Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Setup Dual Stack with NAT on v4

    Scheduled Pinned Locked Moved IPv6
    22 Posts 6 Posters 3.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • DerelictD
      Derelict LAYER 8 Netgate
      last edited by

      I would ask them to route you a /48 in addition to the WAN interface /64.

      They shouldn't have any issue with that.

      Chattanooga, Tennessee, USA
      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
      Do Not Chat For Help! NO_WAN_EGRESS(TM)

      1 Reply Last reply Reply Quote 0
      • S
        SurtursRevenge
        last edited by

        But /64 should also be more than enough.
        I just want /128 per VM

        So this will also work with /64 subnet

        1 Reply Last reply Reply Quote 0
        • DerelictD
          Derelict LAYER 8 Netgate
          last edited by

          That is fine but it is not how IPv6 works.

          Every interface gets a /64.

          At a minimum they should put a /64 on the interface and route a /64 to you over that so you can put it on the inside interface for use on inside hosts.

          Don't get mired in IPv4 depletion practices when deploying IPv6. They are completely different things. There is no scarcity in IPv6.

          Chattanooga, Tennessee, USA
          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
          Do Not Chat For Help! NO_WAN_EGRESS(TM)

          1 Reply Last reply Reply Quote 0
          • JKnottJ
            JKnott
            last edited by

            That is fine but it is not how IPv6 works.

            He mentioned he's in a data centre.  Perhaps they just gave him a flat /64, expecting devices to use it directly with SLAAC or DHCPv6.  In that case, pfSense would need to filter, but not route IPv6.  Is that possible?

            PfSense running on Qotom mini PC
            i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
            UniFi AC-Lite access point

            I haven't lost my mind. It's around here...somewhere...

            1 Reply Last reply Reply Quote 0
            • DerelictD
              Derelict LAYER 8 Netgate
              last edited by

              Doesn't really matter where he is. IPv6 is IPv6. If they will only give a single /64 it is the wrong product for the use case.

              Not that I know of. Best case would probably be NPt with a ULA/64 on the inside interface. You would have to set up VIPs on the WAN which doesn't scale because you need something out there to respond to neighbor discovery.

              A routed /64, /56, or /48 is what you want. Did you ask if that was available?

              Chattanooga, Tennessee, USA
              A comprehensive network diagram is worth 10,000 words and 15 conference calls.
              DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
              Do Not Chat For Help! NO_WAN_EGRESS(TM)

              1 Reply Last reply Reply Quote 0
              • JKnottJ
                JKnott
                last edited by

                Doesn't really matter where he is. IPv6 is IPv6. If they will only give a single /64 it is the wrong product for the use case.

                I'm thinking they might have just split a larger prefix among customers and just routed a single /64 to him.  However, we really don't know what's available there and, like you, I haven't seen enough info to know.  In the data centre work I've done recently, the customer brought in their own Internet connection via fibre from a carrier, instead of using the data centre's connection.

                PfSense running on Qotom mini PC
                i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                UniFi AC-Lite access point

                I haven't lost my mind. It's around here...somewhere...

                1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator
                  last edited by

                  Depends on the sort of DC.. If it is a managed DC where customers services are managed for them.. Customer would have zero control over what the IPs or any sort of firewalls.  They might be included in the sort of rules they want between different services of theirs, etc.  Bu they would not actually control the IPs or the firewall rules in the DC..  They could request say port X open from this zone or IP to that zone or IP, etc.

                  If it a colo where customer just gets rack and connection and they do their own thing - then whatever ipv6 you would give them could be directly attached with multiple segments if they did not want to run their own firewall/routers… Or for sure the DC should be able to assign them their own block say /48 or 56 or 60 and let them do their own thing with this.. Any sort of connection other than a directly attached 64 would/should be routed to them.

                  A /48 might be a bit large to give to someone with a bit of colo space ;)  But sure why not..  If they are just using colo space - why not just have their own IPv6 space routed to the DC?  They can for sure request their own space from their RIR..

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  1 Reply Last reply Reply Quote 0
                  • DerelictD
                    Derelict LAYER 8 Netgate
                    last edited by

                    A /48 is the minimum allocation for such a thing. If someone in a datacenter asks for it, they should immediately get it. Maybe he's subdividing it into /56s over VPN. There are only 256 of those. There is zero reason for the ISP to care. A "X-Small" ISP allocation is a /32, or 64K /48s.

                    Again, if it is "here's a /64 for your VPS web server. Have fun," then it is the wrong product for the use case.

                    There is zero reason not to do it.

                    It is only 64K interfaces.

                    ![Screen Shot 2018-02-19 at 3.44.10 AM.png](/public/imported_attachments/1/Screen Shot 2018-02-19 at 3.44.10 AM.png)
                    ![Screen Shot 2018-02-19 at 3.44.10 AM.png_thumb](/public/imported_attachments/1/Screen Shot 2018-02-19 at 3.44.10 AM.png_thumb)

                    Chattanooga, Tennessee, USA
                    A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                    DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                    Do Not Chat For Help! NO_WAN_EGRESS(TM)

                    1 Reply Last reply Reply Quote 0
                    • S
                      SurtursRevenge
                      last edited by

                      I asked the datacenter provider.

                      I can get oen /56 IPv6 Subnet. But not more.

                      So how would I need to setup the pfsense to get public v6 to my VMs.
                      Because there is no DHCP I need to do this static

                      1 Reply Last reply Reply Quote 0
                      • NogBadTheBadN
                        NogBadTheBad
                        last edited by

                        @SurtursRevenge:

                        I can get oen /56 IPv6 Subnet. But not more.

                        How they're handing out IPv6 address space is borked.

