Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    OpenVPN and Deutsche Glasfaser - IPV6 and CGNAT blocking connection?

    Scheduled Pinned Locked Moved OpenVPN
    45 Posts 5 Posters 6.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • C
      charry2014
      last edited by charry2014

      Yes. My phone (Samsung S20) is on Vodafone in Germany and I have read that they have IPv6 nationwide.
      Edit - I did some digging and it has an IPv6 address too.

      Bob.DigB 1 Reply Last reply Reply Quote 0
      • Bob.DigB
        Bob.Dig LAYER 8 @charry2014
        last edited by

        @charry2014 That's great, you don't need any IPv4, at least not if you want to connect the phone to home via OVPN.

        1 Reply Last reply Reply Quote 0
        • C
          charry2014
          last edited by

          The site https://ipv6-test.com/ reports that my firewall is filtering ICMP v6 messages. Could this be a problem for OpenVPN? I am suspecting it might. How do I enable this?

          JKnottJ 1 Reply Last reply Reply Quote 0
          • Bob.DigB
            Bob.Dig LAYER 8
            last edited by Bob.Dig

            No. How is your IPv6 configured? I think your ISP is doing native IPv6.

            1 Reply Last reply Reply Quote 0
            • C
              charry2014
              last edited by

              I think so too, but I am not sure of much from my ISP.

              One thing I did notice is that when I connect to whatismyipaddress.com or similar from different computers in my LAN that the IPv6 address that is returned is different for each one. The IPv4 address is the same, as I would expect. Now I think I am stumbling into a noob difference between IPv4 and IPv6 addresses.

              So the question - what actually is the IPv6 address of my PFSense WAN?

              JKnottJ 1 Reply Last reply Reply Quote 0
              • Bob.DigB
                Bob.Dig LAYER 8
                last edited by Bob.Dig

                You can see it in the interfaces-gadget and other places. 😉 (Status - Interfaces)

                1 Reply Last reply Reply Quote 0
                • C
                  charry2014
                  last edited by

                  Alright - so it is something like 2a00:61e0:abcd🔢:?

                  It is not the much longer address 2a00:61e0:b00b5:34dd:6969:beef:babe:face?

                  Bob.DigB 1 Reply Last reply Reply Quote 0
                  • Bob.DigB
                    Bob.Dig LAYER 8 @charry2014
                    last edited by Bob.Dig

                    @charry2014 Can't say but maybe you did something wrong. Try this and go for DHCPv6 and not 6rd.

                    1 Reply Last reply Reply Quote 0
                    • C
                      charry2014
                      last edited by

                      Boom - that did it - using the IPv6 address for the WAN as shown in the Interfaces widget on the dashboard packets are now flowing.

                      I now get an authentication error, but the connection is there. Authentication errors are kinda the staple for getting OpenVPN working so somehow I am back on known territory now.

                      1 Reply Last reply Reply Quote 0
                      • JKnottJ
                        JKnott @charry2014
                        last edited by

                        @charry2014

                        No, OpenVPN uses UDP, not ICMPv6. However, ICMPv6 is used for a lot of things, so be careful about any rules blocking it.

                        PfSense running on Qotom mini PC
                        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                        UniFi AC-Lite access point

                        I haven't lost my mind. It's around here...somewhere...

                        1 Reply Last reply Reply Quote 0
                        • JKnottJ
                          JKnott @charry2014
                          last edited by

                          @charry2014

                          One nice thing about IPv6 is there are plenty of addresses to go around. This means no longer having to share an address with NAT. Not only does each device get an address, it will often get several. With SLAAC, privacy addresses are often used. These are random number based addresses and you get a new one every day. They expire after a week. This is in addition to the consistent address, so you could have as many as 8 public addresses on each device.

                          PfSense running on Qotom mini PC
                          i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                          UniFi AC-Lite access point

                          I haven't lost my mind. It's around here...somewhere...

                          1 Reply Last reply Reply Quote 0
                          • C
                            charry2014
                            last edited by

                            Thanks everyone for your help - it seems that a little background reading would be a good idea sometime soon. This may well change the settings in the firewall rules, then?

