Quantcast
Viewing all articles
Browse latest Browse all 60861

Enabling dhcpv6-pd pd on openvpn breaks ipv6 for LAN

With all the helpful posts I've managed to get everything working with my current provider XS4ALL.nl however, there is this one thing i just can't get my head around.

 

IPv6 works like a charm on the LAN however, when I enable dhcpv6-pd for vtun0 it only works for my openvnpn connection and no longer for machines on the LAN,

 

 

$ show configuration 
firewall {
    all-ping enable
    broadcast-ping disable
    ipv6-name WANv6_IN {
        default-action drop
        description "WAN inbound traffic forwarded to LAN"
        enable-default-log
        rule 10 {
            action accept
            description "Allow established/related sessions"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
    }
    ipv6-name WANv6_LOCAL {
        default-action drop
        description "WAN inbound traffic to the router"
        enable-default-log
        rule 10 {
            action accept
            description "Allow established/related sessions"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
        rule 30 {
            action accept
            description "Allow IPv6 icmp"
            protocol ipv6-icmp
        }
        rule 40 {
            action accept
            description "allow dhcpv6"
            destination {
                port 546
            }
            protocol udp
            source {
                port 547
            }
        }
    }
    ipv6-receive-redirects disable
    ipv6-src-route disable
    ip-src-route disable
    log-martians enable
    name WAN_IN {
        default-action drop
        description "WAN to internal"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
    }
    name WAN_LOCAL {
        default-action drop
        description "WAN to router"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
        rule 50 {
            action accept
            description OpenVPN
            destination {
                port 1194
            }
            log enable
            protocol udp
        }
    }
    options {
    }
    receive-redirects disable
    send-redirects enable
    source-validation disable
    syn-cookies enable
}
interfaces {
    ethernet eth0 {
        duplex auto
        mtu 1532
        speed auto
        vif 4 {
            address dhcp
            description "XS4ALL Routed IPTV"
            dhcp-options {
                client-option "send vendor-class-identifier "IPTV_RG";"
                client-option "request subnet-mask, routers, rfc3442-classless-static-routes;"
                default-route no-update
                default-route-distance 210
                name-server update
            }
            mtu 1500
        }
        vif 6 {
            description "Internet (PPPoE)"
            mtu 1508
            pppoe 0 {
                default-route auto
                dhcpv6-pd {
                    pd 0 {
                        interface eth1 {
                            host-address ::1
                            prefix-id :1
                            service slaac
                        }
                        interface eth2 {
                            host-address ::1
                            prefix-id :2
                            service slaac
                        }
                        interface vtun0 {
                        }
                        prefix-length 48
                    }
                    prefix-only
                    rapid-commit enable
                }
                firewall {
                    in {
                        ipv6-name WANv6_IN
                        name WAN_IN
                    }
                    local {
                        ipv6-name WANv6_LOCAL
                        name WAN_LOCAL
                    }
                }
                ipv6 {
                    address {
                        autoconf
                    }
                    dup-addr-detect-transmits 1
                    enable {
                    }
                }
                mtu 1500
                name-server auto
                password ****************
                user-id fb7490@xs4all.nl
            }
        }
    }
    ethernet eth1 {
        address 192.168.168.1/24
        description Local
        duplex auto
        speed auto
    }
    ethernet eth2 {
        address 192.168.178.1/24
        description "Local 2"
        duplex auto
        speed auto
    }
    ethernet eth3 {
        duplex auto
        speed auto
    }
    ethernet eth4 {
        duplex auto
        speed auto
    }
    ethernet eth5 {
        duplex auto
        speed auto
    }
    ethernet eth6 {
        duplex auto
        speed auto
    }
    ethernet eth7 {
        duplex auto
        speed auto
    }
    loopback lo {
    }
    openvpn vtun0 {
        description "OpenVPN server"
        encryption aes256
        hash sha256
        ipv6 {
            address {
                autoconf
            }
            dup-addr-detect-transmits 1
        }
        mode server
        openvpn-option "--port 1194"
        openvpn-option --tls-server
        openvpn-option "--comp-lzo yes"
