Some thoughts:- IPv6 subnets with hosts on them are /64- Your WAN doesn't need a routable address since it forwards over link-local to the ISP router (fe80: and doesn't NAT- DHCPv6 is an edge case - use RADV instead- Internal servers should have static IPv6 addresses unless you want to use mDNS- Tunnels are just subnets and you can delegate /64 subnets from your range to each (you have plenty)- Different security policies require different tunnels - you can run loads of them by picking different ports- Enable ICMPv6 liberally since your multicast stuff relies on itBart...
If I need to receive traffic on the firewalls (load balancing, or any other service running on them), should I allocate an /64 then?.
When do you use /80?
I was looking at DHCPv6 only because of: * reservations / static assignments from a central point* DNS integration/update (assuming it's the same as IPv4)
My usecase is Roadwarrior VPN, so it would be a single server. Should I delegate an /64 per user in the overrides?. The mapping to users seems complicated doing it by IP moving to IPv6, I don't see any other capabilities as found in other firewall products.
Any special treatment for CARP setups (2 node cluster)?
Quote from: random1104 on July 09, 2021, 03:53:23 pmMy usecase is Roadwarrior VPN, so it would be a single server. Should I delegate an /64 per user in the overrides?. The mapping to users seems complicated doing it by IP moving to IPv6, I don't see any other capabilities as found in other firewall products.Security policy divides your users into several roles, and assigns them permissions based on those roles. You can enforce permissions through authentication on your servers and/or firewall rules that restrict access. Your groups should have multiple users though. Apply the KISS principle.
Quote from: random1104 on July 09, 2021, 03:53:23 pmI was looking at DHCPv6 only because of: * reservations / static assignments from a central point* DNS integration/update (assuming it's the same as IPv4)Not much is the same as IPv4, I'm afraid. If you have a server, you can resolve its name using traditional DNS with AAAA records pointing to a static IPv6, or you can use mDNS which uses multicast (a.k.a. Avahi, Zeroconf, Bonjour). Both your server and your client need to support mDNS.Easiest to have mDNS internally and publish your servers on public DNS through domains you own. Something like myserver.local and myserver.mydomain.tld.
Well, my ISP provided little guidance :/First I got fe80:<something> advertisement for gateway, then they changed the configuration to use my <delegated>::1/48 GUA on their side, so I set <delegated>:10/64 on my side and I can ping the outside world from the firewall.Also set <delegated>:ffff::0/64 for LAN, and <delegated>::fffe::0/64 for a test subnet. DHCP6 + Assisted RA is working, since I get an IP and a gateway. Traffic between subnets work, but traffic from the internal subnets to Internet don't. Firewall logs don't show any blocked traffic.Do I need RA on WAN?, do the ISP need to set static routing or something like that?