols, refer to the Implementing RIP for IPv6, Implementing IS-IS
for IPv6, Implementing OSPF for IPv6, or Implementing Multiprotocol BGP for IPv6 module.
IPv6C-15
Implementing Static Routes for IPv6
Additional References
Additional References
The following sections provide references related to the Implementing Static Routes for IPv6 feature.
Related Documents
Related Topic Document Title
IP static route configuration “Protocol-Independent Routing,” Cisco IOS IP Routing Protocols
Configuration Guide
IP static route commands: complete command syntax, Cisco IOS IP Routing Protocols Command Reference
command mode, defaults, usage guidelines, and
examples
IPv6 supported feature list “Start Here: Cisco IOS Software Release Specifics for IPv6
Features,” Cisco IOS IPv6 Configuration Guide
IPv6 commands: complete command syntax, command Cisco IOS IPv6 Command Reference
mode, defaults, usage guidelines, and examples
Standards
Standards Title
No new or modified standards are supported by this —
feature, and support for existing standards has not been
modified by this feature.
MIBs
MIBs MIBs Link
No new or modified MIBs are supported, and support To locate and download MIBs for selected platforms, Cisco IOS
for existing MIBs has not been modified. releases, and feature sets, use Cisco MIB Locator found at the
following URL:
http://www.cisco.com/go/mibs
RFCs
RFCs Title
No new or modified RFCs are supported by this —
feature, and support for existing RFCs has not been
modified by this feature.
IPv6C-16
Implementing Static Routes for IPv6
Command Reference
Technical Assistance
Description Link
The Cisco Support website provides extensive online http://www.cisco.com/techsupport
resources, including documentation and tools for
troubleshooting and resolving technical issues with
Cisco products and technologies.
To receive security and technical information about
your products, you can subscribe to various services,
such as the Product Alert Tool (accessed from Field
Notices), the Cisco Technical Services Newsletter, and
Really Simple Syndication (RSS) Feeds.
Access to most tools on the Cisco Support website
requires a Cisco.com user ID and password.
Command Reference
The following commands are introduced or modified in the feature or features documented in this
module. For information about these commands, see the Cisco IOS IPv6 Command Reference at
http://www.cisco.com/en/US/docs/ios/ipv6/command/reference/ipv6_book.html. For information about
all Cisco IOS commands, use the Command Lookup Tool at http://tools.cisco.com/Support/CLILookup
or the Cisco IOS Master Command List, All Releases, at
http://www.cisco.com/en/US/docs/ios/mcl/all_release/all_mcl.html.
• debug ipv6 route
• ipv6 route
• ipv6 route static bfd
• monitor event ipv6 static
• show ipv6 route
• show ipv6 route summary
• show ipv6 static
IPv6C-17
Implementing Static Routes for IPv6
Feature Information for Implementing Static Routes for IPv6
Note Table 14 lists only the Cisco IOS software release that introduced support for a given feature in a given
Cisco IOS software release train. Unless noted otherwise, subsequent releases of that Cisco IOS
software release train also support that feature.
CCDE, CCENT, Cisco Eos, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, Cisco TelePresence, the Cisco logo, DCE, and Welcome to the Human
Network are trademarks; Changing the Way We Work, Live, Play, and Learn and Cisco Store are service marks; and Access Registrar, Aironet,
AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork
Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation,
EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, iQ
Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone, MeetingPlace,
MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare,
SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx logo
are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
IPv6C-18
Implementing Static Routes for IPv6
Feature Information for Implementing Static Routes for IPv6
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply
a partnership relationship between Cisco and any other company. (0807R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and
figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and
coincidental.
IPv6C-19
Implementing Static Routes for IPv6
Feature Information for Implementing Static Routes for IPv6
IPv6C-20
Implementing Traffic Filters and Firewalls for
IPv6 Security
The Implementing Traffic Filters and Firewalls for IPv6 Security module describes how to configure
Cisco IOS IPv6 traffic filter and firewall features for your Cisco networking devices. These security
features can protect your network from degradation or failure and also from data loss or compromised
security resulting from intentional attacks and from unintended but damaging mistakes by well-meaning
network users.
Finding Support Information for Platforms and Cisco IOS and Catalyst OS Software Images
Use Cisco Feature Navigator to find information about platform support and Cisco IOS and Catalyst OS
software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An
account on Cisco.com is not required.
Contents
• Prerequisites for Implementing Traffic Filters and Firewalls for IPv6 Security, page 2
• Restrictions for Implementing Traffic Filters and Firewalls for IPv6 Security, page 2
• Information About Implementing Traffic Filters and Firewalls for IPv6 Security, page 2
• How to Implement Traffic Filters and Firewalls for IPv6 Security, page 4
• Configuration Examples for Implementing Traffic Filters and Firewalls for IPv6 Security, page 27
• Additional References, page 30
Americas Headquarters:
Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA
TCP or UDP traffic can be matched to the upper-layer protocol (ULP) (for example, TCP, UDP, ICMP,
SCTP) if an AH is present or absent. Before this feature was introduced, this function was only available
if an AH was absent.
This feature introduces the keyword auth to the permit and deny commands. The auth keyword allows
matching traffic against the presence of the authentication header in combination with the specified
protocol; that is, TCP or UDP.
IPv6 traffic can be matched to a ULP when an AH header is present. To perform this function, enter the
ahp option for the protocol argument when using the permit or deny command.
Tunneling Support
IPv6 packets tunneled in IPv4 are not inspected. If a tunnel terminates on a router, and IPv6 traffic
exiting the tunnel is nonterminating, then the traffic is inspected.
Restrictions
• If you are running Cisco IOS Release 12.2(13)T, 12.0(23)S, or later releases, proceed to the
“Creating and Configuring an IPv6 ACL for Traffic Filtering” section. If you are running Cisco
IOS Release 12.2(11)T, 12.0(22)S, or earlier releases, proceed to the “Creating an IPv6 ACL for
Traffic Filtering in Cisco IOS Release 12.2(11)T, 12.0(22)S, or Earlier Releases” section.
• IPv6 ACLs are defined by a unique name (IPv6 does not support numbered ACLs). An IPv4 ACL
and an IPv6 ACL cannot share the same name.
Prerequisites
In Cisco IOS Release 12.2(13)T and 12.0(23)S or later releases, for backward compatibility, the ipv6
access-list command with the deny and permit keywords in global configuration mode is still
supported; however, an IPv6 ACL defined with deny and permit conditions in global configuration mode
is translated to IPv6 access list configuration mode. See the “Creating and Applying IPv6 ACLs:
Examples” section for an example of a translated IPv6 ACL configuration.
Restrictions
• Each IPv6 ACL contains implicit permit rules to enable IPv6 neighbor discovery. These rules can
be overridden by the user by placing a deny ipv6 any any statement within an ACL. The IPv6
neighbor discovery process makes use of the IPv6 network layer service; therefore, by default, IPv6
ACLs implicitly allow IPv6 neighbor discovery packets to be sent and received on an interface. In
IPv4, the Address Resolution Protocol (ARP), which is equivalent to the IPv6 neighbor discovery
process, makes use of a separate data link layer protocol; therefore, by default, IPv4 ACLs implicitly
allow ARP packets to be sent and received on an interface.
