Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    IPv6 Firewall Rules

    Scheduled Pinned Locked Moved Firewalling
    4 Posts 3 Posters 516 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S
      smaxwell2
      last edited by

      Hi All,

      Hopefully a simple one. Just getting my setup fully IPv6 enabled, now that I finally have my head around it + subnetting etc.

      So I have around 40x VLANS on pfSense.

      For each interface, I used to do the following

      RULE 1 - Allow X Traffic to other VLANS where required
      RULE 2 - BLOCK ALL Traffic to Private IPv4 Address Range
      RULE 3 - Allow ANY Outbound (Limited to certain ports if required)

      This works perfectly. Simple, secure, and stopped VLANS being able to talk to other VLANS unless required.

      With IPv6 though, how can I achieve the same result? As there is no longer a Private IPv6 Range / Subnet, as they are all publicly routable IPv6 Addresses.

      Thanks, Scott

      NogBadTheBadN JKnottJ 2 Replies Last reply Reply Quote 0
      • NogBadTheBadN
        NogBadTheBad @smaxwell2
        last edited by NogBadTheBad

        @smaxwell2 said in IPv6 Firewall Rules:

        So I have around 40x VLANS on pfSense.
        For each interface, I used to do the following
        RULE 1 - Allow X Traffic to other VLANS where required
        RULE 2 - BLOCK ALL Traffic to Private IPv4 Address Range
        RULE 3 - Allow ANY Outbound (Limited to certain ports if required)
        This works perfectly. Simple, secure, and stopped VLANS being able to talk to other VLANS unless required.
        With IPv6 though, how can I achieve the same result? As there is no longer a Private IPv6 Range / Subnet, as they are all publicly routable IPv6 Addresses.
        Thanks, Scott

        Create aliases with all your subnets and block on each interface, add an allow for services the firewall provides and put it above the block rule.

        Then add a pass any any at the bottom.

        If you have the 40 vlan interfaces on pfSense maybe use floating rules.

        Screenshot 2021-03-15 at 14.27.42.png

        Screenshot 2021-03-15 at 14.32.03.png

        The /48 is the full allocation from my ISP.

        Andy

        1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

        S 1 Reply Last reply Reply Quote 0
        • S
          smaxwell2 @NogBadTheBad
          last edited by

          @nogbadthebad This makes perfect sense !

          Great :) Thanks very much - knew I was thinking about this the wrong way.

          I'll just create 1 x Alias with my /48 (which will include all my /60s and /64s)

          Then do exactly as you said :)

          Thanks again

          1 Reply Last reply Reply Quote 0
          • JKnottJ
            JKnott @smaxwell2
            last edited by

            @smaxwell2 said in IPv6 Firewall Rules:

            So I have around 40x VLANS on pfSense.

            40???? Why so many? Are you trying to do something that might be better done another way?

            PfSense running on Qotom mini PC
            i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
            UniFi AC-Lite access point

            I haven't lost my mind. It's around here...somewhere...

            1 Reply Last reply Reply Quote 0
            • First post
              Last post
            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.