HP VPN Firewall Appliances VPN Configuration Guide
393
{ Configure a static route to network 2000::/32 (the DNS64 prefix) and the next hop address
6:0:ff06:606:100::.
3. Configure Host B:
Perform the following configurations on Host B. (Details not shown.)
{ Configure IPv4 address 4.4.4.2/24.
{ Configure a static route to the IPv4 network (6.6.6.0/24) embedded in the IVI address and the
next hop address 4.4.4.1.
Verifying the configuration
# Host B's IPv4 address 4.4.4.2 is translated to 2000:0:404:402:: by using the DNS64 prefix. Execute
the ping ipv6 2000:0:404:402:: command on Host A. The ping operation succeeds.
# Use the display session table verbose command on Firewall to display the established sessions.
[Firewall] display session table verbose
Initiator:
Source IP/Port : 0006:0:ff06:0606:0200::/32768
Dest IP/Port : 2000:0:0404:0402::/43982
VPN-Instance/VLAN ID/VLL ID:
Responder:
Source IP/Port : 4.4.4.2/0
Dest IP/Port : 6.6.6.2/43982
VPN-Instance/VLAN ID/VLL ID:
Pro: ICMPv6(58) App: unknown State: ICMP-CLOSED
Start time: 2010-12-21 16:06:44 TTL: 14s
Root Zone(in):
Zone(out): Management
Received packet(s)(Init): 5 packet(s) 520 byte(s)
Received packet(s)(Reply): 5 packet(s) 420 byte(s)
Total find: 1
An IPv4 host initiates communication with an IPv6 host
Network requirements
As shown in Figure 305, Host A is in an IPv6 network and has an address of 6:0:ff06:606:200::, and
Host B is in an IPv4 network and has an address of 4.4.4.2. Host B wishes to communicate with Host A.
Figure 305 Network diagram
Configuration consideration
For Host B to communicate with Host A, enable AFT and configure DNS64 and IVI prefixes and 4to6 AFT
policies on Firewall.