• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

IPv6 from ISP works, but WAN address is link local, not global

Scheduled Pinned Locked Moved IPv6
12 Posts 5 Posters 3.4k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • C
    cra
    last edited by Aug 29, 2018, 4:56 AM

    So my ISP offers IPv6 via prefix delegation, and I managed to get it to work, up to a point, with my pfSense. Hosts on my LAN all get global IP addresses, and they can reach the internet via IPv6 through the pfSense. However, my pfSense does not end up with a global address on the WAN, which is a problem for me, as I would like to land a VPN on the WAN interface. The WAN interface ends up with a link-local address instead.

    WAN config details:
    My ISP does not offer IA-NA via DHCP6, only IA-PD. As such "Request only an IPv6 prefix" is enabled.
    My ISP also does not provide router advertisements, so "Do not wait for a RA" is also enabled.
    The "DHCPv6 Prefix Delegation size" is a /56, for the curious.

    LAN config details:
    IPv6 is set to "Track Interface". It is tracking the WAN interface.

    As I said, the LAN interface ends up getting a global address, WAN does not.

    I did some rudimentary tracing on my pfSense using ssh, and it seems like when rtsold is soliciting for my ISP's router (due to "Do not wait for RA"), the ISP is returning a link local address (!) for the gateway, and the pfSense gains its own link local address, presumably in order to communicate with that gateway.

    How can I get my pfSense to also automatically dish out an IPv6 address to it's own WAN interface from the prefix delegation pool it received from the ISP?

    1 Reply Last reply Reply Quote 1
    • J
      JKnott
      last edited by Aug 29, 2018, 11:06 AM

      First off, routers don't need a routeable WAN address. What does your ISP say? Putting an address from your own block won't get much. With IPv6, routing is normally done using the link local address. A routeable address on the WAN port would only be used for things like configuration, testing, etc..

      PfSense running on Qotom mini PC
      i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
      UniFi AC-Lite access point

      I haven't lost my mind. It's around here...somewhere...

      1 Reply Last reply Reply Quote 1
      • C
        cra
        last edited by Aug 29, 2018, 1:35 PM

        Thanks for your reply, JKnott.

        First off, routers don't need a routeable WAN address.

        Agreed, clearly, IPv6 is working.

        What does your ISP say?

        They say "whats wrong with the box we gave you?", but when pressed, they say that their box gives itself a WAN address in the PD with the sla-id of ff. Presumably that is so they can "service" the box.

        A routeable address on the WAN port would only be used for things like configuration, testing, etc..

        ... serving a VPN? ☺

        If pfSense were just a router, I would just have to be content, I suppose.

        I already have a roadwarrior OpenVPN on the WAN interface with IPv4, I would also like it to listen and serve on IPv6.

        1 Reply Last reply Reply Quote 0
        • J
          JKnott
          last edited by Aug 29, 2018, 3:03 PM

          @cra said in IPv6 from ISP works, but WAN address is link local, not global:

          WAN address in the PD with the sla-id of ff

          Do you mean an address with the prefix ID of ff? That should still leave you with 255 prefixes available. So, if I'm reading your post correctly, the modem has the prefix ID of ff, leaving 0 - fe for your use, but nothing assigned to your WAN port. As for a VPN, there's no reason it has to terminate on the WAN port, if you have public addresses available on your LAN. Also, I run OpenVPN over IPv4, but it carries both IPv4 and IPv6. It uses my public IPv4 address.

          Where you would need a routeable IPv6 address on your WAN port is for things like ping and traceroute to the WAN interface. Without it, you can still ping or traceroute to LAN addresses.

          PfSense running on Qotom mini PC
          i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
          UniFi AC-Lite access point

          I haven't lost my mind. It's around here...somewhere...

          C 1 Reply Last reply Aug 30, 2018, 4:16 AM Reply Quote 0
          • G
            Grimson Banned
            last edited by Aug 29, 2018, 9:45 PM

            You could try adding an IPv6 VIP as your VPN interface.

            1 Reply Last reply Reply Quote 0
            • C
              cra @JKnott
              last edited by Aug 30, 2018, 4:16 AM

              Do you mean an address with the prefix ID of ff?

              Yeah, that is what I meant, my bad.

