IPV4/6 Venet and IPV4 Bridge

zhable

New Member
Mar 8, 2015
1
0
1
Hello,
I recently was given a /64 of IPV6 for my server and would like to add it for my venet interfaces. As of now and from tons on searching I have IPV4/6 working on openvz, but I can NEVER get KVM bridge to work for IPV4 at the same time(IPV6 is not needed currently for my bridge, but welcomed as a solution). Is this even possible?
Here is my /etc/network/interfaces
# /etc/network/interfaces
Code:
### Hetzner Online AG - installimage
# Loopback device:
auto lo
iface lo inet loopback
#
# device: eth0
auto  eth0
iface eth0 inet static
       address   136.243.36.201
       netmask   255.255.255.192
       gateway   136.243.36.193
       broadcast 136.243.36.255
iface eth0 inet6 static
       address   2a01:4f8:212:4ca::2
       netmask   128
       gateway   fe80::1

My /etc/sysctl.conf:


Code:
#
# /etc/sysctl.conf - Configuration file for setting system variables
# See /etc/sysctl.d/ for additonal system variables
# See sysctl.conf (5) for information.
#


#kernel.domainname = example.com


# Uncomment the following to stop low-level messages on console
#kernel.printk = 3 4 1 3


##############################################################3
# Functions previously found in netbase
#


# Uncomment the next two lines to enable Spoof protection (reverse-path filter)
# Turn on Source Address Verification in all interfaces to
# prevent some spoofing attacks
#net.ipv4.conf.default.rp_filter=1
#net.ipv4.conf.all.rp_filter=1


# Uncomment the next line to enable TCP/IP SYN cookies
# See http://lwn.net/Articles/277146/
# Note: This may impact IPv6 TCP sessions too
#net.ipv4.tcp_syncookies=1


# Uncomment the next line to enable packet forwarding for IPv4
net.ipv4.ip_forward=1


# Uncomment the next line to enable packet forwarding for IPv6
#  Enabling this option disables Stateless Address Autoconfiguration
#  based on Router Advertisements for this host
net.ipv6.conf.all.forwarding=1
## CUSTOM IPV6
net.ipv6.conf.all.proxy_ndp = 1


###################################################################
# Additional settings - these settings can improve the network
# security of the host and prevent against some network attacks
# including spoofing attacks and man in the middle attacks through
# redirection. Some network environments, however, require that these
# settings are disabled so review and enable them as needed.
#
# Do not accept ICMP redirects (prevent MITM attacks)
#net.ipv4.conf.all.accept_redirects = 0
#net.ipv6.conf.all.accept_redirects = 0
# _or_
# Accept ICMP redirects only for gateways listed in our default
# gateway list (enabled by default)
# net.ipv4.conf.all.secure_redirects = 1
#
# Do not send ICMP redirects (we are not a router)
#net.ipv4.conf.all.send_redirects = 0
#
# Do not accept IP source route packets (we are not a router)
#net.ipv4.conf.all.accept_source_route = 0
#net.ipv6.conf.all.accept_source_route = 0
#
# Log Martian Packets
#net.ipv4.conf.all.log_martians = 1
#
I feel I may have overlooked something or going completely wrong, I have some other previous attempts with vmbr0 as my bridge (got IPV4 to work on bridge & venet, BUT it prevented IPV6 on venet). Any solutions or ideas would be greatly welcome!
 
According to my experience IPV6 does not work correctly with venet0. In general: if there is venet you should have just 1 IP in the container and nothing else (not a second IP, not a veth device).