<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Necessary Rules for IPv6 Basic Networking in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Necessary-Rules-for-IPv6-Basic-Networking/m-p/269458#M53330</link>
    <description>&lt;P&gt;From what I see reading $FWDIR/lib/implied_rules.def, this should be handled through implied rules (i.e. no explicit rules need to be created).&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 02 Feb 2026 16:53:22 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2026-02-02T16:53:22Z</dc:date>
    <item>
      <title>Necessary Rules for IPv6 Basic Networking</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Necessary-Rules-for-IPv6-Basic-Networking/m-p/269444#M53326</link>
      <description>&lt;DIV&gt;&lt;P&gt;Hello,&lt;BR /&gt;I was not able to find clear documentation specifying which IPv6 control‑plane traffic must be permitted by default.&lt;/P&gt;&lt;P&gt;Is there an overview of the mandatory IPv6 firewall rules required for proper Neighbor Discovery operation?&lt;/P&gt;&lt;P&gt;Specifically, which ICMPv6 message types (such as Router Solicitation, Router Advertisement, Neighbor Solicitation, Neighbor Advertisement, Redirect) must be explicitly allowed?&lt;/P&gt;&lt;P&gt;Additionally, which address scopes must be permitted for these mechanisms to function correctly — for example, the link‑local unicast range &lt;STRONG&gt;FE80::/10&lt;/STRONG&gt; and the link‑local multicast range &lt;STRONG&gt;FF02::/16&lt;/STRONG&gt;,?"**&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Mon, 02 Feb 2026 15:43:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Necessary-Rules-for-IPv6-Basic-Networking/m-p/269444#M53326</guid>
      <dc:creator>Pauli</dc:creator>
      <dc:date>2026-02-02T15:43:56Z</dc:date>
    </item>
    <item>
      <title>Re: Necessary Rules for IPv6 Basic Networking</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Necessary-Rules-for-IPv6-Basic-Networking/m-p/269458#M53330</link>
      <description>&lt;P&gt;From what I see reading $FWDIR/lib/implied_rules.def, this should be handled through implied rules (i.e. no explicit rules need to be created).&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Feb 2026 16:53:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Necessary-Rules-for-IPv6-Basic-Networking/m-p/269458#M53330</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2026-02-02T16:53:22Z</dc:date>
    </item>
    <item>
      <title>Re: Necessary Rules for IPv6 Basic Networking</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Necessary-Rules-for-IPv6-Basic-Networking/m-p/269502#M53335</link>
      <description>&lt;P&gt;I would open TAC case to verify that.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Feb 2026 23:56:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Necessary-Rules-for-IPv6-Basic-Networking/m-p/269502#M53335</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-02-02T23:56:52Z</dc:date>
    </item>
    <item>
      <title>Re: Necessary Rules for IPv6 Basic Networking</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Necessary-Rules-for-IPv6-Basic-Networking/m-p/269506#M53336</link>
      <description>&lt;DIV&gt;&lt;P&gt;Olá Pauli,&lt;/P&gt;&lt;P&gt;While researching IPv6 Neighbor Discovery, I found a summary of what typically needs to be allowed for NDP to work correctly&lt;/P&gt;&lt;H1&gt;&lt;BR /&gt;IPv6 Neighbor Discovery&lt;/H1&gt;&lt;P&gt;Neighbor discovery works over the ICMPv6 Neighbor Discovery protocol, which is the functional equivalent of the IPv4 ARP protocol.&lt;/P&gt;&lt;P&gt;ICMPv6 Neighbor Discovery Protocol must be explicitly permitted in the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Access Control&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;A class="" href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_Installation_and_Upgrade_Guide/Content/Topics-IUG/IPv6-Neighbor-Discovery.htm#" target="_blank" rel="noopener"&gt;Rule Base&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="WiliRGasparetto_0-1770079710557.gif" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/33020iC2584057732FF354/image-size/medium?v=v2&amp;amp;px=400" role="button" title="WiliRGasparetto_0-1770079710557.gif" alt="WiliRGasparetto_0-1770079710557.gif" /&gt;&lt;/span&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;for all bridged networks.