Age | Commit message (Collapse) | Author |
|
(cherry picked from commit 572c2eba2e7019cc3ff26e45cc0a46f81424e852)
|
|
RFC-4862 requires that IPv6 operation on an interface be disabled when
DAD fails on a link-local address. The kernel IPv6 code supports this
feature, but doesn't enable it by default. This change provides a
configurable parameter to control this behavior, but, like the
kenrnel, disables it by default.
(cherry picked from commit 2e9a80aacef26fc72a2c0a6c1736c44355d77e87)
|
|
Bug 5285
|
|
First, we need to set the global IPv6 parameter under "all" when
"disable-forwarding" is deleted because this is the parameter that
actually controls whether the stack will forward IPv6 packets.
Second, if router advertisements were configured while global IPv6
forwarding was disabled, we need to re-start the daemon when global
IPv6 forwarding is re-enabled.
|
|
Now a flag file indicates that IPv6 forwarding is disabled on a specific
interface.
|
|
|
|
|
|
Added the parameter "system ipv6 disable". If set, the module
parameter "disable_ipv6=1" will be passed to the IPv6 module. This
inhibits assignment of IPv6 addresses on any interfaces, effectively
preventing any IPv6 communication. But it leaves the IPv6 module
loaded so that applications that depend upon its existence will not
fail.
|
|
modified via the CLI - (modify ARP table size)
* added cli to configure [arp (ipv4)] and [neighbor (ipv6)] table-size
* set default value for arp_announce so as to avoid local addresses that are
not in the target's subnet for the interface
|
|
|