IPv6 ACL Filtering

IPv6 ACL Filtering

Routerların uygulanan ACL işleme konusu, extension header’ların varlığına göre farklı durumlar ortaya çıkartabilir. Zira uygulanan ACL’in durumuna göre (L4 bilgisi içerip içermediği), router’ın tüm eh işleyip (sadece next-header kısmına bakarak), L4 kadar ilerlemesi gerekir. Encapsulating Security Payload EH kullanılmış ise, onu takip eden kısım şifrelenmiş olacağı için üst seviye bilgiye erişemeyebilir. EH yok ise normal IPv6 pakedi şeklide işliyecektir. Ayrıca diğer önemli konu yapılan iletim işleminin hardware veya software üzerinde mi olduğudur.

Cisco IPv6 ACL’lerinde, IPv6’da IPv4’deki ARP işlevini gören Neighbor Discovery, ND çalışmasının, ACL interface’e uygulanır iken bozulmaması için en sonunda IPv4 ACL’de otomatik olarak bulunan deny ip any any benzer olarak;

permit icmp any any nd-na

permit icmp any any nd-ns

deny ipv6 any any

yer almaktadır.

IPv6 Extension Headers Review and Considerations

Securing IPv6

Üst seviye protokol filtrelemesi :

Bu işlem IPv4 göre biraz daha zor olabilir. Zira EH varlığına göre, her bir EH tek tek işlenmesi gerekir. Ayrıca IPv4 benzer şekilde fragment parçalarından protokolü tespit etmek mümkün olmıyabilir.

EH filtreleme

control plane veya forwarding path’de filtrelenmesi gereken EH’lar farklılık gösterebilir.

Control Plane iletilmesi gereken EH genelde hop-by-hop eh’dır. unknown eh’lar filtrelenmelidir.

routing option eh

artık kullanılmamaktadır. Filtrelenmelidir.

Tunnel Filtreleme

teredo tunneleri bloklanmalı.

IPv4 in IPv6 adresleri bloklanmalı.

ICPMv6 Filtreleme

RFC 4890

SEND : Secure Neighbor Discovery

IPv6 for PPP Broadband

This post is too old. There are lots of improvements on most of the CPE and operating systems. 

Notes for IPv6 for PPP Broadband

This document focus on single ppp dual stack IPv4/IPv6 session for broadband customers. I am trying to update as I make more tests on IPv6 for PPP Broadband.

You may split process as between ISP/CPE and CPE/HOST. The deployment heavily depends on the CPE capabilities and end-user operating systems. This document mostly focus on communication between ISP and CPE. So enabling the IPv6 should be done per customer level. We have configured the IPv6 options under virtual-tempalte and used cisco-avpair=’lcp:interface-config#1=ipv6 enable’ per customer to enable IPv6.

Read before;

Best Current Operational Practice for Operators: IPv6 prefix assignment for end-users – persistent vs non-persistent, and what size to choose

Design Architecture Options for IPv6 Deployment in Broadband Access Networks

For MTU issues try to lower value as some intermediate nodes on internet may block ICMPv6 which will interrupt path mtu. TCP mss adjust can be used for ipv6.

ISP-CPE IPv6 PPP Model :

  • Single PPP dual stack IPv4 and IPv6 session

Using a single ppp session for IPv4 and IPv6 is much more efficient than using a different sessions which is widely supported on CPE and BNG. You may face problems while using different sessions for the subscriber network resources (aaa, radius, etc) also for the NG resources as it doubles the current ppp sessions. Currently IPv6 is disabled on most CPE, it should be also enabled on CPE. Aslo most of them configured to use dual stack by default.

  • Static /64 prefixes for each customer

Broadforum suggest to use /60 for broadband customers however /64 is enough for consumers. But plan your IPv6 address plan for much more less to the /60. Static prefix assignment per customer is much more easy as you do not search audits for finding usage reports.

There can be problems with using dynamic, non-persistent, prefixes. When the IPv6 prefix is changed, dslam reboot etc, CPE should inform the local hosts about to lease the dhcp prefixes, currently which most cpe’s have problem about. Auditing can also be a problem. You may need to enable logging of these dynamic prefixes assigned to the customer separate from the session accounting. If you are using DHCPv6 on the BNG and local pool you should enable DHCPv6 logging as Delegated IPv6 prefix is not included in the accounting records. For cisco which will be included in the session’s accounting records. But DHCPv6 runs after session establishment and may not be included in the session start records. Accounting should be updated after dhcpv6 assignment.

aaa accounting update newinfo periodic 60 (periodic update may not be required in your case).

Static assignment resolves most of these obstacles. Note that there is no nat defined for IPv6 and not needed. Security should be left to the security functions like CPE firewall or features on the customer access devices. You may assign static prefix when you enable customer in your back office system. It’s not very feasible to map customer username, port etc to a prefix as this will lead to security issues. So some offset or etc should be used and do not forget to return the unused prefixes.

  • SLAAC and Statefull DHCPv6 for address assignment

There are couple of ways to for IPv6 prefix assignment between ISP and CPE.

Host can use the IPv4 DNS in dual-stack environment. You may use RA messages to announce DNS to the CPE but its not fully supported on all CPE models. Also ND RA messages is need for CPE to install default route. DHCPv6 is needed for CPE for the lan side, as it gets the LAN prefix via DHCPv6 messages. Some of CPE’es have option to get this information from RA received prefix as well.

You may use different prefixes for the WAN side and LAN side of the CPE.

IPv6 Prefix Delegation for PPP Customers
IPv6 Prefix Delegation for PPP Customers

The radius attributes, Framed-Ipv6-Prefix generally defines for the prefix to be used by SLAAC on the link and Delegated-Ipv6-Prefix defines the prefix to be used by DHCPv6. Delegated-Ipv6-Prefix will not be included in the accounting messages as its supposed to use with dhcpv6. So DHCPv6 accounting must be enabled which then will be included in the accounting records of the session.

However Cisco ISG/IOS XE have a fall-back mechanism for built-in DHCPv6 server while using aaa for prefix delegation ;

If you configure AAA for DHCPv6 ( get the prefix from AAA server, or the name of the pool to be used) and if Delegated-Ipv6-Prefix returned via access-accept messages, it used as DHCPv6 prefix to be assigned. If you configure AAA for DHCPv6 and no prefix is returned via access-accept BNG makes another aaa request to the radius for the prefix to be assigned (look for cisco documentation for more information). Also you can use Framed-Ipv6-Prefix for this fallback scnerio, you need to disable adding this prefix to the nd queu with no ipv6 nd prefix framed-ipv6-prefix command. With this, the Framed-Ipv6-Prefix which is sent via ND RA messages can also be used by DHCPv6 server. With this configuration you can use single mechanism to assign wan and lan prefix for the user. If both of them are included in the access-accept message Delegated will be used by DHCPv6 server. Also you may send the prefixes pool name to be send via radius with Delegated-Ipv6-Prefix-Pool defined in RFC 6911.

  • Framed-Interface-Id

As noted before CPE get’s its ipv6 prefix via ND or DHCPv6 but what it is the ipv6 address? From broadband forum TR-187;

In contrast with IPCP which provides other configuration information, IPV6CP only negotiates an interface identifier. Other configuration information is provided via Neighbor Discovery and DHCPv6.
The 64-bit interface identifier is used to derive the Link-local address on the WAN interface. Given that the Link-local address is derived by the RG for its WAN interface, Duplicate Address Detection is not required for the link-local address or any address derived from the interface identifier on the PPP link.

Framed-Interface-Id radius attribute indicates this interface identifier used on the link. If it’s included in the access-accept message as a reply from aaa, it will be send to remote side of the link to as an option to use on the link. And if the CPE supports it may use this interface-id as the lower 64 bit of it’s WAN IPv6 address.

With this feature you can assign a predefined /128 IPv6 address for the CPE. How to construct the interface-identifier depends on the ISP. A hash generator may be used based on customer information (beware of hash collision).

Tests for Cisco IOS XE, ASR1K

Our IPv4 model is build on radius. For dynamic customers, IPv4 address pools are defined on BNG’s. Static ipv4 customers addresses are defined in database/radius and returned to the BNG via Access-Accept message via Framed-Ip-Address avp. If there is no Framed-Ip-Address defined for the customer the generic pool name which is defined on every BNG is returned. We are not using radius based pools as its hard to track usage for larger number of customers (releasing the recourses). BNG’es are much more efficient as they can release the resource after ppp session disconnects, or handle reboot and etc issues.

For IPv6 CPE-WAN side may require IPv6 prefix and CPE-LAN side requires prefix. For both of them we decided to use static prefix assignment but enabled the dynamic option via using pools. There is couple of methods for using pools.

CPE-LAN : DHCPv6 used for assining prefixed to the CPE for LAN side.

  • DHCPv6 local pool : Defined in the dhcpv6 server configuration. But then assigning static prefix per customer is non executable. As you can not mix local pool and AAA assignment you have define each static prefix on the device itself!
  • DHCPv6 AAA : You can use AAA to assign prefix or prefix pool per customer.

CPE-WAN : CPE may use used DHCPv6 but generally ND is used. You may send the pool name via Framed-IPv6-Pool  or static assignment per customer via Framed-IPv6-Prefix.

The nanog document Building an IPv6 Address Management System may be good reference to this assigning static prefix.

Normally Cisco ISG sends authorisation request to the aaa server to get the dhcpv6 prefix. AAA server handles the DHCPv6 prefixes range. Static matching or dynamic assignment on the AAA depends on the configuration. But this means sending another request. As noted with the use of no ipv6 nd prefix framed-ipv6-prefix command and prefix returned in the access-accept message BNG no longer send another request to get prefix. With this you may use same prefix for WAN and LAN side of the CPE.

For the simplicity we have chosed to use same prefix for the WAN and LAN side for testing. However it may be different.

Configurations

ipv6 dhcp binding track ppp ! Even if you do not use local pool, this command is needed for using the same prefix as customer reconnects or flaps.
aaa authorization configuration IPv6_PD group TEST_RADIUS

ipv6 dhcp pool AAA
 prefix-delegation aaa method-list IPv6_PD! 
 dns-server 2001:4860:4860::8888 ! Used google DNS
 dns-server 2001:4860:4860::4444
interface Virtual-Template3
mtu 1492
ip unnumbered LoopbackX
ip verify unicast reverse-path
no ip split-horizon
ip tcp adjust-mss 1452
no logging event link-status
ipv6 unnumbered loopbackX
ipv6 nd managed-config-flag
ipv6 nd ra dns server 2001:4860:4860::4444 !
The CPE used during tests send RS requesting until got dns from ra. no ipv6 redirects no ipv6 unreachables ipv6 dhcp server AAA ipv6 verify unicast reverse-path no peer default ip address keepalive 60 3 ppp authentication pap pppoe ppp authorization pppoe ppp accounting pppoe service-policy type control PPPOE end
cisco-avpair="lcp:interface-config#1=ipv6 enable\nipv6 unnumbered loopbackX" ! We are using Internet in a vrf design for our customers. ISG service policy configuration which enables vrf forwarding is not listed in here. So sending source interface is required as vrf forwarding command removes source address.

Framed-IPv6-Prefix="2a02:ff0:00F0:0003::/64" For static prefix assignment for SLAAC
Delegated-IPv6-Prefix used for static prefix assignment to dhcpv6 server.

Framed-IPv6-Pool For Dynamic prefix assignment for SLAAC.

Delagated-IPv6-Prefix-Pool For Dynamic prefix assignment for DHCPv6.
Framed-Interface-Id="DEDE:DEDE:DEDE:DEDE" used for CPE IPv6 interface address construction.

Customer Profiles :
- Static WAN + Static LAN : includes Framed-IPv6-Prefix and Delegated-IPv6-Prefix. If you want to both them to be the same which is strongly discaured no ipv6 nd prefix framed-ipv6-prefix  command is required. 
- Dynamic WAN + Static LAN : Framed-IPv6-Pool and Delagated-IPv6-Prefix. Most usable option for broadband customers.

- Static WAN + Dynamic LAN : Framed-IPv6-Prefix and Delagated-IPv6-Prefix-Pool. If you want to access CPE for management more easily (you need to use Framed-Interface-ID to calculate the CPE address or have to send via Access) and no TR-69 management.

- Dynamic WAN + Dynamic LAN : Framed-IPv6-Pool and Delagated-IPv6-Prefix-Pool.

TESTS

Some trikcy configuration for understanding DHCPv6 on IOS XE.

Single prefix delegation for WAN and LAN with a single prefix attribute in access-accept. By this we do not need DHCPv6 logs for audit, the Framed-IPv6-Prefix will be in the accounting records of the customer which aligns with our current IPv4 audit method. This satisfies initial phase for IPv6. Test-2 is the case that we are currently using. You may disable SLAAC or ND prefix advertisement, CPE can still get RA messages without GUA address.

I was using ZTE CPE and MAC OS X during my tests. ZTE CPE has auto mode. In the auto mode it can not get the GUA via DHCPv6 assigned prefix. It requires SLAAC. But with manual configuration you can change this.

For the MAC OS X, i do not see DHCPv6 support. MAS OS X uses RA to configure itself.

For the resulted configuration as explained before, Dynamic WAN prefix assignment and Static LAN prefix assignment will be default but dynamic options will also be enabled.

TEST-1:

This test shows the requirement of no ipv6 nd prefix framed-ipv6-prefix command while using Framed-Ipv6-Prefix alone.