• Time-based and reflexive ACLs are not supported for IPv4 or IPv6 on the Cisco 12000 series
platform. The reflect, timeout, and time-range keywords of the permit command in IPv6 are
excluded on the Cisco 12000 series.
SUMMARY STEPS
1. enable
2. configure terminal
DETAILED STEPS
Example:
Router# configure terminal
or
deny protocol {source-ipv6-prefix/prefix-length
| any | host source-ipv6-address | auth}
[operator [port-number]]
{destination-ipv6-prefix/prefix-length | any |
host destination-ipv6-address | auth} [operator
[port-number]] [dest-option-type [doh-number |
doh-type]] [dscp value] [flow-label value]
[fragments] [log] [log-input] [mobility]
[mobility-type [mh-number | mh-type]] [routing]
[routing-type routing-number] [sequence value]
[time-range name] [undetermined-transport]
Example:
Router(config-ipv6-acl)# permit tcp
2001:0DB8:0300:0201::/32 eq telnet any reflect
reflectout
or
Example:
Router(config-ipv6-acl)# deny tcp host
2001:0db8:1::1 any log-input
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
DETAILED STEPS
Example:
Router# configure terminal
Step 3 interface type number Specifies the interface type and number, and enters interface
configuration mode.
Example:
Router(config)# interface ethernet 0
Step 4 ipv6 traffic-filter access-list-name {in | out} Applies the specified IPv6 access list to the interface
specified in the previous step.
Example:
Router(config-if)# ipv6 traffic-filter outbound
out
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 access-list access-list-name
4. permit protocol {source-ipv6-prefix/prefix-length | any | host source-ipv6-address | auth}
[operator [port-number]] {destination-ipv6-prefix/prefix-length | any | host
destination-ipv6-address | auth} [operator [port-number]] [dest-option-type [doh-number |
doh-type]] [dscp value] [flow-label value] [fragments] [log] [log-input] [mobility] [mobility-type
[mh-number | mh-type]] [reflect name [timeout value]] [routing] [routing-type routing-number]
[sequence value] [time-range name]
or
deny protocol {source-ipv6-prefix/prefix-length | any | host source-ipv6-address | auth} [operator
[port-number]] {destination-ipv6-prefix/prefix-length | any | host destination-ipv6-address | auth}
[operator [port-number]] [dest-option-type [doh-number | doh-type]] [dscp value] [flow-label
value] [fragments] [log] [log-input] [mobility] [mobility-type [mh-number | mh-type]] [routing]
[routing-type routing-number] [sequence value] [time-range name] [undetermined-transport]
DETAILED STEPS
Example:
Router# configure terminal
or
deny protocol {source-ipv6-prefix/prefix-length
| any | host source-ipv6-address | auth}
[operator [port-number]]
{destination-ipv6-prefix/prefix-length | any |
host destination-ipv6-address | auth} [operator
[port-number]] [dest-option-type [doh-number |
doh-type]] [dscp value] [flow-label value]
[fragments] [log] [log-input] [mobility]
[mobility-type [mh-number | mh-type]] [routing]
[routing-type routing-number] [sequence value]
[time-range name] [undetermined-transport]
Example:
Router(config-ipv6-acl)# permit ipv6 host
2001:0DB8:0:4::32 any eq telnet
or
Example:
Router(config-ipv6-acl)# deny ipv6 host
2001:0DB8:0:6::6/32 any
SUMMARY STEPS
1. enable
2. configure terminal
3. line [aux | console | tty | vty] line-number [ending-line-number]
4. ipv6 access-class ipv6-access-list-name {in | out}
DETAILED STEPS
Example:
Router# configure terminal
Step 3 line [aux | console | tty | vty] line-number Identifies a specific line for configuration and enters line
[ending-line-number] configuration mode.
• In this example, the vty keyword is used to specify the
Example: virtual terminal lines for remote console access.
Router(config)# line vty 0 4
Step 4 ipv6 access-class ipv6-access-list-name {in | Filters incoming and outgoing connections to and from the
out} router based on an IPv6 ACL.
Example:
Router(config-line)# ipv6 access-class cisco in
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 access-list access-list-name
4. permit icmp auth
or
deny icmp auth
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 access-list access-list-name Defines an IPv6 access list and places the router in IPv6
access list configuration mode.
Example:
Router(config)# ipv6 access-list list1
Step 4 permit icmp auth Specifies permit or deny conditions for an IPv6 ACL using
the auth keyword, which is used to match against the
or presence of the AH.
deny icmp auth
Example:
Router(config-ipv6-acl)# permit icmp auth
Creating an IPv6 ACL for Traffic Filtering in Cisco IOS Release 12.2(11)T,
12.0(22)S, or Earlier Releases
The following tasks describe how to create and apply ACLs in Cisco IOS Release 12.2(11)T, 12.0(22)S,
or earlier releases.
• Creating an IPv6 ACL in Cisco IOS Release 12.2(11)T, 12.0(22)S, or Earlier Releases, page 12
• Applying the IPv6 ACL to an Interface in Cisco IOS Release 12.2(11)T, 12.0(22)S, or Earlier
Releases, page 13
Creating an IPv6 ACL in Cisco IOS Release 12.2(11)T, 12.0(22)S, or Earlier Releases
This task explains how to create an IPv6 ACL and configure the IPv6 ACL to pass or block traffic in
Cisco IOS Release 12.2(11)T, 12.0(22)S, or earlier releases.
Restrictions
• The source-ipv6-prefix argument filters traffic by packet source address, and the
destination-ipv6-prefix argument filters traffic by packet destination address.
• The Cisco IOS software compares an IPv6 prefix against the permit and deny condition statements
in the access list. Every IPv6 access list, including access lists that do not have any permit and deny
condition statements, has an implicit deny any any statement as its last match condition. The priority
or sequence value applied to each condition statement dictates the order in which the statement is
applied in the access list.
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 access-list access-list-name {permit | deny} {source-ipv6-prefix/prefix-length | any}
{destination-ipv6-prefix/prefix-length | any} [priority value]
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 access-list access-list-name {permit | Creates an IPv6 ACL and sets deny or permit conditions for
deny} {source-ipv6-prefix/prefix-length | any} the ACL.
{destination-ipv6-prefix/prefix-length | any}
[priority value]
Example:
Router(config)# ipv6 access-list list2 deny
fec0:0:0:2::/64 any
Applying the IPv6 ACL to an Interface in Cisco IOS Release 12.2(11)T, 12.0(22)S, or Earlier Releases
This task describes how to apply the IPv6 ACL to an interface in Cisco IOS Release 12.2(11)T,
12.0(22)S, or earlier releases.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ipv6 traffic-filter access-list-name {in | out}
DETAILED STEPS
Example:
Router# configure terminal
Step 3 interface type number Specifies the interface type and number, and enters interface
configuration mode.
Example:
Router(config)# interface ethernet 0
Step 4 ipv6 traffic-filter access-list-name {in | out} Applies the specified IPv6 access list to the interface
specified in the previous step.
Example:
Router(config-if)# ipv6 traffic-filter list2
out
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 unicast-routing
4. ipv6 inspect name inspection-name protocol [alert {on | off}] [audit-trail {on | off}] [timeout
seconds]
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 unicast-routing Enables IPv6 unicast routing.
Example:
Router(config)# ipv6 unicast-routing
Step 4 ipv6 inspect name inspection-name protocol Defines a set of IPv6 inspection rules for the firewall.
[alert {on | off}] [audit-trail {on | off}]
[timeout seconds]
Example:
Router(config)# ipv6 inspect name ipv6_test
icmp timeout 60
Step 5 interface type number Specifies the interface on which the inspection will occur.
Example:
Router(config)# interface FastEthernet0/0
Example:
Router(config-if)# ipv6 address
3FFE:C000:0:7::/64 eui-64
Step 7 ipv6 enable Enables IPv6 routing.
Note This step is optional if the IPv6 address is specified
Example: in step 6.
Router(config-if)# ipv6 enable
Step 8 ipv6 traffic-filter access-list-name {in | out} Applies the specified IPv6 access list to the interface
specified in the previous step.
Example:
Router(config-if)# ipv6 traffic-filter outbound
out
Step 9 ipv6 inspect inspection-name {in | out} Applies the set of inspection rules.
Example:
Router(config)#ipv6 inspect ipv6_test in
or
deny protocol {source-ipv6-prefix/prefix-length
| any | host source-ipv6-address | auth}
[operator [port-number]]
{destination-ipv6-prefix/prefix-length | any |
host destination-ipv6-address | auth} [operator
[port-number]] [dest-option-type [doh-number |
doh-type]] [dscp value] [flow-label value]
[fragments] [log] [log-input] [mobility]
[mobility-type [mh-number | mh-type]] [routing]
[routing-type routing-number] [sequence value]
[time-range name] [undetermined-transport]
Example:
Router(config-ipv6-acl)# permit tcp
2001:0DB8:0300:0201::/32 any reflect reflectout
or
Example:
Router(config-ipv6-acl)# deny tcp
fec0:0:0:0201::/64 any
The following task explains how to create an IPv6 access class filter to use in PAM configuration:
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 access-list access-list-name
4. permit protocol {source-ipv6-prefix/prefix-length | any | host source-ipv6-address | auth}
[operator [port-number]] {destination-ipv6-prefix/prefix-length | any | host
destination-ipv6-address | auth} [operator [port-number]] [dest-option-type [doh-number |
doh-type]] [dscp value] [flow-label value] [fragments] [log] [log-input] [mobility] [mobility-type
[mh-number | mh-type]] [reflect name [timeout value]] [routing] [routing-type routing-number]
[sequence value] [time-range name]
or
deny protocol {source-ipv6-prefix/prefix-length | any | host source-ipv6-address | auth} [operator
[port-number]] {destination-ipv6-prefix/prefix-length | any | host destination-ipv6-address | auth}
[operator [port-number]] [dest-option-type [doh-number | doh-type]] [dscp value] [flow-label
value] [fragments] [log] [log-input] [mobility] [mobility-type [mh-number | mh-type]] [routing]
[routing-type routing-number] [sequence value] [time-range name] [undetermined-transport]
DETAILED STEPS
Example:
Router# configure terminal
or
deny protocol {source-ipv6-prefix/prefix-length
| any | host source-ipv6-address | auth }
[operator [port-number]]
{destination-ipv6-prefix/prefix-length | any |
host destination-ipv6-address | auth} [operator
[port-number]] [dest-option-type [doh-number |
doh-type]] [dscp value] [flow-label value]
[fragments] [log] [log-input] [mobility]
[mobility-type [mh-number | mh-type]] [routing]
[routing-type routing-number] [sequence value]
[time-range name] [undetermined-transport]
Example:
Router(config-ipv6-acl)# permit tcp
2001:0DB8:0300:0201::/32 any reflect reflectout
or
Example:
Router(config-ipv6-acl)# deny tcp
fec0:0:0:0201::/64 any
Once you have created an IPv6 access class filter, use the following task to apply the filter to PAM.
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 port-map application-name port port-num [list acl-name]
DETAILED STEPS
Example:
Router# configure terminal
Step 3 ipv6 port-map application-name port port-num Establishes PAM for the system.
[list acl-name]
Example:
Router(config)# ipv6 port-map ftp port 8090
list PAM_ACL
SUMMARY STEPS
DETAILED STEPS
Example:
Router# show crypto ipsec sa ipv6
Step 2 show crypto isakmp peer [config | detail] Displays peer descriptions.
Example:
Router# show crypto isakmp peer
Step 3 show crypto isakmp profile Lists all the ISAKMP profiles that are defined on a router.
Example:
Router# show crypto isakmp profile
Step 4 show crypto isakmp sa [active | standby | Displays current IKE SAs.
detail | nat]
Example:
Router# show crypto isakmp sa
Step 5 show ipv6 access-list [access-list-name] Displays the contents of all current IPv6 access lists.
Example:
Router# show ipv6 access-list
Step 6 show ipv6 inspect {name inspection-name | Displays CBAC configuration and session information.
config | interfaces | session [detail] | all}
Example:
Router# show ipv6 inspect interfaces
Step 7 show ipv6 port-map [application | port Displays PAM configuration.
port-number]
Example:
Router# show ipv6 port-map ftp
Step 8 show ipv6 prefix-list [detail | summary] Displays information about an IPv6 prefix list or IPv6 prefix
[list-name] list entries.
Example:
Router# show ipv6 prefix-list
Example:
Router# show ipv6 virtual-reassembly interface
e1/1
Step 10 show logging [slot slot-number | summary] Displays the state of system logging (syslog) and the
contents of the standard system logging buffer.
Example: • Access list entries with the log or log-input keywords
Router# show logging will be logged when a packet matches the access list
entry.
SUMMARY STEPS
1. enable
2. clear ipv6 access-list [access-list-name]
3. clear ipv6 inspect {session session-number | all}
4. clear ipv6 prefix-list [prefix-list-name] [ipv6-prefix/prefix-length]
5. debug crypto ipsec
6. debug crypto engine packet [detail]
7. debug ipv6 inspect {function-trace | object-creation | object-deletion | events | timers | protocol
| detailed}
8. debug ipv6 packet [access-list access-list-name] [detail]
DETAILED STEPS
Example:
Router# clear ipv6 access-list tin
Example:
Router# clear ipv6 inspect all
Step 4 clear ipv6 prefix-list [prefix-list-name] Resets the hit count of the IPv6 prefix list entries.
[ipv6-prefix/prefix-length]
Example:
Router# clear ipv6 prefix-list
Step 5 debug crypto ipsec Displays IPsec network events.
Example:
Router# debug crypto ipsec
Step 6 debug crypto engine packet [detail] Displays the contents of IPv6 packets.
Example:
Caution Using this command could flood the system and
Router# debug crypto engine packet
increase CPU if several packets are being
encrypted.
