- Products
- Learn
- Local User Groups
- Partners
- More
Stop Babysitting Rules.
Go Agentic
Step Into the Future of
AI-Powered Cyber Security
The State of Ransomware Q1 2026
Key Trends and Their Impact
AI Security Masters E8:
Claude Mythos: New Era in Cyber Security
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
FWIW, this is what MS AI copilot came back with. Personally, I would still open TAC case and ask about it.
*************************
Hi — great question. IPv6 really depends on ICMPv6 in a way IPv4 never did, so “block ICMP” style policies often break basic networking. RFC 4890 was written specifically because IPv4-era ICMP filtering guidance doesn’t translate well to IPv6. [rfc-editor.org], [rfc-editor.org]
Below is a practical, “what must be allowed” overview for Neighbor Discovery (ND) and the closely-related control-plane pieces that commonly get blocked by host or edge firewalls.
Neighbor Discovery (RFC 4861) is implemented using these ICMPv6 message types: RS, RA, NS, NA, Redirect. [rfc-editor.org], [iana.org]
| ICMPv6 Type | Name | Why you need it | Must be allowed where? |
|---|---|---|---|
| 133 | Router Solicitation (RS) | Host asks for immediate Router Advertisements (e.g., after boot) | Hosts outbound, routers inbound on LAN [rfc-editor.org], [iana.org] |
| 134 | Router Advertisement (RA) | Router announces prefixes, default gateway, MTU, hop-limit, etc. (SLAAC depends on it) | Routers outbound, hosts inbound on LAN [rfc-editor.org], [rfc-editor.org] |
| 135 | Neighbor Solicitation (NS) | IPv6 “ARP”: resolve L2 address; also used for DAD and reachability (NUD) | Both directions on LAN [rfc-editor.org], [rfc-editor.org] |
| 136 | Neighbor Advertisement (NA) | Response/announcement for NS; essential for address resolution/NUD | Both directions on LAN [rfc-editor.org], [rfc-editor.org] |
Key detail: NS is also used for Duplicate Address Detection (DAD) during address assignment. DAD may use the unspecified source address ::, so filtering “source must be a real address” can break IPv6 bring-up. [rfc-editor.org], [rfc-editor.org], [rfc-editor.org]
| ICMPv6 Type | Name | Notes |
|---|---|---|
| 137 | Redirect | Optimization: router tells a host of a better next-hop/on-link destination. Many orgs disable/block it intentionally because of spoofing risk; IPv6 can still function without it in most designs. [rfc-editor.org], [rfc-editor.org] |
So, for ND to work, you typically must allow 133–136 on the local link. 137 is commonly treated as “allow only if you explicitly want/need redirects.” [rfc-editor.org], [rfc-editor.org]
ND is fundamentally link-local in scope. It uses link-local unicast addresses and link-local multicast groups. [rfc-editor.org], [rfc-editor.org]
✅ Firewall implication: permit ND ICMPv6 to/from FE80::/10 on LAN interfaces.
ND uses specific multicast groups within FF02::/16 (link-local scope multicast). [rfc-editor.org], [rfc-editor.org]
Important ones:
✅ Firewall implication: permit ICMPv6 ND to FF02::/16, especially the above groups, on LAN interfaces.
::/128During autoconfiguration/DAD, the source address can be :: before the node has a valid address. If you block that, DAD can fail and the node may never configure IPv6 properly. [rfc-editor.org], [rfc-editor.org], [rfc-editor.org]
✅ Firewall implication: allow NS (type 135) with source :: (DAD).
Even though ND uses multicast, on many switched networks MLD snooping can suppress multicast delivery unless hosts signal membership using MLD. So blocking MLD can cause ND multicast (especially solicited-node) to stop reaching peers, which looks like “ND is broken.” RFC 4890 explicitly calls out MLD as part of IPv6’s essential control functions. [rfc-editor.org], [rfc-editor.org]
Relevant ICMPv6 types:
✅ Practical baseline: allow ICMPv6 types 130/131/132/143 on LAN, at least within link-local scope. [rfc-editor.org], [rfc-editor.org]
Because you asked specifically about control-plane traffic for ND, here is the usual minimum you should allow on LAN / inside interfaces:
Allow ICMPv6:
Allow these with:
:: (for DAD) [rfc-editor.org], [rfc-editor.org], [rfc-editor.org], [rfc-editor.org]You normally do not want ND to arrive from the Internet. ND is link-local and routers should not forward it. RFC 4890 notes that local-link ICMPv6 messages are not meant to transit firewalls acting as routers. [rfc-editor.org]
So on WAN you typically:
Even if ND works, end-to-end IPv6 breaks badly if you block core ICMPv6 error messages (notably Packet Too Big for Path MTU Discovery). RFC 4890 emphasizes that ICMPv6 error messages are essential for establishing/maintaining communications. [rfc-editor.org], [rfc-editor.org]
So most operational baselines also allow (at least statefully / “related”) ICMPv6:
(I know you didn’t ask for these, but they’re the next most common “why does IPv6 act weird?” issue.)
Below are examples of how people express this in common firewalls (illustrative only).
(Types and names come from the ICMPv6 registry and ND specs.) [iana.org], [rfc-editor.org]
If your goal is “ND works on a normal Ethernet LAN”, the safe minimal list is:
:: for DAD NS [rfc-editor.org], [rfc-editor.org]If you tell me the platform (nftables/iptables/pf/Windows Firewall/etc.) and whether this is host vs router, I can provide a clean “default allowlist” that’s tight but won’t break IPv6.
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY