# internal lanmyuser@myhost ~ % nc -6 -z -w 2 2xxx:xxxx:xxxx:xxxx:21a:8cff:fe43:32f8 29930Connection to 2xxx:xxxx:xxxx:xxxx:21a:8cff:fe43:32f8 port 29930 [tcp/*] succeeded!# on OPNsenseroot@OPNsense:/var/log # nc -6 -z -w 2 2xxx:xxxx:xxxx:xxxx:21a:8cff:fe43:32f8 29930Connection to 2xxx:xxxx:xxxx:xxxx:21a:8cff:fe43:32f8 29930 port [tcp/*] succeeded!
root@OPNsense:/var/log # netstat -an | grep 29930tcp46 0 0 *.29930 *.* LISTEN
Setting timezone: Etc/UTCWriting firmware settings: FreeBSD OPNsenseWriting trust files...done.Scanning /usr/share/certs/blacklisted for certificates...Scanning /usr/share/certs/trusted for certificates...Scanning /usr/local/share/certs for certificates...Writing trust bundles...done.Setting hostname: OPNsense.localdomainGenerating /etc/resolv.conf...done.Generating /etc/hosts...done.Configuring system logging...done.Configuring firewall.......done.Configuring hardware interfaces...done.Configuring loopback interface...done.Configuring LAGG interfaces...done.Configuring VLAN interfaces...done.Configuring OPT1 interface...done.Configuring interconnect interface...done.Configuring LAN interface...done.Configuring WAN interface...^CEnter full pathname of shell or RETURN for /bin/sh: root@OPNsense:/ # root@OPNsense:/ # root@OPNsense:/ # ifconfig igb0igb0: flags=8863<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500 description: LAN (lan) options=4800028<VLAN_MTU,JUMBO_MTU,NOMAP> ether 00:1a:8c:43:32:f8 inet 192.168.1.1 netmask 0xffffff00 broadcast 192.168.1.255 inet6 fe80::21a:8cff:fe43:32f8%igb0 prefixlen 64 scopeid 0x1 media: Ethernet autoselect (1000baseT <full-duplex>) status: active nd6 options=21<PERFORMNUD,AUTO_LINKLOCAL>root@OPNsense:/ # ifconfig igb1igb1: flags=8863<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500 options=4800028<VLAN_MTU,JUMBO_MTU,NOMAP> ether 00:1a:8c:43:32:f9 inet 0.0.0.0 netmask 0xff000000 broadcast 255.255.255.255 media: Ethernet autoselect (1000baseT <full-duplex>) status: active nd6 options=29<PERFORMNUD,IFDISABLED,AUTO_LINKLOCAL>
root@OPNsense:/var/etc/openvpn # cat server2.conf dev ovpns2verb 3dev-type tundev-node /dev/tun2writepid /var/run/openvpn_server2.pidscript-security 3daemon openvpn_server2keepalive 10 60ping-timer-rempersist-tunpersist-keyproto tcp-servercipher AES-256-CBCauth SHA256up /usr/local/etc/inc/plugins.inc.d/openvpn/ovpn-linkupdown /usr/local/etc/inc/plugins.inc.d/openvpn/ovpn-linkdownclient-disconnect "/usr/local/opnsense/scripts/openvpn/ovpn_event.py '2'"tls-serverserver 10.10.0.0 255.255.255.0client-config-dir /var/etc/openvpn-csc/2verify-client-cert noneusername-as-common-nameauth-user-pass-verify "/usr/local/opnsense/scripts/openvpn/ovpn_event.py --defer '2'" via-envlearn-address "/usr/local/opnsense/scripts/openvpn/ovpn_event.py '2'"lport 29930management /var/etc/openvpn/server2.sock unixpush "route 192.168.1.0 255.255.255.0"duplicate-cnca /var/etc/openvpn/server2.ca cert /var/etc/openvpn/server2.cert key /var/etc/openvpn/server2.key dh /usr/local/etc/inc/plugins.inc.d/openvpn/dh.rfc7919tls-auth /var/etc/openvpn/server2.tls-auth 0
# Set log file verbosity.verb 3
dev tunverb 3persist-tunpersist-keyproto tcp-clientdata-ciphers-fallback AES-256-CBCauth SHA256clientresolv-retry infiniteremote 192.168.1.1 29930 tcplport 0auth-user-pass
wan IPv6 hinterlegt, so dass ich darüber ein Mapping von IPv4 zur mir nach Hause herstellen kann.
Ich möchte vom ipv4 Client die OPNsense erreichen.
Dies bewerkstellige ich über feste-ip.net, wo die IPv6 der OPNsense hinterlegt ist.
Somit kann der Client den ipv4 dns Eintrag von feste-ip.net verwenden
Ich habe einen Anschluss der Deutschen Glasfaser und somit keine ipv4 über die ich erreichbar wäre.