NAME
6in4, ayiya – configure and run automatic or manual tunnel of IPv6
through IPv4 |
SYNOPSIS
ip/6in4 [ –ag ] [ –m mtu ] [ –x netmtpt ] [ –o outnetmtpt ] [ –i local4
] [ local6[/mask] [ remote4 [ remote6 ] ] ] ip/ayiya [ –g ] [ –m mtu ] [ –x netmtpt ] [ –k secret ] local6[/mask] remote4 remote6 |
DESCRIPTION
6in4 sets up and maintains a 6to4 tunnel of IPv6 traffic through
an IPv4 connection. Ayiya is similar, but uses the UDP based Anything
In Anything protocol to tunnel IPv6 traffic.
Local6 and mask define the IPv6 address and subnet of the near
end of the tunnel (mask defaults to /128 for a single–host tunnel).
If local6 is missing or –, it defaults to
Remote4 is the IPv4 address of the far end of the tunnel (must be given explicitly for a configured tunnel, or defaults to the anycast address 192.88.99.1 for 6to4). Remote6 is the IPv6 address of the far end of the tunnel (used as the point–to–point destination for routing, and defaults to a link–local address constructed from remote4). The program forks a pair of background processes to copy packets to and from the tunnel.
Options are: |
EXAMPLES
If your primary IPv4 address is public, you can start a 6to4 tunnel
simply with
|
FILES
/net/ipmux access to IPv6–in–IPv4 packets /net/ipifc packet interface to IPv6 network |
SEE ALSO
bridge(3), ipmux in ip(3), linklocal in ipconfig(8) /lib/rfc/rfc3056 /lib/rfc/rfc3068 http://tools.ietf.org/id/draft–massar–v6ops–ayiya–02.txt |
BUGS
Needs a kernel with an ipmux driver.
The tunnel client filters addresses fairly conservatively in both
directions. However it's not watertight, and may be flakey in
other ways so don't put too much trust in it. |