By Emily Brooks · Dec 4, 2025

IPv6 and CDNs: When Your CDN Works on IPv4 but Fails on IPv6

A mid-size e-commerce company pays $3,000 per month for a top-tier CDN. Their dashboard shows 99.99% uptime. Their monitoring is green. Their team is confident that every visitor, on every device, in every country, gets a fast, reliable experience. Then a customer success manager notices something odd: mobile conversion rates in Southeast Asia have dropped 18% over two months. Support tickets from those regions mention slow loads and connection errors. The engineering team investigates and discovers that the CDN's IPv6 edge servers in Singapore and Jakarta have been silently misconfigured since a maintenance window six weeks ago. Every IPv6 visitor in those markets has been hitting timeouts or stale content. The CDN dashboard never flagged it because their internal health checks only ran over IPv4.

This is not a hypothetical edge case. It is a pattern that repeats across businesses of all sizes, and it has a direct impact on revenue. The reason it keeps happening is simple: CDNs run two parallel networks, one for IPv4 and one for IPv6, and these networks do not always behave the same way. If your monitoring only checks one protocol, you are blind to failures on the other. This article explains how CDNs handle IPv4 and IPv6 differently under the hood, why those differences create real outages for a growing share of your audience, and what the actual business cost looks like when you miss them.

The Revenue You Cannot See Losing

Before getting into the technical details, consider the business math. IPv6 adoption is not a future concern. It is a present reality. Mobile carriers in India, the United States, Brazil, Japan, and across Southeast Asia route more than half of their traffic over IPv6. T-Mobile US reports over 90% IPv6 usage. Reliance Jio in India is almost entirely IPv6. When your CDN fails on IPv6, you are not losing a tiny fraction of visitors. In some markets, you are losing the majority.

The financial impact compounds because IPv6 failures are silent. Unlike a full site outage that triggers alarms and war rooms, an IPv6-specific failure only affects a segment of your traffic. The site looks fine from your office. Your monitoring shows green. Your CDN dashboard reports excellent performance. Meanwhile, a growing pool of mobile users gets errors, slow loads, or broken SSL warnings. They do not file support tickets. They leave. They buy from a competitor. They never come back. Use our Downtime Cost Calculator to estimate what these invisible outages cost your specific business.

The gap between "our CDN says we are fine" and "our mobile revenue is declining in key markets" is often an IPv6 monitoring gap.

How CDNs Run Two Separate Networks (and Why That Matters)

From the outside, a CDN looks like a single unified service. You point your DNS at it, configure some settings, and it handles everything. In reality, a CDN operates two largely independent infrastructure stacks. Understanding this split is the key to understanding why IPv4 can work perfectly while IPv6 is broken.

Separate edge server pools

CDN providers maintain pools of edge servers at each point of presence (PoP). While many modern edge servers are dual-stack (supporting both IPv4 and IPv6), this is not universal. Some providers still have older PoPs in certain regions where IPv6 has not been enabled. Others run dedicated IPv6 edge servers with different configurations, different software versions, or different capacity than their IPv4 counterparts. When the IPv6 pool in a specific region has lower capacity, traffic spikes that the IPv4 pool handles easily can overwhelm the IPv6 pool.

Independent DNS resolution

When a client resolves your domain, the CDN's authoritative DNS server returns different answers depending on the client's location and protocol. The A record points to an IPv4 edge server. The AAAA record points to an IPv6 edge server. These may be the same physical machine, or they may be completely different machines in different locations. The CDN's GeoDNS logic for IPv6 often routes clients to different PoPs than it would for IPv4, because IPv6 peering topology differs from IPv4 peering topology.

Separate routing and peering agreements

CDNs negotiate peering agreements with ISPs and transit providers independently for each protocol. A CDN might have excellent IPv4 peering with a major European ISP but limited IPv6 connectivity to the same ISP. This forces IPv6 traffic to take a longer, less reliable path through different transit networks. The result: IPv4 latency from Berlin might be 12ms while IPv6 latency from the same city is 85ms, routed through a completely different set of network hops.

Independent WAF and security rule sets

Web Application Firewall rules, rate limiting, and bot detection systems are often configured separately for IPv4 and IPv6 traffic. A rule that works correctly for IPv4 CIDR ranges might be missing or incorrectly applied to IPv6 prefixes. Custom allow-lists written in IPv4 notation provide zero coverage for IPv6 traffic. This means your carefully tuned security configuration can have blind spots that only affect one protocol.

Separate SSL/TLS certificate deployment pipelines

CDNs manage SSL certificates across thousands of edge servers. Certificate deployment automation may process IPv4 and IPv6 edge pools on different schedules. During a renewal or rotation, the new certificate might reach IPv4 servers within minutes while IPv6 servers continue serving the old certificate for hours. The practical result: IPv6 HTTPS connections fail with certificate errors while IPv4 works perfectly.

Seven CDN Failure Scenarios That Only Hit IPv6 Users

Each of these scenarios produces the same frustrating outcome: your IPv4 users experience nothing unusual while your IPv6 users see errors, timeouts, or degraded performance. Your monitoring shows green. Your revenue quietly drops.

1. IPv6 enabled in DNS but not configured at the edge

The most basic failure. Your CDN publishes a AAAA record, so DNS resolution succeeds for IPv6 clients. But the edge server assigned to that IPv6 address is not configured for your domain. The visitor's browser resolves the address, attempts a connection, and hits a timeout or a generic CDN error page. This commonly happens when IPv6 is enabled at the CDN dashboard level but has not propagated to all edge nodes, or when the CDN requires a separate activation step per domain that was missed during setup. Someone enables IPv6, sees the record appear, and considers the job done.

2. SSL certificates deployed only to IPv4 edges

During certificate renewal, the new certificate reaches IPv4 servers first. IPv6 servers continue serving an old or expired certificate. IPv6 users accessing your site over HTTPS see "Your connection is not private" warnings. Mobile browsers on IPv6 networks show security errors that immediately destroy user trust. You can detect this manually by comparing certificates served over each protocol:

# Check certificate over IPv4
openssl s_client -connect example.com:443 -4 2>/dev/null | openssl x509 -noout -dates -subject

# Check certificate over IPv6
openssl s_client -connect example.com:443 -6 2>/dev/null | openssl x509 -noout -dates -subject

If the output differs, the CDN has a certificate synchronization problem. For a deeper look at protocol-specific SSL failures, see our article on common IPv6 connectivity issues.

3. WAF rules blocking legitimate IPv6 traffic

CDN WAF rules rely on IP reputation lists, geo-blocking, and rate limiting. IPv6 creates specific challenges:

  • IPv6 threat intelligence databases are far less mature, so WAFs may default to blocking unknown IPv6 ranges.
  • Rate limiting by IP often fails to account for IPv6 allocation patterns. A single user may have an entire /64 prefix, making per-address limiting ineffective while per-prefix limiting blocks too broadly.
  • Geo-IP databases for IPv6 are less accurate, causing legitimate traffic to be misclassified and blocked.
  • Custom WAF rules written with IPv4 CIDR notation (like 192.168.0.0/16) provide zero coverage for IPv6 traffic.

During traffic spikes like flash sales, this imbalance hits hardest: legitimate IPv6 customers get blocked just when you most need every visitor to convert.

4. Origin server reachable only over IPv4

Some CDNs attempt to connect to your origin server using the same protocol the client used. If a visitor connects to the CDN via IPv6, the CDN tries to fetch content from your origin via IPv6. If your origin only has an IPv4 address, this fetch fails. The CDN returns a 502 or 504 error to the IPv6 visitor while IPv4 visitors get the cached or correctly proxied response.

Not all CDNs behave this way. Many always connect to the origin over IPv4 regardless of client protocol. But this is CDN-specific behavior that you need to verify with your provider and test independently.

5. Regional IPv6 edge outage

CDN failures are rarely global. More commonly, a specific PoP or region has an issue. If IPv6 edge servers in Tokyo go down while IPv4 servers remain healthy, Japanese IPv6 users lose access while the rest of the world is fine. These regional failures are nearly impossible to detect from a single monitoring location.

This is exactly why multi-location monitoring matters. A monitoring probe in Frankfurt might show IPv6 as perfectly healthy while a probe in Singapore detects a complete outage. If you only monitor from one location, regional failures in your highest-growth markets go completely undetected.