&lt;/P&gt;&lt;P&gt;This is different from ARP. ARP traffic is Layer 2 only, therefore it permitted regardless of the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;A class="" href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_Installation_and_Upgrade_Guide/Content/Topics-IUG/IPv6-Neighbor-Discovery.htm#" target="_blank" rel="noopener"&gt;Rule&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="WiliRGasparetto_1-1770079710558.gif" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/33021i656F0F0603756F8B/image-size/medium?v=v2&amp;amp;px=400" role="button" title="WiliRGasparetto_1-1770079710558.gif" alt="WiliRGasparetto_1-1770079710558.gif" /&gt;&lt;/span&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Base&lt;/SPAN&gt;.&lt;/P&gt;&lt;P&gt;This is an example of an explicit&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Rule Base&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;that permits ICMPv6 Neighbor Discovery protocol:&lt;/P&gt;NameSourceDestinationVPN&lt;SPAN class=""&gt;Services &amp;amp; Applications&lt;/SPAN&gt;ActionTrackInstall On &lt;TABLE cellspacing="0"&gt;&lt;COLGROUP&gt;&lt;COL /&gt;&lt;COL /&gt;&lt;COL /&gt;&lt;COL /&gt;&lt;COL /&gt;&lt;COL /&gt;&lt;COL /&gt;&lt;COL /&gt;&lt;/COLGROUP&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;IPv6&lt;/P&gt;&lt;P&gt;Neighbor&lt;/P&gt;&lt;P&gt;Discovery&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Network object&lt;/P&gt;&lt;P&gt;that represents&lt;/P&gt;&lt;P&gt;the Bridged&lt;/P&gt;&lt;P&gt;Network&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Network object&lt;/P&gt;&lt;P&gt;that represents&lt;/P&gt;&lt;P&gt;the Bridged&lt;/P&gt;&lt;P&gt;Network&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Any&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;neighbor-advertisement&lt;/P&gt;&lt;P&gt;neighbor-solicitation&lt;/P&gt;&lt;P&gt;router-advertisement&lt;/P&gt;&lt;P&gt;router-solicitation&lt;/P&gt;&lt;P&gt;redirect6&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Accept&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Log&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Policy Targets&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Feb 2026 00:56:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Necessary-Rules-for-IPv6-Basic-Networking/m-p/269506#M53336</guid>
      <dc:creator>WiliRGasparetto</dc:creator>
      <dc:date>2026-02-03T00:56:00Z</dc:date>
    </item>
    <item>
      <title>Re: Necessary Rules for IPv6 Basic Networking</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Necessary-Rules-for-IPv6-Basic-Networking/m-p/269508#M53337</link>
      <description>&lt;P&gt;FWIW, this is what MS AI copilot came back with. Personally, I would still open TAC case and ask about it.&lt;/P&gt;
&lt;P&gt;*************************&lt;/P&gt;
&lt;DIV&gt;
&lt;P&gt;Hi — great question. IPv6 &lt;EM&gt;really&lt;/EM&gt; depends on ICMPv6 in a way IPv4 never did, so “block ICMP” style policies often break basic networking. RFC 4890 was written specifically because IPv4-era ICMP filtering guidance doesn’t translate well to IPv6. &lt;A href="https://www.rfc-editor.org/rfc/rfc4890" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;, &lt;A href="https://www.rfc-editor.org/rfc/rfc4443" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Below is a practical, “what must be allowed” overview for &lt;STRONG&gt;Neighbor Discovery (ND)&lt;/STRONG&gt; and the closely-related control-plane pieces that commonly get blocked by host or edge firewalls.&lt;/P&gt;
&lt;HR /&gt;
&lt;H2 id="1theicmpv6typesyougenerallymustallowforneighbordiscovery"&gt;1) The ICMPv6 types you generally must allow for Neighbor Discovery&lt;/H2&gt;
&lt;P&gt;Neighbor Discovery (RFC 4861) is implemented using these ICMPv6 message types: &lt;STRONG&gt;RS, RA, NS, NA, Redirect&lt;/STRONG&gt;. &lt;A href="https://www.rfc-editor.org/rfc/rfc4861.html" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;, &lt;A href="https://www.iana.org/assignments/icmpv6-parameters/icmpv6-parameters.xhtml" target="_blank"&gt;[iana.org]&lt;/A&gt;&lt;/P&gt;
&lt;H3 id="acorendmessagesrequiredfornormalonlinkoperation"&gt;A. &lt;STRONG&gt;Core ND messages (required for normal on-link operation)&lt;/STRONG&gt;&lt;/H3&gt;
&lt;TABLE&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH&gt;ICMPv6 Type&lt;/TH&gt;
&lt;TH&gt;Name&lt;/TH&gt;
&lt;TH&gt;Why you need it&lt;/TH&gt;
&lt;TH&gt;Must be allowed where?&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;133&lt;/TD&gt;
&lt;TD&gt;Router Solicitation (RS)&lt;/TD&gt;
