mirror of
				https://github.com/vyos/vyos-documentation.git
				synced 2025-11-04 00:02:05 +01:00 
			
		
		
		
	
		
			
				
	
	
		
			208 lines
		
	
	
		
			6.6 KiB
		
	
	
	
		
			ReStructuredText
		
	
	
	
	
	
			
		
		
	
	
			208 lines
		
	
	
		
			6.6 KiB
		
	
	
	
		
			ReStructuredText
		
	
	
	
	
	
.. _examples-tunnelbroker-ipv6:
 | 
						|
 | 
						|
#######################
 | 
						|
Tunnelbroker.net (IPv6)
 | 
						|
#######################
 | 
						|
 | 
						|
| Testdate: 2021-12-30
 | 
						|
| Version: 1.4-rolling-202112211328
 | 
						|
 | 
						|
This guide walks through the setup of https://www.tunnelbroker.net/ for an
 | 
						|
IPv6 Tunnel.
 | 
						|
 | 
						|
Prerequisites
 | 
						|
=============
 | 
						|
 | 
						|
- A public, routable IPv4 address. This does not necessarily need to be static,
 | 
						|
  but you will need to update the tunnel endpoint when/if your IP address
 | 
						|
  changes, which can be done with a script and a scheduled task.
 | 
						|
- Account at https://www.tunnelbroker.net/
 | 
						|
- Requested a "Regular Tunnel". You want to choose a location that is closest
 | 
						|
  to your physical location for the best response time.
 | 
						|
 | 
						|
 | 
						|
********
 | 
						|
Topology
 | 
						|
********
 | 
						|
 | 
						|
The example topology has 2 VyOS routers. One as The WAN Router and on as a
 | 
						|
Client, to test a single LAN setup
 | 
						|
 | 
						|
.. image:: _include/topology.png
 | 
						|
  :alt: Tunnelbroker topology image
 | 
						|
 | 
						|
 | 
						|
*************
 | 
						|
Configuration
 | 
						|
*************
 | 
						|
 | 
						|
First, we configure the ``vyos-wan`` interface to get a DHCP address.
 | 
						|
 | 
						|
.. literalinclude:: _include/vyos-wan.conf
 | 
						|
   :language: none
 | 
						|
 | 
						|
 | 
						|
Now we are able to setup the tunnel interface.
 | 
						|
 | 
						|
.. literalinclude:: _include/vyos-wan_tun0.conf
 | 
						|
   :language: none
 | 
						|
   :lines: 1-5
 | 
						|
 | 
						|
Setup the ipv6 default route to the tunnel interface
 | 
						|
 | 
						|
.. literalinclude:: _include/vyos-wan_tun0.conf
 | 
						|
   :language: none
 | 
						|
   :lines: 7
 | 
						|
 | 
						|
Now you should be able to ping a public IPv6 Address
 | 
						|
 | 
						|
 | 
						|
.. code-block:: none
 | 
						|
 | 
						|
   vyos@vyos-wan:~$ ping 2001:470:20::2 count 4
 | 
						|
   PING 2001:470:20::2(2001:470:20::2) 56 data bytes
 | 
						|
   64 bytes from 2001:470:20::2: icmp_seq=1 ttl=64 time=31.2 ms
 | 
						|
   64 bytes from 2001:470:20::2: icmp_seq=2 ttl=64 time=30.2 ms
 | 
						|
   64 bytes from 2001:470:20::2: icmp_seq=3 ttl=64 time=31.0 ms
 | 
						|
   64 bytes from 2001:470:20::2: icmp_seq=4 ttl=64 time=30.8 ms
 | 
						|
   
