Other Articles

Servers – Ensure IPv6 Loopback Traffic is Configured

Support > Fixing Checks > Server

06 March, 2026

This check ensures that IPv6 loopback traffic is properly configured on the server.

Proper configuration allows loopback traffic only on the loopback interface and blocks it on all other interfaces, helping prevent spoofing attacks and ensuring secure internal communication.

Check Details

  • Resource: Server
  • Check: Ensure IPv6 loopback traffic (::1) is configured correctly
  • Risk: Improper loopback configuration can allow spoofed traffic and compromise system security.

Remediation Steps

  1. Open a terminal session with root or sudo privileges.
  2. Configure IPv6 loopback rules using ip6tables:

    ip6tables -A INPUT -i lo -j ACCEPT
    ip6tables -A OUTPUT -o lo -j ACCEPT
    ip6tables -A INPUT -s ::1 -j DROP
    
  3. Ensure that:

    • Loopback interface (lo) allows all traffic
    • Traffic from loopback address (::1) on non-loopback interfaces is dropped
  4. Verify rules are applied correctly:

    ip6tables -L INPUT -v -n
    ip6tables -L OUTPUT -v -n
    
  5. Ensure the output includes:

    • ACCEPT rules for loopback interface
    • DROP rules for loopback address (::1) on other interfaces
  6. Save firewall rules to persist across reboots (method depends on your system).