Step 7 debug ipv6 inspect {function-trace | Displays messages about Cisco IOS Firewall events.
object-creation | object-deletion | events |
timers | protocol | detailed}
Example:
Router# debug ipv6 inspect timers
Step 8 debug ipv6 packet [access-list Displays debugging messages for IPv6 packets.
access-list-name] [detail]
Example:
Router# debug ipv6 packet access-list PAK-ACL
Examples
This section provides the following output examples:
• Sample Output for the show crypto ipsec sa ipv6 Command, page 24
• Sample Output for the show crypto isakmp peer Command, page 25
• Sample Output for the show crypto isakmp profile Command, page 25
• Sample Output for the show crypto isakmp sa Command, page 25
• Sample Output for the show ipv6 access-list Command, page 26
• Sample Output for the show ipv6 prefix-list Command, page 26
• Sample Output for the show ipv6 virtual-reassembly Command, page 26
• Sample Output for the show logging Command, page 27
• Sample Output for the clear ipv6 access-list Command, page 27
interface: Tunnel0
Crypto map tag: Tunnel0-head-0, local addr 3FFE:2002::A8BB:CCFF:FE01:9002
inbound ah sas:
spi: 0x967698CB(2524354763)
transform: ah-sha-hmac ,
in use settings ={Tunnel, }
conn id: 93, flow_id: SW:93, crypto map: Tunnel0-head-0
sa timing: remaining key lifetime (k/sec): (4397507/147)
replay detection support: Y
Status: ACTIVE
outbound ah sas:
spi: 0xA83E05B5(2822636981)
transform: ah-sha-hmac ,
in use settings ={Tunnel, }
conn id: 94, flow_id: SW:94, crypto map: Tunnel0-head-0
sa timing: remaining key lifetime (k/sec): (4397508/147)
replay detection support: Y
Status: ACTIVE
dst: 3FFE:2002::A8BB:CCFF:FE01:2C02
src: 3FFE:2002::A8BB:CCFF:FE01:9002
conn-id: 1001 I-VRF: Status: ACTIVE Encr: des Hash: sha Auth:
psk
DH: 1 Lifetime: 23:45:00 Cap: D Engine-id:Conn-id = SW:1
dst: 3FFE:2002::A8BB:CCFF:FE01:2C02
src: 3FFE:2002::A8BB:CCFF:FE01:9002
conn-id: 1002 I-VRF: Status: ACTIVE Encr: des Hash: sha Auth:
psk
DH: 1 Lifetime: 23:45:01 Cap: D Engine-id:Conn-id = SW:2
Configuration Information:
---------------------------------
Virtual Fragment Reassembly (VFR) is ENABLED...
Maximum number of datagram that can be reassembled at a time: 64
Maximum number of fragments per datagram: 8
Timeout value of a datagram: 3 seconds
Statistical Information:
----------------------------
Number of datagram being reassembled:12
Number of fragments being processed:48
Total number of datagram reassembled:6950
Total number of datagram failed: 9
Creating and Applying an IPv6 ACL for Release 12.2(13)T or 12.0(23)S: Example
The following example is from a router running Cisco IOS Release 12.2(13)T.
The example configures two IPv6 ACLs named OUTBOUND and INBOUND and applies both ACLs to
outbound and inbound traffic on Ethernet interface 0. The first and second permit entries in the
OUTBOUND list permit all TCP and User Datagram Protocol (UDP) packets from network
2001:0DB8:0300:0201::/32 to exit out of Ethernet interface 0. The entries also configure the temporary
IPv6 reflexive ACL named REFLECTOUT to filter returning (incoming) TCP and UDP packets on
Ethernet interface 0. The first deny entry in the OUTBOUND list keeps all packets from the network
fec0:0:0:0201::/64 (packets that have the site-local prefix fec0:0:0:0201 as the first 64 bits of their source
IPv6 address) from exiting out of Ethernet interface 0.
The evaluate command in the INBOUND list applies the temporary IPv6 reflexive ACL named
REFLECTOUT to inbound TCP and UDP packets on Ethernet interface 0. When outgoing TCP or UDP
packets are permitted on Ethernet interface 0 by the OUTBOUND list, the INBOUND list uses the
REFLECTOUT list to match (evaluate) the returning (incoming) TCP and UDP packets.
ipv6 access-list OUTBOUND
permit tcp 2001:0DB8:0300:0201::/32 any reflect REFLECTOUT
permit udp 2001:0DB8:0300:0201::/32 any reflect REFLECTOUT
deny fec0:0:0:0201::/64 any
interface ethernet 0
ipv6 traffic-filter OUTBOUND out
ipv6 traffic-filter INBOUND in
Note Given that a permit any any statement is not included as the last entry in the OUTBOUND or
INBOUND ACL, only TCP and UDP packets matching the configured permit entries in the ACL and
ICMP packets matching the implicit permit conditions in the ACL are permitted out of and in to Ethernet
interface 0 (the implicit deny all condition at the end of the ACL denies all other packet types on the
interface).
The following example can be run on a router running Cisco IOS Release 12.2(13)T or 12.0(23)S.
The example configures HTTP access to be restricted to certain hours during the day, and to log any
activity outside of the permitted hours.
time-range lunchtime
periodic weekdays 12:00 to 13:00
Creating and Applying an IPv6 ACL for 12.2(11)T, 12.0(22)S, or Earlier Releases: Example
The following example is from a router running Cisco IOS Release 12.2(11)T, 12.0(22)S, or earlier
releases.
The example configures the IPv6 ACL named list2 and applies the ACL to outbound traffic on Ethernet
interface 0. Specifically, the first ACL entry keeps all packets from the network fec0:0:0:2::/64 (packets
that have the site-local prefix fec0:0:0:2 as the first 64 bits of their source IPv6 address) from exiting out
of Ethernet interface 0. The second entry in the ACL permits all other traffic to exit out of Ethernet
interface 0. The second entry is necessary because an implicit deny all condition is at the end of each
IPv6 ACL.
ipv6 access-list list2 deny fec0:0:0:2::/64 any
ipv6 access-list list2 permit any any
interface ethernet 0
ipv6 traffic-filter list2 out
If the same configuration was used on a router running Cisco IOS Release 12.2(13)T, 12.0(23)S, or later
releases, the configuration would be translated into IPv6 access list configuration mode as follows:
ipv6 access-list list2
deny ipv6 fec0:0:0:2::/64 any
permit ipv6 any any
interface ethernet 0
ipv6 traffic-filter list2 out
Note IPv6 is automatically configured as the protocol type in permit any any and deny any any statements
that are translated from global configuration mode to IPv6 access list configuration mode.
The following example allows TCP or UDP parsing only when an AH header is present. TCP or UDP
traffic without an AH will not be matched:
IPv6 access list example2
deny tcp host 2001::1 any log sequence 5
permit tcp any any auth sequence 10
permit udp any any auth sequence 20
The following example allows any IPv6 traffic containing an authentication header:
IPv6 access list example3
permit ahp any any
interface FastEthernet0/0
ipv6 address 3FFE:C000:0:7::/64 eui-64
ipv6 enable
ipv6 traffic-filter INBOUND out
ipv6 inspect ipv6_test in
interface FastEthernet0/1
ipv6 address 3FFE:C000:1:7::/64 eui-64
ipv6 enable
ipv6 traffic-filter OUTBOUND in
ip default-gateway 192.168.17.8
! end of tftpboot server config
Additional References
The following sections provide references related to the Implementing Traffic Filters and Firewalls for
IPv6 Security feature.