                            JKnottJ 1 Reply Last reply Reply Quote 0
                            • JKnottJ
                              JKnott @charry2014
                              last edited by

                              @charry2014

                              That depends on what the rules do. If filtering on protocol, then you can often create a single rule that handles both. If filtering on address, then you'd need separate rules.

                              PfSense running on Qotom mini PC
                              i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                              UniFi AC-Lite access point

                              I haven't lost my mind. It's around here...somewhere...

                              1 Reply Last reply Reply Quote 0
                              • C
                                charry2014
                                last edited by

                                So here it is, best I can remember it. All the things I changed to get this working:

                                System - Advanced - Networking
                                a539b8e1-4fea-4842-a249-397b68fe9769-image.png

                                Interfaces - WAN
                                0f469929-d495-4ecc-918c-10c081001e7f-image.png
                                d5ac4ad4-c53f-4b6c-b78b-d608e71c7687-image.png

                                Interfaces - LAN:
                                cb7eb2b6-7155-4731-8e0d-eeae16b2cae9-image.png
                                6655c340-d9fb-4936-ae80-1b32133c45ef-image.png

                                The PFSense WAN IPv6 address is then in the Dashboard.

                                Finally I meant to link to beechy.de above but got the wrong link pasted in.

                                JKnottJ 1 Reply Last reply Reply Quote 0
                                • JKnottJ
                                  JKnott @charry2014
                                  last edited by

                                  @charry2014

                                  That link @Bob-Dig provided says 6rd is going to be shut down, which means you should be configuring for DHCPv6 instead. My ISP did the same thing. They provided both 6rd and 6to4 tunnels, until they provided native IPv6 via DHCPv6-PD. This is what you should be configuring for, as that link describes.

                                  PfSense running on Qotom mini PC
                                  i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                                  UniFi AC-Lite access point

                                  I haven't lost my mind. It's around here...somewhere...

                                  1 Reply Last reply Reply Quote 1
                                  • C
                                    charry2014
                                    last edited by

                                    @Bob-Dig said in OpenVPN and Deutsche Glasfaser - IPV6 and CGNAT blocking connection?:

                                    this

                                    Feeling brave I tried DHCPv6 like suggested instead of 6rd and from a quick late-night hack it broke the IPv6 connectivity for me. This is one for more experimentation.

                                    For the moment my pressing requirement is to fix my OpenVPN authentication issue rather than future-proofing the IPv6 connection.

                                    1 Reply Last reply Reply Quote 0
                                    • C
                                      charry2014
                                      last edited by

                                      My authentication problems seem to be documented as a PFSense bug here so I have downgraded the login to SSL/TLS only and it works. Will keep researching the correct settings for DHCPv6. Cue small celebration here...

                                      One further question - is there any way I can access my home network over IPv4? This would be very handy, for one thing my employer only allows IPv4 traffic through their network, and I am sure to travel to corners of the world where the mobile network is not quite so modern as here. I have no idea what options there may be for this.

                                      JKnottJ 1 Reply Last reply Reply Quote 0
                                      • DerelictD
                                        Derelict LAYER 8 Netgate
                                        last edited by

                                        If you mean connecting to your home network over an IPv4 tunnel, with IPv4 endpoints, probably not.

                                        Chattanooga, Tennessee, USA
                                        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                        Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                        1 Reply Last reply Reply Quote 0
                                        • JKnottJ
                                          JKnott @charry2014
                                          last edited by

                                          @charry2014

                                          Not with that CGNAT address. Perhaps you could get an IPv6 tunnel from he.net. It will send IPv6 in IPv4 UDP packets, similar to that 6rd tunnel you were using. Then you'd use IPv6 to access your network.

                                          It sure will be nice when the world moves fully to IPv6, so that we can put all this NAT nonsense behind us.

                                          PfSense running on Qotom mini PC
                                          i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                                          UniFi AC-Lite access point

                                          I haven't lost my mind. It's around here...somewhere...

                                          1 Reply Last reply Reply Quote 0
                                          • DerelictD
                                            Derelict LAYER 8 Netgate
                                            last edited by

                                            I think he was asking about accessing his network from an IPv4 source. Seems he has IPv6 worked out.

                                            Chattanooga, Tennessee, USA
                                            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                            Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.