 | 
						|
   --- 2001:470:20::2 ping statistics ---
 | 
						|
   4 packets transmitted, 4 received, 0% packet loss, time 3004ms
 | 
						|
   rtt min/avg/max/mdev = 30.221/30.820/31.246/0.385 ms
 | 
						|
 | 
						|
 | 
						|
Assuming the pings are successful, you need to add some DNS servers.
 | 
						|
Some options:
 | 
						|
 | 
						|
.. literalinclude:: _include/vyos-wan_tun0.conf
 | 
						|
   :language: none
 | 
						|
   :lines: 13
 | 
						|
 | 
						|
You should now be able to ping something by IPv6 DNS name:
 | 
						|
 | 
						|
 | 
						|
.. code-block:: none
 | 
						|
 | 
						|
   vyos@vyos-wan:~$ ping tunnelbroker.net count 4
 | 
						|
   PING tunnelbroker.net(tunnelbroker.net (2001:470:0:63::2)) 56 data bytes
 | 
						|
   64 bytes from tunnelbroker.net (2001:470:0:63::2): icmp_seq=1 ttl=54 time=179 ms
 | 
						|
   64 bytes from tunnelbroker.net (2001:470:0:63::2): icmp_seq=2 ttl=54 time=180 ms
 | 
						|
   64 bytes from tunnelbroker.net (2001:470:0:63::2): icmp_seq=3 ttl=54 time=180 ms
 | 
						|
   64 bytes from tunnelbroker.net (2001:470:0:63::2): icmp_seq=4 ttl=54 time=180 ms
 | 
						|
   
 | 
						|
   --- tunnelbroker.net ping statistics ---
 | 
						|
   4 packets transmitted, 4 received, 0% packet loss, time 3004ms
 | 
						|
   rtt min/avg/max/mdev = 179.221/179.943/180.340/0.427 ms
 | 
						|
 | 
						|
 | 
						|
*****************
 | 
						|
LAN Configuration
 | 
						|
*****************
 | 
						|
 | 
						|
At this point, your VyOS install should have full IPv6, but now your LAN devices
 | 
						|
need access.
 | 
						|
 | 
						|
With Tunnelbroker.net, you have two options:
 | 
						|
 | 
						|
- Routed /64. This is the default assignment. In IPv6-land, it's good for a
 | 
						|
  single "LAN", and is somewhat equivalent to a /24.
 | 
						|
 | 
						|
- Routed /48. This is something you can request by clicking the "Assign /48"
 | 
						|
  link in the Tunnelbroker.net tunnel config. It allows you to have up to 65k
 | 
						|
 | 
						|
Unlike IPv4, IPv6 is really not designed to be broken up smaller than /64. So
 | 
						|
if you ever want to have multiple LANs, VLANs, DMZ, etc, you'll want to ignore
 | 
						|
the assigned /64, and request the /48 and use that.
 | 
						|
 | 
						|
 | 
						|
Single LAN Setup
 | 
						|
================
 | 
						|
 | 
						|
Single LAN setup where eth2 is your LAN interface. Use the Tunnelbroker
 | 
						|
Routed /64 prefix:
 | 
						|
 | 
						|
.. literalinclude:: _include/vyos-wan_tun0.conf
 | 
						|
   :language: none
 | 
						|
   :lines: 9-11
 | 
						|
 | 
						|
Please note, 'autonomous-flag' and 'on-link-flag' are enabled by default,
 | 
						|
'valid-lifetime' and 'preferred-lifetime' are set to default values of
 | 
						|
30 days and 4 hours respectively.
 | 
						|
 | 
						|
And the ``client`` to receive an IPv6 address with stateless autoconfig.
 | 
						|
 | 
						|
.. literalinclude:: _include/client.conf
 | 
						|
   :language: none
 | 
						|
 | 
						|
This accomplishes a few things:
 | 
						|
 | 
						|
- Sets your LAN interface's IP address
 | 
						|
- Enables router advertisements. This is an IPv6 alternative for DHCP (though
 | 
						|
  DHCPv6 can still be used). With RAs, Your devices will automatically find the
 | 
						|
  information they need for routing and DNS.
 | 
						|
 | 
						|
Now the Client is able to ping a public IPv6 address
 | 
						|
 | 
						|
 | 
						|
.. code-block:: none
 | 
						|
 | 
						|
   vyos@client:~$ ping 2001:470:20::2 count 4
 | 
						|
   PING 2001:470:20::2(2001:470:20::2) 56 data bytes
 | 
						|
   64 bytes from 2001:470:20::2: icmp_seq=1 ttl=63 time=32.3 ms
 | 
						|
   64 bytes from 2001:470:20::2: icmp_seq=2 ttl=63 time=31.1 ms
 | 
						|
   64 bytes from 2001:470:20::2: icmp_seq=3 ttl=63 time=30.2 ms
 | 
						|
   64 bytes from 2001:470:20::2: icmp_seq=4 ttl=63 time=31.6 ms
 | 
						|
   