Related Documents
Related Topic Document Title
IPv6 IPsec “Implementing IPsec in IPv6 Security,” Cisco IOS IPv6
Configuration Guide
Basic IPv6 configuration “Implementing IPv6 Addressing and Basic Connectivity,” Cisco IOS
IPv6 Configuration Guide
IPv6 supported feature list “Start Here: Cisco IOS Software Release Specifics for IPv6
Features,” Cisco IOS IPv6 Configuration Guide
IPv6 commands: complete command syntax, command Cisco IOS IPv6 Command Reference
mode, defaults, usage guidelines, and examples
Standards
Standards Title
No new or modified standards are supported by this —
feature, and support for existing standards has not been
modified by this feature.
MIBs
MIBs MIBs Link
No new or modified MIBs are supported, and support To locate and download MIBs for selected platforms, Cisco IOS
for existing MIBs has not been modified. releases, and feature sets, use Cisco MIB Locator found at the
following URL:
http://www.cisco.com/go/mibs
RFCs
RFCs Title
RFC 2401 Security Architecture for the Internet Protocol
RFC 2402 IP Authentication Header
RFC 2428 FTP Extensions for IPv6 and NATs
RFC 2460 Internet Protocol, Version 6 (IPv6) Specification
RFC 2474 Definition of the Differentiated Services Field (DS Field) in the IPv4
and IPv6 Headers
RFC 3576 Change of Authorization
Technical Assistance
Description Link
The Cisco Support website provides extensive online http://www.cisco.com/techsupport
resources, including documentation and tools for
troubleshooting and resolving technical issues with
Cisco products and technologies.
To receive security and technical information about
your products, you can subscribe to various services,
such as the Product Alert Tool (accessed from Field
Notices), the Cisco Technical Services Newsletter, and
Really Simple Syndication (RSS) Feeds.
Access to most tools on the Cisco Support website
requires a Cisco.com user ID and password.
Command Reference
The following commands are introduced or modified in the feature or features documented in this
module. For information about these commands, see the Cisco IOS IPv6 Command Reference at
http://www.cisco.com/en/US/docs/ios/ipv6/command/reference/ipv6_book.html. For information about
all Cisco IOS commands, use the Command Lookup Tool at http://tools.cisco.com/Support/CLILookup
or the Cisco IOS Master Command List, All Releases, at
http://www.cisco.com/en/US/docs/ios/mcl/all_release/all_mcl.html.
• clear ipv6 access-list
• clear ipv6 inspect
• clear ipv6 prefix-list
• debug crypto ipsec
• debug crypto engine packet
• debug ipv6 inspect
• debug ipv6 packet
• deny
• ipv6 access-class
• ipv6 access-list
• ipv6 address
• ipv6 enable
• ipv6 inspect
• ipv6 inspect name
• ipv6 port-map
• ipv6 traffic-filter
• ipv6 unicast-routing
• permit
Note Table 1 lists only the Cisco IOS software release that introduced support for a given feature in a given
Cisco IOS software release train. Unless noted otherwise, subsequent releases of that Cisco IOS
software release train also support that feature.
Table 1 Feature Information for Implementing Traffic Filters and Firewalls for IPv6 Security
Table 1 Feature Information for Implementing Traffic Filters and Firewalls for IPv6 Security
CCDE, CCENT, Cisco Eos, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, Cisco TelePresence, the Cisco logo, DCE, and Welcome to the Human
Network are trademarks; Changing the Way We Work, Live, Play, and Learn and Cisco Store are service marks; and Access Registrar, Aironet,
AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork
Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation,
EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, iQ
Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone, MeetingPlace,
MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare,
SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx logo
are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply
a partnership relationship between Cisco and any other company. (0807R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and
figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and
coincidental.
This module describes how to configure overlay tunneling techniques used by the Cisco IOS software to
support the transition from IPv4-only networks to integrated IPv4- and IPv6-based networks. Tunneling
encapsulates IPv6 packets in IPv4 packets and uses the IPv4 network as a link-layer mechanism.
Finding Support Information for Platforms and Cisco IOS and Catalyst OS Software Images
Use Cisco Feature Navigator to find information about platform support and Cisco IOS and Catalyst OS
software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An
account on Cisco.com is not required.
Contents
• Prerequisites for Implementing Tunneling for IPv6, page 2
• Restrictions for Implementing Tunneling for IPv6, page 2
• Information About Implementing Tunneling for IPv6, page 2
• How to Implement Tunneling for IPv6, page 7
• Configuration Examples for Implementing Tunneling for IPv6, page 17
• Additional References, page 21
• Command Reference, page 22
• Feature Information for Implementing Tunneling for IPv6, page 24
Americas Headquarters:
Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA
2
Implementing Tunneling for IPv6
Information About Implementing Tunneling for IPv6
IPv4
52685
IPv4 header IPv6 header IPv6 data
Note Overlay tunnels reduce the maximum transmission unit (MTU) of an interface by 20 octets (assuming
the basic IPv4 packet header does not contain optional fields). A network using overlay tunnels is
difficult to troubleshoot. Therefore, overlay tunnels connecting isolated IPv6 networks should not be
considered as a final IPv6 network architecture. The use of overlay tunnels should be considered as a
transition technique toward a network that supports both the IPv4 and IPv6 protocol stacks or just the
IPv6 protocol stack.
Use Table 24 to help you determine which type of tunnel you want to configure to carry IPv6 packets
over an IPv4 network.
Table 24 Suggested Usage of Tunnel Types to Carry IPv6 Packets over an IPv4 Network
Individual tunnel types are discussed in detail in this document. We recommend that you review and
understand the information about the specific tunnel type that you want to implement. When you are
familiar with the type of tunnel you need, see Table 25 for a summary of the tunnel configuration
parameters that you may find useful.
3
Implementing Tunneling for IPv6
Information About Implementing Tunneling for IPv6
4
Implementing Tunneling for IPv6
Information About Implementing Tunneling for IPv6
GRE has a protocol field that identifies the passenger protocol. GRE tunnels allow Intermediate
System-to-Intermediate System (IS-IS) or IPv6 to be specified as a passenger protocol, which allows
both IS-IS and IPv6 traffic to run over the same tunnel. If GRE did not have a protocol field, it would be
impossible to distinguish whether the tunnel was carrying IS-IS or IPv6 packets. The GRE protocol field
is why it is desirable that you tunnel IS-IS and IPv6 inside GRE.
5
Implementing Tunneling for IPv6
Information About Implementing Tunneling for IPv6
The tunnel destination is automatically determined by the IPv4 address in the low-order 32 bits of
IPv4-compatible IPv6 addresses. The host or router at each end of an IPv4-compatible tunnel must
support both the IPv4 and IPv6 protocol stacks. IPv4-compatible tunnels can be configured between
border-routers or between a border-router and a host. Using IPv4-compatible tunnels is an easy method
to create tunnels for IPv6 over IPv4, but the technique does not scale for large networks.
Note IPv4-compatible tunnels were initially supported for IPv6, but are being deprecated. Cisco recommends
that you use the IPv6 ISATAP tunneling technique.
