NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
Forum Discussion
InTheShires
Aug 05, 2013Tutor
IPv6 OFF. How?
I've been trying a few things at home on the Ultra 2+ and I've been looking to disable IPv6. I've tried the usual Google/Linux/Etch/Deb web guides... EXAMPLE # vi /etc/modprobe.d/aliases ...
StephenB
Aug 11, 2013Guru - Experienced User
I get why folks would be bothered by the inability to totally prevent OS6 from "phoning home". But I really don't get your issue here.
IPV6 is disabled on your LAN, as you configured it to be. The VPN termination isn't configurable at all (IPv4 or IPv6), and it is a completely separate (though virtual) network from the local LAN network. You can't reach your NAS using the VPN addresses unless you are using ReadyNAS remote - and even then those addresses only show up inside the encrypted tunnel. If there are IPV6 packets sent over the VPN, they are also encapsulated inside the encrypted IPv4 tunnel. The LAN only sees IPv4 (using the IPv4 address you or your router assigned to the NAS).
The real problem with remote's IP configuration is that it is hijacking IPv4 addresses that are in use by real servers who are paying for those addresses. So when the remote client is installed (PC, iPad, NAS, smartphone), there are web sites, etc. that those devices can no longer access. A forum member here told me in a PM that he can't reach a storage service he is using unless he uninstalls Remote - because his server is assigned an address in the 5.x.x.x range that remote is hijacking. Now if Microsoft did that, people would be screaming (for good reason).
Anyway, there's probably no point in continuing the discussion - I suspect we will just continue to talk past each other.
IPV6 is disabled on your LAN, as you configured it to be. The VPN termination isn't configurable at all (IPv4 or IPv6), and it is a completely separate (though virtual) network from the local LAN network. You can't reach your NAS using the VPN addresses unless you are using ReadyNAS remote - and even then those addresses only show up inside the encrypted tunnel. If there are IPV6 packets sent over the VPN, they are also encapsulated inside the encrypted IPv4 tunnel. The LAN only sees IPv4 (using the IPv4 address you or your router assigned to the NAS).
The real problem with remote's IP configuration is that it is hijacking IPv4 addresses that are in use by real servers who are paying for those addresses. So when the remote client is installed (PC, iPad, NAS, smartphone), there are web sites, etc. that those devices can no longer access. A forum member here told me in a PM that he can't reach a storage service he is using unless he uninstalls Remote - because his server is assigned an address in the 5.x.x.x range that remote is hijacking. Now if Microsoft did that, people would be screaming (for good reason).
Anyway, there's probably no point in continuing the discussion - I suspect we will just continue to talk past each other.
Related Content
NETGEAR Academy

Boost your skills with the Netgear Academy - Get trained, certified and stay ahead with the latest Netgear technology!
Join Us!