ppp943 PPP: Using vpn set call direction
ppp943 PPP: Treating connection as a callin
ppp943 PPP: Session handle[D60003B0] Session id[943]
ppp943 LCP: Event[OPEN] State[Initial to Starting]
ppp943 PPP LCP: Enter passive mode, state[Stopped]
ppp943 LCP: I CONFREQ [Stopped] id 1 len 14
ppp943 LCP:    MRU 1492 (0x010405D4)
ppp943 LCP:    MagicNumber 0x9A66713E (0x05069A66713E)
ppp943 LCP: O CONFREQ [Stopped] id 1 len 18
ppp943 LCP:    MRU 1492 (0x010405D4)
ppp943 LCP:    AuthProto PAP (0x0304C023)
ppp943 LCP:    MagicNumber 0x0B3CC8C8 (0x05060B3CC8C8)
ppp943 LCP: O CONFACK [Stopped] id 1 len 14
ppp943 LCP:    MRU 1492 (0x010405D4)
ppp943 LCP:    MagicNumber 0x9A66713E (0x05069A66713E)
ppp943 LCP: Event[Receive ConfReq+] State[Stopped to ACKsent]
ppp943 LCP: I CONFACK [ACKsent] id 1 len 18
ppp943 LCP:    MRU 1492 (0x010405D4)
ppp943 LCP:    AuthProto PAP (0x0304C023)
ppp943 LCP:    MagicNumber 0x0B3CC8C8 (0x05060B3CC8C8)
ppp943 LCP: Event[Receive ConfAck] State[ACKsent to Open]
ppp943 LCP: I ECHOREQ [Open] id 0 len 8 magic 0x9A66713E
ppp943 LCP: O ECHOREP [Open] id 0 len 8 magic 0x0B3CC8C8
ppp943 PPP: Queue PAP code[1] id[1]
ppp943 PPP: Phase is AUTHENTICATING, by this end
ppp943 PAP: Redirect packet to ppp943
ppp943 PAP: I AUTH-REQ id 1 len 40 from “test@test.net”
ppp943 PAP: Authenticating peer test@test.net
ppp943 PPP: Phase is FORWARDING, Attempting Forward
ppp943 LCP: State is Open
ppp943 PPP: Phase is AUTHENTICATING, Unauthenticated User
ppp943 PPP: Sent PAP LOGIN Request
RADIUS/ENCODE(000006B6):Orig. component type = PPPoE
RADIUS: DSL line rate attributes successfully added
RADIUS(000006B6): Config NAS IP: X.X.X.X
RADIUS(000006B6): Config NAS IPv6: ::
RADIUS/ENCODE: No idb found! Framed IP Addr might not be included
RADIUS/ENCODE(000006B6): acct_session_id: 39655
RADIUS(000006B6): Config NAS IP: X.X.X.X
RADIUS(000006B6): sending
RADIUS(000006B6): Send Access-Request to X.X.X.X:1812 id 1645/109, len 389
RADIUS:  authenticator 61 D5 53 18 B9 3A 95 41 – 2D 4E C8 2A 5A 56 30 35
RADIUS:  Framed-Protocol     [7]   6   PPP                       [1]
RADIUS:  User-Name           [1]   26  “test@test.net”
RADIUS:  User-Password       [2]   18  *
RADIUS:  Vendor, Cisco       [26]  38
RADIUS:   Cisco AVpair       [1]   32  “actual-data-rate-upstream=6997”
RADIUS:  Vendor, Cisco       [26]  42
RADIUS:   Cisco AVpair       [1]   36  “actual-data-rate-downstream=128075”
RADIUS:  NAS-Port-Type       [61]  6   Virtual                   [5]
RADIUS:  NAS-Port            [5]   6   0
xxxxx
RADIUS:  Vendor, Cisco       [26]  41
RADIUS:   Cisco AVpair       [1]   35  “client-mac-address=74b5.7e25.5078”
RADIUS:  Vendor, Cisco       [26]  51
RADIUS:   Cisco AVpair       [1]   45  “xxxxx”
RADIUS:  Vendor, Cisco       [26]  25
RADIUS:   Cisco AVpair       [1]   19  “remote-id-tag=ptm”
RADIUS:  Service-Type        [6]   6   Framed                    [2]
RADIUS:  NAS-IP-Address      [4]   6   X.X.X.X
RADIUS:  Acct-Session-Id     [44]  26  “00000000EC00000000009AE7”
RADIUS:  Nas-Identifier      [32]  42  “xxxxx”
RADIUS(000006B6): Sending a IPv4 Radius Packet
RADIUS(000006B6): Started 3 sec timeout
RADIUS: Received from id 1645/109 X.X.X.X:1812, Access-Accept, len 473
RADIUS:  authenticator DB A2 75 83 78 7B 72 5B – 3F 1C F6 FB A8 13 A5 AE
RADIUS:  Framed-IP-Address   [8]   6   95.70.188.244
RADIUS:  Service-Type        [6]   6   Framed                    [2]
RADIUS:  Framed-Protocol     [7]   6   PPP                       [1]
RADIUS:  Framed-IPv6-Prefix  [97]  20
RADIUS:   00 40 2A 02 0F F0 00 F0 00 03 00 00 00 00 00 00 00 00                [ @*]
RADIUS:  Framed-Interface-Id [96]  21
RADIUS:   44 45 44 45 3A 44 45 44 45 3A 44 45 44 45 3A 44  [DEDE:DEDE:DEDE:D]
RADIUS:   45 44 45               [ EDE]
RADIUS:  Session-Timeout     [27]  6   1411769
RADIUS:  Vendor, Cisco       [26]  17
RADIUS:   ssg-account-info   [250] 11  “AINTERNET”
RADIUS:  Vendor, Cisco       [26]  50
RADIUS:   Cisco AVpair       [1]   44  “ip:dns-servers=193.192.98.8 212.154.100.18”
RADIUS:  Idle-Timeout        [28]  6   5000
RADIUS:  Vendor, Cisco       [26]  70
RADIUS:   Cisco AVpair       [1]   64  “lcp:interface-config#1=ipv6 enable\nipv6 unnumbered loopbackX”
RADIUS:  Vendor, Cisco       [26]  73
RADIUS:   Cisco AVpair       [1]   67  “ip:qos-policy-out=add-class(sub,(class-default),shape(121671250))”
RADIUS:  Vendor, Cisco       [26]  52
RADIUS:   Cisco AVpair       [1]   46  “ip:sub-qos-policy-out=BB_GENERIC_PARENT_DOWN”
RADIUS:  Vendor, Cisco       [26]  71
RADIUS:   Cisco AVpair       [1]   65  “ip:qos-policy-in=add-class(sub,(class-default),police(6647150))”
RADIUS:  Vendor, Cisco       [26]  49
RADIUS:   Cisco AVpair       [1]   43  “ip:sub-qos-policy-in=BB_GENERIC_PARENT_UP”
RADIUS(000006B6): Received from id 1645/109
ppp943 PPP: Received LOGIN Response PASS
ppp943 PPP: Phase is FORWARDING, Attempting Forward
IPv6 DHCP_AAA: Parse SSS author data: 2A02:FF0:F0:3::/64 ! DHCP AAA the prefix
ICMPv6-ND: (Virtual-Access2.1) IPv6 Opr Enabled
ICMPv6-ND: Allocate ND context on Virtual-Access2.1 [2F]
ICMPv6-ND: Allocate ND config on 2F
ICMPv6-ND: (Virtual-Access2.1) IPv6 Opr Disabled
IPv6 DHCP: Delete IAPD routes, pool AAA, idb Virtual-Access2.1
IPv6 DHCP: Delete IANA routes, pool AAA, idb Virtual-Access2.1
IPv6 DHCP_AAA: Saving author data from SSS Virtual-Access2.1
ICMPv6-ND: (Virtual-Access2.1) IPv6 Opr Enabled
[943]PPPoE 901: State LCP_NEGOTIATION    Event SSS CONNECT LOCAL
[943]PPPoE 901: Segment (SSS class): UPDATED
[943]PPPoE 901: Segment (SSS class): BOUND
[943]PPPoE 901: data path set to Virtual Acess
[943]PPPoE 901: State LCP_NEGOTIATION    Event SSM UPDATED
Vi2.1 PPP: Phase is AUTHENTICATING, Authenticated User
Vi2.1 PAP: O AUTH-ACK id 1 len 5
[943]PPPoE 901: AAA get dynamic attrs
Vi2.1 PPP: Phase is UP
Vi2.1 IPCP: Protocol configured, start CP. state[Initial]
Vi2.1 IPCP: Event[OPEN] State[Initial to Starting]
Vi2.1 IPCP: O CONFREQ [Starting] id 1 len 10
Vi2.1 IPCP:    Address 172.17.1.251 (0x0306AC1101FB)
Vi2.1 IPCP: Event[UP] State[Starting to REQsent]
Vi2.1 IPV6CP: Protocol configured, start CP. state[Initial]
Vi2.1 IPV6CP: Event[OPEN] State[Initial to Starting]
Vi2.1 IPV6CP: O CONFREQ [Starting] id 1 len 14
Vi2.1 IPV6CP:    Interface-Id 0207:7DFF:FE6A:9E00 (0x010A02077DFFFE6A9E00)
Vi2.1 IPV6CP: Event[UP] State[Starting to REQsent]
[943]PPPoE 901: State PTA_BINDING    Event STATIC BIND RESPONSE
[943]PPPoE 901: Connected PTA
Vi2.1 IPCP: I CONFREQ [REQsent] id 1 len 22
Vi2.1 IPCP:    Address 0.0.0.0 (0x030600000000)
Vi2.1 IPCP:    PrimaryDNS 0.0.0.0 (0x810600000000)
Vi2.1 IPCP:    SecondaryDNS 0.0.0.0 (0x830600000000)
Vi2.1 IPCP AUTHOR: Start.  Her address 0.0.0.0, we want 0.0.0.0
Vi2.1 IPCP AUTHOR: Done.  Her address 0.0.0.0, we want 95.70.188.244
Vi2.1 IPCP: O CONFNAK [REQsent] id 1 len 22
Vi2.1 IPCP:    Address 95.70.188.244 (0x03065F46BCF4)
Vi2.1 IPCP:    PrimaryDNS 193.192.98.8 (0x8106C1C06208)
Vi2.1 IPCP:    SecondaryDNS 212.154.100.18 (0x8306D49A6412)
Vi2.1 IPCP: Event[Receive ConfReq-] State[REQsent to REQsent]
Vi2.1 IPV6CP: I CONFREQ [REQsent] id 1 len 14
Vi2.1 IPV6CP:    Interface-Id 76B5:7EFF:FE25:5078 (0x010A76B57EFFFE255078)
Vi2.1 IPV6CP AUTHOR: Says use id 4445:4445:3A44:4544 ! Framed-Interface-Id coming from access-accept 
Vi2.1 IPV6CP: O CONFNAK [REQsent] id 1 len 14
Vi2.1 IPV6CP:    Interface-Id 4445:4445:3A44:4544 (0x010A444544453A444544) ! Remote site ACKED our proposel
Vi2.1 IPV6CP: Event[Receive ConfReq-] State[REQsent to REQsent]
Vi2.1 IPCP: I CONFACK [REQsent] id 1 len 10
Vi2.1 IPCP:    Address 172.17.1.251 (0x0306AC1101FB)
Vi2.1 IPCP: Event[Receive ConfAck] State[REQsent to ACKrcvd]
Vi2.1 IPV6CP: I CONFACK [REQsent] id 1 len 14
Vi2.1 IPV6CP:    Interface-Id 0207:7DFF:FE6A:9E00 (0x010A02077DFFFE6A9E00)
Vi2.1 IPV6CP: Event[Receive ConfAck] State[REQsent to ACKrcvd]
Vi2.1 IPCP: I CONFREQ [ACKrcvd] id 2 len 22
Vi2.1 IPCP:    Address 95.70.188.244 (0x03065F46BCF4)
Vi2.1 IPCP:    PrimaryDNS 193.192.98.8 (0x8106C1C06208)
Vi2.1 IPCP:    SecondaryDNS 212.154.100.18 (0x8306D49A6412)
Vi2.1 IPCP: O CONFACK [ACKrcvd] id 2 len 22
Vi2.1 IPCP:    Address 95.70.188.244 (0x03065F46BCF4)
Vi2.1 IPCP:    PrimaryDNS 193.192.98.8 (0x8106C1C06208)
Vi2.1 IPCP:    SecondaryDNS 212.154.100.18 (0x8306D49A6412)
Vi2.1 IPCP: Event[Receive ConfReq+] State[ACKrcvd to Open]
Vi2.1 IPV6CP: I CONFREQ [ACKrcvd] id 2 len 14
Vi2.1 IPV6CP:    Interface-Id 4445:4445:3A44:4544 (0x010A444544453A444544)
Vi2.1 IPV6CP AUTHOR: Says use id 4445:4445:3A44:4544
Vi2.1 IPV6CP: O CONFACK [ACKrcvd] id 2 len 14
Vi2.1 IPV6CP:    Interface-Id 4445:4445:3A44:4544 (0x010A444544453A444544)
Vi2.1 IPV6CP: Event[Receive ConfReq+] State[ACKrcvd to Open]
Vi2.1 IPCP: State is Open
Vi2.1 IPV6CP: State is Open
PPPoE : ipfib_encapstr  prepared
contiguous pak, size 26
74 B5 7E 25 50 78 00 07 7D 6A 9E 03 81 00 00 65
88 64 11 00 03 85 00 00 00 57
IPv6-Addrmgr-ND: Received prefix PI-flag change notification: prefix 2A02:FF0:F0:3::/64(onlink,active) state is not ready ! Framed-IPv6-Prefixed added to the 
IPV6: source :: (local)
      dest FF02::16 (Virtual-Access2.1)
      traffic class 224, flow 0x0, len 76+0, prot 0, hops 1, originating
IPv6-Fwd: L3 injection feature enabled: skipping output feature ‘iEdge IPv6 Features Output Path’
IPv6-Fwd: L3 injection feature enabled: skipping pak_encap
IPV6: source :: (local)
      dest FF02::16 (Virtual-Access2.1)
      traffic class 224, flow 0x0, len 76+0, prot 0, hops 1, originating
IPv6-Fwd: L3 injection feature enabled: skipping output feature ‘iEdge IPv6 Features Output Path’
IPv6-Fwd: L3 injection feature enabled: skipping pak_encap
IPV6: source :: (local)
      dest FF02::16 (Virtual-Access2.1)
      traffic class 224, flow 0x0, len 76+0, prot 0, hops 1, originating
IPv6-Fwd: L3 injection feature enabled: skipping output feature ‘iEdge IPv6 Features Output Path’
IPv6-Fwd: L3 injection feature enabled: skipping pak_encap
ICMPv6-ND: (Virtual-Access2.1) L2 came up
IPv6-Addrmgr-ND: DAD request for FE80::207:7DFF:FE6A:9E00 on Virtual-Access2.1
IPV6: source :: (local)
      dest FF02::16 (Virtual-Access2.1)
      traffic class 224, flow 0x0, len 76+0, prot 0, hops 1, originating
IPv6-Fwd: L3 injection feature enabled: skipping output feature ‘iEdge IPv6 Features Output Path’
IPv6-Fwd: L3 injection feature enabled: skipping pak_encap
ICMPv6-ND: Delay DAD for FE80::207:7DFF:FE6A:9E00 on Virtual-Access2.1 by 200 msec
PPPoE : ipfib_encapstr  prepared
contiguous pak, size 26
74 B5 7E 25 50 78 00 07 7D 6A 9E 03 81 00 00 65
88 64 11 00 03 85 00 00 00 21
Vi2.1 Added to neighbor route AVL tree: topoid 5, address 95.70.188.244
Vi2.1 IPCP: Install route to 95.70.188.244
RADIUS/ENCODE(000006B6):Orig. component type = PPPoE
RADIUS(000006B6): Config NAS IP: X.X.X.X
RADIUS(000006B6): Config NAS IPv6: ::
RADIUS(000006B6): Config NAS IP: X.X.X.X
RADIUS(000006B6): sending
RADIUS(000006B6): Send Accounting-Request to X.X.X.X:1813 id 1646/175, len 1095
RADIUS:  authenticator 69 40 0D 4E 40 D6 D9 D5 – FD F7 1A A9 13 AE 0E 74
RADIUS:  Acct-Session-Id     [44]  26  “00000000EC00000000009AE7”
RADIUS:  Vendor, Cisco       [26]  38
RADIUS:   Cisco AVpair       [1]   32  “actual-data-rate-upstream=6997”
RADIUS:  Vendor, Cisco       [26]  42
RADIUS:   Cisco AVpair       [1]   36  “actual-data-rate-downstream=128075”
RADIUS:  Vendor, Cisco       [26]  38
RADIUS:   Cisco AVpair       [1]   32  “minimum-data-rate-upstream=256”
RADIUS:  Vendor, Cisco       [26]  39
RADIUS:   Cisco AVpair       [1]   33  “minimum-data-rate-downstream=32”
RADIUS:  Vendor, Cisco       [26]  39
RADIUS:   Cisco AVpair       [1]   33  “maximum-data-rate-upstream=7000”
RADIUS:  Vendor, Cisco       [26]  43
RADIUS:   Cisco AVpair       [1]   37  “maximum-data-rate-downstream=200000”
RADIUS:  Vendor, Cisco       [26]  43
RADIUS:   Cisco AVpair       [1]   37  “attainable-data-rate-upstream=68905”
RADIUS:  Vendor, Cisco       [26]  46
RADIUS:   Cisco AVpair       [1]   40  “attainable-data-rate-downstream=149520”
RADIUS:  Vendor, Cisco       [26]  45
RADIUS:   Cisco AVpair       [1]   39  “maximum-interleaving-delay-upstream=8”
RADIUS:  Vendor, Cisco       [26]  47
RADIUS:   Cisco AVpair       [1]   41  “maximum-interleaving-delay-downstream=8”
RADIUS:  Vendor, Cisco       [26]  44
RADIUS:   Cisco AVpair       [1]   38  “actual-interleaving-delay-upstream=1”