&lt;TD&gt;Host asks for immediate Router Advertisements (e.g., after boot)&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;Hosts outbound&lt;/STRONG&gt;, &lt;STRONG&gt;routers inbound&lt;/STRONG&gt; on LAN &lt;A href="https://www.rfc-editor.org/rfc/rfc4861.html" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;, &lt;A href="https://www.iana.org/assignments/icmpv6-parameters/icmpv6-parameters.xhtml" target="_blank"&gt;[iana.org]&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;134&lt;/TD&gt;
&lt;TD&gt;Router Advertisement (RA)&lt;/TD&gt;
&lt;TD&gt;Router announces prefixes, default gateway, MTU, hop-limit, etc. (SLAAC depends on it)&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;Routers outbound&lt;/STRONG&gt;, &lt;STRONG&gt;hosts inbound&lt;/STRONG&gt; on LAN &lt;A href="https://www.rfc-editor.org/rfc/rfc4861.html" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;, &lt;A href="https://www.rfc-editor.org/rfc/rfc4890" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;135&lt;/TD&gt;
&lt;TD&gt;Neighbor Solicitation (NS)&lt;/TD&gt;
&lt;TD&gt;IPv6 “ARP”: resolve L2 address; also used for &lt;STRONG&gt;DAD&lt;/STRONG&gt; and reachability (NUD)&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;Both directions&lt;/STRONG&gt; on LAN &lt;A href="https://www.rfc-editor.org/rfc/rfc4861.html" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;, &lt;A href="https://www.rfc-editor.org/rfc/rfc4890" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;136&lt;/TD&gt;
&lt;TD&gt;Neighbor Advertisement (NA)&lt;/TD&gt;
&lt;TD&gt;Response/announcement for NS; essential for address resolution/NUD&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;Both directions&lt;/STRONG&gt; on LAN &lt;A href="https://www.rfc-editor.org/rfc/rfc4861.html" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;, &lt;A href="https://www.rfc-editor.org/rfc/rfc4890" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;STRONG&gt;Key detail:&lt;/STRONG&gt; NS is also used for &lt;STRONG&gt;Duplicate Address Detection (DAD)&lt;/STRONG&gt; during address assignment. DAD may use the &lt;STRONG&gt;unspecified source address &lt;CODE&gt;::&lt;/CODE&gt;&lt;/STRONG&gt;, so filtering “source must be a real address” can break IPv6 bring-up. &lt;A href="https://www.rfc-editor.org/rfc/rfc4861.html" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;, &lt;A href="https://www.rfc-editor.org/rfc/rfc4862" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;, &lt;A href="https://www.rfc-editor.org/rfc/rfc4890" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;&lt;/P&gt;
&lt;H3 id="bredirectoftenoptionalpolicydriven"&gt;B. &lt;STRONG&gt;Redirect (often optional / policy-driven)&lt;/STRONG&gt;&lt;/H3&gt;
&lt;TABLE&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH&gt;ICMPv6 Type&lt;/TH&gt;
&lt;TH&gt;Name&lt;/TH&gt;
&lt;TH&gt;Notes&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;137&lt;/TD&gt;
&lt;TD&gt;Redirect&lt;/TD&gt;
&lt;TD&gt;Optimization: router tells a host of a better next-hop/on-link destination. Many orgs disable/block it intentionally because of spoofing risk; IPv6 can still function without it in most designs. &lt;A href="https://www.rfc-editor.org/rfc/rfc4861.html" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;, &lt;A href="https://www.rfc-editor.org/rfc/rfc4890" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;So, &lt;STRONG&gt;for ND to work&lt;/STRONG&gt;, you typically must allow &lt;STRONG&gt;133–136&lt;/STRONG&gt; on the local link. &lt;STRONG&gt;137&lt;/STRONG&gt; is commonly treated as “allow only if you explicitly want/need redirects.” &lt;A href="https://www.rfc-editor.org/rfc/rfc4861.html" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;, &lt;A href="https://www.rfc-editor.org/rfc/rfc4890" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;&lt;/P&gt;
&lt;HR /&gt;
&lt;H2 id="2addressscopesrangesyoumustpermitforndtofunction"&gt;2) Address scopes/ranges you must permit for ND to function&lt;/H2&gt;
&lt;P&gt;ND is fundamentally &lt;STRONG&gt;link-local&lt;/STRONG&gt; in scope. It uses &lt;STRONG&gt;link-local unicast&lt;/STRONG&gt; addresses and &lt;STRONG&gt;link-local multicast&lt;/STRONG&gt; groups. &lt;A href="https://www.rfc-editor.org/rfc/rfc4861.html" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;, &lt;A href="https://www.rfc-editor.org/rfc/rfc4291.html" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;&lt;/P&gt;
&lt;H3 id="alinklocalunicastfe8010"&gt;A. Link-local unicast — &lt;STRONG&gt;FE80::/10&lt;/STRONG&gt;&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;All IPv6 interfaces have a &lt;STRONG&gt;link-local unicast&lt;/STRONG&gt; address, and routers must have one on each interface; ND relies on these for on-link communication. &lt;A href="https://www.rfc-editor.org/rfc/rfc4861.html" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;, &lt;A href="https://www.rfc-editor.org/rfc/rfc4291.html" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":white_heavy_check_mark:"&gt;✅&lt;/span&gt; Firewall implication: &lt;STRONG&gt;permit ND ICMPv6 to/from FE80::/10 on LAN interfaces&lt;/STRONG&gt;.&lt;/P&gt;
&lt;H3 id="blinklocalmulticastff0216"&gt;B. Link-local multicast — &lt;STRONG&gt;FF02::/16&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;ND uses specific multicast groups within &lt;STRONG&gt;FF02::/16&lt;/STRONG&gt; (link-local scope multicast). &lt;A href="https://www.rfc-editor.org/rfc/rfc4861.html" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;, &lt;A href="https://www.rfc-editor.org/rfc/rfc4291.html" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Important ones:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;FF02::1&lt;/STRONG&gt; = all-nodes (used by unsolicited RAs) &lt;A href="https://www.rfc-editor.org/rfc/rfc4861.html" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;, &lt;A href="https://www.rfc-editor.org/rfc/rfc4291.html" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;FF02::2&lt;/STRONG&gt; = all-routers (destination for RS) &lt;A href="https://www.rfc-editor.org/rfc/rfc4861.html" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;, &lt;A href="https://www.rfc-editor.org/rfc/rfc4291.html" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Solicited-node multicast&lt;/STRONG&gt; = &lt;STRONG&gt;FF02::1:FF00:0/104&lt;/STRONG&gt; (used by NS for address resolution and DAD) &lt;A href="https://www.rfc-editor.org/rfc/rfc4861.html" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;, &lt;A href="https://www.rfc-editor.org/rfc/rfc4291.html" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":white_heavy_check_mark:"&gt;✅&lt;/span&gt; Firewall implication: &lt;STRONG&gt;permit ICMPv6 ND to FF02::/16&lt;/STRONG&gt;, especially the above groups, on LAN interfaces.&lt;/P&gt;
&lt;H3 id="ctheunspecifiedaddress128"&gt;C. The unspecified address — &lt;STRONG&gt;&lt;CODE&gt;::/128&lt;/CODE&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;During autoconfiguration/DAD, the source address can be &lt;STRONG&gt;&lt;CODE&gt;::&lt;/CODE&gt;&lt;/STRONG&gt; before the node has a valid address. If you block that, DAD can fail and the node may never configure IPv6 properly. &lt;A href="https://www.rfc-editor.org/rfc/rfc4861.html" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;, &lt;A href="https://www.rfc-editor.org/rfc/rfc4890" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;, &lt;A href="https://www.rfc-editor.org/rfc/rfc4862" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":white_heavy_check_mark:"&gt;✅&lt;/span&gt; Firewall implication: allow &lt;STRONG&gt;NS (type 135)&lt;/STRONG&gt; with source &lt;CODE&gt;::&lt;/CODE&gt; (DAD).&lt;/P&gt;
&lt;HR /&gt;
&lt;H2 id="3dontforgetmldbecauseitcanindirectlybreaknd"&gt;3) Don’t forget MLD (because it can indirectly break ND)&lt;/H2&gt;
&lt;P&gt;Even though ND uses multicast, on many switched networks &lt;STRONG&gt;MLD snooping&lt;/STRONG&gt; can suppress multicast delivery unless hosts signal membership using MLD. So blocking MLD can cause ND multicast (especially solicited-node) to stop reaching peers, which looks like “ND is broken.” RFC 4890 explicitly calls out MLD as part of IPv6’s essential control functions. &lt;A href="https://www.rfc-editor.org/rfc/rfc4890" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;, &lt;A href="https://www.rfc-editor.org/rfc/rfc3810" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Relevant ICMPv6 types:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;130 Query, 131 Report, 132 Done (MLDv1), &lt;STRONG&gt;143 Report v2 (MLDv2)&lt;/STRONG&gt;\ MLD’s purpose and role on directly attached links is specified in RFC 3810. &lt;A href="https://www.iana.org/assignments/icmpv6-parameters/icmpv6-parameters.xhtml" target="_blank"&gt;[iana.org]&lt;/A&gt;, &lt;A href="https://www.rfc-editor.org/rfc/rfc4890" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt; &lt;A href="https://www.rfc-editor.org/rfc/rfc3810" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":white_heavy_check_mark:"&gt;✅&lt;/span&gt; Practical baseline: &lt;STRONG&gt;allow ICMPv6 types 130/131/132/143 on LAN&lt;/STRONG&gt;, at least within link-local scope. &lt;A href="https://www.rfc-editor.org/rfc/rfc4890" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;, &lt;A href="https://www.rfc-editor.org/rfc/rfc3810" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;&lt;/P&gt;
&lt;HR /&gt;
&lt;H2 id="4aminimalsafebaselinerulesetconceptual"&gt;4) A “minimal safe baseline” rule set (conceptual)&lt;/H2&gt;
&lt;P&gt;Because you asked specifically about control-plane traffic for ND, here is the usual minimum you should allow &lt;STRONG&gt;on LAN / inside interfaces&lt;/STRONG&gt;:&lt;/P&gt;
&lt;H3 id="lanfacinginterfaceshostsrouters"&gt;&lt;STRONG&gt;LAN-facing interfaces (hosts + routers)&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Allow &lt;STRONG&gt;ICMPv6&lt;/STRONG&gt;:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;133–136&lt;/STRONG&gt; (RS/RA/NS/NA) &lt;A href="https://www.rfc-editor.org/rfc/rfc4861.html" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;, &lt;A href="https://www.rfc-editor.org/rfc/rfc4890" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;(Optional/policy) 137&lt;/STRONG&gt; Redirect &lt;A href="https://www.rfc-editor.org/rfc/rfc4861.html" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;, &lt;A href="https://www.rfc-editor.org/rfc/rfc4890" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;130/131/132/143&lt;/STRONG&gt; (MLD) if snooping is in play / generally recommended &lt;A href="https://www.rfc-editor.org/rfc/rfc4890" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;, &lt;A href="https://www.rfc-editor.org/rfc/rfc3810" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Allow these with:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Source/destination including &lt;STRONG&gt;FE80::/10&lt;/STRONG&gt;, &lt;STRONG&gt;FF02::/16&lt;/STRONG&gt;, and &lt;STRONG&gt;&lt;CODE&gt;::&lt;/CODE&gt;&lt;/STRONG&gt; (for DAD) &lt;A href="https://www.rfc-editor.org/rfc/rfc4861.html" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;, &lt;A href="https://www.rfc-editor.org/rfc/rfc4291.html" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;, &lt;A href="https://www.rfc-editor.org/rfc/rfc4890" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;, &lt;A href="https://www.rfc-editor.org/rfc/rfc4862" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3 id="waninternetfacinginterfaces"&gt;&lt;STRONG&gt;WAN/Internet-facing interfaces&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;You normally &lt;STRONG&gt;do not&lt;/STRONG&gt; want ND to arrive from the Internet. ND is link-local and routers should not forward it. RFC 4890 notes that local-link ICMPv6 messages are not meant to transit firewalls acting as routers. &lt;A href="https://www.rfc-editor.org/rfc/rfc4890" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;So on WAN you typically:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Drop inbound RS/RA/NS/NA/Redirect&lt;/STRONG&gt; (133–137), unless you are doing something special (tunnels, certain L2 extensions). &lt;A href="https://www.rfc-editor.org/rfc/rfc4890" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;, &lt;A href="https://www.rfc-editor.org/rfc/rfc4861.html" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;HR /&gt;
&lt;H2 id="5importantrelatednoteipv6needsicmpv6beyondnd"&gt;5) Important related note: “IPv6 needs ICMPv6” beyond ND&lt;/H2&gt;
&lt;P&gt;Even if ND works, &lt;EM&gt;end-to-end IPv6&lt;/EM&gt; breaks badly if you block core ICMPv6 error messages (notably &lt;STRONG&gt;Packet Too Big&lt;/STRONG&gt; for Path MTU Discovery). RFC 4890 emphasizes that ICMPv6 error messages are essential for establishing/maintaining communications. &lt;A href="https://www.rfc-editor.org/rfc/rfc4890" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;, &lt;A href="https://www.rfc-editor.org/rfc/rfc4443" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;So most operational baselines also allow (at least statefully / “related”) ICMPv6:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Type 1 (Destination Unreachable), 2 (Packet Too Big), 3 (Time Exceeded), 4 (Parameter Problem) &lt;A href="https://www.rfc-editor.org/rfc/rfc4443" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;, &lt;A href="https://www.rfc-editor.org/rfc/rfc4890" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;, &lt;A href="https://www.iana.org/assignments/icmpv6-parameters/icmpv6-parameters.xhtml" target="_blank"&gt;[iana.org]&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;(I know you didn’t ask for these, but they’re the &lt;EM&gt;next most common&lt;/EM&gt; “why does IPv6 act weird?” issue.)&lt;/P&gt;
