# Network Management - [Network Management](#network-management) - [IP Addresses](#ip-addresses) - [Route53](#route53) - [IPV6 EUI64 Address Generation](#ipv6-eui64-address-generation) - [NetworkManager](#networkmanager) - [VPN](#vpn) - [IPv6 leak prevention](#ipv6-leak-prevention) ## IP Addresses | Hostname | IPV4 | IPV6 | | -------- | -------------- | ------------------------ | | unifi | 192.168.2.0/24 | 2603:6013:3140:102::0/64 | | lab | 10.1.0.0/16 | 2603:6013:3140:100::0/64 | | iot | 10.2.0.0/16 | | | home | 10.3.0.0/16 | 2603:6013:3140:103::0/64 | | metallb | 10.5.0.0/16 | 2603:6013:3140:101::0/64 | ## Route53 ```bash aws route53 list-hosted-zones # reeselink aws route53 change-resource-record-sets --hosted-zone-id Z0092652G7L97DSINN18 --change-batch file:// # reeseapps aws route53 change-resource-record-sets --hosted-zone-id Z012820733346FJ0U4FUF --change-batch file:// ``` ## IPV6 EUI64 Address Generation This will ensure a static IPV6 Address that is based on your mac address. You can tell if your ipv6 is eui64 if it has an fe:ff in between the 6th and 7th number. ### NetworkManager (Fedora Server, Raspberry Pi, Debian) ```bash nmcli connection show --active nmcli -f ipv6.addr-gen-mode connection show nmcli con mod ipv6.addr-gen-mode eui64 systemctl restart NetworkManager nmcli -f ipv6.addr-gen-mode connection show ``` ## VPN ### IPv6 leak prevention Add the following to the exported wireguard config to block ipv6 ```conf [Interface] PrivateKey = Address = 192.168.4.2/32, fd00::1/128 DNS = 192.168.4.1 [Peer] PublicKey = AllowedIPs = 192.168.4.1/32,192.168.4.2/32,0.0.0.0/0,::0/0 Endpoint = ipv4.reeseapps.com:51831 ```