I have a ZTE H298A router from my ISP, alongside a static IPv4 and IPv6 IP addresses which I have connected with an Ethernet cable to my GL.iNet GL-MT6000(Flint 2).
I have set port forwarding to the Flint 2 with the IPv4, not sure if anything else has to be set for IPv6.
On the other hand I have transferred the configuration to my GL-AXT1800 and have taken that abroad with me.
However it seems that the device I need it for uses DirectAccess - DirectAccess and I realised that it might be the reason I cannot access some systems as DirectAccess depends on IPv6.
What can I do in this case?
IP leakages or location sharing is absolutely off the table, so turning off the VPN should not happen.
How can I set up IPv6 in my case where I am using Wireguard Client on the Slate GL-AXT1800?
Do I need to make another configuration on the GL-MT6000(Flint 2) and what should that configuration include? How do I prevent IPv6 Leakages as I can't afford my location being compromised or perhaps reduce the chance for the location being compromised?
Someone from support suggested using encrypted DNS or change the MTU, but I'm not too sure how to do that.
Please, I would be so grateful if we can clarify this sooner..
Thank you in advance, any help is much appreciated.
Hello,
Configuring a secure and functional IPv6 setup with your current network setup can be tricky, especially when using DirectAccess, WireGuard VPN, and aiming to prevent IPv6 leaks. Here's a detailed guide to help you: ehallpass
Steps for IPv6 Configuration
Enable and Verify IPv6 on GL.iNet Flint (GL-MT6000)
Your ISP router (ZTE H298A) likely already provides IPv6 connectivity. Ensure the Flint router is configured to handle IPv6:
Log into the Flint admin panel:
Go to the web interface
Navigate to Internet Settings > IPv6.
Enable IPv6:
Set the IPv6 type to "DHCPv6" or "Static IPv6" depending on what your ISP provides.
Ensure "IPv6 Relay" is enabled to pass IPv6 traffic from your ISP through to connected devices.
Verify IPv6 connectivity:
Use an IPv6 test site like Test-IPv6 to confirm that IPv6 is operational on devices connected to Flint.
2. Configure WireGuard VPN with IPv6 on GL-AXT1800 (Slate)
WireGuard must be properly configured for IPv6 to avoid leaks and to support DirectAccess:
Enable IPv6 in the WireGuard configuration:
Edit the WireGuard client config file on the Slate (/etc/wireguard/wg0.conf):
ini
Copy code
[Interface]
Address = , # Ensure IPv6 address is included
DNS =
[Peer]
AllowedIPs = ::/0, 0.0.0.0/0 # Allow both IPv4 and IPv6 traffic
Endpoint = :
PersistentKeepalive = 25
Restart WireGuard to apply changes:
bash
Copy code
wg-quick down wg0 && wg-quick up wg0
Prevent IPv6 leaks:
On the Slate:
Go to VPN > WireGuard Client and enable IPv6 Leak Protection.
Alternatively, edit the firewall rules:
bash
Copy code
uci set firewall.@zone[1].masq6=1
uci set firewall.@zone[1].mtu_fix=1
uci commit firewall
/etc/init.d/firewall restart
VPN server has not supposed the IPv6 feature in GL firmware. Only VPN client supported the IPv6.
Sorry, if it has to IPv6, probably have to wait the GL firmware improve the VPN server IPv6 feature. In the development plan already.