@johnpoz:
"Openvpn supports ipv6 (arguably not very well), but since it does, I want to get it working, for the sake of getting it working."
Not sure where you got that idea - I have openvpn on ipv6, even hand out ipv6 address to ipv4 clients..
You said:
@johnpoz:
Borked config.. You would never use /65 on anything.. /64 would be the correct prefix for any network/transit in ipv6.
The /65 wasn't my idea. It was from the "IPv6 in OpenVPN" wiki https://community.openvpn.net/openvpn/wiki/IPv6. I tried using the /65 because I couldn't get it to work with a /64, I think because the route created by openvpn for the tun0 conflicted with the default route for eth0. You say Openvpn supports ipv6. I'm not disputing that, but while the software may support ipv6, it's hard to argue that the documentation for using openvpn with ipv6 is not sorely lacking. The "Bridging and Routing" wiki https://community.openvpn.net/openvpn/wiki/BridgingAndRouting mentions that openvpn supports ipv6, but then only provides examples for ipv4.
I got the client and server fully working for ipv4 and I was also able to get it to hand out an ipv6 address to the client and the client and server to ping each other back and forth. However, I can't get the server to pass the ipv6 traffic. That's what I'm asking for help with. I'm asking here, because if pfsense needs to be configured for it to work, where better to ask about that than here?
Also, for the record, quite a few people on the openvpn forum and the openvpn-users email list have admitted that the documentation for ipv6 is lacking because ipv6 is not widely used, so I don't think I'm alone in holding that opinion.
@johnpoz:
Drawing is pretty much useless from a network perspective.. Where are you networks in use - lets see a logical layer 3 drawing. With networks and prefixes labelled.. You can obfuscate your ipv6 prefixes if you so desire..
You said:
@johnpoz:
I asked you for a drawing before, I would highly suggest you draw up your network so you can easy work through this stuff and makes it much easier to explain to someone trying to help you. Either breakout the crayons and napkin or use of the multitude of FREE options for drawing basic network diagrams.
Good thing I didn't use my napkin and crayons…
I gave you a drawing that depicts the configuration in a manner that anyone familiar with virtualization should understand. I also explained each network (modem / lan, pfsense 2.3.4 / lan and pfsense 2.4 beta / lan have separate /56 prefixes and the lans are /64 subnets. Aside for packets from all three networks being visible on the NIC, the networks are completely independent. I've been using this configuration for several years with no problems.
I have used the modem lan exactly once, to enable port bridging. The only devices on this network are the pvr and stb.
Both of the pfsense networks are minimally simple. They each have one wan and one lan interface. Both use dhcp, dhcpv6 with assisted RA and unbound. Snort is also running on pfsense 2.3.4. The wan interfaces have pd only, no address, because that is only configuration the ISP supports. The lans have no subnets. The routing is all default. I haven't made any changes.
I'm not going to post the prefixes. What information about the networks that would pertain to getting the openvpn server to work is missing or unclear?
@johnpoz:
Where is the vpn your trying to put in play - is it site to site between your pfsense, is it road warrior to one of them? Is client from one of them? Site to site to some other location, etc.
I should have been more clear about this. I want the server to be used to provide a local routed gateway for a single client as if I'm at home, for use when I'm away from home - not a site to site bridge (i.e., it should work the same as any other vpn privacy service).
As I already explained, it's working for ipv4, but not for ipv6. I'm asking for help to sort out why it's not working for ipv6. I can post the client and server configs or whatever. Just let me know what is needed.