In preparation for some IPv6 testing of our hotspot systems, I’ve come up with the following temporary authentication method for dual-stacked users.
Seeing as the login redirect goes via an IPv4 webserver, if enabled IPv6 traffic passes by the hotspot unhindered. This is my work on enabling the IPv6 side of things when a user logs in or out of the hotspot with a dual stacked client.
This has been implemented on my demo v4.10 router and tested with both Mac OS X 10.6 and Windows 7 Ultimate x64
!!Please note this is an Alpha release an as such is not recommended to be used on any production routers!!
1. An IPv6 (public) address must be assigned to the hotspot interface
2. IPv6 transit must be working (can you reach ipv6 sites on the internet? try pinging 2404:6800:8004::68 aka ipv6.google.com … from Australia anyway)
3. ND (neighbour discovery) helps to be setup on the specific interface with the following options enabled:
Admin note: as I’m not familiar with the reachable-time and retrans-time values I’ve copied default Cisco values, if anyone wants to correct me on this go ahead ^_^