Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    FIOS - getting /56 PD via DHCP6 but no V6 is assigned to WAN

    Scheduled Pinned Locked Moved IPv6
    53 Posts 9 Posters 11.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B
      betapc @luckman212
      last edited by

      @luckman212 Yes I have that option check.

      luckman212L 1 Reply Last reply Reply Quote 0
      • luckman212L
        luckman212 LAYER 8 @betapc
        last edited by

        @betapc I'm sorry but I'm really not sure where to point you next. Maybe someone else has an idea...

        B 2 Replies Last reply Reply Quote 0
        • B
          betapc @luckman212
          last edited by

          @luckman212 Thank you very much. I will wait for pFsense version 23.01 to be release and see what happen when I do a clean installation.

          Do you think ipv6/dpinger fixes from PR #4595 will be included on version 23.01? and maybe a fix to handle IPv6 to WAN for cases like this on Fios?

          Thank you for your contribution to pFsense.

          1 Reply Last reply Reply Quote 0
          • B
            betapc @luckman212
            last edited by betapc

            @luckman212

            Finally I make it work, I upgrade to 23.01 RC, removed limiters and WAN firewall rules for Bufferbloat mitigation, then I change on your scrip the python version from 3.8 to 3.9 and works.

            Screenshot 2023-02-13 190517.jpg

            The only problem is the getaway still showing the local IPv6 and not the one from Verizon, and is unable to identify if the getaway is
            online or not.

            Screenshot 2023-02-13 190805.jpg

            Screenshot 2023-02-13 191238.jpg

            So this is normal behavior? or I need to do something else?

            Thanks @luckman212

            MikeV7896M 1 Reply Last reply Reply Quote 0
            • MikeV7896M
              MikeV7896 @betapc
              last edited by

              @betapc Verizon doesn't provide a global address to the WAN interface. They only provide a prefix that the router can use.

              Verizon's own router takes an address from the "ff" prefix ID and assigns it to the WAN interface. pfSense does not provide an automated way to do the same though. I had manually accomplished the same thing by setting a virtual IP on WAN... but if my prefix ever changed in the future, I would need to change the virtual IP to match the new prefix. So I gave up on that.

              I think @luckman212 had created a script to do something similar, that you could run regularly to change the address if the prefix had changed... I never looked closer at it though. I'm happy without a global WAN address... things work, that's what matters.

              Mine seems to be happy pinging Verizon's end of the link-local route... not sure why yours would have problems with that. If you had a monitoring destination manually set, you'll need to remove that since the only thing it'll be able to ping without a global address is Verizon's end of the link-local route.

              The S in IOT stands for Security

              1 Reply Last reply Reply Quote 0
              • GertjanG Gertjan referenced this topic on
              • GertjanG Gertjan referenced this topic on
              • maverickwsM
                maverickws
                last edited by

                Parts sound alike the problem described here

                https://forum.netgate.com/topic/177981/no-ipv6-after-upgrade-to-23-01

                O 1 Reply Last reply Reply Quote 0
                • O
                  orange.guru @maverickws
                  last edited by orange.guru

                  @luckman212

                  Good evening, are there any plans to update the system patch or the script for pfsense 23.01+ and devd integration. I find this to be particularly useful with dynamic dns that I use for sending IPv6 traffic to my existing pfsense. It helps a lot having an IP from gua in a somewhat automated fashion. Thanks for writing this, I am still baffled by how this script works, I need to brush up on my bsd scripting.

                  I think this would be a good feature for the mainline pfsense releases.

                  1 Reply Last reply Reply Quote 0
                  • Y
                    yobyot
                    last edited by

                    I'm on CE 2.6 and just want to ask a question before I start trying to implement @luckman212 's workarounds to obtain a GUA for the WAN interface.

                    Would a GUA for the WAN interface allow me to use HAProxy to listen on that interface via a proxy front end definition? I want to use HAProxy to connect IPv6 clients to a backend Mastodon self-hosted server. I'm guessing that isn't working even though HAProxy's front end is set to listen to IPv6 on the WAN because that interface has no GUA.

                    Thanks.

                    Y 1 Reply Last reply Reply Quote 0
                    • Y
                      yobyot @yobyot
                      last edited by

                      For anyone who, like me, upgrades from CE 2.6 to CE 2.7, be sure to change @luckman212 's script to reflect the latest version of python. See my pull request here.

                      maverickwsM 1 Reply Last reply Reply Quote 0
                      • maverickwsM
                        maverickws @yobyot
                        last edited by maverickws

                        @yobyot this issue has been fixed in the latest 23.05.1 update

                        Y 1 Reply Last reply Reply Quote 0
                        • Y
                          yobyot @maverickws
                          last edited by

                          @maverickws said in FIOS - getting /56 PD via DHCP6 but no V6 is assigned to WAN:

                          @yobyot this issue has been fixed in the latest 23.05.1 update

                          Except I use CE 2.7 due to Netgate licensing.

                          On that point, it breaks my heart that to monetize pfSense, esp 7.2, which essentially means I can never use pfSense+ with client systems. That section along with others makes it impossible to assure my clients that nobody but me is accessing their systems.

                          1 Reply Last reply Reply Quote 0
                          • B
                            betapc @luckman212
                            last edited by

                            @luckman212

                            Hi,

                            I am using pFsense plus 24.03, I am still having same issue where WAN interface only got a local IPv6 and not a IPv6 assigned by FIOS, is a problem when I configured CoDel Limiters for Bufferbloat, limiters work fine for IPv4 but not for IPv6 since it doesn't have a IPv6 and can identify traffic going through the WAN.

                            I tried your patch and I was unable to make work.

                            Are you aware if pFsense plus 24.03 already fixed this issue, and let me know what is the configuration we have to use to make WAN to obtain and IPv6 or how to make the onfiguring CoDel Limiters for Bufferbloat to work with IPv6 traffic.

                            Thanks.

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.