              I also apologise for not being more clear that I'm not using my ISP's device; the pfSense is plugged directly into the demarcation, as I do not want to use their device. I was describing how the ISP's device ends up with an IP on its WAN interface given the ISP's spartan DHCP service. It issues itself an address on the WAN interface from the PD received from the DHCP, something I have yet to figure out how to do on the pfSense.

              As for a VPN, there's no reason it has to terminate on the WAN port, if you have public addresses available on your LAN. Also, I run OpenVPN over IPv4, but it carries both IPv4 and IPv6. It uses my public IPv4 address.

              I get what you are saying, and it makes sense. I would really like to run a single OpenVPN configuration but listening on IPv4 and IPv6 without having to a) duplicate configs and OpenVPN server instances and b) having to do some kind port forward trick so they can both land on the same adaptor to achieve that. I understand that serving OpenVPN just from IPv4 works for you, but I'd like the diversity of serving mine from IPv4 and IPv6.

              I would also like my LAN firewall rules to pertain strictly to LAN traffic, and WAN firewall rules to pertain strictly to WAN traffic. If I served OpenVPN from the LAN interface, and for argument's sake wanted to filter incoming connections to the VPN service to those originating only from a certain block of IPs, I would have rules describing WAN traffic in my LAN rules. Not a big deal, I know, but when I come back to it 2 years from now, or have someone else look at it, it would be confusing for them or future me.

              I think Grimson's suggestion is close to what I am looking for.

              You could try adding an IPv6 VIP as your VPN interface.

              This works until my ISP's DHCP decides to change my PD. If I could find a way to do this dynamically based on my PD, I think I'm golden. Any ideas?

              1 Reply Last reply Reply Quote 0
              • D
                Derelict LAYER 8 Netgate
                last edited by Sep 1, 2018, 4:16 PM

                They shouldn't change your PD. If they do they are doing it wrong. They should honor the DUID and issue you the same PD every time. At least as long as your router doesn't vanish from the network for an extended period of time or otherwise explicitly release the PD.

                Chattanooga, Tennessee, USA
                A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                Do Not Chat For Help! NO_WAN_EGRESS(TM)

                J 1 Reply Last reply Sep 1, 2018, 7:21 PM Reply Quote 0
                • J
                  JKnott @Derelict
                  last edited by Sep 1, 2018, 7:21 PM

                  @derelict said in IPv6 from ISP works, but WAN address is link local, not global:

                  They should honor the DUID and issue you the same PD every time.

                  Make sure "Do not allow PD/Address release" is selected on the WAN interface.

                  PfSense running on Qotom mini PC
                  i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                  UniFi AC-Lite access point

                  I haven't lost my mind. It's around here...somewhere...

                  1 Reply Last reply Reply Quote 0
                  • C
                    cra
                    last edited by Sep 9, 2018, 4:43 PM

                    Thanks everyone. I'm combining the last two posts from Derelict and JKnott and crossing my fingers to see if my ISP will do it right in the long term!

                    1 Reply Last reply Reply Quote 0
                    • J
                      jeroenh
                      last edited by May 12, 2020, 7:31 AM

                      I am facing the exact same issue as the topic starter. Are there any ways added to recent versions to achieve this without creating additional interfaces?

                      J 1 Reply Last reply May 12, 2020, 10:43 AM Reply Quote 0
                      • J
                        JKnott @jeroenh
                        last edited by May 12, 2020, 10:43 AM

                        @jeroenh said in IPv6 from ISP works, but WAN address is link local, not global:

                        Are there any ways added to recent versions to achieve this without creating additional interfaces?

                        ????

                        What do you mean by that?

                        PfSense running on Qotom mini PC
                        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                        UniFi AC-Lite access point

                        I haven't lost my mind. It's around here...somewhere...

                        J 1 Reply Last reply May 12, 2020, 11:52 AM Reply Quote 0
                        • J
                          jeroenh @JKnott
                          last edited by May 12, 2020, 11:52 AM

                          @JKnott I misunderstood that I needed an extra interface to tie the VIP to. But I see I can just create one and tie it to the WAN interface. I just confirmed this works as expected.

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                            This community forum collects and processes your personal information.
                            consent.not_received