- Products
- Learn
- Local User Groups
- Partners
- More
Call For Papers
Your Expertise, Our Stage
Ink Dragon: A Major Nation-State Campaign
Watch HereAI Security Masters E5:
Powering Prevention: The AI Driving Check Point’s ThreatCloud
The Great Exposure Reset
AI Security Masters E4:
Introducing Cyata, Securing the Agentic AI Era
CheckMates Go:
CheckMates Fest
Hello,
I was not able to find clear documentation specifying which IPv6 control‑plane traffic must be permitted by default.
Is there an overview of the mandatory IPv6 firewall rules required for proper Neighbor Discovery operation?
Specifically, which ICMPv6 message types (such as Router Solicitation, Router Advertisement, Neighbor Solicitation, Neighbor Advertisement, Redirect) must be explicitly allowed?
Additionally, which address scopes must be permitted for these mechanisms to function correctly — for example, the link‑local unicast range FE80::/10 and the link‑local multicast range FF02::/16,?"**
Thanks
From what I see reading $FWDIR/lib/implied_rules.def, this should be handled through implied rules (i.e. no explicit rules need to be created).
I would open TAC case to verify that.
Olá Pauli,
While researching IPv6 Neighbor Discovery, I found a summary of what typically needs to be allowed for NDP to work correctly
Neighbor discovery works over the ICMPv6 Neighbor Discovery protocol, which is the functional equivalent of the IPv4 ARP protocol.
ICMPv6 Neighbor Discovery Protocol must be explicitly permitted in the Access Control Rule Base
for all bridged networks.
This is different from ARP. ARP traffic is Layer 2 only, therefore it permitted regardless of the Rule
Base.
This is an example of an explicit Rule Base that permits ICMPv6 Neighbor Discovery protocol:
NameSourceDestinationVPNServices & ApplicationsActionTrackInstall OnIPv6 Neighbor Discovery | Network object that represents the Bridged Network | Network object that represents the Bridged Network | Any | neighbor-advertisement neighbor-solicitation router-advertisement router-solicitation redirect6 | Accept | Log | Policy Targets |
FWIW, this is what MS AI copilot came back with. Personally, I would still open TAC case and ask about it.
*************************
Hi — great question. IPv6 really depends on ICMPv6 in a way IPv4 never did, so “block ICMP” style policies often break basic networking. RFC 4890 was written specifically because IPv4-era ICMP filtering guidance doesn’t translate well to IPv6. [rfc-editor.org], [rfc-editor.org]
Below is a practical, “what must be allowed” overview for Neighbor Discovery (ND) and the closely-related control-plane pieces that commonly get blocked by host or edge firewalls.
Neighbor Discovery (RFC 4861) is implemented using these ICMPv6 message types: RS, RA, NS, NA, Redirect. [rfc-editor.org], [iana.org]
| ICMPv6 Type | Name | Why you need it | Must be allowed where? |
|---|---|---|---|
| 133 | Router Solicitation (RS) | Host asks for immediate Router Advertisements (e.g., after boot) | Hosts outbound, routers inbound on LAN [rfc-editor.org], [iana.org] |
| 134 | Router Advertisement (RA) | Router announces prefixes, default gateway, MTU, hop-limit, etc. (SLAAC depends on it) | Routers outbound, hosts inbound on LAN [rfc-editor.org], [rfc-editor.org] |
| 135 | Neighbor Solicitation (NS) | IPv6 “ARP”: resolve L2 address; also used for DAD and reachability (NUD) | Both directions on LAN [rfc-editor.org], [rfc-editor.org] |
| 136 | Neighbor Advertisement (NA) | Response/announcement for NS; essential for address resolution/NUD | Both directions on LAN [rfc-editor.org], [rfc-editor.org] |
Key detail: NS is also used for Duplicate Address Detection (DAD) during address assignment. DAD may use the unspecified source address ::, so filtering “source must be a real address” can break IPv6 bring-up. [rfc-editor.org], [rfc-editor.org], [rfc-editor.org]
| ICMPv6 Type | Name | Notes |
|---|---|---|
| 137 | Redirect | Optimization: router tells a host of a better next-hop/on-link destination. Many orgs disable/block it intentionally because of spoofing risk; IPv6 can still function without it in most designs. [rfc-editor.org], [rfc-editor.org] |
So, for ND to work, you typically must allow 133–136 on the local link. 137 is commonly treated as “allow only if you explicitly want/need redirects.” [rfc-editor.org], [rfc-editor.org]
ND is fundamentally link-local in scope. It uses link-local unicast addresses and link-local multicast groups. [rfc-editor.org], [rfc-editor.org]
✅ Firewall implication: permit ND ICMPv6 to/from FE80::/10 on LAN interfaces.
