Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    reaching firewall itself via ipv6

    Scheduled Pinned Locked Moved IPv6
    24 Posts 6 Posters 2.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • DerelictD
      Derelict LAYER 8 Netgate @ddbnj
      last edited by

      @ddbnj Depends on what they delegate to you. If it's a /56, take a /64 out of it and dedicate it to VIPs on the localhost interface. Then just tell OpenVPN to bind to that and pass the traffic to it into WAN.

      Chattanooga, Tennessee, USA
      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
      Do Not Chat For Help! NO_WAN_EGRESS(TM)

      JKnottJ 1 Reply Last reply Reply Quote 0
      • JKnottJ
        JKnott @Derelict
        last edited by

        @derelict

        Why assign a prefix to local host, when using the LAN address works?

        PfSense running on Qotom mini PC
        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
        UniFi AC-Lite access point

        I haven't lost my mind. It's around here...somewhere...

        DerelictD 1 Reply Last reply Reply Quote 0
        • D
          ddbnj
          last edited by

          @derelict

          Thank you for introducing me to some more tools.

          Verizon provides a /56.

          Never had the need to use VIPs before so that's something I'll have to read about tomorrow.

          Can you bind any app to any VIP? Do I have to assign the VIP to an interface before I can bind openvpn to it? I don't think wireguard has a way to bind it to a specific interface. Too bad because that's the main site to site tunnel. Openvpn is a backup.

          Take care,

          Devan

          JKnottJ DerelictD 2 Replies Last reply Reply Quote 0
          • Bob.DigB
            Bob.Dig LAYER 8 @ddbnj
            last edited by

            @ddbnj said in reaching firewall itself via ipv6:

            Since my ISP does not provide my WAN an IPv6 address,

            Is that really the case? Do you have IPv6 working on LAN and don't have an address on WAN? Show it please, you have been wrong before.

            MikeV7896M D 2 Replies Last reply Reply Quote 0
            • JKnottJ
              JKnott @ddbnj
              last edited by

              @ddbnj

              I don't think you need to use a VIP for this. Just point the VPN server to your LAN interface. Any valid address on pfSense will work. In another thread, someone else mentioned my method worked for him.

              PfSense running on Qotom mini PC
              i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
              UniFi AC-Lite access point

              I haven't lost my mind. It's around here...somewhere...

              1 Reply Last reply Reply Quote 0
              • DerelictD
                Derelict LAYER 8 Netgate @JKnott
                last edited by Derelict

                @jknott Why not?

                Nobody is saying your method will not work, but why not put services bound to addresses on the firewall in their own IPv6 interface "domain" disconnected from services off the firewall? One day you might want to, say, filter them differently. Maybe move that localhost /64 to another node.

                So, Why not?

                Chattanooga, Tennessee, USA
                A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                Do Not Chat For Help! NO_WAN_EGRESS(TM)

                1 Reply Last reply Reply Quote 0
                • DerelictD
                  Derelict LAYER 8 Netgate @ddbnj
                  last edited by

                  @ddbnj Well, with OpenVPN you have three choices:

                  Bind to a specific IPv4 interface address or IPv4 VIP
                  Bind to a specific IPv6 interface or IPv6 VIP
                  Bind to any address on the firewall. *

                  The third method is the only way a single OpenVPN server can accept connections on both IPv4 and IPv6 addresses. So the 5th choice here...

                  19e5ac67-55fe-4bea-8bf2-b952eb4833e1-image.png

                  Chattanooga, Tennessee, USA
                  A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                  DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                  Do Not Chat For Help! NO_WAN_EGRESS(TM)

                  1 Reply Last reply Reply Quote 0
                  • MikeV7896M
                    MikeV7896 @Bob.Dig
                    last edited by MikeV7896

                    @bob-dig said in reaching firewall itself via ipv6:

                    Is that really the case? Do you have IPv6 working on LAN and don't have an address on WAN? Show it please, you have been wrong before.

                    Yes, Verizon does not provide a global IPv6 address to the WAN interface. On their own routers, they use the "ff" prefix ID and assign a global address from that prefix to the WAN interface (usually ::1).

                    It had been thought that they might be using RFC 6603 (prefix exclude) for this, but a user in another forum with an OpenWRT router (which supports that RFC) said this doesn't appear to be the case, so we're not sure how they're picking that prefix for the purpose (might just be hard-coded in their routers).

                    I've basically done the same thing by putting a VIP on my WAN interface. It works, but if my prefix ever changes, I'll need to manually update the VIP with the new prefix.

                    The S in IOT stands for Security

                    JKnottJ 1 Reply Last reply Reply Quote 1
                    • D
                      ddbnj @Bob.Dig
                      last edited by

                      @bob-dig said in reaching firewall itself via ipv6:

                      @ddbnj said in reaching firewall itself via ipv6:

                      Since my ISP does not provide my WAN an IPv6 address,

                      Is that really the case? Do you have IPv6 working on LAN and don't have an address on WAN? Show it please, you have been wrong before.

                      Thanks,

                      I didn't want to be wrong again.

                      Devan

                      JKnottJ 1 Reply Last reply Reply Quote 0
                      • JKnottJ
                        JKnott @MikeV7896
                        last edited by

                        @mikev7896 said in reaching firewall itself via ipv6:

                        On their own routers, they use the "ff" prefix ID and assign a global address from that prefix to the WAN interface (usually ::1).

                        ff00/8 is a multicast address and certainly not global, which starts with 2 or 3. Perhaps you meant fc or fd, which are unique local addresses and entirely suitable for network management.

                        PfSense running on Qotom mini PC
                        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                        UniFi AC-Lite access point

                        I haven't lost my mind. It's around here...somewhere...

                        MikeV7896M 1 Reply Last reply Reply Quote 0
                        • JKnottJ
                          JKnott @ddbnj
                          last edited by

                          @ddbnj said in reaching firewall itself via ipv6:

                          I didn't want to be wrong again.

                          I thought I was wrong once, but I was mistaken. 😉

                          PfSense running on Qotom mini PC
                          i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                          UniFi AC-Lite access point

                          I haven't lost my mind. It's around here...somewhere...

                          1 Reply Last reply Reply Quote 1
                          • MikeV7896M
                            MikeV7896 @JKnott
                            last edited by

                            @jknott said in reaching firewall itself via ipv6:

                            @mikev7896 said in reaching firewall itself via ipv6:

                            On their own routers, they use the "ff" prefix ID and assign a global address from that prefix to the WAN interface (usually ::1).

                            ff00/8 is a multicast address and certainly not global, which starts with 2 or 3. Perhaps you meant fc or fd, which are unique local addresses and entirely suitable for network management.

                            I mean that they use prefix ID "ff" out of the /56 that was delegated... that would be xxxx:xxxx:xxxx:xxFF::

                            The S in IOT stands for Security

                            1 Reply Last reply Reply Quote 1
                            • luckman212L
                              luckman212 LAYER 8 @ddbnj
                              last edited by

                              @ddbnj I'm on FIOS too (NYC) and spent just about the entire week messing around with and learning the ins and outs of Verizon's implementation. There are definitely some sharp edges but I'm pretty happy now with the way things are working.

                              You might want to check out my helper script to assign a routable IP (GUA) to your WAN from one of the delegated prefix subnets. Link below

                              luckman212/assign-gua-from-iapd - GitHub

                              1 Reply Last reply Reply Quote 2
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.