        openvpn-option --persist-key
        openvpn-option --persist-tun
        openvpn-option "--keepalive 10 120"
        openvpn-option "--user nobody"
        openvpn-option "--group nogroup"
        openvpn-option "--push route-ipv6 ::/0"
        openvpn-option --tun-ipv6
        server {
            name-server 192.168.188.1
            push-route 192.168.168.0/24
            push-route 192.168.178.0/24
            subnet 192.168.188.0/24
        }
        tls {
            ca-cert-file /config/auth/cacert.pem
            cert-file /config/auth/host.pem
            dh-file /config/auth/dh2048.pem
            key-file /config/auth/host-decrypted.key
        }
    }
}
protocols {
    igmp-proxy {
        interface eth0.4 {
            alt-subnet 10.16.12.0/16
            alt-subnet 213.75.0.0/16
            role upstream
            threshold 1
        }
        interface eth1 {
            role downstream
            threshold 1
        }
    }
    static {
        route 213.75.112.0/21 {
            next-hop 10.194.232.1 {
            }
        }
    }
}
service {
    dhcp-server {
        disabled false
        global-parameters "option vendor-class-identifier code 60 = string;"
        global-parameters "option broadcast-address code 28 = ip-address;"
        hostfile-update disable
        shared-network-name LAN1 {
            authoritative enable
            subnet 192.168.168.0/24 {
                default-router 192.168.168.1
                dns-server 192.168.168.1
                lease 86400
                start 192.168.168.38 {
                    stop 192.168.168.243
                }
            }
        }
        shared-network-name LAN2 {
            authoritative enable
            subnet 192.168.178.0/24 {
                default-router 192.168.178.1
                dns-server 192.168.178.1
                lease 86400
                start 192.168.178.38 {
                    stop 192.168.178.243
                }
            }
        }
        use-dnsmasq disable
    }
    dns {
        forwarding {
            cache-size 150
            listen-on eth1
            listen-on eth2
            listen-on vtun0
        }
    }
    gui {
        http-port 80
        https-port 443
        older-ciphers enable
    }
    nat {
        rule 5000 {
            description IPTV
            destination {
                address 10.16.0.0/16
            }
            log disable
            outbound-interface eth0.4
            protocol all
            type masquerade
        }
        rule 5001 {
            description IPTV
            destination {
                address 213.75.112.0/21
            }
            log disable
            outbound-interface eth0.4
            protocol all
            type masquerade
        }
        rule 5010 {
            description "masquerade for WAN"
            outbound-interface pppoe0
            type masquerade
        }
    }
    ssh {
        port 22
        protocol-version v2
    }
    upnp {
        listen-on eth1 {
            outbound-interface pppoe0
        }
        listen-on eth2 {
            outbound-interface pppoe0
        }
    }
}
system {
    config-management {
        commit-revisions 64
    }
    domain-name xxxxx.nl
    host-name hq
    login {
        user xxxxxx {
            authentication {
                encrypted-password ****************
                public-keys user@domain.com {
                    key ****************
                    type ssh-rsa
                }
            }
            level admin
        }
    }
    ntp {
        server 0.ubnt.pool.ntp.org {
        }
        server 1.ubnt.pool.ntp.org {
        }
        server 2.ubnt.pool.ntp.org {
        }
        server 3.ubnt.pool.ntp.org {
        }
    }
    offload {
        hwnat disable
        ipsec enable
        ipv4 {
            forwarding enable
            pppoe enable
            vlan enable
        }
        ipv6 {
            forwarding enable
            vlan enable
        }
    }
    package {
        repository wheezy {
            components "main contrib non-free"
            distribution wheezy
            password ****************
            url http://mirror.leaseweb.com/debian
            username ""
        }
        repository wheezy-security {
            components main
            distribution wheezy/updates
            password ****************
            url http://security.debian.org
            username ""
        }
    }
    syslog {
        global {
            facility all {
                level notice
            }
            facility protocols {
                level debug
            }
        }
    }
    time-zone Europe/Amsterdam
    traffic-analysis {
        dpi enable
        export enable
    }
}

here's the part that breaks ipv6 for the LAN and makes it work for openvnp

 

 

 

# compare 2
[edit interfaces ethernet eth0 vif 6 pppoe 0 dhcpv6-pd pd 0 interface vtun0]
-host-address ::1
-prefix-id :100
-service slaac
[edit interfaces openvpn vtun0]
-openvpn-option "--server-ipv6 2001:984:674d:100::1/64"
[edit]

 

 

Any help is appreciated 


Viewing all articles
Browse latest Browse all 60861

Trending Articles