&lt;HR /&gt;
&lt;H2 id="6examplerulepatternsgeneric"&gt;6) Example rule patterns (generic)&lt;/H2&gt;
&lt;P&gt;Below are examples of how people express this in common firewalls (illustrative only).&lt;/P&gt;
&lt;H3 id="nftableslinux"&gt;nftables (Linux)&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="scriptor-paragraph"&gt;&lt;SPAN&gt;# Allow core ND on LAN&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class="scriptor-paragraph"&gt;&lt;SPAN&gt;ip6 nexthdr icmpv6 icmpv6 type { 133, 134, 135, 136 } accept&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;BR class="scriptor-paragraph" /&gt;
&lt;DIV class="scriptor-paragraph"&gt;&lt;SPAN&gt;# Optional: allow redirects (policy)&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class="scriptor-paragraph"&gt;&lt;SPAN&gt;ip6 nexthdr icmpv6 icmpv6 type 137 accept&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;BR class="scriptor-paragraph" /&gt;
&lt;DIV class="scriptor-paragraph"&gt;&lt;SPAN&gt;# Allow MLD (helpful if snooping exists)&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class="scriptor-paragraph"&gt;&lt;SPAN&gt;ip6 nexthdr icmpv6 icmpv6 type { 130, 131, 132, 143 } accept&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3 id="ip6tableslinux"&gt;ip6tables (Linux)&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="scriptor-paragraph"&gt;&lt;SPAN&gt;ip6tables&lt;/SPAN&gt; &lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;A&lt;/SPAN&gt; &lt;SPAN&gt;INPUT&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;p&lt;/SPAN&gt; &lt;SPAN&gt;icmpv6&lt;/SPAN&gt; &lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;icmpv6&lt;/SPAN&gt;&lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;type&lt;/SPAN&gt; &lt;SPAN&gt;133&lt;/SPAN&gt; &lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;j&lt;/SPAN&gt; &lt;SPAN&gt;ACCEPT&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class="scriptor-paragraph"&gt;&lt;SPAN&gt;ip6tables&lt;/SPAN&gt; &lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;A&lt;/SPAN&gt; &lt;SPAN&gt;INPUT&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;p&lt;/SPAN&gt; &lt;SPAN&gt;icmpv6&lt;/SPAN&gt; &lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;icmpv6&lt;/SPAN&gt;&lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;type&lt;/SPAN&gt; &lt;SPAN&gt;134&lt;/SPAN&gt; &lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;j&lt;/SPAN&gt; &lt;SPAN&gt;ACCEPT&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class="scriptor-paragraph"&gt;&lt;SPAN&gt;ip6tables&lt;/SPAN&gt; &lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;A&lt;/SPAN&gt; &lt;SPAN&gt;INPUT&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;p&lt;/SPAN&gt; &lt;SPAN&gt;icmpv6&lt;/SPAN&gt; &lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;icmpv6&lt;/SPAN&gt;&lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;type&lt;/SPAN&gt; &lt;SPAN&gt;135&lt;/SPAN&gt; &lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;j&lt;/SPAN&gt; &lt;SPAN&gt;ACCEPT&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class="scriptor-paragraph"&gt;&lt;SPAN&gt;ip6tables&lt;/SPAN&gt; &lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;A&lt;/SPAN&gt; &lt;SPAN&gt;INPUT&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;p&lt;/SPAN&gt; &lt;SPAN&gt;icmpv6&lt;/SPAN&gt; &lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;icmpv6&lt;/SPAN&gt;&lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;type&lt;/SPAN&gt; &lt;SPAN&gt;136&lt;/SPAN&gt; &lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;j&lt;/SPAN&gt; &lt;SPAN&gt;ACCEPT&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class="scriptor-paragraph"&gt;&lt;SPAN&gt;# optional