RADIUS:  Vendor, Cisco       [26]  46
RADIUS:   Cisco AVpair       [1]   40  “actual-interleaving-delay-downstream=6”
RADIUS:  Vendor, Cisco       [26]  75
RADIUS:   Sub_Policy_In      [37]  69  “BB_GENERIC_PARENT_UP$class-default;police=6647150,0,0$class-default”
RADIUS:  Vendor, Cisco       [26]  74
RADIUS:   Sub_Policy_Out     [38]  68  “BB_GENERIC_PARENT_DOWN$class-default;shape=121671250$class-default”
RADIUS:  Framed-Protocol     [7]   6   PPP                       [1]
RADIUS:  Framed-Interface-Id [96]  10
RADIUS:   44 45 44 45 3A 44 45 44          [ DEDE:DED]
RADIUS:  Framed-IPv6-Prefix  [97]  20
RADIUS:   00 40 2A 02 0F F0 00 F0 00 03 00 00 00 00 00 00 00 00                [ @*]
RADIUS:  User-Name           [1]   26  “test@test.net”
RADIUS:  Vendor, Cisco       [26]  32
RADIUS:   Cisco AVpair       [1]   26  “connect-progress=Call Up”
RADIUS:  Acct-Authentic      [45]  6   RADIUS                    [1]
RADIUS:  Acct-Status-Type    [40]  6   Start                     [1]
RADIUS:  Vendor, Cisco       [26]  25
RADIUS:   Cisco AVpair       [1]   19  “portbundle=enable”
RADIUS:  Vendor, Cisco       [26]  24
RADIUS:   ssg-account-info   [250] 18  “S172.17.251.1:17”
RADIUS:  NAS-Port-Type       [61]  6   Virtual                   [5]
RADIUS:  NAS-Port            [5]   6   0
xxxxx
RADIUS:  Vendor, Cisco       [26]  41
RADIUS:   Cisco AVpair       [1]   35  “client-mac-address=74b5.7e25.5078”
RADIUS:  Vendor, Cisco       [26]  51
RADIUS:   Cisco AVpair       [1]   45  “xxxxx”
RADIUS:  Vendor, Cisco       [26]  25
RADIUS:   Cisco AVpair       [1]   19  “remote-id-tag=ptm”
RADIUS:  Connect-Info        [77]  10  “INTERNET”
RADIUS:  Service-Type        [6]   6   Framed                    [2]
RADIUS:  NAS-IP-Address      [4]   6   X.X.X.X
RADIUS:  Event-Timestamp     [55]  6   1536920281
RADIUS:  Nas-Identifier      [32]  42  “xxxxx”
RADIUS:  Acct-Delay-Time     [41]  6   0
RADIUS(000006B6): Sending a IPv4 Radius Pac
RADIUS(000006B6): Started 3 sec timeout
RADIUS: Received from id 1646/175 X.X.X.X:1813, Accounting-response, len 20
RADIUS:  authenticator C4 2F 3A DE E4 81 03 95 – FF 45 83 D8 1B 0A F7 7E
IPv6-Addrmgr-ND: DAD: FE80::207:7DFF:FE6A:9E00 is unique.
ICMPv6-ND: (Virtual-Access2.1,FE80::207:7DFF:FE6A:9E00) Sending NA to FF02::1
ICMPv6-ND: (Virtual-Access2.1) L3 came up
IPV6: source FE80::207:7DFF:FE6A:9E00 (local)
      dest FF02::16 (Virtual-Access2.1)
      traffic class 224, flow 0x0, len 76+0, prot 0, hops 1, originating
IPv6-Fwd: L3 injection feature enabled: skipping output feature ‘iEdge IPv6 Features Output Path’
IPv6-Fwd: L3 injection feature enabled: skipping pak_encap
IPV6: source FE80::207:7DFF:FE6A:9E00 (local)
      dest FF02::16 (Virtual-Access2.1)
      traffic class 224, flow 0x0, len 76+0, prot 0, hops 1, originating
IPv6-Fwd: L3 injection feature enabled: skipping output feature ‘iEdge IPv6 Features Output Path’
IPv6-Fwd: L3 injection feature enabled: skipping pak_encap
IPV6: source FE80::207:7DFF:FE6A:9E00 (local)
      dest FF02::16 (Virtual-Access2.1)
      traffic class 224, flow 0x0, len 76+0, prot 0, hops 1, originating
IPv6-Fwd: L3 injection feature enabled: skipping output feature ‘iEdge IPv6 Features Output Path’
IPv6-Fwd: L3 injection feature enabled: skipping pak_encap
IPV6: source FE80::207:7DFF:FE6A:9E00 (local)
      dest FF02::16 (Virtual-Access2.1)
      traffic class 224, flow 0x0, len 76+0, prot 0, hops 1, originating
IPv6-Fwd: L3 injection feature enabled: skipping output feature ‘iEdge IPv6 Features Output Path’
IPv6-Fwd: L3 injection feature enabled: skipping pak_encap
IPv6-Fwd: SAS on intf Virtual-Access2.1 didn’t find any address
ICMPv6-ND: (Virtual-Access2.1,FE80::207:7DFF:FE6A:9E00) Linklocal Up
IPV6: source FE80::207:7DFF:FE6A:9E00 (local)
      dest FF02::1 (Virtual-Access2.1)
      traffic class 224, flow 0x0, len 64+0, prot 58, hops 255, originating
IPv6-Fwd: L3 injection feature enabled: skipping output feature ‘iEdge IPv6 Features Output Path’
IPv6-Fwd: L3 injection feature enabled: skipping pak_encap
IPV6: source FE80::207:7DFF:FE6A:9E00 (local)
      dest FF02::16 (Virtual-Access2.1)
      traffic class 224, flow 0x0, len 76+0, prot 0, hops 1, originating
IPv6-Fwd: L3 injection feature enabled: skipping output feature ‘iEdge IPv6 Features Output Path’
IPv6-Fwd: L3 injection feature enabled: skipping pak_encap
IPV6: source FE80::207:7DFF:FE6A:9E00 (local)
      dest FF02::16 (Virtual-Access2.1)
      traffic class 224, flow 0x0, len 76+0, prot 0, hops 1, originating
IPv6-Fwd: L3 injection feature enabled: skipping output feature ‘iEdge IPv6 Features Output Path’
IPv6-Fwd: L3 injection feature enabled: skipping pak_encap
IPV6: source FE80::207:7DFF:FE6A:9E00 (local)
      dest FF02::16 (Virtual-Access2.1)
      traffic class 224, flow 0x0, len 76+0, prot 0, hops 1, originating
IPv6-Fwd: L3 injection feature enabled: skipping output feature ‘iEdge IPv6 Features Output Path’
IPv6-Fwd: L3 injection feature enabled: skipping pak_encap
IPV6: source FE80::207:7DFF:FE6A:9E00 (local)
      dest FF02::16 (Virtual-Access2.1)
      traffic class 224, flow 0x0, len 76+0, prot 0, hops 1, originating
IPv6-Fwd: L3 injection feature enabled: skipping output feature ‘iEdge IPv6 Features Output Path’
IPv6-Fwd: L3 injection feature enabled: skipping pak_encap
IPv6-Fwd: L3 injection feature enabled: skipping input feature ‘Verify Unicast Reverse-Path’
IPv6-Fwd: L3 injection feature enabled: skipping input feature ‘iEdge IPv6 Features Input Path’
IPv6-Fwd: L3 injection feature enabled: skipping input feature ‘Verify Unicast Reverse-Path’
IPv6-Fwd: L3 injection feature enabled: skipping input feature ‘iEdge IPv6 Features Input Path’
IPv6-Fwd: L3 injection feature enabled: skipping input feature ‘Verify Unicast Reverse-Path’
IPv6-Fwd: L3 injection feature enabled: skipping input feature ‘iEdge IPv6 Features Input Path’
IPv6-Fwd: L3 injection feature enabled: skipping input feature ‘Verify Unicast Reverse-Path’
IPv6-Fwd: L3 injection feature enabled: skipping input feature ‘iEdge IPv6 Features Input Path’
IPV6: source FE80::4445:4445:3A44:4544 (Virtual-Access2.1)
      dest FF02::1:2
      traffic class 0, flow 0x0, len 92+26, prot 17, hops 1, forward to ulp
IPv6 DHCP: Received SOLICIT from FE80::4445:4445:3A44:4544 on Virtual-Access2.1
IPv6 DHCP: detailed packet contents
  src FE80::4445:4445:3A44:4544 (Virtual-Access2.1)
  dst FF02::1:2
  type SOLICIT(1), xid 13637046
  option CLIENTID(1), len 14
    000100011579A1F774B57E255078
  option IA-PD(25), len 12
    IAID 0x000003E8, T1 0, T2 0
  option ELAPSED-TIME(8), len 2
    elapsed-time 0
IPv6 DHCP_AAA: Can’t initialise authorization request ! We did not confired a proper aaa for this. This test will not include prefix assignment from AAA. If it was so, router will send authorization request to get Delegated-IPv6-Prefix. 
IPv6 DHCP: Discard message due to AAA failure
IPv6-Fwd: L3 injection feature enabled: skipping input feature ‘Verify Unicast Reverse-Path’
IPv6-Fwd: L3 injection feature enabled: skipping input feature ‘iEdge IPv6 Features Input Path’
IPV6: source FE80::4445:4445:3A44:4544 (Virtual-Access2.1)
      dest FF02::2
      traffic class 0, flow 0x0, len 48+26, prot 58, hops 255, forward to ulp
ICMPv6-ND: (Virtual-Access2.1,FE80::4445:4445:3A44:4544) Received RS
ICMPv6-ND: Packet contains no options
ICMPv6-ND: Validating ND packet options: valid
ICMPv6-ND: Packet contains no options
ICMPv6-ND: (Virtual-Access2.1) Sending solicited RA
ICMPv6-ND: (Virtual-Access2.1) The interface media type does not support ND resolution.
ICMPv6-ND: (Virtual-Access2.1,FE80::207:7DFF:FE6A:9E00) send RA to FE80::4445:4445:3A44:4544
ICMPv6-ND: (Virtual-Access2.1,FE80::207:7DFF:FE6A:9E00) Sending RA (1800) to FE80::4445:4445:3A44:4544
ICMPv6-ND:   MTU = 1492
ICMPv6-ND:   DNS lifetime 400
ICMPv6-ND:     server 2001:4860:4860::4444
ICMPv6-ND:   prefix 2A02:FF0:F0:3::/64 [LA] 2592000/604800
IPV6: source FE80::207:7DFF:FE6A:9E00 (local)
      dest FE80::4445:4445:3A44:4544 (Virtual-Access2.1)
      traffic class 224, flow 0x0, len 120+0, prot 58, hops 255, originating
IPv6-Fwd: Created tmp mtu cache entry for FE80::207:7DFF:FE6A:9E00 FE80::4445:4445:3A44:4544 00000000
IPv6-Fwd: L3 injection feature enabled: skipping output feature ‘iEdge IPv6 Features Output Path’
IPv6-Fwd: L3 injection feature enabled: skipping pak_encap
IPv6-Fwd: L3 injection feature enabled: skipping input feature ‘Verify Unicast Reverse-Path’
IPv6-Fwd: L3 injection feature enabled: skipping input feature ‘iEdge IPv6 Features Input Path’
IPV6: source FE80::4445:4445:3A44:4544 (Virtual-Access2.1)
      dest FF02::1:2
      traffic class 0, flow 0x0, len 92+26, prot 17, hops 1, forward to ulp
IPv6 DHCP: Received SOLICIT from FE80::4445:4445:3A44:4544 on Virtual-Access2.1
IPv6 DHCP: detailed packet contents
  src FE80::4445:4445:3A44:4544 (Virtual-Access2.1)
  dst FF02::1:2
  type SOLICIT(1), xid 13637046
  option CLIENTID(1), len 14
    000100011579A1F774B57E255078
  option IA-PD(25), len 12
    IAID 0x000003E8, T1 0, T2 0
  option ELAPSED-TIME(8), len 2
    elapsed-time 100
IPv6 DHCP_AAA: Can’t initialise authorization request
IPv6 DHCP: Discard message due to AAA failure
IPv6-Fwd: L3 injection feature enabled: skipping input feature ‘Verify Unicast Reverse-Path’
IPv6-Fwd: L3 injection feature enabled: skipping input feature ‘iEdge IPv6 Features Input Path’
IPV6: source FE80::4445:4445:3A44:4544 (Virtual-Access2.1)
      dest FF02::2
      traffic class 0, flow 0x0, len 48+26, prot 58, hops 255, forward to ulp
ICMPv6-ND: (Virtual-Access2.1,FE80::4445:4445:3A44:4544) Received RS
ICMPv6-ND: Packet contains no options
ICMPv6-ND: Validating ND packet options: valid
ICMPv6-ND: Packet contains no options
ICMPv6-ND: (Virtual-Access2.1) Sending solicited RA
ICMPv6-ND: (Virtual-Access2.1) The interface media type does not support ND resolution.
ICMPv6-ND: (Virtual-Access2.1,FE80::207:7DFF:FE6A:9E00) send RA to FE80::4445:4445:3A44:4544
ICMPv6-ND: (Virtual-Access2.1,FE80::207:7DFF:FE6A:9E00) Sending RA (1800) to FE80::4445:4445:3A44:4544
ICMPv6-ND:   MTU = 1492
ICMPv6-ND:   DNS lifetime 400
ICMPv6-ND:     server 2001:4860:4860::4444
ICMPv6-ND:   prefix 2A02:FF0:F0:3::/64 [LA] 2592000/604800
IPV6: source FE80::207:7DFF:FE6A:9E00 (local)
      dest FE80::4445:4445:3A44:4544 (Virtual-Access2.1)
      traffic class 224, flow 0x0, len 120+0, prot 58, hops 255, originating
IPv6-Fwd: L3 injection feature enabled: skipping output feature ‘iEdge IPv6 Features Output Path’
IPv6-Fwd: L3 injection feature enabled: skipping pak_encap
IPv6-Fwd: L3 injection feature enabled: skipping input feature ‘Verify Unicast Reverse-Path’
IPv6-Fwd: L3 injection feature enabled: skipping input feature ‘iEdge IPv6 Features Input Path’
IPV6: source FE80::4445:4445:3A44:4544 (Virtual-Access2.1)
      dest FF02::1:2
      traffic class 0, flow 0x0, len 92+26, prot 17, hops 1, forward to ulp
IPv6 DHCP: Received SOLICIT from FE80::4445:4445:3A44:4544 on Virtual-Access2.1
IPv6 DHCP: detailed packet contents
  src FE80::4445:4445:3A44:4544 (Virtual-Access2.1)
  dst FF02::1:2
  type SOLICIT(1), xid 13637046
  option CLIENTID(1), len 14
    000100011579A1F774B57E255078
  option IA-PD(25), len 12
    IAID 0x000003E8, T1 0, T2 0
  option ELAPSED-TIME(8), len 2
    elapsed-time 200
IPv6 DHCP_AAA: Can’t initialise authorization request
IPv6 DHCP: Discard message due to AAA failure
IPv6-Fwd: L3 injection feature enabled: skipping input feature ‘Verify Unicast Reverse-Path’
IPv6-Fwd: L3 injection feature enabled: skipping input feature ‘iEdge IPv6 Features Input Path’
IPV6: source FE80::4445:4445:3A44:4544 (Virtual-Access2.1)
      dest FF02::1:2
      traffic class 0, flow 0x0, len 92+26, prot 17, hops 1, forward to ulp
IPv6 DHCP: Received SOLICIT from FE80::4445:4445:3A44:4544 on Virtual-Access2.1
IPv6 DHCP: detailed packet contents
  src FE80::4445:4445:3A44:4544 (Virtual-Access2.1)
  dst FF02::1:2
  type SOLICIT(1), xid 13637046
  option CLIENTID(1), len 14
    000100011579A1F774B57E255078
  option IA-PD(25), len 12
    IAID 0x000003E8, T1 0, T2 0term no
  option ELAPSED-TIME(8), len 2
    elapsed-time 500
IPv6 DHCP_AAA: Can’t initialise authorization request
IPv6 DHCP: Discard message due to AAA failuremon

