Configuring 6RD for CenturyLink on Ubiquiti
CenturyLink still does not provide native IPv6, but you can configure a 6RD tunnel. This configurations have been tested on their gigabit fiber offering, but will probably work for any subscribers using a Ubiquiti Edge Router.
This will work best if you have a static IP address because your 6RD prefix is a function of your IPv4 address. I have scripted managing this change, but have never quite been satisfied with its stability over the long run.
Get a default firewall ready
We'll want to have this ready to attach to an interface in a moment, so let's prep it now. This is a simple firewall that will permit ICMP and any return traffic from outbound connections.
set firewall ipv6-name internet6-in enable-default-log set firewall ipv6-name internet6-in rule 10 action accept set firewall ipv6-name internet6-in rule 10 description 'Allow established connections' set firewall ipv6-name internet6-in rule 10 log disable set firewall ipv6-name internet6-in rule 10 state established enable set firewall ipv6-name internet6-in rule 10 state related enable set firewall ipv6-name internet6-in rule 20 action drop set firewall ipv6-name internet6-in rule 20 log enable set firewall ipv6-name internet6-in rule 20 state invalid enable set firewall ipv6-name internet6-in rule 30 action accept set firewall ipv6-name internet6-in rule 30 log disable set firewall ipv6-name internet6-in rule 30 protocol icmpv6
Permit proto 41 in your IPv4 firewall
Look for the firewall configuration attached to your WAN interface. Make a rule that permits inbound proto 41 (ipv6) from CenturyLink:
set firewall name internet-in rule 100 source address 126.96.36.199 set firewall name internet-in rule 100 protocol 41 set firewall name internet-in rule 100 action accept
I use the same ruleset for both
local, but if you don't, ensure
these rules are applied to the
Creating the tunnel interface
Now that the prerequisites are out of the way, we will begin by creating a
tunnel; we'll use
tun0. Tunnels have transport configurations (the outer
header) and their own addresses (the inner header).
set interfaces tunnel tun0 description 'CenturyLink 6rd Tunnel' set interfaces tunnel tun0 encapsulation sit set interfaces tunnel tun0 firewall in ipv6-name internet6-in set interfaces tunnel tun0 firewall local ipv6-name internet6-in set interfaces tunnel tun0 local-ip 0.0.0.0 set interfaces tunnel tun0 mtu 1472 set interfaces tunnel tun0 multicast enable set interfaces tunnel tun0 remote-ip 188.8.131.52 set interfaces tunnel tun0 ttl 255
sit to indicate this is an ipip tunnel. The firewall configurations
reference the newly created ruleset from above.
We can set
local-ip to the anonymous address (
0.0.0.0), which allows the
kernel to automatically select the source address of outbound packets. If you
have a static ip, you can place it here instead. If you don't, leaving this
automatic is one less configuration parameter to script updates on.
mtu setting accounts for the 20-byte IPv4 header and the 8-byte PPPoE
remote-ip field is the CenturyLink tunnel endpoint.
Determining your prefix
6RD uses your IPv4 address to fill in part of an IPv6 prefix. On CenturyLink, 2602::/24 is the supernet for 6RD. These 24 bits are followed by the 32 bits of your IPv4 address, resulting in a 56-bit prefix usable on your home network. The only trick here is turning your base-10 IPv4 octets into IPv6 hex nibbles. You can use this shell command to turn your IPv4 address into your 6RD prefix:
$ IP='198.51.100.78' $ printf "2602:%02x:%02x%02x:%02x00::/56\n" $(echo $IP | tr . ' ') 2602:c6:3364:4e00::/56
In this example, the
00 represent 8 bits,
0x00 - 0xFF that we can
use to number 256 unique /64 prefixes for our home network.
Assign an address to the tunnel
We need to select one of our 2^72 addresses for our tunnel interface
(technically speaking, the tunnel can remain unnumbered, but it will be
easier to troubleshoot if we give it an address). I recommend assigning
from either the
set interfaces tunnel tun0 address 2602:c6:3364:4eFF::/128
This configuration uses the
FF subnet number and the all zeroes host
Many of the other guides available on this topic suggest using
some other prefix length on the tunnel interface. These configurations don't
really make sense -- the
/24 is not directly attached to the tunnel
interface, and we don't want to send packets to unknown hosts from our own
prefix out to the CenturyLink tunnel server. Use a /128 on this interface.
Define your routes
Because there is no "on net" IPv6 address on the other end of the tunnel, we use an interface route to send traffic for other IPv6 networks to the tunnel endpoint.
We will also pin up a blackhole route for our /56 prefix to ensure that local traffic for unknown IPs belonging to us is discarded by our router instead of being sent out to CenturyLink.
set protocols static route6 2602:c6:3364:4e00::/56 blackhole set protocols static interface-route6 ::/0 next-hop-interface tun0
At this point, you should be able to use
ping6 on your Ubiquiti router.
Configure your LAN
Assuming you have a single local network on
switch0, you can pick a prefix
00), and assign it to switch0:
set interfaces switch switch0 address 2602:c6:3364:4e00::1/64
Then you can enable router advertisements:
set interfaces switch switch0 ipv6 dup-addr-detect-transmits 1 set interfaces switch switch0 ipv6 router-advert cur-hop-limit 64 set interfaces switch switch0 ipv6 router-advert managed-flag false set interfaces switch switch0 ipv6 router-advert max-interval 30 set interfaces switch switch0 ipv6 router-advert other-config-flag false set interfaces switch switch0 ipv6 router-advert prefix '::/64' autonomous-flag true set interfaces switch switch0 ipv6 router-advert prefix '::/64' on-link-flag true set interfaces switch switch0 ipv6 router-advert prefix '::/64' valid-lifetime 600 set interfaces switch switch0 ipv6 router-advert reachable-time 0 set interfaces switch switch0 ipv6 router-advert retrans-timer 0 set interfaces switch switch0 ipv6 router-advert send-advert true
These timers are somewhat aggressive to account for possible changes in the underlying IPv4 address.
At this point, hosts on your LAN should begin performing SLAAC.
Look at the centurylink-6rd script in this project for inspiration on
managing prefix changes automatically. This script is intended to be
/config/scripts/ppp/ip-up.d, which will cause it to be run
automatically on any IP changes.
You may also want to set up IPv6-based DNS resolution. I run unbound directly on my Edge Router and hand out its IPs for DNS configurations. Your approach may look quite different.