There is no segment with /48. You get your /48 from the ISP to assign /64 chunks to your segments. Not minimum, not maximum. Exactly!
OK, so on WAN you configure the same prefix that the OpenWRT router has got on its LAN. Sorry, I missed the part that there is a full featured router in place already.Just pick two addresses you like from that /64 and configure statically. Then as CARP configure a third address from that /64.On the OpenWRT configure this third address as the gateway for the entire /48.Then pick another /64 from your /48 and configure two static addresses with /64 prefix length on LAN of both your firewalls. For CARP configure e.g. fe80::<some small number you like, VLAN ID if existent, or simply "1">.Enable router advertisements, unmanaged, on LAN.Done.
The OpenWRT router should have a /64 on its LAN side just like every other systemAll interfaces are /64. Putting a /48 prefix length on an interface is wrong. Period. If that system was configured by your ISP they don't know IPv6.Do you have administrative access to that router? Change the prefix length to /64, then proceed as I wrote above.The OpenWRT is the default gateway for all systems that are directly connected to its LAN side. For all other /64s the default gateway is the OPNsense CARP address in that network.
So basically it's going to be the OPNSense that's going to route from all the different /64 Networks to the Subnet of the OpenWRT Router ?
Isn't that either doing NAT or generating a "Default Deny State Violation" ?
Quote from: luckylinux on May 13, 2024, 02:01:53 pmIsn't that either doing NAT or generating a "Default Deny State Violation" ?With proper rules - no.
even with Outbound NAT for IPv6 it's
Quote even with Outbound NAT for IPv6 it's<sound of me eating my desk>
eno1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen 1000 inet6 2aXX:XXX4:XXXX:1:XXXX:XXXX:a9f2:1858/128 scope global deprecated valid_lft forever preferred_lft 0sec inet6 2aXX:XXX4:XXXX:1:XXXX:XXXX:fe79:2d9a/64 scope global dynamic mngtmpaddr noprefixroute valid_lft 86388sec preferred_lft 14388sec
OK ... I REALLY hope somebody could bring some clarity to the current status.OpenWRT Fiber Router is able to ping IPv6 (testing with Google DNS Server 2001:4860:4860::8888) all the time.OPNSense Router1 is able to ping IPv6 (testing with Google DNS Server 2001:4860:4860::8888) all the time.OPNSense Router2 is able to ping IPv6 (testing with Google DNS Server 2001:4860:4860::8888) all the time.On the other Hand, OPNsense Router DHCP Clients, lose IPv6 Ping "capability" after a while.Nothing shows up in Firewall -> Log Files -> Live View (well, what shows is "Green" ).I'm suspecting an issue where the OPNsense CARP is misconfigured or misbehaving, like Packets are maybe going from LAN Client to OPNSense Router1, go to OpenWRT, then to the Internet, the reply comes back to OpenWRT, forwards to OPNSense CARP Adress and for some reason it goes to OPNSense Router2.I'm not sure what to think otherwise .No problem with IPv4, but IPv6 seems to last maximum a day, or as little as a few hours (didn't measure precisely ).I wanted to use a Podman/Docker Container to monitor a Remote Host using IPv6 for this exact Reason, EXCEPT that Podman/Docker Rootless Containers don't really work well with IPv6 and external Routes to the Host.So I cannot even monitor another HOST in the LAN with IPv6 at the moment from inside a Docker/Podman Container .
Attached Network Diagram.For a bit added clarity:- RED: segment of the IPv6 Delegation Prefix for WAN-interfaced Zones- BLUE: segment of the IPv6 Delegation Prefix for LAN-interfaced Zones