ND uses specific multicast groups within FF02::/16 (link-local scope multicast). [rfc-editor.org], [rfc-editor.org]
Important ones:
✅ Firewall implication: permit ICMPv6 ND to FF02::/16, especially the above groups, on LAN interfaces.
::/128During autoconfiguration/DAD, the source address can be :: before the node has a valid address. If you block that, DAD can fail and the node may never configure IPv6 properly. [rfc-editor.org], [rfc-editor.org], [rfc-editor.org]
✅ Firewall implication: allow NS (type 135) with source :: (DAD).
Even though ND uses multicast, on many switched networks MLD snooping can suppress multicast delivery unless hosts signal membership using MLD. So blocking MLD can cause ND multicast (especially solicited-node) to stop reaching peers, which looks like “ND is broken.” RFC 4890 explicitly calls out MLD as part of IPv6’s essential control functions. [rfc-editor.org], [rfc-editor.org]
Relevant ICMPv6 types:
✅ Practical baseline: allow ICMPv6 types 130/131/132/143 on LAN, at least within link-local scope. [rfc-editor.org], [rfc-editor.org]
Because you asked specifically about control-plane traffic for ND, here is the usual minimum you should allow on LAN / inside interfaces:
Allow ICMPv6:
Allow these with:
:: (for DAD) [rfc-editor.org], [rfc-editor.org], [rfc-editor.org], [rfc-editor.org]You normally do not want ND to arrive from the Internet. ND is link-local and routers should not forward it. RFC 4890 notes that local-link ICMPv6 messages are not meant to transit firewalls acting as routers. [rfc-editor.org]
So on WAN you typically:
Even if ND works, end-to-end IPv6 breaks badly if you block core ICMPv6 error messages (notably Packet Too Big for Path MTU Discovery). RFC 4890 emphasizes that ICMPv6 error messages are essential for establishing/maintaining communications. [rfc-editor.org], [rfc-editor.org]
So most operational baselines also allow (at least statefully / “related”) ICMPv6:
(I know you didn’t ask for these, but they’re the next most common “why does IPv6 act weird?” issue.)
Below are examples of how people express this in common firewalls (illustrative only).
(Types and names come from the ICMPv6 registry and ND specs.) [iana.org], [rfc-editor.org]
If your goal is “ND works on a normal Ethernet LAN”, the safe minimal list is:
:: for DAD NS [rfc-editor.org], [rfc-editor.org]If you tell me the platform (nftables/iptables/pf/Windows Firewall/etc.) and whether this is host vs router, I can provide a clean “default allowlist” that’s tight but won’t break IPv6.
Hey @Pauli
Were you able to get this working?
Hi,
I have an open case and will keep you updated 🙂
After a lot of research, i'm also think that the described rules (FE80::, FF02:: - ICMPv6 133-136) are necessary for IPv6. However, I would like this verified by TAC (inclusion implied rules,...)
Sounds good, thank you!
A quick update:
The case is still open and is currently being worked on by R&D.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 35 | |
| 22 | |
| 17 | |
| 12 | |
| 9 | |
| 9 | |
| 8 | |
| 8 | |
| 8 | |
| 7 |
Tue 17 Mar 2026 @ 03:00 PM (CET)
From SASE to Hybrid Mesh: Securing Enterprise AI at Scale - EMEATue 17 Mar 2026 @ 02:00 PM (EDT)
From SASE to Hybrid Mesh: Securing Enterprise AI at Scale - AMERWed 18 Mar 2026 @ 10:00 AM (CET)
The Cloud Architects Series: An introduction to Check Point Hybrid Mesh in 2026 - In Seven LanguagesThu 19 Mar 2026 @ 11:00 AM (EDT)
Tips and Tricks 2026 #2: AI Security Challenges and SolutionsTue 17 Mar 2026 @ 03:00 PM (CET)
From SASE to Hybrid Mesh: Securing Enterprise AI at Scale - EMEATue 17 Mar 2026 @ 02:00 PM (EDT)
From SASE to Hybrid Mesh: Securing Enterprise AI at Scale - AMERWed 18 Mar 2026 @ 10:00 AM (CET)
The Cloud Architects Series: An introduction to Check Point Hybrid Mesh in 2026 - In Seven LanguagesThu 19 Mar 2026 @ 11:00 AM (EDT)
Tips and Tricks 2026 #2: AI Security Challenges and SolutionsTue 24 Mar 2026 @ 04:00 PM (CET)
Maestro Masters EMEA: Hyperscale Firewall Architectures and OptimizationTue 24 Mar 2026 @ 06:00 PM (COT)
San Pedro Sula: Spark Firewall y AI-Powered Security ManagementThu 26 Mar 2026 @ 06:00 PM (COT)
Tegucigalpa: Spark Firewall y AI-Powered Security ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY