Thanks to a nudge from my friend Dave Cairns, I’ve dipped my toe into the waters of IPv6, and I’m noting what I did here for future reference.
Enabled ICMP on my Bell Aliant-provided Actiontec R1000H router; this is done from the Firewall tab by enabling WAN PING mode.
Visited to https://www.tunnelbroker.net/ and registered for a free Tunnelbroker account.
Clicked Create Regular Tunnel in the left sidebar.
As IPv4 Endpoint (Your side), I entered the IP address that Bell Aliant assigned to my Actiontec R1000H router (it appears as “Modem IP Address” on the main status screen).
Selected the Toronto tunnel server and clicked Create Tunnel.
From my MacBook Air’s Terminal app:
sudo ifconfig gif0 tunnel 192.168.2.12 216.66.38.58 sudo ifconfig gif0 inet6 2001:470:1c:7f::2 2001:470:1c:7f::1 prefixlen 128 sudo route -n add -inet6 default 2001:470:1c:7f::1
The 192.168.2.12 IP address above is the LAN IP address of my MacBook Air.
In the MacBook Air’s System Preferences under Network | Wi-Fi | DNS, added IPv6 nameservers from the Tunnelbroker tunnel information page (2001:470:20::2 and 74.82.42.42), in addition to the IPv4 ones from Google that were already there.
That’s it.
At this point I could then visit http://www.test-ipv6.com/ and see the following:
And, from the Mac OS X command line:
# ping6 ns.upei.ca PING6(56=40+8+8 bytes) 2001:470:1c:7f::2 --> 2001:410:e000:903:1::1 16 bytes from 2001:410:e000:903:1::1, icmp_seq=0 hlim=56 time=77.641 ms 16 bytes from 2001:410:e000:903:1::1, icmp_seq=1 hlim=56 time=98.467 ms 16 bytes from 2001:410:e000:903:1::1, icmp_seq=2 hlim=56 time=65.694 ms 16 bytes from 2001:410:e000:903:1::1, icmp_seq=3 hlim=56 time=71.714 ms
I’m fairly certain this is all going to fall to pieces when my DHCP lease from Bell Aliant expires; by that time, though, I hope that Dave has read this far and is ready for the next dose of help.