IPV4/6 Venet and IPV4 Bridge

zhable

New Member
Mar 8, 2015
1
0
1
Hello,
I recently was given a /64 of IPV6 for my server and would like to add it for my venet interfaces. As of now and from tons on searching I have IPV4/6 working on openvz, but I can NEVER get KVM bridge to work for IPV4 at the same time(IPV6 is not needed currently for my bridge, but welcomed as a solution). Is this even possible?
Here is my /etc/network/interfaces
# /etc/network/interfaces
Code:
### Hetzner Online AG - installimage
# Loopback device:
auto lo
iface lo inet loopback
#
# device: eth0
auto  eth0
iface eth0 inet static
       address   136.243.36.201
       netmask   255.255.255.192
       gateway   136.243.36.193
       broadcast 136.243.36.255
iface eth0 inet6 static
       address   2a01:4f8:212:4ca::2
       netmask   128
       gateway   fe80::1

My /etc/sysctl.conf:


Code:
#
# /etc/sysctl.conf - Configuration file for setting system variables
# See /etc/sysctl.d/ for additonal system variables
# See sysctl.conf (5) for information.
#


#kernel.domainname = example.com


# Uncomment the following to stop low-level messages on console
#kernel.printk = 3 4 1 3


##############################################################3
# Functions previously found in netbase
#


# Uncomment the next two lines to enable Spoof protection (reverse-path filter)
# Turn on Source Address Verification in all interfaces to
# prevent some spoofing attacks
#net.ipv4.conf.default.rp_filter=1
#net.ipv4.conf.all.rp_filter=1


# Uncomment the next line to enable TCP/IP SYN cookies
# See http://lwn.net/Articles/277146/
# Note: This may impact IPv6 TCP sessions too
#net.ipv4.tcp_syncookies=1


# Uncomment the next line to enable packet forwarding for IPv4
net.ipv4.ip_forward=1


# Uncomment the next line to enable packet forwarding for IPv6
#  Enabling this option disables Stateless Address Autoconfiguration
#  based on Router Advertisements for this host
net.ipv6.conf.all.forwarding=1
## CUSTOM IPV6
net.ipv6.conf.all.proxy_ndp = 1


###################################################################
# Additional settings - these settings can improve the network
# security of the host and prevent against some network attacks
# including spoofing attacks and man in the middle attacks through
# redirection. Some network environments, however, require that these
# settings are disabled so review and enable them as needed.
#
# Do not accept ICMP redirects (prevent MITM attacks)
#net.ipv4.conf.all.accept_redirects = 0
#net.ipv6.conf.all.accept_redirects = 0
# _or_
# Accept ICMP redirects only for gateways listed in our default
# gateway list (enabled by default)
# net.ipv4.conf.all.secure_redirects = 1
#
# Do not send ICMP redirects (we are not a router)
#net.ipv4.conf.all.send_redirects = 0
#
# Do not accept IP source route packets (we are not a router)
#net.ipv4.conf.all.accept_source_route = 0
#net.ipv6.conf.all.accept_source_route = 0
#
# Log Martian Packets
#net.ipv4.conf.all.log_martians = 1
#
I feel I may have overlooked something or going completely wrong, I have some other previous attempts with vmbr0 as my bridge (got IPV4 to work on bridge & venet, BUT it prevented IPV6 on venet). Any solutions or ideas would be greatly welcome!
 
According to my experience IPV6 does not work correctly with venet0. In general: if there is venet you should have just 1 IP in the container and nothing else (not a second IP, not a veth device).
 

About

The Proxmox community has been around for many years and offers help and support for Proxmox VE, Proxmox Backup Server, and Proxmox Mail Gateway.
We think our community is one of the best thanks to people like you!

Get your subscription!

The Proxmox team works very hard to make sure you are running the best software and getting stable updates and security enhancements, as well as quick enterprise support. Tens of thousands of happy customers have a Proxmox subscription. Get yours easily in our online shop.

Buy now!