TEST-2

enabled no ipv6 nd prefix framed-ipv6-prefix on virtual-template

interface Virtual-Template3
mtu 1492
ip unnumbered loopbackX
ip verify unicast reverse-path
no ip split-horizon
ip tcp adjust-mss 1452
no logging event link-status
ipv6 unnumbered loopbackX
no ipv6 nd prefix framed-ipv6-prefix
ipv6 nd ra dns server 2001:4860:4860::4444
no ipv6 redirects
no ipv6 unreachables
ipv6 dhcp server AAA
ipv6 verify unicast reverse-path
no peer default ip address
keepalive 60 3
ppp authentication pap pppoe
ppp authorization pppoe
ppp accounting pppoe
service-policy type control PPPOE
end

ppp944 PPP: Using vpn set call direction
ppp944 PPP: Treating connection as a callin
ppp944 PPP: Session handle[C0003B1] Session id[944]
ppp944 LCP: Event[OPEN] State[Initial to Starting]
ppp944 PPP LCP: Enter passive mode, state[Stopped]
ppp944 LCP: I CONFREQ [Stopped] id 1 len 14
ppp944 LCP:    MRU 1492 (0x010405D4)
ppp944 LCP:    MagicNumber 0x2EDF8D7C (0x05062EDF8D7C)
ppp944 LCP: O CONFREQ [Stopped] id 1 len 18
ppp944 LCP:    MRU 1492 (0x010405D4)
ppp944 LCP:    AuthProto PAP (0x0304C023)
ppp944 LCP:    MagicNumber 0x0B4C8CE8 (0x05060B4C8CE8)
ppp944 LCP: O CONFACK [Stopped] id 1 len 14
ppp944 LCP:    MRU 1492 (0x010405D4)
ppp944 LCP:    MagicNumber 0x2EDF8D7C (0x05062EDF8D7C)
ppp944 LCP: Event[Receive ConfReq+] State[Stopped to ACKsent]
ppp944 LCP: I CONFACK [ACKsent] id 1 len 18
ppp944 LCP:    MRU 1492 (0x010405D4)
ppp944 LCP:    AuthProto PAP (0x0304C023)
ppp944 LCP:    MagicNumber 0x0B4C8CE8 (0x05060B4C8CE8)
ppp944 LCP: Event[Receive ConfAck] State[ACKsent to Open]
ppp944 LCP-FS: I ECHOREQ [Open] id 0 len 8 magic 0x2EDF8D7C
ppp944 LCP-FS: O ECHOREP [Open] id 0 len 8 magic 0x0B4C8CE8
ppp944 PPP: Queue PAP code[1] id[1]
ppp944 PPP: Phase is AUTHENTICATING, by this end
ppp944 PAP: Redirect packet to ppp944
ppp944 PAP: I AUTH-REQ id 1 len 40 from “test@test.net”
ppp944 PAP: Authenticating peer test@test.net
ppp944 PPP: Phase is FORWARDING, Attempting Forward
ppp944 LCP: State is Open
ppp944 PPP: Phase is AUTHENTICATING, Unauthenticated User
ppp944 PPP: Sent PAP LOGIN Request
RADIUS/ENCODE(000006B7):Orig. component type = PPPoE
RADIUS: DSL line rate attributes successfully added
RADIUS(000006B7): Config NAS IP: X.X.X.X
RADIUS(000006B7): Config NAS IPv6: ::
RADIUS/ENCODE: No idb found! Framed IP Addr might not be included
RADIUS/ENCODE(000006B7): acct_session_id: 39685
RADIUS(000006B7): Config NAS IP: X.X.X.X
RADIUS(000006B7): sending
RADIUS(000006B7): Send Access-Request to X.X.X.X:1812 id 1645/110, len 389
RADIUS:  authenticator D6 6F F2 F7 68 14 E5 BB – 5E 60 48 C7 56 5C B1 22
RADIUS:  Framed-Protocol     [7]   6   PPP                       [1]
RADIUS:  User-Name           [1]   26  “test@test.net”
RADIUS:  User-Password       [2]   18  *
RADIUS:  Vendor, Cisco       [26]  38
RADIUS:   Cisco AVpair       [1]   32  “actual-data-rate-upstream=6997”
RADIUS:  Vendor, Cisco       [26]  42
RADIUS:   Cisco AVpair       [1]   36  “actual-data-rate-downstream=128075”
RADIUS:  NAS-Port-Type       [61]  6   Virtual                   [5]
RADIUS:  NAS-Port            [5]   6   0
xxxxx
RADIUS:  Vendor, Cisco       [26]  41
RADIUS:   Cisco AVpair       [1]   35  “client-mac-address=74b5.7e25.5078”
RADIUS:  Vendor, Cisco       [26]  51
RADIUS:   Cisco AVpair       [1]   45  “xxxxx”
RADIUS:  Vendor, Cisco       [26]  25
RADIUS:   Cisco AVpair       [1]   19  “remote-id-tag=ptm”
RADIUS:  Service-Type        [6]   6   Framed                    [2]
RADIUS:  NAS-IP-Address      [4]   6   X.X.X.X
RADIUS:  Acct-Session-Id     [44]  26  “00000000EC00000000009B05”
RADIUS:  Nas-Identifier      [32]  42  “xxxxx”
RADIUS(000006B7): Sending a IPv4 Radius Packet
RADIUS(000006B7): Started 3 sec timeout
RADIUS: Received from id 1645/110 X.X.X.X:1812, Access-Accept, len 473
RADIUS:  authenticator 53 06 81 9C 71 D0 33 2A – 74 40 49 76 7E 2E 6E CF
RADIUS:  Framed-IP-Address   [8]   6   95.70.188.244
RADIUS:  Service-Type        [6]   6   Framed                    [2]
RADIUS:  Framed-Protocol     [7]   6   PPP                       [1]
RADIUS:  Framed-IPv6-Prefix  [97]  20
RADIUS:   00 40 2A 02 0F F0 00 F0 00 03 00 00 00 00 00 00 00 00                [ @*]
RADIUS:  Framed-Interface-Id [96]  21
RADIUS:   44 45 44 45 3A 44 45 44 45 3A 44 45 44 45 3A 44  [DEDE:DEDE:DEDE:D]
RADIUS:   45 44 45               [ EDE]
RADIUS:  Session-Timeout     [27]  6   1351474
RADIUS:  Vendor, Cisco       [26]  17
RADIUS:   ssg-account-info   [250] 11  “AINTERNET”
RADIUS:  Vendor, Cisco       [26]  50
RADIUS:   Cisco AVpair       [1]   44  “ip:dns-servers=193.192.98.8 212.154.100.18”
RADIUS:  Idle-Timeout        [28]  6   5000
RADIUS:  Vendor, Cisco       [26]  70
RADIUS:   Cisco AVpair       [1]   64  “lcp:interface-config#1=ipv6 enable\nipv6 unnumbered loopbackX”
RADIUS:  Vendor, Cisco       [26]  73
RADIUS:   Cisco AVpair       [1]   67  “ip:qos-policy-out=add-class(sub,(class-default),shape(121671250))”
RADIUS:  Vendor, Cisco       [26]  52
RADIUS:   Cisco AVpair       [1]   46  “ip:sub-qos-policy-out=BB_GENERIC_PARENT_DOWN”
RADIUS:  Vendor, Cisco       [26]  71
RADIUS:   Cisco AVpair       [1]   65  “ip:qos-policy-in=add-class(sub,(class-default),police(6647150))”
RADIUS:  Vendor, Cisco       [26]  49
RADIUS:   Cisco AVpair       [1]   43  “ip:sub-qos-policy-in=BB_GENERIC_PARENT_UP”
RADIUS(000006B7): Received from id 1645/110
ppp944 PPP: Received LOGIN Response PASS
ppp944 PPP: Phase is FORWARDING, Attempting Forward
IPv6 DHCP_AAA: Parse SSS author data: 2A02:FF0:F0:3::/64
ICMPv6-ND: (Virtual-Access2.1) IPv6 Opr Enabled
ICMPv6-ND: Allocate ND context on Virtual-Access2.1 [27]
ICMPv6-ND: Allocate ND config on 27
ICMPv6-ND: (Virtual-Access2.1) IPv6 Opr Disabled
IPv6 DHCP: Delete IAPD routes, pool AAA, idb Virtual-Access2.1
IPv6 DHCP: Delete IANA routes, pool AAA, idb Virtual-Access2.1
IPv6 DHCP_AAA: Saving author data from SSS Virtual-Access2.1
ICMPv6-ND: (Virtual-Access2.1) IPv6 Opr Enabled
[944]PPPoE 902: State LCP_NEGOTIATION    Event SSS CONNECT LOCAL
[944]PPPoE 902: Segment (SSS class): UPDATED
[944]PPPoE 902: Segment (SSS class): BOUND
[944]PPPoE 902: data path set to Virtual Acess
[944]PPPoE 902: State LCP_NEGOTIATION    Event SSM UPDATED
Vi2.1 PPP: Phase is AUTHENTICATING, Authenticated User
Vi2.1 PAP: O AUTH-ACK id 1 len 5
[944]PPPoE 902: AAA get dynamic attrs
Vi2.1 PPP: Phase is UP
Vi2.1 IPCP: Protocol configured, start CP. state[Initial]
Vi2.1 IPCP: Event[OPEN] State[Initial to Starting]
Vi2.1 IPCP: O CONFREQ [Starting] id 1 len 10
Vi2.1 IPCP:    Address 172.17.1.251 (0x0306AC1101FB)
Vi2.1 IPCP: Event[UP] State[Starting to REQsent]
Vi2.1 IPV6CP: Protocol configured, start CP. state[Initial]
Vi2.1 IPV6CP: Event[OPEN] State[Initial to Starting]
Vi2.1 IPV6CP: O CONFREQ [Starting] id 1 len 14
Vi2.1 IPV6CP:    Interface-Id 0207:7DFF:FE6A:9E00 (0x010A02077DFFFE6A9E00)
Vi2.1 IPV6CP: Event[UP] State[Starting to REQsent]
[944]PPPoE 902: State PTA_BINDING    Event STATIC BIND RESPONSE
[944]PPPoE 902: Connected PTA
Vi2.1 IPCP: I CONFREQ [REQsent] id 1 len 22
Vi2.1 IPCP:    Address 0.0.0.0 (0x030600000000)
Vi2.1 IPCP:    PrimaryDNS 0.0.0.0 (0x810600000000)
Vi2.1 IPCP:    SecondaryDNS 0.0.0.0 (0x830600000000)
Vi2.1 IPCP AUTHOR: Start.  Her address 0.0.0.0, we want 0.0.0.0
Vi2.1 IPCP AUTHOR: Done.  Her address 0.0.0.0, we want 95.70.188.244
Vi2.1 IPCP: O CONFNAK [REQsent] id 1 len 22
Vi2.1 IPCP:    Address 95.70.188.244 (0x03065F46BCF4)
Vi2.1 IPCP:    PrimaryDNS 193.192.98.8 (0x8106C1C06208)
Vi2.1 IPCP:    SecondaryDNS 212.154.100.18 (0x8306D49A6412)
Vi2.1 IPCP: Event[Receive ConfReq-] State[REQsent to REQsent]
Vi2.1 IPV6CP: I CONFREQ [REQsent] id 1 len 14
Vi2.1 IPV6CP:    Interface-Id 76B5:7EFF:FE25:5078 (0x010A76B57EFFFE255078)
Vi2.1 IPV6CP AUTHOR: Says use id 4445:4445:3A44:4544
Vi2.1 IPV6CP: O CONFNAK [REQsent] id 1 len 14
Vi2.1 IPV6CP:    Interface-Id 4445:4445:3A44:4544 (0x010A444544453A444544)
Vi2.1 IPV6CP: Event[Receive ConfReq-] State[REQsent to REQsent]
Vi2.1 IPCP: I CONFACK [REQsent] id 1 len 10
Vi2.1 IPCP:    Address 172.17.1.251 (0x0306AC1101FB)
Vi2.1 IPCP: Event[Receive ConfAck] State[REQsent to ACKrcvd]
Vi2.1 IPV6CP: I CONFACK [REQsent] id 1 len 14
Vi2.1 IPV6CP:    Interface-Id 0207:7DFF:FE6A:9E00 (0x010A02077DFFFE6A9E00)
Vi2.1 IPV6CP: Event[Receive ConfAck] State[REQsent to ACKrcvd]
Vi2.1 IPCP: I CONFREQ [ACKrcvd] id 2 len 22
Vi2.1 IPCP:    Address 95.70.188.244 (0x03065F46BCF4)
Vi2.1 IPCP:    PrimaryDNS 193.192.98.8 (0x8106C1C06208)
Vi2.1 IPCP:    SecondaryDNS 212.154.100.18 (0x8306D49A6412)
Vi2.1 IPCP: O CONFACK [ACKrcvd] id 2 len 22
Vi2.1 IPCP:    Address 95.70.188.244 (0x03065F46BCF4)
Vi2.1 IPCP:    PrimaryDNS 193.192.98.8 (0x8106C1C06208)
Vi2.1 IPCP:    SecondaryDNS 212.154.100.18 (0x8306D49A6412)
Vi2.1 IPCP: Event[Receive ConfReq+] State[ACKrcvd to Open]
Vi2.1 IPV6CP: I CONFREQ [ACKrcvd] id 2 len 14
Vi2.1 IPV6CP:    Interface-Id 4445:4445:3A44:4544 (0x010A444544453A444544)
Vi2.1 IPV6CP AUTHOR: Says use id 4445:4445:3A44:4544
Vi2.1 IPV6CP: O CONFACK [ACKrcvd] id 2 len 14
Vi2.1 IPV6CP:    Interface-Id 4445:4445:3A44:4544 (0x010A444544453A444544)
Vi2.1 IPV6CP: Event[Receive ConfReq+] State[ACKrcvd to Open]
Vi2.1 IPCP: State is Open
Vi2.1 IPV6CP: State is Open
PPPoE : ipfib_encapstr  prepared
contiguous pak, size 26
74 B5 7E 25 50 78 00 07 7D 6A 9E 03 81 00 00 65
88 64 11 00 03 86 00 00 00 57
IPv6-Addrmgr-ND: Received prefix PI-flag change notification: prefix 2A02:FF0:F0:3::/64 (onlink,active) state is not ready
IPV6: source :: (local)
      dest FF02::16 (Virtual-Access2.1)
      traffic class 224, flow 0x0, len 76+0, prot 0, hops 1, originating
IPv6-Fwd: L3 injection feature enabled: skipping output feature ‘iEdge IPv6 Features Output Path’
IPv6-Fwd: L3 injection feature enabled: skipping pak_encap
IPV6: source :: (local)
      dest FF02::16 (Virtual-Access2.1)
      traffic class 224, flow 0x0, len 76+0, prot 0, hops 1, originating
IPv6-Fwd: L3 injection feature enabled: skipping output feature ‘iEdge IPv6 Features Output Path’
IPv6-Fwd: L3 injection feature enabled: skipping pak_encap
IPV6: source :: (local)
      dest FF02::16 (Virtual-Access2.1)
      traffic class 224, flow 0x0, len 76+0, prot 0, hops 1, originating
IPv6-Fwd: L3 injection feature enabled: skipping output feature ‘iEdge IPv6 Features Output Path’
IPv6-Fwd: L3 injection feature enabled: skipping pak_encap
ICMPv6-ND: (Virtual-Access2.1) L2 came up
IPv6-Addrmgr-ND: DAD request for FE80::207:7DFF:FE6A:9E00 on Virtual-Access2.1
IPV6: source :: (local)
      dest FF02::16 (Virtual-Access2.1)
      traffic class 224, flow 0x0, len 76+0, prot 0, hops 1, originating
IPv6-Fwd: L3 injection feature enabled: skipping output feature ‘iEdge IPv6 Features Output Path’
IPv6-Fwd: L3 injection feature enabled: skipping pak_encap
ICMPv6-ND: Delay DAD for FE80::207:7DFF:FE6A:9E00 on Virtual-Access2.1 by 200 msec
PPPoE : ipfib_encapstr  prepared
contiguous pak, size 26
74 B5 7E 25 50 78 00 07 7D 6A 9E 03 81 00 00 65
88 64 11 00 03 86 00 00 00 21
Vi2.1 Added to neighbor route AVL tree: topoid 5, address 95.70.188.244
Vi2.1 IPCP: Install route to 95.70.188.244
RADIUS/ENCODE(000006B7):Orig. component type = PPPoE
RADIUS(000006B7): Config NAS IP: X.X.X.X
RADIUS(000006B7): Config NAS IPv6: ::
RADIUS(000006B7): Config NAS IP: X.X.X.X
RADIUS(000006B7): sending
RADIUS(000006B7): Send Accounting-Request to X.X.X.X:1813 id 1646/193, len 1095
RADIUS:  authenticator 98 96 4B 69 0A 8E A3 81 – 64 91 85 EF 65 FA 8B 47
RADIUS:  Acct-Session-Id     [44]  26  “00000000EC00000000009B05”
RADIUS:  Vendor, Cisco       [26]  38
RADIUS:   Cisco AVpair       [1]   32  “actual-data-rate-upstream=6997”
RADIUS:  Vendor, Cisco       [26]  42
RADIUS:   Cisco AVpair       [1]   36  “actual-data-rate-downstream=128075”
RADIUS:  Vendor, Cisco       [26]  38
RADIUS:   Cisco AVpair       [1]   32  “minimum-data-rate-upstream=256”
RADIUS:  Vendor, Cisco       [26]  39
RADIUS:   Cisco AVpair       [1]   33  “minimum-data-rate-downstream=32”
RADIUS:  Vendor, Cisco       [26]  39
RADIUS:   Cisco AVpair       [1]   33  “maximum-data-rate-upstream=7000”
RADIUS:  Vendor, Cisco       [26]  43
RADIUS:   Cisco AVpair       [1]   37  “maximum-data-rate-downstream=200000”
RADIUS:  Vendor, Cisco       [26]  43
RADIUS:   Cisco AVpair       [1]   37  “attainable-data-rate-upstream=68905”
RADIUS:  Vendor, Cisco       [26]  46
RADIUS:   Cisco AVpair       [1]   40  “attainable-data-rate-downstream=149648”
RADIUS:  Vendor, Cisco       [26]  45
RADIUS:   Cisco AVpair       [1]   39  “maximum-interleaving-delay-upstream=8”
RADIUS:  Vendor, Cisco       [26]  47
RADIUS:   Cisco AVpair       [1]   41  “maximum-interleaving-delay-downstream=8”
RADIUS:  Vendor, Cisco       [26]  44
RADIUS:   Cisco AVpair       [1]   38  “actual-interleaving-delay-upstream=1”
RADIUS:  Vendor, Cisco       [26]  46
RADIUS:   Cisco AVpair       [1]   40  “actual-interleaving-delay-downstream=6”
RADIUS:  Vendor, Cisco       [26]  75
RADIUS:   Sub_Policy_In      [37]  69  “BB_GENERIC_PARENT_UP$class-default;police=6647150,0,0$class-default”
RADIUS:  Vendor, Cisco       [26]  74
RADIUS:   Sub_Policy_Out     [38]  68  “BB_GENERIC_PARENT_DOWN$class-default;shape=121671250$class-default”
RADIUS:  Framed-Protocol     [7]   6   PPP                       [1]
RADIUS:  Framed-Interface-Id [96]  10
RADIUS:   44 45 44 45 3A 44 45 44          [ DEDE:DED]
RADIUS:  Framed-IPv6-Prefix  [97]  20
RADIUS:   00 40 2A 02 0F F0 00 F0 00 03 00 00 00 00 00 00 00 00                [ @*]
RADIUS:  User-Name           [1]   26  “test@test.net”
RADIUS:  Vendor, Cisco       [26]  32
RADIUS:   Cisco AVpair       [1]   26  “connect-progress=Call Up”
RADIUS:  Acct-Authentic      [45]  6   RADIUS                    [1]
RADIUS:  Acct-Status-Type    [40]  6   Start                     [1]
RADIUS:  Vendor, Cisco       [26]  25
RADIUS:   Cisco AVpair       [1]   19  “portbundle=enable”
RADIUS:  Vendor, Cisco       [26]  24
RADIUS:   ssg-account-info   [250] 18  “S172.17.251.1:16”
RADIUS:  NAS-Port-Type       [61]  6   Virtual                   [5]
RADIUS:  NAS-Port            [5]   6   0
xxxxx
RADIUS:  Vendor, Cisco       [26]  41
RADIUS:   Cisco AVpair       [1]   35  “client-mac-address=74b5.7e25.5078”
RADIUS:  Vendor, Cisco       [26]  51
RADIUS:   Cisco AVpair       [1]   45  “xxxxx”
RADIUS:  Vendor, Cisco       [26]  25
RADIUS:   Cisco AVpair       [1]   19  “remote-id-tag=ptm”
RADIUS:  Connect-Info        [77]  10  “INTERNET”
RADIUS:  Service-Type        [6]   6   Framed                    [2]
RADIUS:  NAS-IP-Address      [4]   6   X.X.X.X
RADIUS:  Event-Timestamp     [55]  6   1536921313
RADIUS:  Nas-Identifier      [32]  42  “xxxxx”
RADIUS:  Acct-Delay-Time     [41]  6   0
RADIUS(000006B7): Sending a IPv4 Radius Packet
RADIUS(000006B7): Started 3 sec timeout
RADIUS: Received from id 1646/193 X.X.X.X:1813, Accounting-response, len 20
RADIUS:  authenticator 29 52 F7 DC 1E 6E 6F 75 – 81 C0 5A 34 53 94 A4 3B
IPv6-Addrmgr-ND: DAD: FE80::207:7DFF:FE6A:9E00 is unique.
ICMPv6-ND: (Virtual-Access2.1,FE80::207:7DFF:FE6A:9E00) Sending NA to FF02::1
ICMPv6-ND: (Virtual-Access2.1) L3 came up
IPV6: source FE80::207:7DFF:FE6A:9E00 (local)
      dest FF02::16 (Virtual-Access2.1)
      traffic class 224, flow 0x0, len 76+0, prot 0, hops 1, originating
IPv6-Fwd: L3 injection feature enabled: skipping output feature ‘iEdge IPv6 Features Output Path’
IPv6-Fwd: L3 injection feature enabled: skipping pak_encap
IPV6: source FE80::207:7DFF:FE6A:9E00 (local)
      dest FF02::16 (Virtual-Access2.1)
      traffic class 224, flow 0x0, len 76+0, prot 0, hops 1, originating
IPv6-Fwd: L3 injection feature enabled: skipping output feature ‘iEdge IPv6 Features Output Path’
IPv6-Fwd: L3 injection feature enabled: skipping pak_encap
IPV6: source FE80::207:7DFF:FE6A:9E00 (local)
      dest FF02::16 (Virtual-Access2.1)
      traffic class 224, flow 0x0, len 76+0, prot 0, hops 1, originating
IPv6-Fwd: L3 injection feature enabled: skipping output feature ‘iEdge IPv6 Features Output Path’
IPv6-Fwd: L3 injection feature enabled: skipping pak_encap
IPV6: source FE80::207:7DFF:FE6A:9E00 (local)
      dest FF02::16 (Virtual-Access2.1)
      traffic class 224, flow 0x0, len 76+0, prot 0, hops 1, originating
IPv6-Fwd: L3 injection feature enabled: skipping output feature ‘iEdge IPv6 Features Output Path’
IPv6-Fwd: L3 injection feature enabled: skipping pak_encap
IPv6-Fwd: SAS on intf Virtual-Access2.1 didn’t find any address
ICMPv6-ND: (Virtual-Access2.1,FE80::207:7DFF:FE6A:9E00) Linklocal Up
IPV6: source FE80::207:7DFF:FE6A:9E00 (local)
      dest FF02::1 (Virtual-Access2.1)
      traffic class 224, flow 0x0, len 64+0, prot 58, hops 255, originating
IPv6-Fwd: L3 injection feature enabled: skipping output feature ‘iEdge IPv6 Features Output Path’
IPv6-Fwd: L3 injection feature enabled: skipping pak_encap
IPv6-Fwd: L3 injection feature enabled: skipping input feature ‘Verify Unicast Reverse-Path’
IPv6-Fwd: L3 injection feature enabled: skipping input feature ‘iEdge IPv6 Features Input Path’
IPV6: source FE80::207:7DFF:FE6A:9E00 (local)
      dest FF02::16 (Virtual-Access2.1)
      traffic class 224, flow 0x0, len 76+0, prot 0, hops 1, originating
IPv6-Fwd: L3 injection feature enabled: skipping output feature ‘iEdge IPv6 Features Output Path’
IPv6-Fwd: L3 injection feature enabled: skipping pak_encap
IPV6: source FE80::207:7DFF:FE6A:9E00 (local)
      dest FF02::16 (Virtual-Access2.1)
      traffic class 224, flow 0x0, len 76+0, prot 0, hops 1, originating
IPv6-Fwd: L3 injection feature enabled: skipping output feature ‘iEdge IPv6 Features Output Path’
IPv6-Fwd: L3 injection feature enabled: skipping pak_encap
IPv6-Fwd: L3 injection feature enabled: skipping input feature ‘Verify Unicast Reverse-Path’
IPv6-Fwd: L3 injection feature enabled: skipping input feature ‘iEdge IPv6 Features Input Path’
IPV6: source FE80::207:7DFF:FE6A:9E00 (local)
      dest FF02::16 (Virtual-Access2.1)
      traffic class 224, flow 0x0, len 76+0, prot 0, hops 1, originating
IPv6-Fwd: L3 injection feature enabled: skipping output feature ‘iEdge IPv6 Features Output Path’
IPv6-Fwd: L3 injection feature enabled: skipping pak_encap
IPV6: source FE80::207:7DFF:FE6A:9E00 (local)
      dest FF02::16 (Virtual-Access2.1)
      traffic class 224, flow 0x0, len 76+0, prot 0, hops 1, originating
IPv6-Fwd: L3 injection feature enabled: skipping output feature ‘iEdge IPv6 Features Output Path’
IPv6-Fwd: L3 injection feature enabled: skipping pak_encap
IPv6-Fwd: L3 injection feature enabled: skipping input feature ‘Verify Unicast Reverse-Path’
IPv6-Fwd: L3 injection feature enabled: skipping input feature ‘iEdge IPv6 Features Input Path’
IPv6-Fwd: L3 injection feature enabled: skipping input feature ‘Verify Unicast Reverse-Path’
IPv6-Fwd: L3 injection feature enabled: skipping input feature ‘iEdge IPv6 Features Input Path’
IPV6: source FE80::4445:4445:3A44:4544 (Virtual-Access2.1)
      dest FF02::1:2
      traffic class 0, flow 0x0, len 92+26, prot 17, hops 1, forward to ulp
IPv6 DHCP: Received SOLICIT from FE80::4445:4445:3A44:4544 on Virtual-Access2.1
IPv6 DHCP: detailed packet contents
  src FE80::4445:4445:3A44:4544 (Virtual-Access2.1)
  dst FF02::1:2
  type SOLICIT(1), xid 15131536
  option CLIENTID(1), len 14
    000100011579A1F874B57E255078
  option IA-PD(25), len 12
    IAID 0x000003E8, T1 0, T2 0
  option ELAPSED-TIME(8), len 2
    elapsed-time 0
IPv6 DHCP: Using interface pool AAA
IPv6 DHCP_AAA: Got prefix 2A02:FF0:F0:3::/64
IPv6 DHCP_AAA: Retrieved subblock; It has AAA DNS_SERVERS=0
IPv6 DHCP: SAS retured Null falling to link local
IPv6 DHCP: Returning Link local address FE80::207:7DFF:FE6A:9E00
IPv6 DHCP: detailed packet contents
  src FE80::207:7DFF:FE6A:9E00
  dst FE80::4445:4445:3A44:4544 (Virtual-Access2.1)
  type ADVERTISE(2), xid 15131536
  option SERVERID(2), len 10
    0003000100077D6A9E00
  option CLIENTID(1), len 14
    000100011579A1F874B57E255078
  option IA-PD(25), len 41
    IAID 0x000003E8, T1 302400, T2 483840
    option IAPREFIX(26), len 25
      preferred 604800, valid 2592000, prefix 2A02:FF0:F0:3::/64
  option DNS-SERVERS(23), len 32
    2001:4860:4860::8888
    2001:4860:4860::4444
IPv6 DHCP: Sending ADVERTISE to FE80::4445:4445:3A44:4544 on Virtual-Access2.1
IPV6: source FE80::207:7DFF:FE6A:9E00 (local)
      dest FE80::4445:4445:3A44:4544 (Virtual-Access2.1)
      traffic class 224, flow 0x0, len 165+0, prot 17, hops 255, originating
IPv6-Fwd: Created tmp mtu cache entry for FE80::207:7DFF:FE6A:9E00 FE80::4445:4445:3A44:4544 12000027
IPv6-Fwd: L3 injection feature enabled: skipping output feature ‘iEdge IPv6 Features Output Path’
IPv6-Fwd: L3 injection feature enabled: skipping pak_encap
IPv6-Fwd: L3 injection feature enabled: skipping input feature ‘Verify Unicast Reverse-Path’
IPv6-Fwd: L3 injection feature enabled: skipping input feature ‘iEdge IPv6 Features Input Path’
IPV6: source FE80::4445:4445:3A44:4544 (Virtual-Access2.1)
      dest FF02::2
      traffic class 0, flow 0x0, len 48+26, prot 58, hops 255, forward to ulp
ICMPv6-ND: (Virtual-Access2.1,FE80::4445:4445:3A44:4544) Received RS
ICMPv6-ND: Packet contains no options
ICMPv6-ND: Validating ND packet options: valid
ICMPv6-ND: Packet contains no options
ICMPv6-ND: (Virtual-Access2.1) Sending solicited RA
ICMPv6-ND: (Virtual-Access2.1) The interface media type does not support ND resolution.
ICMPv6-ND: (Virtual-Access2.1,FE80::207:7DFF:FE6A:9E00) send RA to FE80::4445:4445:3A44:4544
ICMPv6-ND: (Virtual-Access2.1,FE80::207:7DFF:FE6A:9E00) Sending RA (1800) to FE80::4445:4445:3A44:4544
ICMPv6-ND:   MTU = 1492
ICMPv6-ND:   DNS lifetime 400
ICMPv6-ND:     server 2001:4860:4860::4444
ICMPv6-ND:   prefix 2A02:FF0:F0:3::/64 [LA] 2592000/604800
IPV6: source FE80::207:7DFF:FE6A:9E00 (local)
      dest FE80::4445:4445:3A44:4544 (Virtual-Access2.1)
      traffic class 224, flow 0x0, len 120+0, prot 58, hops 255, originating
IPv6-Fwd: Created tmp mtu cache entry for FE80::207:7DFF:FE6A:9E00 FE80::4445:4445:3A44:4544 00000000
IPv6-Fwd: L3 injection feature enabled: skipping output feature ‘iEdge IPv6 Features Output Path’
IPv6-Fwd: L3 injection feature enabled: skipping pak_encap
Vi2.2 LCP: O ECHOREQ [Open] id 132 len 12 magic 0xF6A95C76
Vi2.2 LCP-FS: I ECHOREP [Open] id 132 len 12 magic 0x124C1DF4
Vi2.2 LCP-FS: Received id 132, sent id 132, line up
IPv6-Fwd: L3 injection feature enabled: skipping input feature ‘Verify Unicast Reverse-Path’
IPv6-Fwd: L3 injection feature enabled: skipping input feature ‘iEdge IPv6 Features Input Path’
IPV6: source FE80::4445:4445:3A44:4544 (Virtual-Access2.1)
      dest FF02::1:2
      traffic class 0, flow 0x0, len 135+26, prot 17, hops 1, forward to ulp
IPv6 DHCP: Received REQUEST from FE80::4445:4445:3A44:4544 on Virtual-Access2.1
IPv6 DHCP: detailed packet contents
  src FE80::4445:4445:3A44:4544 (Virtual-Access2.1)
  dst FF02::1:2
  type REQUEST(3), xid 1295165
  option CLIENTID(1), len 14
    000100011579A1F874B57E255078
  option IA-PD(25), len 41
    IAID 0x000003E8, T1 302400, T2 483840
    option IAPREFIX(26), len 25
      preferred 604800, valid 2592000, prefix 2A02:FF0:F0:3::/64
  option SERVERID(2), len 10
    0003000100077D6A9E00
  option ELAPSED-TIME(8), len 2
    elapsed-time 0
IPv6 DHCP: Using interface pool AAA
IPv6 DHCP: Creating binding for FE80::4445:4445:3A44:4544 in pool AAA
IPv6 DHCP: Allocating IA_PD 000003E8 in binding for FE80::4445:4445:3A44:4544
IPv6 DHCP_AAA: Got prefix 2A02:FF0:F0:3::/64
IPv6 DHCP: Allocating prefix 2A02:FF0:F0:3::/64 in binding for FE80::4445:4445:3A44:4544, IAID 000003E8
IPv6 DHCP: Added Prefix 2A02:FF0:F0:3::/64 to Radix tree
IPv6 DHCP: Route added: 2A02:FF0:F0:3::/64 via FE80::4445:4445:3A44:4544 dist 1 iaid 000003E8 vrf INTERNET
IPv6 DHCP_AAA:  AAA id got from PPP = 1719
IPv6 DHCP_AAA: Retrieved subblock; It has AAA DNS_SERVERS=0
IPv6 DHCP: SAS retured Null falling to link local
IPv6 DHCP: Returning Link local address FE80::207:7DFF:FE6A:9E00
IPv6 DHCP: detailed packet contents
  src FE80::207:7DFF:FE6A:9E00
  dst FE80::4445:4445:3A44:4544 (Virtual-Access2.1)
  type REPLY(7), xid 1295165
  option SERVERID(2), len 10
    0003000100077D6A9E00
  option CLIENTID(1), len 14
    000100011579A1F874B57E255078
  option IA-PD(25), len 41
    IAID 0x000003E8, T1 302400, T2 483840
    option IAPREFIX(26), len 25
      preferred 604800, valid 2592000, prefix 2A02:FF0:F0:3::/64
  option DNS-SERVERS(23), len 32
    2001:4860:4860::8888
    2001:4860:4860::4444
IPv6 DHCP: Sending REPLY to FE80::4445:4445:3A44:4544 on Virtual-Access2.1
IPV6: source FE80::207:7DFF:FE6A:9E00 (local)
      dest FE80::4445:4445:3A44:4544 (Virtual-Access2.1)
      traffic class 224, flow 0x0, len 165+0, prot 17, hops 255, originating
IPv6-Fwd: L3 injection feature enabled: skipping output feature ‘iEdge IPv6 Features Output Path’
IPv6-Fwd: L3 injection feature enabled: skipping pak_encap
IPv6-Fwd: L3 injection feature enabled: skipping input feature ‘Verify Unicast Reverse-Path’
IPv6-Fwd: L3 injection feature enabled: skipping input feature ‘iEdge IPv6 Features Input Path’
IPV6: source FE80::4445:4445:3A44:4544 (Virtual-Access2.1)
      dest FF02::2
      traffic class 0, flow 0x0, len 48+26, prot 58, hops 255, forward to ulp
ICMPv6-ND: (Virtual-Access2.1,FE80::4445:4445:3A44:4544) Received RS
ICMPv6-ND: Packet contains no options
ICMPv6-ND: Validating ND packet options: valid
ICMPv6-ND: Packet contains no options
ICMPv6-ND: (Virtual-Access2.1) Sending solicited RA
ICMPv6-ND: (Virtual-Access2.1) The interface media type does not support ND resolution.
ICMPv6-ND: (Virtual-Access2.1,FE80::207:7DFF:FE6A:9E00) send RA to FE80::4445:4445:3A44:4544
ICMPv6-ND: (Virtual-Access2.1,FE80::207:7DFF:FE6A:9E00) Sending RA (1800) to FE80::4445:4445:3A44:4544
ICMPv6-ND:   MTU = 1492
ICMPv6-ND:   DNS lifetime 400
ICMPv6-ND:     server 2001:4860:4860::4444
ICMPv6-ND:   prefix 2A02:FF0:F0:3::/64 [LA] 2592000/604800
IPV6: source FE80::207:7DFF:FE6A:9E00 (local)
      dest FE80::4445:4445:3A44:4544 (Virtual-Access2.1)
      traffic class 224, flow 0x0, len 120+0, prot 58, hops 255, originating
IPv6-Fwd: L3 injection feature enabled: skipping output feature ‘iEdge IPv6 Features Output Path’
IPv6-Fwd: L3 injection feature enabled: skipping pak_encap
 

TEST-3

This time we will use both of Framed-Ipv6-Prefix and Delegated-Ipv6-Prefix attributes for  the subscriber. Their values might be the same but this is out of meaning to use both of them.
As we are using Delegated-Ipv6-prefix for the subscriber there is no need to use no ipv6 nd prefix framed-ipv6-prefix command
 
 
 
ppp946 PPP: Using vpn set call direction
ppp946 PPP: Treating connection as a callin
ppp946 PPP: Session handle[E60003B3] Session id[946]
ppp946 LCP: Event[OPEN] State[Initial to Starting]
ppp946 PPP LCP: Enter passive mode, state[Stopped]
ppp946 LCP: I CONFREQ [Stopped] id 1 len 14
ppp946 LCP:    MRU 1492 (0x010405D4)
ppp946 LCP:    MagicNumber 0x430ADD2F (0x0506430ADD2F)
ppp946 LCP: O CONFREQ [Stopped] id 1 len 18
ppp946 LCP:    MRU 1492 (0x010405D4)
ppp946 LCP:    AuthProto PAP (0x0304C023)
ppp946 LCP:    MagicNumber 0x0B6C1BD2 (0x05060B6C1BD2)
ppp946 LCP: O CONFACK [Stopped] id 1 len 14
ppp946 LCP:    MRU 1492 (0x010405D4)
ppp946 LCP:    MagicNumber 0x430ADD2F (0x0506430ADD2F)
ppp946 LCP: Event[Receive ConfReq+] State[Stopped to ACKsent]
ppp946 LCP: I CONFACK [ACKsent] id 1 len 18
ppp946 LCP:    MRU 1492 (0x010405D4)
ppp946 LCP:    AuthProto PAP (0x0304C023)
ppp946 LCP:    MagicNumber 0x0B6C1BD2 (0x05060B6C1BD2)
ppp946 LCP: Event[Receive ConfAck] State[ACKsent to Open]
ppp946 LCP: I ECHOREQ [Open] id 0 len 8 magic 0x430ADD2F
ppp946 LCP: O ECHOREP [Open] id 0 len 8 magic 0x0B6C1BD2
ppp946 PPP: Queue PAP code[1] id[1]
ppp946 PPP: Phase is AUTHENTICATING, by this end
ppp946 PAP: Redirect packet to ppp946
ppp946 PAP: I AUTH-REQ id 1 len 40 from “test@test.net”
ppp946 PAP: Authenticating peer test@test.net
ppp946 PPP: Phase is FORWARDING, Attempting Forward
ppp946 LCP: State is Open
ppp946 PPP: Phase is AUTHENTICATING, Unauthenticated User
ppp946 PPP: Sent PAP LOGIN Request
RADIUS/ENCODE(000006BA):Orig. component type = PPPoE
RADIUS: DSL line rate attributes successfully added
RADIUS(000006BA): Config NAS IP: X.X.X.X
RADIUS(000006BA): Config NAS IPv6: ::
RADIUS/ENCODE: No idb found! Framed IP Addr might not be included
RADIUS/ENCODE(000006BA): acct_session_id: 39759
RADIUS(000006BA): Config NAS IP: X.X.X.X
RADIUS(000006BA): sending
RADIUS(000006BA): Send Access-Request to X.X.X.X:1812 id 1645/112, len 389
RADIUS:  authenticator D4 F8 D3 A5 82 90 B5 5A – 1F 2F BA 0F 2D F0 8A A1
RADIUS:  Framed-Protocol     [7]   6   PPP                       [1]
RADIUS:  User-Name           [1]   26  “test@test.net”
RADIUS:  User-Password       [2]   18  *
RADIUS:  Vendor, Cisco       [26]  38
RADIUS:   Cisco AVpair       [1]   32  “actual-data-rate-upstream=6997”
RADIUS:  Vendor, Cisco       [26]  42
RADIUS:   Cisco AVpair       [1]   36  “actual-data-rate-downstream=128075”
RADIUS:  NAS-Port-Type       [61]  6   Virtual                   [5]
RADIUS:  NAS-Port            [5]   6   0
xxxxx
RADIUS:  Vendor, Cisco       [26]  41
RADIUS:   Cisco AVpair       [1]   35  “client-mac-address=74b5.7e25.5078”
RADIUS:  Vendor, Cisco       [26]  51
RADIUS:   Cisco AVpair       [1]   45  “xxxxx”
RADIUS:  Vendor, Cisco       [26]  25
RADIUS:   Cisco AVpair       [1]   19  “remote-id-tag=ptm”
RADIUS:  Service-Type        [6]   6   Framed                    [2]
RADIUS:  NAS-IP-Address      [4]   6   X.X.X.X
RADIUS:  Acct-Session-Id     [44]  26  “00000000EC00000000009B4F”
RADIUS:  Nas-Identifier      [32]  42  “xxxxx”
RADIUS(000006BA): Sending a IPv4 Radius Packet
RADIUS(000006BA): Started 3 sec timeout
RADIUS: Received from id 1645/112 X.X.X.X:1812, Access-Accept, len 493
RADIUS:  authenticator 2E 74 99 24 D7 2D 02 5C – D0 6E 3F 87 9D A7 35 97
RADIUS:  Framed-IP-Address   [8]   6   95.70.188.244
RADIUS:  Service-Type        [6]   6   Framed                    [2]
RADIUS:  Framed-Protocol     [7]   6   PPP                       [1]
RADIUS:  Delegated-IPv6-Prefi[123] 20
RADIUS:   00 40 2A 02 0F F0 00 F0 00 02 00 00 00 00 00 00 00 00                [ @*]
RADIUS:  Framed-IPv6-Prefix  [97]  20
RADIUS:   00 40 2A 02 0F F0 00 F0 00 03 00 00 00 00 00 00 00 00                [ @*]
RADIUS:  Framed-Interface-Id [96]  21
RADIUS:   44 45 44 45 3A 44 45 44 45 3A 44 45 44 45 3A 44  [DEDE:DEDE:DEDE:D]
RADIUS:   45 44 45               [ EDE]
RADIUS:  Session-Timeout     [27]  6   1416903
RADIUS:  Vendor, Cisco       [26]  17
RADIUS:   ssg-account-info   [250] 11  “AINTERNET”
RADIUS:  Vendor, Cisco       [26]  50
RADIUS:   Cisco AVpair       [1]   44  “ip:dns-servers=193.192.98.8 212.154.100.18”
RADIUS:  Idle-Timeout        [28]  6   5000
RADIUS:  Vendor, Cisco       [26]  70
RADIUS:   Cisco AVpair       [1]   64  “lcp:interface-config#1=ipv6 enable\nipv6 unnumbered loopbackX”
RADIUS:  Vendor, Cisco       [26]  73
RADIUS:   Cisco AVpair       [1]   67  “ip:qos-policy-out=add-class(sub,(class-default),shape(121671250))”
RADIUS:  Vendor, Cisco       [26]  52
RADIUS:   Cisco AVpair       [1]   46  “ip:sub-qos-policy-out=BB_GENERIC_PARENT_DOWN”
RADIUS:  Vendor, Cisco       [26]  71
RADIUS:   Cisco AVpair       [1]   65  “ip:qos-policy-in=add-class(sub,(class-default),police(6647150))”
RADIUS:  Vendor, Cisco       [26]  49
RADIUS:   Cisco AVpair       [1]   43  “ip:sub-qos-policy-in=BB_GENERIC_PARENT_UP”
RADIUS(000006BA): Received from id 1645/112
ppp946 PPP: Received LOGIN Response PASS
ppp946 PPP: Phase is FORWARDING, Attempting Forward
IPv6 DHCP_AAA: Parse SSS author data: 2A02:FF0:F0:2::/64
IPv6 DHCP_AAA: Parse SSS author data: 2A02:FF0:F0:3::/64
ICMPv6-ND: (Virtual-Access2.1) IPv6 Opr Enabled
ICMPv6-ND: Allocate ND context on Virtual-Access2.1 [35]
ICMPv6-ND: Allocate ND config on 35
ICMPv6-ND: (Virtual-Access2.1) IPv6 Opr Disabled
IPv6 DHCP: Delete IAPD routes, pool AAA, idb Virtual-Access2.1
IPv6 DHCP: Delete IANA routes, pool AAA, idb Virtual-Access2.1
IPv6 DHCP_AAA: Saving author data from SSS Virtual-Access2.1
ICMPv6-ND: (Virtual-Access2.1) IPv6 Opr Enabled
[946]PPPoE 904: State LCP_NEGOTIATION    Event SSS CONNECT LOCAL
[946]PPPoE 904: Segment (SSS class): UPDATED
[946]PPPoE 904: Segment (SSS class): BOUND
[946]PPPoE 904: data path set to Virtual Acess
[946]PPPoE 904: State LCP_NEGOTIATION    Event SSM UPDATED
Vi2.1 PPP: Phase is AUTHENTICATING, Authenticated User
Vi2.1 PAP: O AUTH-ACK id 1 len 5
[946]PPPoE 904: AAA get dynamic attrs
Vi2.1 PPP: Phase is UP
Vi2.1 IPCP: Protocol configured, start CP. state[Initial]
Vi2.1 IPCP: Event[OPEN] State[Initial to Starting]
Vi2.1 IPCP: O CONFREQ [Starting] id 1 len 10
Vi2.1 IPCP:    Address 172.17.1.251 (0x0306AC1101FB)
Vi2.1 IPCP: Event[UP] State[Starting to REQsent]
Vi2.1 IPV6CP: Protocol configured, start CP. state[Initial]
Vi2.1 IPV6CP: Event[OPEN] State[Initial to Starting]
Vi2.1 IPV6CP: O CONFREQ [Starting] id 1 len 14
Vi2.1 IPV6CP:    Interface-Id 0207:7DFF:FE6A:9E00 (0x010A02077DFFFE6A9E00)
Vi2.1 IPV6CP: Event[UP] State[Starting to REQsent]
[946]PPPoE 904: State PTA_BINDING    Event STATIC BIND RESPONSE
[946]PPPoE 904: Connected PTA
Vi2.1 IPCP: I CONFREQ [REQsent] id 1 len 22
Vi2.1 IPCP:    Address 0.0.0.0 (0x030600000000)
Vi2.1 IPCP:    PrimaryDNS 0.0.0.0 (0x810600000000)
Vi2.1 IPCP:    SecondaryDNS 0.0.0.0 (0x830600000000)
Vi2.1 IPCP AUTHOR: Start.  Her address 0.0.0.0, we want 0.0.0.0
Vi2.1 IPCP AUTHOR: Done.  Her address 0.0.0.0, we want 95.70.188.244
Vi2.1 IPCP: O CONFNAK [REQsent] id 1 len 22
Vi2.1 IPCP:    Address 95.70.188.244 (0x03065F46BCF4)
Vi2.1 IPCP:    PrimaryDNS 193.192.98.8 (0x8106C1C06208)
Vi2.1 IPCP:    SecondaryDNS 212.154.100.18 (0x8306D49A6412)
Vi2.1 IPCP: Event[Receive ConfReq-] State[REQsent to REQsent]
Vi2.1 IPV6CP: I CONFREQ [REQsent] id 1 len 14
Vi2.1 IPV6CP:    Interface-Id 76B5:7EFF:FE25:5078 (0x010A76B57EFFFE255078)
Vi2.1 IPV6CP AUTHOR: Says use id 4445:4445:3A44:4544
Vi2.1 IPV6CP: O CONFNAK [REQsent] id 1 len 14
Vi2.1 IPV6CP:    Interface-Id 4445:4445:3A44:4544 (0x010A444544453A444544)
Vi2.1 IPV6CP: Event[Receive ConfReq-] State[REQsent to REQsent]
Vi2.1 IPCP: I CONFACK [REQsent] id 1 len 10
Vi2.1 IPCP:    Address 172.17.1.251 (0x0306AC1101FB)
Vi2.1 IPCP: Event[Receive ConfAck] State[REQsent to ACKrcvd]
Vi2.1 IPV6CP: I CONFACK [REQsent] id 1 len 14
Vi2.1 IPV6CP:    Interface-Id 0207:7DFF:FE6A:9E00 (0x010A02077DFFFE6A9E00)
Vi2.1 IPV6CP: Event[Receive ConfAck] State[REQsent to ACKrcvd]
Vi2.1 IPCP: I CONFREQ [ACKrcvd] id 2 len 22
Vi2.1 IPCP:    Address 95.70.188.244 (0x03065F46BCF4)
Vi2.1 IPCP:    PrimaryDNS 193.192.98.8 (0x8106C1C06208)
Vi2.1 IPCP:    SecondaryDNS 212.154.100.18 (0x8306D49A6412)
Vi2.1 IPCP: O CONFACK [ACKrcvd] id 2 len 22
Vi2.1 IPCP:    Address 95.70.188.244 (0x03065F46BCF4)
Vi2.1 IPCP:    PrimaryDNS 193.192.98.8 (0x8106C1C06208)
Vi2.1 IPCP:    SecondaryDNS 212.154.100.18 (0x8306D49A6412)
Vi2.1 IPCP: Event[Receive ConfReq+] State[ACKrcvd to Open]
Vi2.1 IPV6CP: I CONFREQ [ACKrcvd] id 2 len 14
Vi2.1 IPV6CP:    Interface-Id 4445:4445:3A44:4544 (0x010A444544453A444544)
Vi2.1 IPV6CP AUTHOR: Says use id 4445:4445:3A44:4544
Vi2.1 IPV6CP: O CONFACK [ACKrcvd] id 2 len 14
Vi2.1 IPV6CP:    Interface-Id 4445:4445:3A44:4544 (0x010A444544453A444544)
Vi2.1 IPV6CP: Event[Receive ConfReq+] State[ACKrcvd to Open]
Vi2.1 IPCP: State is Open
Vi2.1 IPV6CP: State is Open
PPPoE : ipfib_encapstr  prepared
contiguous pak, size 26
74 B5 7E 25 50 78 00 07 7D 6A 9E 03 81 00 00 65
88 64 11 00 03 88 00 00 00 57
IPv6-Addrmgr-ND: Received prefix PI-flag change notification: prefix 2A02:FF0:F0:3::/64 (onlink,active) state is not ready
IPV6: source :: (local)
      dest FF02::16 (Virtual-Access2.1)
      traffic class 224, flow 0x0, len 76+0, prot 0, hops 1, originating
IPv6-Fwd: L3 injection feature enabled: skipping output feature ‘iEdge IPv6 Features Output Path’
IPv6-Fwd: L3 injection feature enabled: skipping pak_encap
IPV6: source :: (local)
      dest FF02::16 (Virtual-Access2.1)
      traffic class 224, flow 0x0, len 76+0, prot 0, hops 1, originating
IPv6-Fwd: L3 injection feature enabled: skipping output feature ‘iEdge IPv6 Features Output Path’
IPv6-Fwd: L3 injection feature enabled: skipping pak_encap
IPV6: source :: (local)
      dest FF02::16 (Virtual-Access2.1)
      traffic class 224, flow 0x0, len 76+0, prot 0, hops 1, originating
IPv6-Fwd: L3 injection feature enabled: skipping output feature ‘iEdge IPv6 Features Output Path’
IPv6-Fwd: L3 injection feature enabled: skipping pak_encap
ICMPv6-ND: (Virtual-Access2.1) L2 came up
IPv6-Addrmgr-ND: DAD request for FE80::207:7DFF:FE6A:9E00 on Virtual-Access2.1
IPV6: source :: (local)
      dest FF02::16 (Virtual-Access2.1)
      traffic class 224, flow 0x0, len 76+0, prot 0, hops 1, originating
IPv6-Fwd: L3 injection feature enabled: skipping output feature ‘iEdge IPv6 Features Output Path’
IPv6-Fwd: L3 injection feature enabled: skipping pak_encap
ICMPv6-ND: Delay DAD for FE80::207:7DFF:FE6A:9E00 on Virtual-Access2.1 by 200 msec
PPPoE : ipfib_encapstr  prepared
contiguous pak, size 26
74 B5 7E 25 50 78 00 07 7D 6A 9E 03 81 00 00 65
88 64 11 00 03 88 00 00 00 21
Vi2.1 Added to neighbor route AVL tree: topoid 5, address 95.70.188.244
Vi2.1 IPCP: Install route to 95.70.188.244
RADIUS/ENCODE(000006BA):Orig. component type = PPPoE
RADIUS(000006BA): Config NAS IP: X.X.X.X
RADIUS(000006BA): Config NAS IPv6: ::
RADIUS(000006BA): Config NAS IP: X.X.X.X
RADIUS(000006BA): sending
RADIUS(000006BA): Send Accounting-Request to X.X.X.X:1813 id 1646/229, len 1095
RADIUS:  authenticator 7C 73 E1 2A 2C 8C FD 6C – 37 D0 34 EE 6C A4 83 DC
RADIUS:  Acct-Session-Id     [44]  26  “00000000EC00000000009B4F”
RADIUS:  Vendor, Cisco       [26]  38
RADIUS:   Cisco AVpair       [1]   32  “actual-data-rate-upstream=6997”
RADIUS:  Vendor, Cisco       [26]  42
RADIUS:   Cisco AVpair       [1]   36  “actual-data-rate-downstream=128075”
RADIUS:  Vendor, Cisco       [26]  38
RADIUS:   Cisco AVpair       [1]   32  “minimum-data-rate-upstream=256”
RADIUS:  Vendor, Cisco       [26]  39
RADIUS:   Cisco AVpair       [1]   33  “minimum-data-rate-downstream=32”
RADIUS:  Vendor, Cisco       [26]  39
RADIUS:   Cisco AVpair       [1]   33  “maximum-data-rate-upstream=7000”
RADIUS:  Vendor, Cisco       [26]  43
RADIUS:   Cisco AVpair       [1]   37  “maximum-data-rate-downstream=200000”
RADIUS:  Vendor, Cisco       [26]  43
RADIUS:   Cisco AVpair       [1]   37  “attainable-data-rate-upstream=68905”
RADIUS:  Vendor, Cisco       [26]  46
RADIUS:   Cisco AVpair       [1]   40  “attainable-data-rate-downstream=149020”
RADIUS:  Vendor, Cisco       [26]  45
RADIUS:   Cisco AVpair       [1]   39  “maximum-interleaving-delay-upstream=8”
RADIUS:  Vendor, Cisco       [26]  47
RADIUS:   Cisco AVpair       [1]   41  “maximum-interleaving-delay-downstream=8”
RADIUS:  Vendor, Cisco       [26]  44
RADIUS:   Cisco AVpair       [1]   38  “actual-interleaving-delay-upstream=1”
RADIUS:  Vendor, Cisco       [26]  46
RADIUS:   Cisco AVpair       [1]   40  “actual-interleaving-delay-downstream=6”
RADIUS:  Vendor, Cisco       [26]  75
RADIUS:   Sub_Policy_In      [37]  69  “BB_GENERIC_PARENT_UP$class-default;police=6647150,0,0$class-default”
RADIUS:  Vendor, Cisco       [26]  74