ISATAP Tunnels
ISATAP is an automatic overlay tunneling mechanism that uses the underlying IPv4 network as a NBMA
link layer for IPv6. ISATAP is designed for transporting IPv6 packets within a site where a native IPv6
infrastructure is not yet available; for example, when sparse IPv6 hosts are deployed for testing. ISATAP
tunnels allow individual IPv4 or IPv6 dual-stack hosts within a site to communicate with other such hosts
on the same virtual link, basically creating an IPv6 network using the IPv4 infrastructure.
The ISATAP router provides standard router advertisement network configuration support for the
ISATAP site. This feature allows clients to automatically configure themselves as they would do if they
were connected to an Ethernet. It can also be configured to provide connectivity out of the site. ISATAP
uses a well-defined IPv6 address format composed of any unicast IPv6 prefix (/64), which can be link
local, or global (including 6to4 prefixes), enabling IPv6 routing locally or on the Internet. The IPv4
address is encoded in the last 32 bits of the IPv6 address, enabling automatic IPv6-in-IPv4 tunneling.
Although the ISATAP tunneling mechanism is similar to other automatic tunneling mechanisms, such as
IPv6 6to4 tunneling, ISATAP is designed for transporting IPv6 packets within a site, not between sites.
ISATAP uses unicast addresses that include a 64-bit IPv6 prefix and a 64-bit interface identifier. The
interface identifier is created in modified EUI-64 format in which the first 32 bits contain the value
000:5EFE to indicate that the address is an IPv6 ISATAP address. Table 26 describes an ISATAP address
format.
As shown in Table 26, an ISATAP address consists of an IPv6 prefix and the ISATAP interface identifier.
This interface identifier includes the IPv4 address of the underlying IPv4 link. The following example
shows what an actual ISATAP address would look like if the prefix is 2001:0DB8:1234:5678::/64 and
the embedded IPv4 address is 10.173.129.8. In the ISATAP address, the IPv4 address is expressed in
hexadecimal as 0AAD:8108.
Example:
2001:0DB8:1234:5678:0000:5EFE:0AAD:8108
6
Implementing Tunneling for IPv6
How to Implement Tunneling for IPv6
Prerequisites
With manually configured IPv6 tunnels, an IPv6 address is configured on a tunnel interface, and
manually configured IPv4 addresses are assigned to the tunnel source and the tunnel destination. The
host or router at each end of a configured tunnel must support both the IPv4 and IPv6 protocol stacks.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface tunnel tunnel-number
4. ipv6 address ipv6-prefix/prefix-length [eui-64]
5. tunnel source {ip-address | interface-type interface-number}
6. tunnel destination ip-address
7. tunnel mode ipv6ip
7
Implementing Tunneling for IPv6
How to Implement Tunneling for IPv6
DETAILED STEPS
Example:
Router# configure terminal
Step 3 interface tunnel tunnel-number Specifies a tunnel interface and number, and enters interface
configuration mode.
Example:
Router(config)# interface tunnel 0
Step 4 ipv6 address ipv6-prefix/prefix-length [eui-64] Specifies the IPv6 network assigned to the interface and
enables IPv6 processing on the interface.
Example: Note Refer to the Configuring Basic Connectivity for
Router(config-if)# ipv6 address IPv6 module for more information on configuring
3ffe:b00:c18:1::3/127 IPv6 addresses.
Step 5 tunnel source {ip-address | interface-type Specifies the source IPv4 address or the source interface
interface-number} type and number for the tunnel interface.
• If an interface is specified, the interface must be
Example: configured with an IPv4 address.
Router(config-if)# tunnel source ethernet 0
Step 6 tunnel destination ip-address Specifies the destination IPv4 address or hostname for the
tunnel interface.
Example:
Router(config-if)# tunnel destination
192.168.30.1
Step 7 tunnel mode ipv6ip Specifies a manual IPv6 tunnel.
Note The tunnel mode ipv6ip command specifies IPv6
Example: as the passenger protocol and IPv4 as both the
Router(config-if)# tunnel mode ipv6ip encapsulation and transport protocol for the manual
IPv6 tunnel.
What to Do Next
Proceed to the “Verifying IPv6 Tunnel Configuration and Operation” section on page 15.
8
Implementing Tunneling for IPv6
How to Implement Tunneling for IPv6
Prerequisites
When GRE IPv6 tunnels are configured, IPv6 addresses are assigned to the tunnel source and the tunnel
destination. The tunnel interface can have either IPv4 or IPv6 addresses assigned (this is not shown in
the task). The host or router at each end of a configured tunnel must support both the IPv4 and IPv6
protocol stacks.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface tunnel tunnel-number
4. ipv6 address ipv6-prefix/prefix-length [eui-64]
5. tunnel source {ip-address | ipv6-address | interface-type interface-number}
6. tunnel destination {host-name | ip-address | ipv6-address}
7. tunnel mode {aurp | cayman | dvmrp | eon | gre | gre multipoint | gre ipv6 | ipip
[decapsulate-any] | iptalk | ipv6 | mpls | nos}
DETAILED STEPS
Example:
Router# configure terminal
Step 3 interface tunnel tunnel-number Specifies a tunnel interface and number, and enters interface
configuration mode.
Example:
Router(config)# interface tunnel 0
Step 4 ipv6 address ipv6-prefix/prefix-length [eui-64] Specifies the IPv6 network assigned to the interface and
enables IPv6 processing on the interface.
Example: Note Refer to the Implementing Basic Connectivity for
Router(config-if)# ipv6 address IPv6 module for more information on configuring
3ffe:b00:c18:1::3/127 IPv6 addresses.
Step 5 tunnel source {ip-address | ipv6-address | Specifies the source IPv4 address or the source interface
interface-type interface-number} type and number for the tunnel interface.
• If an interface is specified, the interface must be
Example: configured with an IPv4 address.
Router(config-if)# tunnel source ethernet 0
9
Implementing Tunneling for IPv6
How to Implement Tunneling for IPv6
Example:
Router(config-if)# tunnel destination
192.168.30.1
Step 7 tunnel mode {aurp | cayman | dvmrp | eon | gre Specifies a GRE IPv6 tunnel.
| gre multipoint | gre ipv6 | ipip
[decapsulate-any] | iptalk | ipv6 | mpls | Note The tunnel mode gre ipv6 command specifies GRE
nos} as the encapsulation protocol for the tunnel.
Example:
Router(config-if)# tunnel mode gre ipv6
What to Do Next
Proceed to the “Verifying IPv6 Tunnel Configuration and Operation” section on page 15.
Prerequisites
With 6to4 tunnels, the tunnel destination is determined by the border router IPv4 address, which is
concatenated to the prefix 2002::/16 in the format 2002:border-router-IPv4-address::/48. The border
router at each end of a 6to4 tunnel must support both the IPv4 and IPv6 protocol stacks.
Restrictions
The configuration of only one IPv4-compatible tunnel and one 6to4 IPv6 tunnel is supported on a router.
If you choose to configure both of those tunnel types on the same router, we strongly recommend that
they do not share the same tunnel source.
The reason that a 6to4 tunnel and an IPv4-compatible tunnel cannot share an interface is that both of
them are NBMA “point-to-multipoint” access links and only the tunnel source can be used to reorder the
packets from a multiplexed packet stream into a single packet stream for an incoming interface. So when
a packet with an IPv4 protocol type of 41 arrives on an interface, that packet is mapped to an IPv6 tunnel
interface based on the IPv4 address. However, if both the 6to4 tunnel and the IPv4-compatible tunnel
share the same source interface, the router is not able to determine the IPv6 tunnel interface to which it
should assign the incoming packet.
IPv6 manually configured tunnels can share the same source interface because a manual tunnel is a
“point-to-point” link, and both the IPv4 source and IPv4 destination of the tunnel are defined.
SUMMARY STEPS
1. enable
2. configure terminal
10
Implementing Tunneling for IPv6
How to Implement Tunneling for IPv6
DETAILED STEPS
Example:
Router# configure terminal
Step 3 interface tunnel tunnel-number Specifies a tunnel interface and number, and enters interface
configuration mode.
Example:
Router(config)# interface tunnel 0
Step 4 ipv6 address ipv6-prefix/prefix-length [eui-64] Specifies the IPv6 address assigned to the interface and
enables IPv6 processing on the interface.
Example: • The 32 bits following the initial 2002::/16 prefix
Router(config-if)# ipv6 address correspond to an IPv4 address assigned to the tunnel
2002:c0a8:6301:1::1/64 source.
Note Refer to the Configuring Basic Connectivity for
IPv6 module for more information on configuring
IPv6 addresses.
Step 5 tunnel source {ip-address | interface-type Specifies the source interface type and number for the
interface-number} tunnel interface.
Note The interface type and number specified in the
Example: tunnel source command must be configured with
Router(config-if)# tunnel source ethernet 0 an IPv4 address.
Step 6 tunnel mode ipv6ip 6to4 Specifies an IPv6 overlay tunnel using a 6to4 address.
Example:
Router(config-if)# tunnel mode ipv6ip 6to4
11
Implementing Tunneling for IPv6
How to Implement Tunneling for IPv6
What to Do Next
Proceed to the “Verifying IPv6 Tunnel Configuration and Operation” section on page 15.
Prerequisites
With an IPv4-compatible tunnel, the tunnel destination is automatically determined by the IPv4 address
in the low-order 32 bits of IPv4-compatible IPv6 addresses. The host or router at each end of an
IPv4-compatible tunnel must support both the IPv4 and IPv6 protocol stacks.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface tunnel tunnel-number
4. tunnel source {ip-address | interface-type interface-number}
5. tunnel mode ipv6ip auto-tunnel
12
Implementing Tunneling for IPv6
How to Implement Tunneling for IPv6
DETAILED STEPS
Example:
Router# configure terminal
Step 3 interface tunnel tunnel-number Specifies a tunnel interface and number, and enters interface
configuration mode.
Example:
Router(config)# interface tunnel 0
Step 4 tunnel source {ip-address | interface-type Specifies the source interface type and number for the
interface-number} tunnel interface.
Note The interface type and number specified in the
Example: tunnel source command is configured with an IPv4
Router(config-if)# tunnel source ethernet 0 address only.
Step 5 tunnel mode ipv6ip auto-tunnel Specifies an IPv4-compatible tunnel using an
IPv4-compatible IPv6 address.
Example:
Router(config-if)# tunnel mode ipv6ip
auto-tunnel
What to Do Next
Proceed to the “Verifying IPv6 Tunnel Configuration and Operation” section on page 15.
Prerequisites
The tunnel source command used in the configuration of an ISATAP tunnel must point to an interface
with an IPv4 address configured. The ISATAP IPv6 address and prefix (or prefixes) advertised are
configured as for a native IPv6 interface. The IPv6 tunnel interface must be configured with a modified
EUI-64 address because the last 32 bits in the interface identifier are constructed using the IPv4 tunnel
source address.
SUMMARY STEPS
1. enable
2. configure terminal
13
Implementing Tunneling for IPv6
How to Implement Tunneling for IPv6
DETAILED STEPS
Example:
Router# configure terminal
Step 3 interface tunnel tunnel-number Specifies a tunnel interface and number, and enters interface
configuration mode.
Example:
Router(config)# interface tunnel 1
Step 4 ipv6 address ipv6-prefix/prefix-length [eui-64] Specifies the IPv6 address assigned to the interface and
enables IPv6 processing on the interface.
Example: Note Refer to the Configuring Basic Connectivity for
Router(config-if)# ipv6 address IPv6 module for more information on configuring
2001:0DB8:6301::/64 eui-64 IPv6 addresses.
Step 5 no ipv6 nd suppress-ra Sending of IPv6 router advertisements is disabled by default
on tunnel interfaces. This command reenables the sending
of IPv6 router advertisements to allow client
Example:
Router(config-if)# no ipv6 nd suppress-ra
autoconfiguration.
Step 6 tunnel source {ip-address | interface-type Specifies the source interface type and number for the
interface-number} tunnel interface.
Note The interface type and number specified in the
Example: tunnel source command must be configured with
Router(config-if)# tunnel source ethernet 1/0/1 an IPv4 address.
Step 7 tunnel mode ipv6ip isatap Specifies an IPv6 overlay tunnel using a ISATAP address.
Example:
Router(config-if)# tunnel mode ipv6ip isatap
What to Do Next
Proceed to the “Verifying IPv6 Tunnel Configuration and Operation” section on page 15.
14
Implementing Tunneling for IPv6
How to Implement Tunneling for IPv6
SUMMARY STEPS
1. enable
2. show interfaces tunnel number [accounting]
3. ping [protocol] destination
4. show ip route [address [mask]]
DETAILED STEPS
Example:
Router# ping 10.0.0.1
Step 4 show ip route [address [mask]] (Optional) Displays the current state of the routing table.
Note Only the syntax relevant for this task is shown.
Example:
Router# show ip route 10.0.0.2
Examples
This section provides the following output examples:
• Sample Output for the show interfaces tunnel Command
• Sample Output for the ping Command
• Sample Output for the show ip route Command
• Sample Output for the ping Command
This example uses a generic example suitable for both IPv6 manually configured tunnels and IPv6 over
IPv4 GRE tunnels. In the example, two routers are configured to be endpoints of a tunnel. Router A has
Ethernet interface 0/0 configured as tunnel interface 0 with an IPv4 address of 10.0.0.1 and an IPv6
15
Implementing Tunneling for IPv6
How to Implement Tunneling for IPv6
To check that the local endpoint is configured and working, use the ping command on Router A:
RouterA# ping 2001:0DB8:1111:2222::2
To check that a route exists to the remote endpoint address, use the show ip route command:
RouterA# show ip route 10.0.0.2
To check that the remote endpoint address is reachable, use the ping command on Router A.
Note The remote endpoint address may not be reachable using the ping command because of filtering, but the
tunnel traffic may still reach its destination.
16
Implementing Tunneling for IPv6
Configuration Examples for Implementing Tunneling for IPv6
To check that the remote IPv6 tunnel endpoint is reachable, use the ping command again on Router A.