                        https://www.ripe.net/support/training/material/lir-training-course/LIR-Training-Handbook-Appendices/IPv6Chart_2015.pdf

                        Andy

                        1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

                        1 Reply Last reply Reply Quote 0
                        • johnpozJ
                          johnpoz LAYER 8 Global Moderator
                          last edited by

                          While they should prob just give a /48 a /56 will work just fine - as long as it is actually ROUTED to you and not just putting the /56 on their interface connected to you… Have seen that a lot around here..

                          You should get a /64 that you use as transit.. That you would put on your wan interface of pfsense, then just break that /56 into /64's that you put on your interfaces/vlans for your networks behind pfsense.

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 24.11 | Lab VMs 2.8, 24.11

                          1 Reply Last reply Reply Quote 0
                          • JKnottJ
                            JKnott
                            last edited by

                            You should get a /64 that you use as transit.

                            On IPv6, the "transit" network is normally link local.  The global is used to access the router WAN interface for management, but nothing else.  If you don't enable remote management via the WAN interface, that address serves no useful purpose.  Unlike IPv4, link local addresses are normally used for routing on IPv6.

                            PfSense running on Qotom mini PC
                            i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                            UniFi AC-Lite access point

                            I haven't lost my mind. It's around here...somewhere...

                            1 Reply Last reply Reply Quote 0
                            • johnpozJ
                              johnpoz LAYER 8 Global Moderator
                              last edited by

                              While I agree that sure you can use link local for your transit.. I don't agree with that being a good option.  There is ZERO reason not to make it a actual viable address.  For starters so that your traceroute is valid.

                              I can use rfc1918 as my transit to route public IPv4 as well - doesn't make it a good idea.

                              An intelligent man is sometimes forced to be drunk to spend time with his fools
                              If you get confused: Listen to the Music Play
                              Please don't Chat/PM me for help, unless mod related
                              SG-4860 24.11 | Lab VMs 2.8, 24.11

                              1 Reply Last reply Reply Quote 0
                              • K
                                kpa
                                last edited by

                                On IPv6 a link-local gateway address is what you get more often than not and it's completely valid and according to the specifications.

                                This is on my Mac:

                                
                                 route -n get -inet6 default
                                   route to: ::
                                destination: ::
                                       mask: default
                                    gateway: fe80::21b:21ff:fea6:4244%en0
                                  interface: en0
                                      flags: <up,gateway,done,prcloning>recvpipe  sendpipe  ssthresh  rtt,msec    rttvar  hopcount      mtu     expire
                                       0         0         0         0         0         0      1500         0</up,gateway,done,prcloning> 
                                

                                That's configured with plain SLAAC.

                                1 Reply Last reply Reply Quote 0
                                • johnpozJ
                                  johnpoz LAYER 8 Global Moderator
                                  last edited by

                                  Again I hear you… So? Read https://tools.ietf.org/html/rfc7404

                                  It clearly goes over the advantages and disadvantages to doing it that way..  There are many ways to skin a cat, I don't like skinning the cat that way because it has issues that I would rather not deal with...

                                  Its not like you have to worry about running out of space by using up a /64 for your transit..

                                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                                  If you get confused: Listen to the Music Play
                                  Please don't Chat/PM me for help, unless mod related
                                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                                  1 Reply Last reply Reply Quote 0
                                  • JKnottJ
                                    JKnott
                                    last edited by

                                    While I agree that sure you can use link local for your transit.. I don't agree with that being a good option.

                                    Take a look at your routing table.  You'll see it uses link local, not routeable addresses  In fact, on point to point links, you don't even need an IP address at all, just the link.  On IPv6, routing via link local addresses is the default, not an option.

                                    PfSense running on Qotom mini PC
                                    i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                                    UniFi AC-Lite access point

                                    I haven't lost my mind. It's around here...somewhere...

                                    1 Reply Last reply Reply Quote 0
                                    • JKnottJ
                                      JKnott
                                      last edited by

                                      @johnpoz:

                                      Again I hear you… So? Read https://tools.ietf.org/html/rfc7404

                                      It clearly goes over the advantages and disadvantages to doing it that way..  There are many ways to skin a cat, I don't like skinning the cat that way because it has issues that I would rather not deal with...

                                      Its not like you have to worry about running out of space by using up a /64 for your transit..

                                      Unless you specifically configure using otherwise, you will normally be using link local.  It happens with pfSense and it happens with routing protocols such as OSPF.  The only purpose of the interface IP address in routing is to determine which link is used.  When you look through the routing table, you will see the IP address will resolve to an interface, which is how routing takes place.

                                      Now, there is nothing wrong with assigning a routeable address to an interface, for things like remote managment, ping, traceroute etc., but it normally will not have any purpose in the routing function.

                                      PfSense running on Qotom mini PC
                                      i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                                      UniFi AC-Lite access point

                                      I haven't lost my mind. It's around here...somewhere...

                                      1 Reply Last reply Reply Quote 0
                                      • JKnottJ
                                        JKnott
                                        last edited by

                                        Again I hear you… So? Read https://tools.ietf.org/html/rfc7404

                                        I just did.  That article points out why you'd need a routeable address for management purposes, not routing.  Given that any interface that has a routeable address would also have a link local address (even my OpenVPN tunnel has a link local address), it's not an either/or situation.  Use a routeable address for management and link local for routing.  Regardless, a routeable address is not necessary for routing in IPv6.  Incidentally, some of the things in that article might make a case for using ULA and not global addresses.  ULA provides a routeable address that's not exposed externally.

                                        PfSense running on Qotom mini PC
                                        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                                        UniFi AC-Lite access point

                                        I haven't lost my mind. It's around here...somewhere...

                                        1 Reply Last reply Reply Quote 0
                                        • First post
                                          Last post
                                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.