Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    NPt?

    Scheduled Pinned Locked Moved IPv6
    19 Posts 4 Posters 2.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • DerelictD
      Derelict LAYER 8 Netgate
      last edited by

      Now I got my /64 from hurrican elecetric, and I set up the tunnel

      Get a /48 and do it right. Still free.

      Chattanooga, Tennessee, USA
      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
      Do Not Chat For Help! NO_WAN_EGRESS(TM)

      1 Reply Last reply Reply Quote 0
      • P
        pox
        last edited by

        @Derelict:

        Now I got my /64 from hurrican elecetric, and I set up the tunnel

        Get a /48 and do it right. Still free.

        By doing it right you mean setting my internal ips to my reserved /48?
        I would like to keep my ula addresses for the moment and npt them to the external addresses.
        I think I will add an other ipv6 wan interface in the near future, so I'd like to play with npt.

        1 Reply Last reply Reply Quote 0
        • DerelictD
          Derelict LAYER 8 Netgate
          last edited by

          No reason to NAT/NPt with IPv6 unless it is absolutely a last resort (or some other extenuating circumstances.)

          Release your IPv4 mind. Imagine a world without NAT where billions and billions of addresses are yours for the asking.

          Chattanooga, Tennessee, USA
          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
          Do Not Chat For Help! NO_WAN_EGRESS(TM)

          1 Reply Last reply Reply Quote 0
          • GertjanG
            Gertjan
            last edited by

            @Derelict:

            Get a /48 and do it right. Still free.

            Doing it right ? I'm all Ok with that. It would be a nice thing if this page https://doc.pfsense.org/index.php/Using_IPv6_with_a_Tunnel_Broker reflects a pure /48 setup.
            Right now, I'm using the /64 for my LAN.

            edit: sorry, this off topic.

            No "help me" PM's please. Use the forum, the community will thank you.
            Edit : and where are the logs ??

            1 Reply Last reply Reply Quote 0
            • DerelictD
              Derelict LAYER 8 Netgate
              last edited by

              Building a Tunnel
              Sign Up

              This article assumes that an account has already been registered with Hurricane Electric or some other broker. After registering an account and getting the first /64 or /48 IPv6 block assigned, the gif tunnel may be configured on pfSense.

              It's pretty much the same thing. You would just be using a /64 out of the /48 for your LAN.

              Chattanooga, Tennessee, USA
              A comprehensive network diagram is worth 10,000 words and 15 conference calls.
              DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
              Do Not Chat For Help! NO_WAN_EGRESS(TM)

              1 Reply Last reply Reply Quote 0
              • P
                pox
                last edited by

                @Derelict:

                No reason to NAT/NPt with IPv6 unless it is absolutely a last resort (or some other extenuating circumstances.)

                Release your IPv4 mind. Imagine a world without NAT where billions and billions of addresses are yours for the asking.

                Ok I am trying to: so say I set my internal servers services ips to a /48 I own. Say
                2001:470:1f0a:f30::1
                2001:470:1f0a:f30::2
                2001:470:1f0a:f30::3
                and so on.

                Do I use these addresses to get to the services internally in my LAN? Or do I use other addresses? Maybe the ULA address?

                What happens when I change ISP?
                Do I still use the "old" IPs from HE? Do I still have to use the tunnel even if I get IPv6 directly from my ISP? Do I have to change all of them?

                Or if I add an other WAN interface from an other ISP? So I maybe have 2001:470:1f0a::/48 and 2001:41d0:8::/48. Can I loadbalance between them? Why should I prefer one over the other for my "internal" addressing? What happens when one ISP goes down?

                Having internal ULA addresses and translating them over to the public side with NPt seems so much nicer to me. Where am I wrong?

                1 Reply Last reply Reply Quote 0
                • GertjanG
                  Gertjan
                  last edited by

                  @pox:

                  What happens when I change ISP?
                  Do I still use the "old" IPs from HE? Do I still have to use the tunnel even if I get IPv6 directly from my ISP? Do I have to change all of them?

                  ISP's could have give you a static IP (WAN). Some do it always, some ask money for it. Others change your IPv4 all the time (pppoe connections).
                  When you move, your IPv4 will change - I'm pretty sure.
                  But …. have a look at the "tunnel server" that your are using with he.net (the town it's located) : if that one is ok for you - still the closest - then you do not have to create another tunnel with them.
                  Same tunnel means : same /64 and same /48.
                  This is an advantage when one uses he.net.

                  From what I understand why you would use this "NPt" : maybe your right ;) (I never had a real look at this NPt - didn't need it).