RADIUS:   Sub_Policy_Out     [38]  68  “BB_GENERIC_PARENT_DOWN$class-default;shape=121671250$class-default”
RADIUS:  Framed-Protocol     [7]   6   PPP                       [1]
RADIUS:  Framed-Interface-Id [96]  10
RADIUS:   44 45 44 45 3A 44 45 44          [ DEDE:DED]
RADIUS:  Framed-IPv6-Prefix  [97]  20
RADIUS:   00 40 2A 02 0F F0 00 F0 00 03 00 00 00 00 00 00 00 00                [ @*]
RADIUS:  User-Name           [1]   26  “test@test.net”
RADIUS:  Vendor, Cisco       [26]  32
RADIUS:   Cisco AVpair       [1]   26  “connect-progress=Call Up”
RADIUS:  Acct-Authentic      [45]  6   RADIUS                    [1]
RADIUS:  Acct-Status-Type    [40]  6   Start                     [1]
RADIUS:  Vendor, Cisco       [26]  25
RADIUS:   Cisco AVpair       [1]   19  “portbundle=enable”
RADIUS:  Vendor, Cisco       [26]  24
RADIUS:   ssg-account-info   [250] 18  “S172.17.251.1:19”
RADIUS:  NAS-Port-Type       [61]  6   Virtual                   [5]
RADIUS:  NAS-Port            [5]   6   0
xxxxx
RADIUS:  Vendor, Cisco       [26]  41
RADIUS:   Cisco AVpair       [1]   35  “client-mac-address=74b5.7e25.5078”
RADIUS:  Vendor, Cisco       [26]  51
RADIUS:   Cisco AVpair       [1]   45  “xxxxx”
RADIUS:  Vendor, Cisco       [26]  25
RADIUS:   Cisco AVpair       [1]   19  “remote-id-tag=ptm”
RADIUS:  Connect-Info        [77]  10  “INTERNET”
RADIUS:  Service-Type        [6]   6   Framed                    [2]
RADIUS:  NAS-IP-Address      [4]   6   X.X.X.X
RADIUS:  Event-Timestamp     [55]  6   1536923380
RADIUS:  Nas-Identifier      [32]  42  “xxxxx”
RADIUS:  Acct-Delay-Time     [41]  6   0
RADIUS(000006BA): Sending a IPv4 Radius Packet
RADIUS(000006BA): Started 3 sec timeout
RADIUS: Received from id 1646/229 X.X.X.X:1813, Accounting-response, len 20
RADIUS:  authenticator D5 D3 ED 67 85 98 00 C9 – 4E AE 1D 22 84 A7 C1 1D
IPv6-Addrmgr-ND: DAD: FE80::207:7DFF:FE6A:9E00 is unique.
ICMPv6-ND: (Virtual-Access2.1,FE80::207:7DFF:FE6A:9E00) Sending NA to FF02::1
ICMPv6-ND: (Virtual-Access2.1) L3 came up
IPV6: source FE80::207:7DFF:FE6A:9E00 (local)
      dest FF02::16 (Virtual-Access2.1)
      traffic class 224, flow 0x0, len 76+0, prot 0, hops 1, originating
IPv6-Fwd: L3 injection feature enabled: skipping output feature ‘iEdge IPv6 Features Output Path’
IPv6-Fwd: L3 injection feature enabled: skipping pak_encap
IPV6: source FE80::207:7DFF:FE6A:9E00 (local)
      dest FF02::16 (Virtual-Access2.1)
      traffic class 224, flow 0x0, len 76+0, prot 0, hops 1, originating
IPv6-Fwd: L3 injection feature enabled: skipping output feature ‘iEdge IPv6 Features Output Path’
IPv6-Fwd: L3 injection feature enabled: skipping pak_encap
IPV6: source FE80::207:7DFF:FE6A:9E00 (local)
      dest FF02::16 (Virtual-Access2.1)
      traffic class 224, flow 0x0, len 76+0, prot 0, hops 1, originating
IPv6-Fwd: L3 injection feature enabled: skipping output feature ‘iEdge IPv6 Features Output Path’
IPv6-Fwd: L3 injection feature enabled: skipping pak_encap
IPV6: source FE80::207:7DFF:FE6A:9E00 (local)
      dest FF02::16 (Virtual-Access2.1)
      traffic class 224, flow 0x0, len 76+0, prot 0, hops 1, originating
IPv6-Fwd: L3 injection feature enabled: skipping output feature ‘iEdge IPv6 Features Output Path’
IPv6-Fwd: L3 injection feature enabled: skipping pak_encap
IPv6-Fwd: SAS on intf Virtual-Access2.1 didn’t find any address
ICMPv6-ND: (Virtual-Access2.1,FE80::207:7DFF:FE6A:9E00) Linklocal Up
IPV6: source FE80::207:7DFF:FE6A:9E00 (local)
      dest FF02::1 (Virtual-Access2.1)
      traffic class 224, flow 0x0, len 64+0, prot 58, hops 255, originating
IPv6-Fwd: L3 injection feature enabled: skipping output feature ‘iEdge IPv6 Features Output Path’
IPv6-Fwd: L3 injection feature enabled: skipping pak_encap
IPV6: source FE80::207:7DFF:FE6A:9E00 (local)
      dest FF02::16 (Virtual-Access2.1)
      traffic class 224, flow 0x0, len 76+0, prot 0, hops 1, originating
IPv6-Fwd: L3 injection feature enabled: skipping output feature ‘iEdge IPv6 Features Output Path’
IPv6-Fwd: L3 injection feature enabled: skipping pak_encap
IPV6: source FE80::207:7DFF:FE6A:9E00 (local)
      dest FF02::16 (Virtual-Access2.1)
      traffic class 224, flow 0x0, len 76+0, prot 0, hops 1, originating
IPv6-Fwd: L3 injection feature enabled: skipping output feature ‘iEdge IPv6 Features Output Path’
IPv6-Fwd: L3 injection feature enabled: skipping pak_encap
IPV6: source FE80::207:7DFF:FE6A:9E00 (local)
      dest FF02::16 (Virtual-Access2.1)
      traffic class 224, flow 0x0, len 76+0, prot 0, hops 1, originating
IPv6-Fwd: L3 injection feature enabled: skipping output feature ‘iEdge IPv6 Features Output Path’
IPv6-Fwd: L3 injection feature enabled: skipping pak_encap
IPV6: source FE80::207:7DFF:FE6A:9E00 (local)
      dest FF02::16 (Virtual-Access2.1)
      traffic class 224, flow 0x0, len 76+0, prot 0, hops 1, originating
IPv6-Fwd: L3 injection feature enabled: skipping output feature ‘iEdge IPv6 Features Output Path’
IPv6-Fwd: L3 injection feature enabled: skipping pak_encap
IPv6-Fwd: L3 injection feature enabled: skipping input feature ‘Verify Unicast Reverse-Path’
IPv6-Fwd: L3 injection feature enabled: skipping input feature ‘iEdge IPv6 Features Input Path’
IPv6-Fwd: L3 injection feature enabled: skipping input feature ‘Verify Unicast Reverse-Path’
IPv6-Fwd: L3 injection feature enabled: skipping input feature ‘iEdge IPv6 Features Input Path’
IPv6-Fwd: L3 injection feature enabled: skipping input feature ‘Verify Unicast Reverse-Path’
IPv6-Fwd: L3 injection feature enabled: skipping input feature ‘iEdge IPv6 Features Input Path’
IPV6: source FE80::4445:4445:3A44:4544 (Virtual-Access2.1)
      dest FF02::1:2
      traffic class 0, flow 0x0, len 92+26, prot 17, hops 1, forward to ulp
IPv6 DHCP: Received SOLICIT from FE80::4445:4445:3A44:4544 on Virtual-Access2.1
IPv6 DHCP: detailed packet contents
  src FE80::4445:4445:3A44:4544 (Virtual-Access2.1)
  dst FF02::1:2
  type SOLICIT(1), xid 4972162
  option CLIENTID(1), len 14
    000100011579A1FA74B57E255078
  option IA-PD(25), len 12
    IAID 0x000003E8, T1 0, T2 0
  option ELAPSED-TIME(8), len 2
    elapsed-time 0
IPv6 DHCP: Using interface pool AAA
IPv6 DHCP_AAA: Got prefix 2A02:FF0:F0:2::/64
IPv6 DHCP_AAA: Retrieved subblock; It has AAA DNS_SERVERS=0
IPv6 DHCP: SAS retured Null falling to link local
IPv6 DHCP: Returning Link local address FE80::207:7DFF:FE6A:9E00
IPv6 DHCP: detailed packet contents
  src FE80::207:7DFF:FE6A:9E00
  dst FE80::4445:4445:3A44:4544 (Virtual-Access2.1)
  type ADVERTISE(2), xid 4972162
  option SERVERID(2), len 10
    0003000100077D6A9E00
  option CLIENTID(1), len 14
    000100011579A1FA74B57E255078
  option IA-PD(25), len 41
    IAID 0x000003E8, T1 302400, T2 483840
    option IAPREFIX(26), len 25
      preferred 604800, valid 2592000, prefix 2A02:FF0:F0:2::/64
  option DNS-SERVERS(23), len 32
    2001:4860:4860::8888
    2001:4860:4860::4444
IPv6 DHCP: Sending ADVERTISE to FE80::4445:4445:3A44:4544 on Virtual-Access2.1
IPV6: source FE80::207:7DFF:FE6A:9E00 (local)
      dest FE80::4445:4445:3A44:4544 (Virtual-Access2.1)
      traffic class 224, flow 0x0, len 165+0, prot 17, hops 255, originating
IPv6-Fwd: Created tmp mtu cache entry for FE80::207:7DFF:FE6A:9E00 FE80::4445:4445:3A44:4544 12000035
IPv6-Fwd: L3 injection feature enabled: skipping output feature ‘iEdge IPv6 Features Output Path’
IPv6-Fwd: L3 injection feature enabled: skipping pak_encap
IPv6-Fwd: L3 injection feature enabled: skipping input feature ‘Verify Unicast Reverse-Path’
IPv6-Fwd: L3 injection feature enabled: skipping input feature ‘iEdge IPv6 Features Input Path’
IPV6: source FE80::4445:4445:3A44:4544 (Virtual-Access2.1)
      dest FF02::2
      traffic class 0, flow 0x0, len 48+26, prot 58, hops 255, forward to ulp
ICMPv6-ND: (Virtual-Access2.1,FE80::4445:4445:3A44:4544) Received RS
ICMPv6-ND: Packet contains no options
ICMPv6-ND: Validating ND packet options: valid
ICMPv6-ND: Packet contains no options
ICMPv6-ND: (Virtual-Access2.1) Sending solicited RA
ICMPv6-ND: (Virtual-Access2.1) The interface media type does not support ND resolution.
ICMPv6-ND: (Virtual-Access2.1,FE80::207:7DFF:FE6A:9E00) send RA to FE80::4445:4445:3A44:4544
ICMPv6-ND: (Virtual-Access2.1,FE80::207:7DFF:FE6A:9E00) Sending RA (1800) to FE80::4445:4445:3A44:4544
ICMPv6-ND:   MTU = 1492
ICMPv6-ND:   DNS lifetime 400
ICMPv6-ND:     server 2001:4860:4860::4444
ICMPv6-ND:   prefix 2A02:FF0:F0:3::/64 [LA] 2592000/604800
IPV6: source FE80::207:7DFF:FE6A:9E00 (local)
      dest FE80::4445:4445:3A44:4544 (Virtual-Access2.1)
      traffic class 224, flow 0x0, len 120+0, prot 58, hops 255, originating
IPv6-Fwd: Created tmp mtu cache entry for FE80::207:7DFF:FE6A:9E00 FE80::4445:4445:3A44:4544 00000000
IPv6-Fwd: L3 injection feature enabled: skipping output feature ‘iEdge IPv6 Features Output Path’
IPv6-Fwd: L3 injection feature enabled: skipping pak_encap
IPv6-Fwd: L3 injection feature enabled: skipping input feature ‘Verify Unicast Reverse-Path’
IPv6-Fwd: L3 injection feature enabled: skipping input feature ‘iEdge IPv6 Features Input Path’
IPV6: source FE80::4445:4445:3A44:4544 (Virtual-Access2.1)
      dest FF02::1:2
      traffic class 0, flow 0x0, len 135+26, prot 17, hops 1, forward to ulp
IPv6 DHCP: Received REQUEST from FE80::4445:4445:3A44:4544 on Virtual-Access2.1
IPv6 DHCP: detailed packet contents
  src FE80::4445:4445:3A44:4544 (Virtual-Access2.1)
  dst FF02::1:2
  type REQUEST(3), xid 15836525
  option CLIENTID(1), len 14
    000100011579A1FA74B57E255078
  option IA-PD(25), len 41
    IAID 0x000003E8, T1 302400, T2 483840
    option IAPREFIX(26), len 25
      preferred 604800, valid 2592000, prefix 2A02:FF0:F0:2::/64
  option SERVERID(2), len 10
    0003000100077D6A9E00
  option ELAPSED-TIME(8), len 2
    elapsed-time 0
IPv6 DHCP: Using interface pool AAA
IPv6 DHCP: Creating binding for FE80::4445:4445:3A44:4544 in pool AAA
IPv6 DHCP: Allocating IA_PD 000003E8 in binding for FE80::4445:4445:3A44:4544
IPv6 DHCP_AAA: Got prefix 2A02:FF0:F0:2::/64
IPv6 DHCP: Allocating prefix 2A02:FF0:F0:2::/64 in binding for FE80::4445:4445:3A44:4544, IAID 000003E8
IPv6 DHCP: Added Prefix 2A02:FF0:F0:2::/64 to Radix tree
IPv6 DHCP: Route added: 2A02:FF0:F0:2::/64 via FE80::4445:4445:3A44:4544 dist 1 iaid 000003E8 vrf INTERNET
IPv6 DHCP_AAA:  AAA id got from PPP = 1722
IPv6 DHCP_AAA: Retrieved subblock; It has AAA DNS_SERVERS=0
IPv6 DHCP: SAS retured Null falling to link local
IPv6 DHCP: Returning Link local address FE80::207:7DFF:FE6A:9E00
IPv6 DHCP: detailed packet contents
  src FE80::207:7DFF:FE6A:9E00
  dst FE80::4445:4445:3A44:4544 (Virtual-Access2.1)
  type REPLY(7), xid 15836525
  option SERVERID(2), len 10
    0003000100077D6A9E00
  option CLIENTID(1), len 14
    000100011579A1FA74B57E255078
  option IA-PD(25), len 41
    IAID 0x000003E8, T1 302400, T2 483840
    option IAPREFIX(26), len 25
      preferred 604800, valid 2592000, prefix 2A02:FF0:F0:2::/64
  option DNS-SERVERS(23), len 32
    2001:4860:4860::8888
    2001:4860:4860::4444
IPv6 DHCP: Sending REPLY to FE80::4445:4445:3A44:4544 on Virtual-Access2.1
IPV6: source FE80::207:7DFF:FE6A:9E00 (local)
      dest FE80::4445:4445:3A44:4544 (Virtual-Access2.1)
      traffic class 224, flow 0x0, len 165+0, prot 17, hops 255, originating
IPv6-Fwd: L3 injection feature enabled: skipping output feature ‘iEdge IPv6 Features Output Path’
IPv6-Fwd: L3 injection feature enabled: skipping pak_encap
IPv6-Fwd: L3 injection feature enabled: skipping input feature ‘Verify Unicast Reverse-Path’
IPv6-Fwd: L3 injection feature enabled: skipping input feature ‘iEdge IPv6 Features Input Path’
IPV6: source FE80::4445:4445:3A44:4544 (Virtual-Access2.1)
      dest FF02::2
      traffic class 0, flow 0x0, len 48+26, prot 58, hops 255, forward to ulp
ICMPv6-ND: (Virtual-Access2.1,FE80::4445:4445:3A44:4544) Received RS
ICMPv6-ND: Packet contains no options
ICMPv6-ND: Validating ND packet options: valid
ICMPv6-ND: Packet contains no options
ICMPv6-ND: (Virtual-Access2.1) Sending solicited RA
ICMPv6-ND: (Virtual-Access2.1) The interface media type does not support ND resolution.
ICMPv6-ND: (Virtual-Access2.1,FE80::207:7DFF:FE6A:9E00) send RA to FE80::4445:4445:3A44:4544
ICMPv6-ND: (Virtual-Access2.1,FE80::207:7DFF:FE6A:9E00) Sending RA (1800) to FE80::4445:4445:3A44:4544
ICMPv6-ND:   MTU = 1492
ICMPv6-ND:   DNS lifetime 400
ICMPv6-ND:     server 2001:4860:4860::4444
ICMPv6-ND:   prefix 2A02:FF0:F0:3::/64 [LA] 2592000/604800
IPV6: source FE80::207:7DFF:FE6A:9E00 (local)
      dest FE80::4445:4445:3A44:4544 (Virtual-Access2.1)
      traffic class 224, flow 0x0, len 120+0, prot 58, hops 255, originating
IPv6-Fwd: L3 injection feature enabled: skipping output feature ‘iEdge IPv6 Features Output Path’
IPv6-Fwd: L3 injection feature enabled: skipping pak_encap
NWPLANLAMA_DCTESTLNS01#
IPv6-Fwd: L3 injection feature enabled: skipping input feature ‘Verify Unicast Reverse-Path’
IPv6-Fwd: L3 injection feature enabled: skipping input feature ‘iEdge IPv6 Features Input Path’
 

