V6Direct · Tunnels
GRE, VxLAN, and WireGuard tunnel setup
V6Direct provides IPv6 transit over WireGuard, GRE, and VxLAN/L2TPv3 tunnels from multiple EU PoPs, with 1G or 10G ports depending on location.
WireGuard (Linux)
Recommended for most users: encrypted, fast, and easy to automate with the V6Direct dashboard and API.
# /etc/wireguard/wg-v6direct.conf
[Interface]
Address = 2001:db8:200::1/64
PrivateKey = YOUR_LOCAL_PRIVATE_KEY
ListenPort = 51820
[Peer]
PublicKey = V6DIRECT_PUBLIC_KEY
Endpoint = ourEndpoint:51820
AllowedIPs = 2001:db8:200::2/128, ::/0
PersistentKeepalive = 25
sudo wg-quick up wg-v6direct
GRE (Linux)
GRE is useful when your existing router supports it natively and you prefer no encryption overhead.
# Replace addresses with your values
LOCAL_IP=198.51.100.10
REMOTE_IP=203.0.113.5
ip tunnel add v6direct-gre mode gre remote $REMOTE_IP local $LOCAL_IP ttl 255
ip link set v6direct-gre up
ip addr add 2001:db8:100::1/64 dev v6direct-gre
VxLAN / L2TPv3 (advanced)
V6Direct supports additional tunnel types such as VxLAN and L2TPv3 for L2 extension or more complex topologies.
# Example VxLAN skeleton
ip link add vxlan-v6direct type vxlan id 42 dev eth0 remote 203.0.113.5 dstport 4789
ip link set vxlan-v6direct up
# Bridge vxlan-v6direct into a Linux bridge with your internal interfaces as needed
Exact parameters depend on your dashboard values and whether you terminate at L2 or L3.