                  No "help me" PM's please. Use the forum, the community will thank you.
                  Edit : and where are the logs ??

                  1 Reply Last reply Reply Quote 0
                  • P
                    pox
                    last edited by

                    @pox:

                    Having internal ULA addresses and translating them over to the public side with NPt seems so much nicer to me. Where am I wrong?

                    Now I had to change the routed subnet from HE because I wanted to make a new tunnel on an other location.
                    Having used ULA addresses inside my lan, I just had to go to Firewall->NAT->NPt on pfsense, and change "Global Unicast routable IPv6 prefix" from 2001:470:aaaa:: to 2001:470:bbbb:: and everything works like before.

                    If I had assigned all IPs statically on the servers, I would have had to change them all somehow. With NPt it was one textbox.

                    I really don't understand why this is considered bad? I am sure I am missing something, but I would like to understand. What problems could I incur into that I did not foresee?

                    1 Reply Last reply Reply Quote 0
                    • DerelictD
                      Derelict LAYER 8 Netgate
                      last edited by

                      Because NAT sucks. It breaks protocols that contain connection addresses in them, such as SIP and (who cares) FTP.

                      Chattanooga, Tennessee, USA
                      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                      Do Not Chat For Help! NO_WAN_EGRESS(TM)

                      1 Reply Last reply Reply Quote 0
                      • P
                        pox
                        last edited by

                        @Derelict:

                        Because NAT sucks. It breaks protocols that contain connection addresses in them, such as SIP and (who cares) FTP.

                        Ok, I don't use SIP.
                        So I would tend to keep the convenience of changing my public facing addresses with one textbox… or is there more?

                        1 Reply Last reply Reply Quote 0
                        • DerelictD
                          Derelict LAYER 8 Netgate
                          last edited by

                          NAT sucks. If what you are doing works for you, that's cool.

                          Chattanooga, Tennessee, USA
                          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                          Do Not Chat For Help! NO_WAN_EGRESS(TM)

                          1 Reply Last reply Reply Quote 0
                          • JKnottJ
                            JKnott
                            last edited by

                            @pox:

                            @Derelict:

                            No reason to NAT/NPt with IPv6 unless it is absolutely a last resort (or some other extenuating circumstances.)

                            Release your IPv4 mind. Imagine a world without NAT where billions and billions of addresses are yours for the asking.

                            Ok I am trying to: so say I set my internal servers services ips to a /48 I own. Say
                            2001:470:1f0a:f30::1
                            2001:470:1f0a:f30::2
                            2001:470:1f0a:f30::3
                            and so on.

                            Do I use these addresses to get to the services internally in my LAN? Or do I use other addresses? Maybe the ULA address?

                            What happens when I change ISP?
                            Do I still use the "old" IPs from HE? Do I still have to use the tunnel even if I get IPv6 directly from my ISP? Do I have to change all of them?

                            Or if I add an other WAN interface from an other ISP? So I maybe have 2001:470:1f0a::/48 and 2001:41d0:8::/48. Can I loadbalance between them? Why should I prefer one over the other for my "internal" addressing? What happens when one ISP goes down?

                            Having internal ULA addresses and translating them over to the public side with NPt seems so much nicer to me. Where am I wrong?

                            First off, you can have both ULA and global addresses on the same interface.  IPv6 is designed to have multiple addresses.  I have my network configured with ULA as well as global addresses.  I use the ULA between local devices and global for the Internet.  Second forget about NAT.  It's a hack designed to get around the IPv4 address shortage but causes other problems.  With the IPv6 address space, there's absolutely no need to use NAT.  For example, a single /64 provides 2^64 or 1.84467440737 x 10^19 addresses.  With a /48 prefix, you get 65536 /64s.  That's a LOT of addresses!

                            Another nice thing about IPv6 is it's easy to change ISPs.  You get a new address block and everything updates automagically.  You can even have more than one and use either or both as appropriate.  Should you move to another ISP, all you have to do is update any DNS that points to your network.  Of course, there'd be no change for ULA addresses.

                            In general, people have to stop being limited by the IPv4 way of doing things.  IPv6 is so much better.

                            PfSense running on Qotom mini PC
                            i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                            UniFi AC-Lite access point

                            I haven't lost my mind. It's around here...somewhere...

