V6Direct · Tunnels

GRE, VxLAN, and WireGuard tunnel setup

V6Direct provides IPv6 transit over WireGuard, GRE, and VxLAN/L2TPv3 tunnels from multiple EU PoPs, with 1G or 10G ports depending on location.

WireGuard (Linux)

Recommended for most users: encrypted, fast, and easy to automate with the V6Direct dashboard and API.

# /etc/wireguard/wg-v6direct.conf
[Interface]
Address = 2001:db8:200::1/64
PrivateKey = YOUR_LOCAL_PRIVATE_KEY
ListenPort = 51820

[Peer]
PublicKey = V6DIRECT_PUBLIC_KEY
Endpoint = ourEndpoint:51820
AllowedIPs = 2001:db8:200::2/128, ::/0
PersistentKeepalive = 25
sudo wg-quick up wg-v6direct

GRE (Linux)

GRE is useful when your existing router supports it natively and you prefer no encryption overhead.

# Replace addresses with your values
LOCAL_IP=198.51.100.10
REMOTE_IP=203.0.113.5

ip tunnel add v6direct-gre mode gre remote $REMOTE_IP local $LOCAL_IP ttl 255
ip link set v6direct-gre up
ip addr add 2001:db8:100::1/64 dev v6direct-gre

VxLAN / L2TPv3 (advanced)

V6Direct supports additional tunnel types such as VxLAN and L2TPv3 for L2 extension or more complex topologies.

# Example VxLAN skeleton
ip link add vxlan-v6direct type vxlan id 42 dev eth0 remote 203.0.113.5 dstport 4789
ip link set vxlan-v6direct up
# Bridge vxlan-v6direct into a Linux bridge with your internal interfaces as needed

Exact parameters depend on your dashboard values and whether you terminate at L2 or L3.