6. Cache inconsistency between IPv4 and IPv6 edges

CDNs cache content independently at each edge server. If IPv4 and IPv6 requests are served by different servers (or different PoPs), cached content may diverge. A cache purge might propagate to IPv4 edges but skip IPv6 edges, leaving IPv6 users seeing outdated pricing, broken layouts, or old product information for the duration of the cache TTL. For e-commerce, this means some visitors see incorrect prices or out-of-stock products while others see the current version.

7. DNS health checks that ignore IPv6

CDN DNS systems use health checks to route traffic away from unhealthy edge servers. If the health check system only monitors IPv4, it cannot detect IPv6-specific failures. The CDN DNS continues directing IPv6 traffic to a broken edge while correctly routing IPv4 traffic to healthy alternatives. This is one of the most common CDN IPv6 failure modes because it is a gap in the CDN's own internal monitoring, not in your configuration.

Why These Failures Stay Hidden for Weeks

The core problem with CDN IPv6 failures is not that they are hard to fix. Most can be resolved quickly once identified. The problem is that multiple factors conspire to keep them invisible:

  • Office networks default to IPv4. When you load your site from your desk to check if it works, your browser almost certainly connects via IPv4. You confirm the site is up. You tested one protocol and assumed both work.
  • Most monitoring tools only check IPv4. Unless you have explicitly configured separate IPv6 monitors, your uptime dashboard only reflects IPv4 health. It can show 100% uptime while IPv6 has been broken for days.
  • CDN status pages report IPv4 health. CDN provider status pages are based on their internal IPv4 health checks. An IPv6-specific failure in a specific region may never appear on their status page.
  • User complaints look random. IPv6 users report "site is down" while IPv4 users say "works fine for me." Without protocol-specific monitoring data, these contradictory reports look like user error or localized ISP problems rather than a systematic CDN issue.
  • Analytics data is ambiguous. A drop in mobile traffic from a specific region could be seasonal, could be a marketing issue, could be a competitor gaining share. Without the monitoring data that pinpoints an IPv6 failure, the real cause gets buried in speculation.

The average time to detect a CDN IPv6 failure without dedicated monitoring is measured in weeks, not minutes. Every day that passes is a day of lost revenue from a growing segment of your audience.

Real-World Business Impact: Three Scenarios

Scenario: Certificate renewal breaks IPv6 HTTPS, mobile conversions drop

A SaaS company uses a major CDN for their customer portal. The CDN auto-renews SSL certificates every 90 days. During one renewal cycle, the new certificate deploys to IPv4 edge servers within minutes, but IPv6 edges receive the update six hours later due to a deployment pipeline issue. During this window, mobile users on IPv6 networks see "Your connection is not private" warnings. The company's monitoring (IPv4 only) shows no issues. Customer support receives scattered tickets from mobile users, but the team cannot reproduce the problem from the office.

After three renewal cycles with this same pattern, the company estimates they lost approximately $45,000 in trial signups from mobile visitors who encountered security warnings during the renewal windows. The fix took 20 minutes once they identified the problem. The identification took three months because they had no IPv6 monitoring.

Scenario: Flash sale WAF rules block IPv6 customers

An e-commerce site runs a Black Friday sale. Traffic spikes trigger the CDN's rate limiting. The rate limiting rules include IPv4 CIDR allow-lists for known partners and legitimate traffic sources, but equivalent IPv6 allow-lists were never created. IPv6 traffic from legitimate customers gets rate-limited and returns 429 (Too Many Requests) errors while IPv4 customers shop normally. Post-sale analysis shows that mobile conversion rate dropped 34% compared to the previous year's sale, concentrated in markets with high IPv6 adoption. The lost revenue from one sale event exceeded $120,000.

Scenario: Regional PoP drops IPv6 after maintenance

A CDN provider performs maintenance on edge servers at their Tokyo PoP. After maintenance, IPv4 services come back online automatically. IPv6 services require a manual configuration step that the operations team misses. Japanese users on IPv6-preferred networks cannot access any site served by that PoP. The affected sites see IPv6 errors only from Japan, and only if they have monitoring probes in the region. For one company, this meant two weeks of degraded access in their second-largest market before a customer escalation finally reached the right engineer.