The same note on filtering also applies to this example.
RouterA# ping 1::2
Router A Configuration
interface ethernet 0
ip address 192.168.99.1 255.255.255.0
interface tunnel 0
ipv6 address 3ffe:b00:c18:1::3/127
tunnel source ethernet 0
tunnel destination 192.168.30.1
tunnel mode ipv6ip
Router B Configuration
interface ethernet 0
ip address 192.168.30.1 255.255.255.0
interface tunnel 0
ipv6 address 3ffe:b00:c18:1::2/127
tunnel source ethernet 0
tunnel destination 192.168.99.1
tunnel mode ipv6ip
17
Implementing Tunneling for IPv6
Configuration Examples for Implementing Tunneling for IPv6
Router A Configuration
ipv6 unicast-routing
clns routing
!
interface tunnel 0
no ip address
ipv6 address 2001:0DB8:1111:2222::1/64
ipv6 router isis
tunnel source Ethernet 0/0
tunnel destination 10.0.0.2
tunnel mode gre ipv6
!
interface Ethernet0/0
ip address 10.0.0.1 255.255.255.0
!
router isis
net 49.0000.0000.000a.00
Router B Configuration
ipv6 unicast-routing
clns routing
!
interface tunnel 0
no ip address
ipv6 address 2001:0DB8:1111:2222::2/64
ipv6 router isis
tunnel source Ethernet 0/0
tunnel destination 10.0.0.1
tunnel mode gre ipv6
!
interface Ethernet0/0
ip address 10.0.0.2 255.255.255.0
!
router isis
net 49.0000.0000.000b.00
address-family ipv6
redistribute static
exit-address-family
18
Implementing Tunneling for IPv6
Configuration Examples for Implementing Tunneling for IPv6
!
Router(config)# ipv6 unicast-routing
Router A
ipv6 unicast-routing
clns routing
interface Ethernet0/1
clns router isis
router isis
net 49.0001.1111.1111.1111.00
Router B
ipv6 unicast-routing
clns routing
interface Ethernet0/1
clns router isis
router isis
net 49.0001.2222.2222.2222.00
To turn off the GRE mode and restore the CTunnel to the default Cisco encapsulation routing only
between endpoints on Cisco equipment, use either the no ctunnel mode command or the ctunnel mode
cisco command. The following example shows the same configuration modified to transport only IPv4
traffic.
19
Implementing Tunneling for IPv6
Configuration Examples for Implementing Tunneling for IPv6
interface ethernet 0
ip address 10.27.0.1 255.255.255.0
ipv6 address 3000:2222::1/64
20
Implementing Tunneling for IPv6
Additional References
address-family ipv6
neighbor ::10.67.0.2 activate
neighbor ::10.67.0.2 next-hop-self
network 2001:2222:d00d:b10b::/64
Where to Go Next
• If you have configured an automatic 6to4 tunnel you can design your IPv6 network around the /48
6to4 prefix you have created from your IPv4 address.
• If you want to implement routing protocols, refer to the Implementing RIP for IPv6, Implementing
IS-IS for IPv6, Implementing OSPF for IPv6, or Implementing Multiprotocol BGP for IPv6 module.
• If you want to implement security features for your IPv6 network, refer to the Implementing Security
for IPv6 module.
Additional References
The following sections provide references related to the Implementing Tunneling for IPv6 feature.
Related Documents
Related Topic Document Title
IPSec VTIs Implementing IPSec on IPv6
IPv4 tunneling commands: complete command syntax, Cisco IOS Interface Command Reference, Release 12.4
command mode, defaults, usage guidelines, and
examples
IPv6 supported feature list Start Here: Cisco IOS Software Release Specifics for IPv6 Features
IPv6 commands: complete command syntax, command Cisco IOS IPv6 Command Reference
mode, defaults, usage guidelines, and examples
IPv4 configuration and command reference Cisco IOS Configuration Guides and Command References,
information Release 12.4
21
Implementing Tunneling for IPv6
Command Reference
Standards
Standards Title
No new or modified standards are supported by this —
feature, and support for existing standards has not been
modified by this feature.
MIBs
MIBs MIBs Link
To locate and download MIBs for selected platforms, Cisco IOS
releases, and feature sets, use Cisco MIB Locator found at the
following URL:
http://www.cisco.com/go/mibs
RFCs
RFCs Title
RFC 2473 Generic Packet Tunneling in IPv6 Specification
RFC 2893 Transition Mechanisms for IPv6 Hosts and Routers
RFC 3056 Connection of IPv6 Domains via IPv4 Clouds
RFC 4214 Intra-Site Automatic Tunnel Addressing Protocol (ISATAP)
Technical Assistance
Description Link
The Cisco Support website provides extensive online http://www.cisco.com/techsupport
resources, including documentation and tools for
troubleshooting and resolving technical issues with
Cisco products and technologies. Access to most tools
on the Cisco Support website requires a Cisco.com user
ID and password. If you have a valid service contract
but do not have a user ID or password, you can register
on Cisco.com.
Command Reference
The following commands are introduced or modified in the feature or features documented in this
module. For information about these commands, see the Cisco IOS IPv6 Command Reference at
http://www.cisco.com/en/US/docs/ios/ipv6/command/reference/ipv6_book.html. For information about
all Cisco IOS commands, use the Command Lookup Tool at http://tools.cisco.com/Support/CLILookup
or the Cisco IOS Master Command List, All Releases, at
http://www.cisco.com/en/US/docs/ios/mcl/all_release/all_mcl.html.
22
Implementing Tunneling for IPv6
Command Reference
• ctunnel mode
• show ipv6 tunnel
• tunnel destination
• tunnel mode
• tunnel mode ipv6ip
• tunnel source
23
Implementing Tunneling for IPv6
Feature Information for Implementing Tunneling for IPv6
Note Table 27 lists only the Cisco IOS software release that introduced support for a given feature in a given
Cisco IOS software release train. Unless noted otherwise, subsequent releases of that Cisco IOS
software release train also support that feature.
24
Implementing Tunneling for IPv6
Feature Information for Implementing Tunneling for IPv6
25
Implementing Tunneling for IPv6
Feature Information for Implementing Tunneling for IPv6
26
Implementing Tunneling for IPv6
Feature Information for Implementing Tunneling for IPv6
1. In Cisco IOS Release 12.0(23)S, the Cisco 12000 series Internet router provides enhanced performance for IPv6 manually configured tunnels by processing
traffic on the line card.
2. IPv6 over IPv4 GRE tunnels are not supported on the Cisco 12000 series Internet router.
3. Feature is supported on the Cisco 12000 series Internet router only.
CCDE, CCENT, Cisco Eos, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, Cisco TelePresence, the Cisco logo, DCE, and Welcome to the Human
Network are trademarks; Changing the Way We Work, Live, Play, and Learn and Cisco Store are service marks; and Access Registrar, Aironet,
AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork
Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation,
EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, iQ
Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone, MeetingPlace,
MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare,
SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx logo
are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply
a partnership relationship between Cisco and any other company. (0807R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and
figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and
coincidental.
27
Implementing Tunneling for IPv6
Feature Information for Implementing Tunneling for IPv6
28