Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    HE tunnel broker questions

    Scheduled Pinned Locked Moved IPv6
    7 Posts 3 Posters 778 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • JonathanLeeJ
      JonathanLee
      last edited by JonathanLee

      Hello fellow netgate community. Can you please help?

      I’m having issues or concerns with the IPv6 tunnel. Does snort still function and check for traffic on the wan connection if there’s a tunnel established? Or do I need to create a separate snort instance that Interface? My squid proxy does function and blocks traffic even if they are of IP6 Destination for my blocked destinations as it looks at the header. This is new to me and with new things it’s kind of Scary. Is my system still protected with my ACLs that are already established with ip4 Traffic originally? The firewall I assume is allowing connections to IPV6 as they are just different ipv6 connections. I have the tunnel established and working However, I’m afraid to leave it on with data loss on my Nas or something of that sort. Is there any security recommendations, That you can tell me about? I was with the first group of netacad students for Cisco training many years ago, ipv6 at that time was only talked about as the future of internet and was not used yet, it seems to be widely deployed now. Again, ISPs in our area only provide IPV4

      Make sure to upvote

      1 Reply Last reply Reply Quote 0
      • JonathanLeeJ
        JonathanLee
        last edited by JonathanLee

        With activation of the IPV6 Inside my system, I noticed a large increase on the AC identification numbers. I went from 88 on one alc to 125. It seems that the auto added rules are vast once the IP6 is activated inside the firewall.

        Make sure to upvote

        JonathanLeeJ 1 Reply Last reply Reply Quote 0
        • JonathanLeeJ
          JonathanLee @JonathanLee
          last edited by JonathanLee

          @JonathanLee my wife is also making fun of me for using the text to speech. She asked me if Siri is deaf. I’m not that old.

          Anyway I guess I am afraid of the new stuff, can Snort still check it for invasive actors? If my hosts are only ipv4 and access a ipv6 does that work because the test site says that the browser is blocking ipv6 everything else is ok. I can see ipv6 traffic in the proxy going randomly with Facebook and what not also.

          Make sure to upvote

          S 1 Reply Last reply Reply Quote 0
          • S
            SteveITS Galactic Empire @JonathanLee
            last edited by

            @JonathanLee Run Suricata/Snort on LAN and then it would see both IPv4 and IPv6.

            When run on WAN, it runs outside the firewall so will end up scanning a lot of extra traffic.

            Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
            When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
            Upvote 👍 helpful posts!

            JonathanLeeJ 1 Reply Last reply Reply Quote 1
            • JonathanLeeJ
              JonathanLee @SteveITS
              last edited by

              @SteveITS I like the wan side it took me far to long to create the surpass list and custom tune it, it took a lot of time. I understand why that is recommended. I went the old way of wan only, yes it had a ton of stuff to comb through when it was getting set up.

              So you are saying it can still work? It did see the tunnels and originally was blocking them. I fixed that. I just wanted it to keep seeing open app id and other known bad hosts etc

              Make sure to upvote

              GertjanG 1 Reply Last reply Reply Quote 0
              • JonathanLeeJ
                JonathanLee
                last edited by JonathanLee

                I just noticed it does detect ipv6 traffic from the tunnel, this was my major concern and Snort is working with it. HE is amazing

                Make sure to upvote

                1 Reply Last reply Reply Quote 0
                • GertjanG
                  Gertjan @JonathanLee
                  last edited by Gertjan

                  @JonathanLee said in HE tunnel broker questions:

                  I went the old way of wan only

                  The old way ?
                  If your uplink is rather big, like a Gigagbit or way more, it's the dangerous way.

                  Incoming, Internet originated traffic, is normally dropped without any further actions taken.
                  If you decide to have that traffic analyzed by, for example, snort, then you expose yourself to a much greater DOS risk : the more traffic comes in, the harder snort is going to "snort" on it.
                  Now, all it takes it : I, with my bots, send you a loads of 'suspect' traffic and your firewall comes to a crawling halt.
                  Remember : you can not stop the the traffic coming into your WAN, only your ISP can. If you want to spend a zillion CPU cycles on every bad packet, and lots of these are coming in, your firewall will get overloaded.

                  No "help me" PM's please. Use the forum, the community will thank you.
                  Edit : and where are the logs ??

                  1 Reply Last reply Reply Quote 0
                  • First post
                    Last post
                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.