How UptyBots Catches CDN IPv6 Problems

UptyBots is built to detect exactly the kind of partial, protocol-specific outages that CDNs create:

  • Independent IPv4 and IPv6 monitors: Each protocol is checked separately on its own schedule. An IPv6 failure triggers an alert immediately, even when IPv4 is healthy. You see the split clearly on your dashboard, not buried in aggregated metrics.
  • Multi-location probes: Checks run from multiple geographic regions, catching CDN edge failures that only affect specific PoPs. A failure visible only from Asia is detected by the Asian probe even if European and American probes show the site as healthy.
  • SSL monitoring per protocol: UptyBots validates SSL certificates independently for IPv4 and IPv6 connections. Mismatched certificates, expired certs on one protocol, and handshake failures that only occur on IPv6 are caught the moment they happen.
  • Response time comparison: By tracking IPv4 and IPv6 response times side by side over time, you can spot CDN routing changes that increase IPv6 latency or cache behavior that differs between protocols. A sudden divergence in response times is often the first signal of a CDN configuration problem.
  • Instant multi-channel alerts: When the IPv6 monitor detects an issue, you receive an alert via email, Telegram, or webhook immediately. No waiting for user complaints. No wondering if the support tickets are real or user error.

Auditing Your CDN's IPv6 Configuration

Before setting up ongoing monitoring, verify that your CDN is correctly configured for IPv6 right now:

  1. Check DNS records. Run dig AAAA yourdomain.com and confirm the returned address belongs to your CDN's IPv6 range. Check your CDN's documentation for their published IPv6 prefixes.
  2. Test HTTPS over IPv6. Run curl -6 -I https://yourdomain.com and verify you get a 200 response with correct content headers.
  3. Compare SSL certificates. Run openssl s_client over both -4 and -6 and confirm the same certificate is served with the same expiration date.
  4. Check from multiple locations. Use UptyBots's multi-location checks to verify IPv6 works from different regions, not just from your own network.
  5. Review CDN WAF rules. Ensure that every IP-based allow-list, rate limit, or geo-blocking rule has corresponding IPv6 entries. If your rules only reference IPv4 CIDR ranges, IPv6 traffic is either unprotected or blocked by default.
  6. Verify CDN origin settings. Check how your CDN connects to your origin server. If it matches the client's protocol, ensure your origin supports IPv6 or configure the CDN to always use IPv4 for origin connections.
  7. Test after CDN changes. Every configuration change, plan upgrade, or CDN migration should include IPv6 verification. Changes that work for IPv4 do not automatically propagate to IPv6.

Best Practices for CDN + IPv6 Reliability

Practice Why it matters for revenue
Create separate IPv4 and IPv6 monitors The only way to detect protocol-specific CDN failures that silently cost you mobile customers
Monitor from multiple geographic regions CDN edge failures are regional. A single monitoring location misses outages in your growth markets
Enable SSL monitoring on both protocols Certificate deployment desync between IPv4 and IPv6 edges causes security warnings that destroy trust
Audit WAF rules for IPv6 coverage IPv4-only allow-lists mean your IPv6 customers hit blocks during traffic spikes when conversions matter most
Test after every CDN configuration change CDN changes that affect IPv4 may not propagate to IPv6. Each change is a potential IPv6 regression
Monitor cache purge propagation Stale prices, outdated product info, or broken layouts on IPv6 edges erode customer confidence
Track IPv4 vs IPv6 response times Diverging response times signal CDN routing problems before they become full outages

The Mobile Revenue Connection

The reason CDN IPv6 failures disproportionately affect revenue is the mobile connection. Mobile carriers are the primary drivers of IPv6 adoption. In many markets, mobile traffic is majority IPv6. Mobile users are also the fastest-growing segment for most online businesses. When your CDN fails on IPv6, you are failing the audience segment that is growing fastest, spending more time on their devices, and increasingly making purchasing decisions from their phones.

The businesses that catch these issues early share one characteristic: they monitor both protocols independently, from multiple locations, continuously. They do not rely on their CDN's dashboard to tell them everything is fine. They verify it with independent, protocol-specific monitoring that catches the failures CDN internal systems miss.

The businesses that do not will continue to see "99.99% uptime" on their CDN dashboards while a growing share of their mobile audience in high-value markets quietly encounters something very different.

For a deeper look at why dual-stack monitoring is essential, read IPv4 vs IPv6 monitoring. To understand the broader picture of hidden downtime affecting IPv6-only users, see our dedicated guide.

See setup tutorials or get started with UptyBots monitoring today.

Ready to get started?

Start Free