redirect&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class="scriptor-paragraph"&gt;&lt;SPAN&gt;ip6tables&lt;/SPAN&gt; &lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;A&lt;/SPAN&gt; &lt;SPAN&gt;INPUT&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;p&lt;/SPAN&gt; &lt;SPAN&gt;icmpv6&lt;/SPAN&gt; &lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;icmpv6&lt;/SPAN&gt;&lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;type&lt;/SPAN&gt; &lt;SPAN&gt;137&lt;/SPAN&gt; &lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;j&lt;/SPAN&gt; &lt;SPAN&gt;ACCEPT&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class="scriptor-paragraph"&gt;&lt;SPAN&gt;# MLD&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class="scriptor-paragraph"&gt;&lt;SPAN&gt;ip6tables&lt;/SPAN&gt; &lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;A&lt;/SPAN&gt; &lt;SPAN&gt;INPUT&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;p&lt;/SPAN&gt; &lt;SPAN&gt;icmpv6&lt;/SPAN&gt; &lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;icmpv6&lt;/SPAN&gt;&lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;type&lt;/SPAN&gt; &lt;SPAN&gt;130&lt;/SPAN&gt; &lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;j&lt;/SPAN&gt; &lt;SPAN&gt;ACCEPT&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class="scriptor-paragraph"&gt;&lt;SPAN&gt;ip6tables&lt;/SPAN&gt; &lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;A&lt;/SPAN&gt; &lt;SPAN&gt;INPUT&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;p&lt;/SPAN&gt; &lt;SPAN&gt;icmpv6&lt;/SPAN&gt; &lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;icmpv6&lt;/SPAN&gt;&lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;type&lt;/SPAN&gt; &lt;SPAN&gt;131&lt;/SPAN&gt; &lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;j&lt;/SPAN&gt; &lt;SPAN&gt;ACCEPT&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class="scriptor-paragraph"&gt;&lt;SPAN&gt;ip6tables&lt;/SPAN&gt; &lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;A&lt;/SPAN&gt; &lt;SPAN&gt;INPUT&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;p&lt;/SPAN&gt; &lt;SPAN&gt;icmpv6&lt;/SPAN&gt; &lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;icmpv6&lt;/SPAN&gt;&lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;type&lt;/SPAN&gt; &lt;SPAN&gt;132&lt;/SPAN&gt; &lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;j&lt;/SPAN&gt; &lt;SPAN&gt;ACCEPT&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class="scriptor-paragraph"&gt;&lt;SPAN&gt;ip6tables&lt;/SPAN&gt; &lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;A&lt;/SPAN&gt; &lt;SPAN&gt;INPUT&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;p&lt;/SPAN&gt; &lt;SPAN&gt;icmpv6&lt;/SPAN&gt; &lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;icmpv6&lt;/SPAN&gt;&lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;type&lt;/SPAN&gt; &lt;SPAN&gt;143&lt;/SPAN&gt; &lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;j&lt;/SPAN&gt; &lt;SPAN&gt;ACCEPT&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;(Types and names come from the ICMPv6 registry and ND specs.) &lt;A href="https://www.iana.org/assignments/icmpv6-parameters/icmpv6-parameters.xhtml" target="_blank"&gt;[iana.org]&lt;/A&gt;, &lt;A href="https://www.rfc-editor.org/rfc/rfc4861.html" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;&lt;/P&gt;
&lt;HR /&gt;
&lt;H2 id="7quickchecklistifionlyopenthetrulymandatorythings"&gt;7) Quick checklist: “If I only open the truly mandatory things…”&lt;/H2&gt;
&lt;P&gt;If your goal is &lt;STRONG&gt;“ND works on a normal Ethernet LAN”&lt;/STRONG&gt;, the safe minimal list is:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Allow &lt;STRONG&gt;ICMPv6 133–136&lt;/STRONG&gt; on LAN (RS/RA/NS/NA). &lt;A href="https://www.rfc-editor.org/rfc/rfc4861.html" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;, &lt;A href="https://www.rfc-editor.org/rfc/rfc4890" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Ensure you allow traffic involving:
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;FE80::/10&lt;/STRONG&gt; (link-local unicast) &lt;A href="https://www.rfc-editor.org/rfc/rfc4861.html" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;, &lt;A href="https://www.rfc-editor.org/rfc/rfc4291.html" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;FF02::/16&lt;/STRONG&gt; and specifically FF02::1, FF02::2, FF02::1:FF00:0/104 &lt;A href="https://www.rfc-editor.org/rfc/rfc4861.html" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;, &lt;A href="https://www.rfc-editor.org/rfc/rfc4291.html" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Source &lt;CODE&gt;::&lt;/CODE&gt;&lt;/STRONG&gt; for DAD NS &lt;A href="https://www.rfc-editor.org/rfc/rfc4862" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;, &lt;A href="https://www.rfc-editor.org/rfc/rfc4890" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;If you have managed switches / snooping: allow &lt;STRONG&gt;MLD (130/131/132/143)&lt;/STRONG&gt; too. &lt;A href="https://www.rfc-editor.org/rfc/rfc4890" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;, &lt;A href="https://www.rfc-editor.org/rfc/rfc3810" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Treat &lt;STRONG&gt;Redirect (137)&lt;/STRONG&gt; as &lt;STRONG&gt;policy&lt;/STRONG&gt; (often disabled/blocked). &lt;A href="https://www.rfc-editor.org/rfc/rfc4890" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;, &lt;A href="https://www.rfc-editor.org/rfc/rfc4861.html" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;HR /&gt;
&lt;H3 id="acoupleofclarifyingquestionssoicantailorrulesprecisely"&gt;A couple of clarifying questions (so I can tailor rules precisely)&lt;/H3&gt;
&lt;OL&gt;
&lt;LI&gt;Are you building rules for a &lt;STRONG&gt;host firewall&lt;/STRONG&gt;, an &lt;STRONG&gt;edge router/firewall&lt;/STRONG&gt;, or an &lt;STRONG&gt;L2 firewall/bridge&lt;/STRONG&gt;? RFC 4890’s recommendations differ depending on that role. &lt;A href="https://www.rfc-editor.org/rfc/rfc4890" target="_blank"&gt;[rfc-editor.org]&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Is this primarily &lt;STRONG&gt;Ethernet LAN&lt;/STRONG&gt;, or something like &lt;STRONG&gt;Wi‑Fi with client isolation&lt;/STRONG&gt;, &lt;STRONG&gt;VXLAN/EVPN&lt;/STRONG&gt;, or an &lt;STRONG&gt;NBMA&lt;/STRONG&gt; environment?&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;If you tell me the platform (nftables/iptables/pf/Windows Firewall/etc.) and whether this is &lt;EM&gt;host&lt;/EM&gt; vs &lt;EM&gt;router&lt;/EM&gt;, I can provide a clean “default allowlist” that’s tight but won’t break IPv6.&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Tue, 03 Feb 2026 01:02:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Necessary-Rules-for-IPv6-Basic-Networking/m-p/269508#M53337</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-02-03T01:02:16Z</dc:date>
    </item>
    <item>
      <title>Re: Necessary Rules for IPv6 Basic Networking</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Necessary-Rules-for-IPv6-Basic-Networking/m-p/269833#M53418</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/680"&gt;@Pauli&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Were you able to get this working?&lt;/P&gt;</description>
      <pubDate>Thu, 05 Feb 2026 19:00:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Necessary-Rules-for-IPv6-Basic-Networking/m-p/269833#M53418</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-02-05T19:00:52Z</dc:date>
    </item>
    <item>
      <title>Re: Necessary Rules for IPv6 Basic Networking</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Necessary-Rules-for-IPv6-Basic-Networking/m-p/269858#M53423</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;I have an open case and will keep you updated &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;After a lot of research, i'm also think that the described rules (FE80::, FF02:: - ICMPv6 133-136) are necessary for IPv6. However, I would like this verified by TAC (inclusion implied rules,...)&lt;/P&gt;</description>
      <pubDate>Fri, 06 Feb 2026 07:24:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Necessary-Rules-for-IPv6-Basic-Networking/m-p/269858#M53423</guid>
      <dc:creator>Pauli</dc:creator>
      <dc:date>2026-02-06T07:24:18Z</dc:date>
    </item>
    <item>
      <title>Re: Necessary Rules for IPv6 Basic Networking</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Necessary-Rules-for-IPv6-Basic-Networking/m-p/269886#M53424</link>
      <description>&lt;P&gt;Sounds good, thank you!&lt;/P&gt;</description>
      <pubDate>Fri, 06 Feb 2026 11:51:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Necessary-Rules-for-IPv6-Basic-Networking/m-p/269886#M53424</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-02-06T11:51:41Z</dc:date>
    </item>
    <item>
      <title>Re: Necessary Rules for IPv6 Basic Networking</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Necessary-Rules-for-IPv6-Basic-Networking/m-p/272680#M103868</link>
      <description>&lt;P&gt;A quick update:&lt;/P&gt;&lt;P&gt;The case is still open and is currently being worked on by R&amp;amp;D.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Mar 2026 11:30:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Necessary-Rules-for-IPv6-Basic-Networking/m-p/272680#M103868</guid>
      <dc:creator>Pauli</dc:creator>
      <dc:date>2026-03-06T11:30:50Z</dc:date>
    </item>
  </channel>
</rss>

