Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    reaching firewall itself via ipv6

    Scheduled Pinned Locked Moved IPv6
    24 Posts 6 Posters 2.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • D
      ddbnj
      last edited by

      @derelict

      Thank you for introducing me to some more tools.

      Verizon provides a /56.

      Never had the need to use VIPs before so that's something I'll have to read about tomorrow.

      Can you bind any app to any VIP? Do I have to assign the VIP to an interface before I can bind openvpn to it? I don't think wireguard has a way to bind it to a specific interface. Too bad because that's the main site to site tunnel. Openvpn is a backup.

      Take care,

      Devan

      JKnottJ DerelictD 2 Replies Last reply Reply Quote 0
      • Bob.DigB
        Bob.Dig LAYER 8 @ddbnj
        last edited by

        @ddbnj said in reaching firewall itself via ipv6:

        Since my ISP does not provide my WAN an IPv6 address,

        Is that really the case? Do you have IPv6 working on LAN and don't have an address on WAN? Show it please, you have been wrong before.

        MikeV7896M D 2 Replies Last reply Reply Quote 0
        • JKnottJ
          JKnott @ddbnj
          last edited by

          @ddbnj

          I don't think you need to use a VIP for this. Just point the VPN server to your LAN interface. Any valid address on pfSense will work. In another thread, someone else mentioned my method worked for him.

          PfSense running on Qotom mini PC
          i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
          UniFi AC-Lite access point

          I haven't lost my mind. It's around here...somewhere...

          1 Reply Last reply Reply Quote 0
          • DerelictD
            Derelict LAYER 8 Netgate @JKnott
            last edited by Derelict

            @jknott Why not?

            Nobody is saying your method will not work, but why not put services bound to addresses on the firewall in their own IPv6 interface "domain" disconnected from services off the firewall? One day you might want to, say, filter them differently. Maybe move that localhost /64 to another node.

            So, Why not?

            Chattanooga, Tennessee, USA
            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
            Do Not Chat For Help! NO_WAN_EGRESS(TM)

            1 Reply Last reply Reply Quote 0
            • DerelictD
              Derelict LAYER 8 Netgate @ddbnj
              last edited by

              @ddbnj Well, with OpenVPN you have three choices:

              Bind to a specific IPv4 interface address or IPv4 VIP
              Bind to a specific IPv6 interface or IPv6 VIP
              Bind to any address on the firewall. *

              The third method is the only way a single OpenVPN server can accept connections on both IPv4 and IPv6 addresses. So the 5th choice here...

              19e5ac67-55fe-4bea-8bf2-b952eb4833e1-image.png

              Chattanooga, Tennessee, USA
              A comprehensive network diagram is worth 10,000 words and 15 conference calls.
              DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
              Do Not Chat For Help! NO_WAN_EGRESS(TM)

              1 Reply Last reply Reply Quote 0
              • MikeV7896M
                MikeV7896 @Bob.Dig
                last edited by MikeV7896

                @bob-dig said in reaching firewall itself via ipv6:

                Is that really the case? Do you have IPv6 working on LAN and don't have an address on WAN? Show it please, you have been wrong before.

                Yes, Verizon does not provide a global IPv6 address to the WAN interface. On their own routers, they use the "ff" prefix ID and assign a global address from that prefix to the WAN interface (usually ::1).

                It had been thought that they might be using RFC 6603 (prefix exclude) for this, but a user in another forum with an OpenWRT router (which supports that RFC) said this doesn't appear to be the case, so we're not sure how they're picking that prefix for the purpose (might just be hard-coded in their routers).

                I've basically done the same thing by putting a VIP on my WAN interface. It works, but if my prefix ever changes, I'll need to manually update the VIP with the new prefix.

                The S in IOT stands for Security

                JKnottJ 1 Reply Last reply Reply Quote 1
                • D
                  ddbnj @Bob.Dig
                  last edited by

                  @bob-dig said in reaching firewall itself via ipv6:

                  @ddbnj said in reaching firewall itself via ipv6:

                  Since my ISP does not provide my WAN an IPv6 address,

                  Is that really the case? Do you have IPv6 working on LAN and don't have an address on WAN? Show it please, you have been wrong before.

                  Thanks,

                  I didn't want to be wrong again.

                  Devan

                  JKnottJ 1 Reply Last reply Reply Quote 0
                  • JKnottJ
                    JKnott @MikeV7896
                    last edited by

                    @mikev7896 said in reaching firewall itself via ipv6:

                    On their own routers, they use the "ff" prefix ID and assign a global address from that prefix to the WAN interface (usually ::1).

                    ff00/8 is a multicast address and certainly not global, which starts with 2 or 3. Perhaps you meant fc or fd, which are unique local addresses and entirely suitable for network management.

                    PfSense running on Qotom mini PC
                    i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                    UniFi AC-Lite access point

                    I haven't lost my mind. It's around here...somewhere...

                    MikeV7896M 1 Reply Last reply Reply Quote 0
                    • JKnottJ
                      JKnott @ddbnj
                      last edited by

                      @ddbnj said in reaching firewall itself via ipv6:

                      I didn't want to be wrong again.

                      I thought I was wrong once, but I was mistaken. 😉

                      PfSense running on Qotom mini PC
                      i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                      UniFi AC-Lite access point

                      I haven't lost my mind. It's around here...somewhere...

                      1 Reply Last reply Reply Quote 1
                      • MikeV7896M
                        MikeV7896 @JKnott
                        last edited by

                        @jknott said in reaching firewall itself via ipv6:

                        @mikev7896 said in reaching firewall itself via ipv6:

                        On their own routers, they use the "ff" prefix ID and assign a global address from that prefix to the WAN interface (usually ::1).

                        ff00/8 is a multicast address and certainly not global, which starts with 2 or 3. Perhaps you meant fc or fd, which are unique local addresses and entirely suitable for network management.

                        I mean that they use prefix ID "ff" out of the /56 that was delegated... that would be xxxx:xxxx:xxxx:xxFF::

                        The S in IOT stands for Security

                        1 Reply Last reply Reply Quote 1
                        • luckman212L
                          luckman212 LAYER 8 @ddbnj
                          last edited by

                          @ddbnj I'm on FIOS too (NYC) and spent just about the entire week messing around with and learning the ins and outs of Verizon's implementation. There are definitely some sharp edges but I'm pretty happy now with the way things are working.

                          You might want to check out my helper script to assign a routable IP (GUA) to your WAN from one of the delegated prefix subnets. Link below

                          luckman212/assign-gua-from-iapd - GitHub

                          1 Reply Last reply Reply Quote 2
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.