                            1 Reply Last reply Reply Quote 0
                            • P
                              pox
                              last edited by

                              @JKnott:

                              First off, you can have both ULA and global addresses on the same interface.  IPv6 is designed to have multiple addresses.  I have my network configured with ULA as well as global addresses.  I use the ULA between local devices and global for the Internet.  Second forget about NAT.  It's a hack designed to get around the IPv4 address shortage but causes other problems.  With the IPv6 address space, there's absolutely no need to use NAT.  For example, a single /64 provides 2^64 or 1.84467440737 x 10^19 addresses.  With a /48 prefix, you get 65536 /64s.  That's a LOT of addresses!

                              Another nice thing about IPv6 is it's easy to change ISPs.  You get a new address block and everything updates automagically.  You can even have more than one and use either or both as appropriate.  Should you move to another ISP, all you have to do is update any DNS that points to your network.  Of course, there'd be no change for ULA addresses.

                              In general, people have to stop being limited by the IPv4 way of doing things.  IPv6 is so much better.

                              Thank you for your answer.
                              So you use ULA addresses assigned from the DHCP for internal traffic, and public addresses assigned with SLAAC for traffic that goes out to the internet.
                              BUT I seem to get the idea that with SLAAC you can't give a specific subnet to a device/host, so how can you make a firewall rule to say that my chinese webcam is not allowed to go out on the internet, but my ps4 is?
                              Do you use different VLANs for every device? Is that even manageable? Or is there an other way to do that?

                              Thank you

                              1 Reply Last reply Reply Quote 0
                              • JKnottJ
                                JKnott
                                last edited by

                                I do not use DHCP, SLAAC only.  Why do you want to assign a subnet to a host?  SLAAC, like DHCP, gives a device an address.  It doesn't make any difference to the firewall.  If your webcam has only a ULA address, it will never be passed to the Internet.  You could create a VLAN for the cameras that has ULA only and also allow the computer on that VLAN, so that it can access the camera.  The PS4 would be on the main LAN and get a global address.  And no, you don't have a VLAN for every device.  Just create one, with ULA only, for the cameras.

                                PfSense running on Qotom mini PC
                                i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                                UniFi AC-Lite access point

                                I haven't lost my mind. It's around here...somewhere...

                                1 Reply Last reply Reply Quote 0
                                • P
                                  pox
                                  last edited by

                                  @JKnott:

                                  I do not use DHCP, SLAAC only.  Why do you want to assign a subnet to a host?  SLAAC, like DHCP, gives a device an address.  It doesn't make any difference to the firewall.  If your webcam has only a ULA address, it will never be passed to the Internet.  You could create a VLAN for the cameras that has ULA only and also allow the computer on that VLAN, so that it can access the camera.  The PS4 would be on the main LAN and get a global address.  And no, you don't have a VLAN for every device.  Just create one, with ULA only, for the cameras.

                                  All right, starts to make sense. Please help me out with just one more thing: at the moment I have vlan 20 for devices I trust, and vlan 30 for devices I do not trust. Say on vlan 20 I have

                                  • the server

                                  • the laptop

                                  • the phone and

                                  • the mediacenter

                                  and on vlan 30 I have

                                  • the ps4

                                  • two chinese webcams

                                  • the fridge

                                  • the tv

                                  all the things on vlan 20 can go to the internet, but on vlan 30 just the tv and the ps4 can. As I did things until now, I just give all those devices a fixed ip and make firewall rules to let them out on the internet or not.
                                  How do you do this the ipv6 way?
                                  As I understand it, you would create 3 vlans:

                                  • one main vlan for the things I trust - that get ULA addresses and global addresses

                                  • one for things I do not trust, but that can get to the internet - that get ULA addresses and global addresses (ps4 and tv)

                                  • one for things I do not trust, that can not go to the internet - that get just ULA addresses (the webcams, the fridge)

                                  This way, if the global addresses assigned to me change, SLAAC takes care of that. I just have to change the ips I assigned statically (if any).
                                  Did I get it?

                                  1 Reply Last reply Reply Quote 0
                                  • JKnottJ
                                    JKnott
                                    last edited by

                                    On the networks you want to access the internet, you assign global addresses and can also assign ULA.  On the network you don't want to reach the Internet, ULA only.  Assuming you have more than a /64 IPv6 prefix, you select a different prefix ID for each interface.  For example, I have a /56.  That means I can pick anything between  0 & FF for a network.  Routing between interfaces means your computer should be able to reach the cameras etc..

                                    PfSense running on Qotom mini PC
                                    i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                                    UniFi AC-Lite access point

                                    I haven't lost my mind. It's around here...somewhere...

                                    1 Reply Last reply Reply Quote 0
                                    • First post
                                      Last post
                                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.