References

  • IPv6 address assignment methods

    • Static
    • Stateless Address Auto-configuration SLAAC : Based on router advertisement nearly required for every local network for proper IPv6 communication. RA message includes IPv6 prefixes and lifetimes, some flags, and default router and lifetime. What about DNS? RFC 6106 DNS option is added to the RA messages. Check for the CPE and host features.
    • DHCPv6
      • Stateless : Still use SLAAC to get prefix and router information. Use DHCPv6 for DNS. Host starts with RS messages and the router response with RA message with other-config flag which tells host to config DNS with DHCPv6. Than host starts and crawls DHCPv6 server to get DNS.
        • Statefull : Still use SLAAC just for starting the process. Host starts with RS but this time router responds with RA with managed-config flag which tells host to configure prefix and DNS with DHCPv6. Also If no router is found on the link host may start DHCPv6 statefull process. Uses its link-local address.
      • DHCPv6-Prefix Delegation : Often used for between service provider and CPE. Its an extension to he DHCPv6. Instead of a single address assignment, DHCPv6-PD will assign a set of IPv6 “subnets” to the client.

Additionally the OS behaviour changes according to the combination of A bit and M,O flag. The ietf document DHCPv6/SLAAC Interaction Problems on Address and DNS Configuration explains these problems.

IPv6 M-, O-, A- flags and OS behaviours
  • logging :  ISP logs the assigned prefix of the customer which is /64 or lower.  It can be logged via radius avp or with static assignment to the customer.  For the end user, enterprise customers, logging can be much more difficult.  IPv6 Privacy Extensions makes this much more complicated which is enabled by the default in most of the operating systems. Basically operating system generates temporary address from the given IPv6 Prefix for every service that requested. These temporary IPv6 addresses means a lots of IPv6 addresses to be logged per user. Also the dynamic/hashed IPv6 address generation mechanism causes difficulties for troubleshooting. However it can be turned off in OS level. Search for newest information for your OS.
  • address assignment : According to the Broadband forum /60 prefix assignment is suggested. You can assign up to /64 length prefix to the customers. Basically ipv6 address assignment can be done via SLAAC , DHCP or using both of them. SLAAC is based on RA messages that includes IPv6 prefixes and lifetimes, some flags, and default router and lifetime. However with RFC 6106 DNS option is added to the RA messages.

Links to knowledge

IPv6 EBGP Temel Filtreleme

IPv6 EBGP Temel Filtreleme

  • Bogon Prefixes

Burada iki tip filtreleme yapılabilir. Gevşek veya sıkı. Sıkı yöntemde zararlı IPv6 prefixlerin surekli takip edilip guncellenmesi gerekmektedir. Aşağıda bir örnek gevşek liste verilmiştir.

Prefix that contains Loop back Address ::1/128 le 128
Unspecified Address : ::/128, IETF reserved Address
Formerly IPv4-compatible IPv6 Address: ::/96 le 128,
IPv4-mapped IPv6 Address : ::ffff:0000:0000/96 le 96
Unspecified, loopback and embedded IPv4 addresses : ::/8 le 128
Link-local Address : fe80::/10 le 128
IETF reserved Address(formerly Site-local Address) : fec0::/10 le 128
Unique-local Address : fc00::/7 le 128
Multicast Address : ff00::/8 le 128
Documentation Address : 2001:db8::/32 le 128
6to4 addressing : 2002::/16 le 128

ipv6 prefix-list P_BOGON_FILTER seq 5 permit ::1/128 le 128
ipv6 prefix-list P_BOGON_FILTER seq 10 permit ::/128
ipv6 prefix-list P_BOGON_FILTER seq 15 permit ::ffff:0000:0000/96 le 96
ipv6 prefix-list P_BOGON_FILTER seq 20 permit ::/96 le 128
ipv6 prefix-list P_BOGON_FILTER seq 25 permit fe80::/10 le 128
ipv6 prefix-list P_BOGON_FILTER seq 30 permit fec0::/10 le 128
ipv6 prefix-list P_BOGON_FILTER seq 35 permit fc00::/7 le 128
ipv6 prefix-list P_BOGON_FILTER seq 40 permit ff00::/8 le 128
ipv6 prefix-list P_BOGON_FILTER seq 45 permit 2001:db8::/32 le 128
ipv6 prefix-list P_BOGON_FILTER seq 50 permit 2002::/16 le 128

  • Ayrıca ::/48 uzun prefixleri kabul etmeyin. Genel olarak internette izin verilmemektedir.

ipv6 prefix-list P_SMALL_PREFIXES seq 5 permit ::/0 ge 49

  • Transit olmamak için sadece karşı tarafın AS-PATH kabul edilmeli ve diğer peeringler anons edilmemelidir. Ayrıca diğer peeringlerin as-pathleride kabul edilmemlidir.

Yararlı Linkler :

  1. http://www.space.net/~gert/RIPE/ipv6-filters.html
  2. http://6session.wordpress.com/2009/04/08/ipv6-martian-and-bogon-filters/
  3. RFC 4890