 | 
						|
   --- 2001:470:20::2 ping statistics ---
 | 
						|
   4 packets transmitted, 4 received, 0% packet loss, time 3005ms
 | 
						|
   rtt min/avg/max/mdev = 30.234/31.293/32.269/0.748 ms
 | 
						|
 | 
						|
 | 
						|
Multiple LAN/DMZ Setup
 | 
						|
======================
 | 
						|
 | 
						|
That's how you can expand the example above.
 | 
						|
Use the `Routed /48` information. This allows you to assign a
 | 
						|
different /64 to every interface, LAN, or even device. Or you could break your
 | 
						|
network into smaller chunks like /56 or /60.
 | 
						|
 | 
						|
The format of these addresses:
 | 
						|
 | 
						|
- `2001:470:xxxx::/48`: The whole subnet. xxxx should come from Tunnelbroker.
 | 
						|
- `2001:470:xxxx:1::/64`: A subnet suitable for a LAN
 | 
						|
- `2001:470:xxxx:2::/64`: Another subnet
 | 
						|
- `2001:470:xxxx:ffff:/64`: The last usable /64 subnet.
 | 
						|
 | 
						|
In the above examples, 1,2,ffff are all chosen by you. You can use 1-ffff
 | 
						|
(1-65535).
 | 
						|
 | 
						|
So, when your LAN is eth1, your DMZ is eth2, your cameras are on eth3, etc:
 | 
						|
 | 
						|
.. code-block:: none
 | 
						|
 | 
						|
  set interfaces ethernet eth1 address '2001:470:xxxx:1::1/64'
 | 
						|
  set service router-advert interface eth1 name-server '2001:470:20::2'
 | 
						|
  set service router-advert interface eth1 prefix 2001:470:xxxx:1::/64
 | 
						|
 | 
						|
  set interfaces ethernet eth2 address '2001:470:xxxx:2::1/64'
 | 
						|
  set service router-advert interface eth2 name-server '2001:470:20::2'
 | 
						|
  set service router-advert interface eth2 prefix 2001:470:xxxx:2::/64
 | 
						|
 | 
						|
  set interfaces ethernet eth3 address '2001:470:xxxx:3::1/64'
 | 
						|
  set service router-advert interface eth3 name-server '2001:470:20::2'
 | 
						|
  set service router-advert interface eth3 prefix 2001:470:xxxx:3::/64
 | 
						|
 | 
						|
Please note, 'autonomous-flag' and 'on-link-flag' are enabled by default,
 | 
						|
'valid-lifetime' and 'preferred-lifetime' are set to default values of
 | 
						|
30 days and 4 hours respectively.
 | 
						|
 | 
						|
Firewall
 | 
						|
========
 | 
						|
 | 
						|
Finally, don't forget the :ref:`firewall`. The usage is identical, except for
 | 
						|
instead of `set firewall name NAME`, you would use `set firewall ipv6-name
 | 
						|
NAME`.
 | 
						|
 | 
						|
Similarly, to attach the firewall, you would use `set interfaces ethernet eth0
 | 
						|
firewall in ipv6-name` or `set zone-policy zone LOCAL from WAN firewall
 | 
						|
ipv6-name`. |