r/ipv6

▲ 126 r/ipv6

Convince people to stop disabling IPv6

I see colleagues disabling IPv6 as a networking troubleshooting step all the time. Surely this will cause major issues long term? Is this a common thing you guys see? How can we convince people that this is the wrong thing to do?

reddit.com
u/ross2000 — 4 days ago
▲ 50 r/ipv6+2 crossposts

Routing a Public IPv6 /64 to my home via wireguard and mikrotik

My ISP still doesn’t provide native IPv6, so I built a routed IPv6 setup using a VPS, WireGuard, and MikroTik RouterOS v7.

Home clients receive real globally routable IPv6 addresses via SLAAC over a delegated /64 - no NAT66, no HE tunnelbroker. The guide also covers Vultr quirks, NDP proxying, MTU considerations, and validation/testing.

gist.github.com
u/marfillaster — 3 days ago
▲ 50 r/ipv6+2 crossposts

MAP-T in 2026: Stateless IPv4-over-IPv6 translation and what operators debate in production networks

As we move through 2026, IPv6 adoption continues to increase steadily across service provider networks, enterprise backbones, and mobile infrastructures. However, IPv4 is still far from disappearing in practice. A large portion of global internet traffic, applications, and legacy services continues to rely on IPv4 connectivity, which means operators must still maintain mechanisms to bridge IPv4 and IPv6 environments.

This has led to continued interest in transition technologies that allow operators to simplify their core networks while still supporting IPv4 access. One of these mechanisms is MAP-T (Mapping of Address and Port using Translation), which is designed to support IPv4 connectivity over an IPv6-only infrastructure without requiring per-connection state in the core.

In this article, we will first take a closer look at how MAP-T actually works in practical terms. After that, we will shift the focus to something more relevant to 2026 operator discussions: how MAP-T behaves in real deployments, what trade-offs engineers report, and why many of the interesting questions are operational rather than protocol-level.

Understanding MAP-T: how IPv4 works over an IPv6-only core

MAP-T, defined in RFC 7599, is a stateless mechanism for transporting IPv4 traffic across an IPv6-only network using deterministic translation rules.

At a high level, MAP-T exists to solve a specific problem: how to allow IPv4 communication to continue working when the provider network itself has removed IPv4 from its internal infrastructure.

Instead of maintaining large state tables like Carrier-Grade NAT systems, MAP-T relies on a pre-defined mapping function. This function allows both the customer-side device and the provider-side gateway to independently calculate how IPv4 addresses and port ranges correspond to IPv6 addressing.

The key idea: shared IPv4 + port partitioning

In a typical MAP-T deployment, multiple customers share a single IPv4 address. What distinguishes one customer from another is not the IPv4 address itself, but the range of ports assigned to them.

Each subscriber is given:

  • a shared IPv4 address
  • a specific subset of transport-layer ports, defined by a Port Set ID (PSID)

This means that IPv4 addressing becomes less about unique addresses and more about structured sharing of both address and port space.

These parameters are then embedded into the IPv6 address structure using what are known as Embedded Address (EA) bits. This embedding allows the network to carry enough information within IPv6 packets to reconstruct the original IPv4 context when needed.

A simplified way to think about this mapping is:

IPv6 address = IPv6 prefix + embedded IPv4 + port-set identifier + interface identifier

This is not a literal packet format, but it is a useful conceptual model for understanding how MAP-T preserves IPv4 semantics inside an IPv6-native environment.

The role of Customer Edge and Border Relay

MAP-T deployments are typically built around two functional components.

The first is the Customer Edge (CE), which is usually the subscriber’s home or enterprise router. The CE is responsible for applying local translation rules and ensuring that outgoing traffic conforms to the assigned IPv4 address and port range.

The second is the Border Relay (BR), which sits at the edge of the service provider network. The BR is responsible for translating traffic between the IPv6-only core and the external IPv4 Internet.

Because both sides use the same deterministic mapping rules, the system does not require per-session state. Instead, it relies entirely on address structure and rule consistency.

Packet flow in practice

When a device sends traffic, the Customer Edge first translates private IPv4 traffic into the assigned shared IPv4 space using NAT44. After this step, the packet is translated into IPv6 using MAP-T rules and forwarded into the provider’s IPv6-only core network.

Within the core, the traffic is treated as native IPv6 and does not require any IPv4 routing capability.

When return traffic arrives, the Border Relay uses the destination IPv4 address and port combination to determine which subscriber the traffic belongs to. It then applies the same mapping logic in reverse, reconstructing the correct IPv6 destination and forwarding the packet to the appropriate Customer Edge device.

The important property here is determinism: both sides independently arrive at the same mapping decision without exchanging state information.

What operators actually talk about in 2026 MAP-T deployments

While the mechanism itself is relatively straightforward, most operator discussions in 2026 are not focused on the protocol design. Instead, they revolve around operational trade-offs, deployment constraints, and real-world behaviour under scale.

In practice, MAP-T is less of a theoretical design discussion and more of a “how does this behave in my environment” topic.

1. Stateless forwarding vs operational state reality

One of the first clarifications that often appears in operator conversations is that “stateless” refers only to packet forwarding behaviour in the core network.

In reality, operators still maintain a significant operational state, including:

  • Port Set ID allocations per subscriber
  • Mapping rule consistency across provisioning systems
  • Coordination between DHCP, BNG, and translation systems
  • Troubleshooting metadata for support and engineering teams

This leads to a subtle but important distinction that is frequently discussed in ISP engineering groups:

MAP-T removes per-flow state from the forwarding plane, but it does not remove the need for structured state in the operational and provisioning layers.

In other words, the network becomes simpler in one dimension, but more structured in another.

2. Port allocation becomes a design constraint, not just a detail

In operator discussions, port allocation is one of the most practical constraints in MAP-T design.

Because each subscriber receives only a subset of the available port space, operators must carefully balance:

  • IPv4 address efficiency
  • expected user behaviour
  • application requirements
  • support overhead

In real deployments, issues rarely come from steady-state traffic. Instead, they tend to emerge from burst behaviour, where a user temporarily exceeds expected connection patterns.

This leads to a recurring engineering question in operator forums:

>

MAP-T does not remove this constraint; it makes it explicit and structurally enforced.

3. Customer equipment remains a persistent operational limitation

Another consistent theme in 2026 deployment discussions is customer-premises equipment compatibility.

Even though MAP-T is conceptually clean in the core network, it requires correct implementation at the edge device. In practice, operators frequently encounter challenges such as:

  • inconsistent vendor support across router firmware versions
  • limited availability of MAP-T-capable consumer devices
  • difficulties supporting customer-owned hardware
  • operational overhead in managing firmware fragmentation

As a result, MAP-T deployments tend to work best in environments where operators control the customer edge device, or where equipment is tightly standardised.

This is one of the reasons MAP-T is not universally deployed, even when it is architecturally attractive.

4. MAP-T vs MAP-E: an ongoing operational preference debate

Although MAP-T and MAP-E are closely related in design, operators often prefer one over the other based on operational experience rather than theoretical efficiency.

MAP-T is typically described as more “native” to IPv6 networks, since it avoids encapsulation and operates through translation alone. However, this also means that packet reconstruction and debugging require deeper awareness of mapping rules.

MAP-E, by contrast, uses encapsulation, which some operators find easier to troubleshoot because IPv4 packets remain intact inside IPv6 transport.

A common summary from engineering discussions is:

MAP-T tends to be preferred for architectural cleanliness, while MAP-E is often preferred for operational simplicity.

5. Observability is more complex than the stateless model suggests

One of the more subtle findings from operator discussions in 2026 is that stateless forwarding does not automatically translate into simpler observability.

Because IPv4 headers are translated and partially embedded into IPv6 structure, troubleshooting often requires:

  • access to mapping rule definitions
  • correlation between IPv4 and IPv6 address spaces
  • understanding of Port Set ID allocation logic

This means that packet-level debugging can be less intuitive than in either pure IPv4 or dual-stack environments.

To address this, operators often implement additional tooling around MAP-T deployments, including enhanced telemetry at Border Relays and internal systems that reconstruct subscriber identity from flow data.

6. MAP-T is typically a later-stage transition mechanism

In most 2026 deployments, MAP-T is not the first step in IPv6 transition strategy.

Instead, operators typically progress through stages such as dual-stack deployment, CGNAT introduction, and gradual exploration of IPv6-only core designs using different transition technologies.

MAP-T is usually considered when operators are explicitly trying to reduce IPv4 dependency in the core while maintaining deterministic control over address sharing and port allocation.

This positions MAP-T as a refinement stage rather than an initial adoption tool.

Final thoughts

MAP-T is best understood not simply as a translation mechanism, but as part of a broader operational shift in 2026 network design. It replaces per-flow state with deterministic mapping rules, enabling IPv6-only core architectures while preserving IPv4 connectivity.

However, the real-world experience of MAP-T is shaped less by its protocol design and more by operational realities: port allocation strategy, customer equipment constraints, observability requirements, and the complexity of large-scale ISP environments.

In that sense, MAP-T does not eliminate complexity — it redistributes it. And in 2026 operator discussions, that redistribution is exactly where the most interesting engineering debates continue to happen.

u/Individual-Rip3343 — 3 days ago
▲ 8 r/ipv6

slaac + dns

Hi

so i'm trying to get ipv6 into the home network - the isp provides /64 + /48 - all good.

I had dhcp for ipv4, but my mikrotik doesn't do ipv6 dhcpv6 to allocate ip's - from my understand ??

what I have done is add dgw to all of my interfaces from my /48

I have added ipv6 static ip's to all of my dns servers - made sure they hand AAAA queries

that all seems to be going well so my phone can connect to wifi get ipv6 via slaac and gets its dns via ipv4 dhcp.

I believe what I want to do is set my ipv6 ND ?? to so do I tell it to advertise dns servers here and point to the ipv6 address for the DNS servers.

Does it matter - as I am not turning of ipv4 at home

or do i some how turn on dhcpv6 and issue dns and ntp and ??? from there

reddit.com
u/Horror-Breakfast-113 — 17 hours ago
▲ 30 r/ipv6

Your experience and recommendations on learning and dealing with IPv6

Background:

Living in the most problematic country in middle east (you guessed it, Iran), government completely hate Internet and we have the best GFW/DPI and censorship systems making hundreds of thousands of problems. I didn't touch IPv6 in reality even now, almost everything here is going on with IPv4. I only remember one ISP is/was providing it while fighting with the bad parts of government. Though it wasn't native dual-stack and it had major issues.

Add that when you live where DNS is nuked, you remember and use IP databases to configure and understand the network architecture. Domains don't do anything for you as no single public DNS is easily accessible. You always read and remember and write IP addresses everywhere, from routers to computers to faulty DHCP, etc.

The good:

IPv6 solves a ton of problems with already had with old 80s IPv4 which wasn't supposed to go this large. It's running with tapes and workaround like NAT, DHCP and others which casues a lot of frustration to network admins, ISPs and technical users.

It uses new hardly engineered stuff like 128-bit address space written with hexadecimals, SLAAC, ICMPv6, NAT64, DNS64 and a lot of other things.

The bad:

I feel pretty dumb around it. It's the thing most people say to turn off when you encounter network problems. I feel frustrated of don't understanding the :::: and hexadecimal addresses.

The ugly (my problem):

I always had headaches around IPv6, I'm not lazy nor dumb, but I still feel stuck in the way of learning or doing things using IPv6. I love "learn by doing" and learn while working with things and getting problems around them which forcing me to learn the reason to solve the problem I crossed. I can't still think I know IPv6 even though I tried to read and learn RFCs, YouTube videos, manuals, blogs and etc. I feel stuck behind legacy but easy to remember and calculate IPv4, easily guess the subnet by looking and feel pretty hard to get to the inside of IPv6.

How did you overcome these feelings? Is it only me or widespread and true IPv6 support everywhere hasn't come yet in 2026? How can I learn IPv6 correctly and face my fears? Do you recommend any website, any online lab, any web-based game or any specific YouTube videos to follow along?

reddit.com
u/amiria703 — 2 days ago
▲ 10 r/ipv6

Of the use of multiple ULA prefixes at a single physical place

I recently understood how ULAs could be useful (so I could very simply transpose my IPv4 gaslighting DNS server setup to IPv6: s!10.28.56.0/24!fdxx:xxxx:xxxx:yyyy::/64!g).

I'm now overthinking it: should my homelab (which has its own VLANs and is in its own rdomain(4) have only their own local part (yyyy) changed or also their own distinct domain part (xx:xxxx:xxxx)?

Current status:

  • Adults VLAN at home: fdxx:xxxx:xxxx:123::/64
  • Guests VLAN at home: fdxx:xxxx:xxxx:58a::/64

Should the homelab be fdxx:xxxx:xxxx:1ab::/64 or something else entirely? (fdzz:zzzz:zzzz:kkkk::/64)

Any insight is appreciated, thanks!

https://datatracker.ietf.org/doc/html/rfc4193

reddit.com
u/moviuro — 1 day ago
▲ 86 r/ipv6

You’re advocating a:

( ) technical ( ) legislative ( ) market-based ( ) denial-based

approach to retaining IPv4. Your idea will not work. Here is why it won’t work:
( ) We’re already out of IPv4 addresses
( ) People in Africa also deserve to own IP space too
( ) ISPs in rural and underdeveloped areas need IP space now
( ) Route fragmentation is getting worse
( ) Class E space is permanently blocked in many systems
( ) It will give us more addresses for 2 years and then we’ll be stuck with it
( ) NAT makes security worse, not better
( ) Android will not put up with it
( ) Linus Torvalds will not put up with it
( ) Requires too much cooperation from ISPs
( ) Requires immediate total cooperation from everybody at once
( ) Many users cannot afford to lose business or alienate potential employers
( ) It makes geolocation even worse than it already is
( ) You are re-inventing 464XLAT but worse

Specifically, your plan fails to account for:
( ) You can’t send packets to existing hosts
( ) Existing hosts can’t send packets to new hosts
( ) Kubernetes clusters already easily burn through the entire 1918 space
( ) The 10.x.x.x/8 space is already an overlapping nightmare
( ) Upgrading all routers on the planet, again
( ) Upgrading all firewalls on the planet, again
( ) Adding bytes to IPv4 is the entire problem
( ) Parsing IPv6 addresses isn’t the hard part
( ) AWS won’t support it
( ) ISPs won’t support it
( ) Having to upgrade all software to support it
( ) Needing to create a new DNS type
( ) Legacy operating systems
( ) Extreme profitability of leasing IP space
( ) Smart TVs
( ) Lazy system administrators
( ) Customer premises equipment

and the following philosophical objections may also apply:
( ) Ideas similar to yours are easy to come up with, yet none have ever been shown practical
( ) You haven’t laid out a transition plan
( ) TCP/IP should not be the subject of legislation
( ) CGNAT sucks
( ) Split internet sucks
( ) End to end connectivity is a net good
( ) IP addresses do not identify a person
( ) IP addresses should be free
( ) Globally addressable does not mean globally accessible
( ) Rollout plans must work if phased in gradually
( ) Why should we have to trust you and your servers?
( ) Not everything that touches the internet is a computer anymore
( ) Feel-good measures do nothing to solve the problem
( ) Even the staunchest defender of IPv4 will die eventually

Furthermore, this is what I think about you:
( ) Sorry dude, but I don’t think it would work.
( ) This is a stupid idea, and you’re a stupid person for suggesting it.
( ) You own a /16 and want to get top dollar for it
( ) You wrote this instead of enabling IPv6

reddit.com
u/IPv6forDogecoin — 6 days ago
▲ 65 r/ipv6

Good news everyone.

Unlike previous versions, Ubuntu Server 26.04 LTS has now DHCPv6 IPv6 enabled by default!

Edit: There seems to be some confusion. Previously Ubuntu subiquity installer had IPv6 disabled by default for Ubuntu Server LTS. Now it is set to DHCPv6, just like with DHCPv4

Edit2: This should clear things up: https://old.reddit.com/r/ipv6/comments/1t5gna6/ubuntu_server_2604_has_dhcpv6_enabled_by_default/okicor7/

Edit 3: I don't know how I can write it any clearer. So I gave up and made a video instead. Here is the installation of a Ubuntu server 24.04 iso: https://imgur.com/a/5LOwNNe That here in the last second? That is no longer the case since 26.04!

u/jammsession — 7 days ago
▲ 156 r/ipv6

Someone in the Linux dev' community says loud that they need to make it possible to discard ipv4, or Legacy IP.

u/StephaneiAarhus — 12 days ago
▲ 48 r/ipv6

Edit: Solved! The bottleneck was Docker NAT.

It was my (very limited) understanding that IPv4 vs IPv6 has a limited performance impact in a LAN. So I am a little suprised at why I see a 15% performance uplift in one direction on my self hosted speed test. The server end of the connection is a cheap USB 2.5 GbE NIC which has been struggling to reach full upload speed in this particular test. Is it possible that the IPv6 path is more optimized on this dongle or would it be more related to this particular speedtest software (openspeedtest in docker).

u/Scienceman57 — 9 days ago
▲ 27 r/ipv6

If you are into IPv6 and haven't heard of u/apalrd, go check out his YouTube channel and website. In this video, he breaks down the recent (unserious) IPv8 proposal, why it wouldn't work, and explains a lot of basics. However, one aspect from the idea is addressed: forcing clients to opt-in to IPv4 instead of the opposite (what we have now). I found it really interesting.

u/differentiallity — 12 days ago
▲ 13 r/ipv6

VPN via WireGuard from between IPv4 only and IPv6 Only

Hi,

what is a recommended way for this scenario:

At home I have Internet via Cable and no public iv4 adress. I also own a fritzbox which can act as an WireGuard Server.

When I'm abroad I'm in an IPv4 only internet, no IPv6 internet adress available. I found a way how to connect via TCP with a 3rd Party Service Offering, but not with WireGuard which needs UDP.

What is the recommended way? I'm also willing to pay money for the solution.

At the remote location i have a Gli.Net Beryl AX MT-3000

AI recommends to rent a virtual server and route it myself. Is there any service doing it or any other way?

Thank you.

reddit.com
u/Successful_Work_8913 — 5 days ago
▲ 36 r/ipv6

I run a nameserver from home (not a forwarder/recursive resolver) which runs my domains. I have noticed that most of the traffic comes from IPv4 addresses, despite these providers supporting IPv6.

Majority of the traffic (for some reason) come from Aussie Broadband, a provider that has been providing dual stack for quite some time now. Even some of their traffic is from IPv6. The only DNS traffic I have recieved from Telstra (a network that has been running IPv6 only for as long as I can remember) is IPv4 only. Even traffic from Cloudflare seems to be roughly 50/50.

Is there any reason that recursive resolvers seem to be preferring IPv4? If I want to disable IPv4 on my nameserver, would these resolvers "fall back" to IPv6? I would like to move away from running IPv4 as much as possible on my home network.

u/nbtm_sh — 10 days ago
▲ 5 r/ipv6

How to properly route inbound/outbound traffic to / from my PI Prefix announced on my home router when using Wireguard on a VPS?

I have been scratching my head, for some time on the issue below.

Lets say that I have been given a 2000:db8:aaaa::/48 PI Prefix and I want to announce it from my home router but can only do so from a VPS via Wireguard.

Below is my Intended Network Flow:

  • Incoming Traffic towards addresses within my PI Prefix: Internet -> Upstream Providers Router -> VPS -> Wireguard Tunnel -> Home Router

  • Outgoing Traffic from addresses within my PI Prefix announced on my Home Router: Home Router -> Wireguard -> VPS -> Upstream Provider Router -> Internet

Setup Right Now:

VPS - eBGP between my upstreams and iBGP to neighbour (which is the home router) which can only be accessed by a Wireguard Tunnel being up.

eBGP - Receiving Default Route and sending my PI Prefixes. The neighbor IP connected to my upstream can only be accessed by eth0 (the physical network interface).

iBGP - Uses my ASN Number.

2000:db8:cccc:ccc:/56 - Routed to my VPS via eth0 via eth0 IPv6 Address by my Upstream provider router, although only one /64 is used on the VPS for eth0 purposes. I intended to allocate another /64 subnet from the /56 for the Wireguard Connection between my VPS and Home router but I have found that hasn't worked.

Wireguard Tunnel - Running on the VPS which as one Public IPv4 Address and a GUA IPv6 Address (that I intended to allocate from /64 subnet from 2000:db8:cccc:ccc:/56). I can only connect via IPv4 to the wireguard from my home router due to CGNAT from my ISP and no native IPv6.

  • Wireguard Interface uses NAT from wg0 to eth0 interface running on the VPS for IPv4 based traffic.

next-hop-self is set on the IBGP Neighbor which is the home router (accessible only when wg0 is up) via FRR

Default Route is only accessible via eth0.

Software & Hardware in Use:

  • FRR running on the VPS

  • Mikrotik as the home router

My Ideal Requirements:

  • Avoid NAT and any translation technologies such as NPTv6, if possible.

  • Ideally use GUAs, instead of ULAs, for the Wireguard Tunnel interface IPv6 addresses.

Additional Questions:

  • Should I continue to announce my IPv6 PI Prefix via the home router or the VPS instead, while having a blackhole static route on my home router?
  • Is Table = off needed in the Wireguard config on the VPS?
  • Is Policy Based Routing via FRR needed in some form?
reddit.com
u/stonesco — 4 days ago
▲ 8 r/ipv6

When using IPv4 and the whole standard NAT tech that is implemented everywhere, it’s pretty simple to understand that if I redirect my traffic via a VPN (site-to-site for example) I can access source that are limited to the public facing IP of the other WAN connection.

However, when I route with IPv6 there is no NAT that translates addresses, and even tho I force to redirect traffic via further routes through the VPN I would exist with my usual IPv6 Address, meaning that keep my Prefix.

What bending do I have to set up to make use of the IPv6 prefix of the others site WAN connection, when there is no static prefix on any of the sites.

Am I missing something or is it just some wrong configuration on my tech stack that my IPv6 traffic is leaving the local WAN connection instead of making use of my home site connection .

Related to VoD content etc

reddit.com
u/dreacon34 — 13 days ago