...
While Windows Server 2012 has been released recently, we can not use it (yet), because the latest version of Windows that our current VMware setup (ESXi 4.1) supports as guest OS is Server 2008 R2.
So weI'll go llgo for 2008 R2 and give it a shot.
Basic functions
IPv6-only VLAN
A dedicated VLAN was created for IPv6-only systems, so that building, testing and configuring would not interfere with any production networks. Configuring this VLAN with only IPv6 allows to use simpler IP Access Control Lists (ACLs), and start from scratch:
Code Block | ||||
---|---|---|---|---|
| ||||
interface Vlan9 description IPv6_only_Servers no ip address no ip proxy-arp ipv6 address 2001:610:148:BAD::1/64 ipv6 nd prefix 2001:610:148:BAD::/64 ipv6 traffic-filter ipv6_servers2_out in ipv6 traffic-filter ipv6_servers2_in out end |
I started out with IPv6 ACLs that disallow everything by default, and then open up specific things.
Addressing
Obviously, the first thing to do is to uncheck IPv4 in the interface configuration . For IPv6 addressing I choose autoconfigured EUI64, no privacy extensions. The reason is that this is a server, and it will not be used for any web browsing activities. Static addresses also help configuring the (empty) IP ACLs. The idea is that during configuration and testing the IPv6 ACLs will be constructed, based on stuff that does not work. Eventually, when everything works, it might be an option to use privacy extensions.
Also, I disabled all tunnelling stuff (ISATAP, Teredo, etc). Combined script:
Code Block | ||||
---|---|---|---|---|
| ||||
REM RFC 4941 privacy extensions (i.e. temporary address for outgoing connections)
netsh interface ipv6 set privacy state=disabled store=active
netsh interface ipv6 set privacy state=disabled store=persistent
REM Don't use random identifiers. This will result in EUI64 based adddresses
netsh interface ipv6 set global randomizeidentifiers=disabled store=active
netsh interface ipv6 set global randomizeidentifiers=disabled store=persistent
REM disable unused tunneling protocols
netsh interface ipv6 6to4 set state disabled
netsh interface ipv6 isatap set state disabled
netsh interface ipv6 set teredo disabled |
DNS
The DNS server addresses are statically assigned, and are picked from the SURFnet DNSSEC-validating resolvers.
The "Register this connection's addresses in DNS" option has been deselected, because this causes DNS registration requests to go out, which we do not want. Eventually things look like this: