ERL and firmware v1.9.0
Cable Modem in Bridge Mode
I upgraded my ERL from v1.8.5 to v1.9.0 on August 11, 2016 and since that date I have not been able to pass any ipv6 tests using the following 2 sites: test-ipv6.com and http://ipv6-test.com/
1.. my ERl gets ipv6 addresses assigned to eth0/128 eth1/64 eth2.10/64 eth2.20/64
2.. Internally I can ping6 each address but externally ping6 fails on each connected device I test.
3. I have 2 wind10 machines and 1 Linux machine plus various Apple devices like iPads, iPhones and Mac's --- all of these device get ipv6 addresses but they all are unable to pass ipv6 tests.
4. My Linux machine running Ubuntu 16.04 LTS and with a terminal session can successfully run a traceroute6 but ping6 fails.and all the ipv6 tests sites fail. You would think that if traceroute6 works ping6 would all work but not so. Ping6 -c 6 -n ipv6.google.co returns Host unrachable.
5. To take out the Cable Modem and my ISP out of the equation as a possible problem, I shutdown my ERL, I did a hard reset on the Cable Modem which converts it into a Gateway .... in Gateway mode I have 4 devices connected to it --- my Linux workstation, 2 Win10 computers [1 wired and the other wireless] and a iPhone6 connected wirelessly --- in Gateway mode all those device pass the ipv6 tests.
6..placing the Gateway back into Bridge mode and reconnecting my ERL --- all ipv6 tests fail.
So I have to conclude that either something is wrong with my EdgeOS configuration or something has changed in EdgeOS v1.9.0 firmware.
firewall { all-ping enable broadcast-ping disable group { address-group BOGONS { address 10.0.0.0/8 address 100.64.0.0/10 address 127.0.0.0/8 address 169.254.0.0/16 address 172.16.0.0/12 address 192.0.0.0/24 address 192.0.2.0/24 address 192.168.0.0/16 address 198.18.0.0/15 address 198.51.100.0/24 address 203.0.113.0/24 address 224.0.0.0/4 address 240.0.0.0/4 description "Rogue Networks" } address-group MODEM_IP { address 192.168.100.1 description "Access to Cable Modem" } address-group PRINTER_IP { address 192.168.10.36 address 192.168.10.44 description "Allowed Printers for VLAN 20 to use" } } ipv6-name WANv6_IN { default-action drop description "WAN inbound traffic forwarded to LAN" enable-default-log rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } rule 30 { action accept description "Allow IPv6 icmp" protocol ipv6-icmp } } ipv6-name WANv6_LOCAL { default-action drop description "WAN inbound traffic to the router" enable-default-log rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } rule 30 { action accept description "Allow IPv6 icmp" protocol ipv6-icmp } rule 40 { action accept description "allow dhcpv6" destination { port 546 } protocol udp source { port 547 } } } ipv6-receive-redirects disable ipv6-src-route disable ip-src-route disable log-martians enable name VLAN_IN { default-action accept description "segregate VLANS" rule 10 { action accept description "Accept established / related" protocol all state { established enable related enable } } rule 20 { action drop description "drop invalid" protocol all state { invalid enable } } rule 50 { action accept description "Cable Modem GUI access" destination { group { address-group MODEM_IP } } log disable protocol all source { } state { new enable } } rule 60 { action accept description "Printer access for VLAN20" destination { group { address-group PRINTER_IP } } } rule 70 { action drop description "drop all LANs" destination { address 192.168.0.0/16 } protocol all state { new enable } } } name WAN_IN { default-action drop description "WAN to internal" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } } name WAN_LOCAL { default-action drop description "WAN to router" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } rule 30 { action drop description "Drop Bogon source" log disable protocol all source { group { address-group BOGONS } } } rule 40 { action accept description "Allow icmp" log disable protocol icmp } rule 50 { action accept description "Allow IKE for Remote VPN Server" destination { port 500 } log disable protocol udp } rule 60 { action accept description "Allow L2TP for Remote VPN Server" destination { port 1701 } log disable protocol udp } rule 70 { action accept description "Allow ESP for Remote VPN server" log disable protocol 50 } rule 80 { action accept description "Allow NAT-T for Remote VPN Server" destination { port 4500 } log disable protocol udp } } receive-redirects disable send-redirects enable source-validation disable syn-cookies enable } interfaces { ethernet eth0 { address dhcp description "IPv4 and IPv6-Internet" dhcpv6-pd { no-dns pd 0 { interface eth1 { host-address ::1 no-dns service slaac } prefix-length /64 } pd 1 { interface eth2.10 { host-address ::1 no-dns service slaac } prefix-length /64 } pd 2 { interface eth2.20 { host-address ::1 no-dns service slaac } prefix-length /64 } rapid-commit enable } duplex auto firewall { in { ipv6-name WANv6_IN name WAN_IN } local { ipv6-name WANv6_LOCAL name WAN_LOCAL } } speed auto } ethernet eth1 { address 192.168.1.1/24 description Local duplex auto firewall { in { name VLAN_IN } local { } } speed auto } ethernet eth2 { address 192.168.2.1/24 description "Local 2" duplex auto speed auto vif 10 { address 192.168.10.1/24 description vlan10 firewall { in { name VLAN_IN } local { } } mtu 1500 } vif 20 { address 192.168.20.1/24 description vlan20 firewall { in { name VLAN_IN } local { } } mtu 1500 } vif 30 { address 192.168.30.1/24 description vlan30 firewall { in { name VLAN_IN } local { } } mtu 1500 } } loopback lo { } } service { dhcp-server { disabled false hostfile-update disable shared-network-name LAN1 { authoritative enable subnet 192.168.1.0/24 { default-router 192.168.1.1 dns-server 8.8.8.8 dns-server 8.8.4.4 lease 86400 start 192.168.1.101 { stop 192.168.1.110 } } } shared-network-name LAN2 { authoritative enable subnet 192.168.2.0/24 { default-router 192.168.2.1 dns-server 8.8.8.8 dns-server 8.8.4.4 lease 86400 start 192.168.2.101 { stop 192.168.2.110 } } } shared-network-name vlan10 { authoritative disable subnet 192.168.10.0/24 { default-router 192.168.10.1 dns-server 8.8.8.8 dns-server 8.8.4.4 lease 86400 start 192.168.10.100 { stop 192.168.10.110 } } } shared-network-name vlan20 { authoritative disable subnet 192.168.20.0/24 { default-router 192.168.20.1 dns-server 8.8.8.8 dns-server 8.8.4.4 lease 86400 start 192.168.20.100 { stop 192.168.20.115 } } } shared-network-name vlan30 { authoritative disable subnet 192.168.30.0/24 { default-router 192.168.30.1 dns-server 8.8.8.8 dns-server 8.8.4.4 lease 86400 start 192.168.30.100 { stop 192.168.30.105 } } } use-dnsmasq disable } dns { forwarding { cache-size 150 listen-on eth1 listen-on eth2 name-server 2001:4860:4860::8888 name-server 2001:4860:4860::8844 } } gui { http-port 80 https-port 443 older-ciphers enable } nat { rule 5010 { description "masquerade for WAN" outbound-interface eth0 type masquerade } } ssh { port 22 protocol-version v2 } upnp2 { acl { rule 10 { action deny description "Block Port 3074 to Force a Different Port For Xbox" external-port 3074 local-port 0-65535 subnet 192.168.20.0/24 } rule 20 { action allow description "Allow DiskStation" external-port 1024-65535 local-port 0-65535 subnet 192.168.10.15/32 } rule 30 { action allow description "Allow Apple Airport Time Capsule" external-port 1024-65535 local-port 0-65535 subnet 192.168.20.254/32 } rule 40 { action allow description "Allow XBOX360_LAB" external-port 1024-65535 local-port 0-65535 subnet 192.168.20.50/32 } rule 50 { action allow description "Allow XBOX360_AMY" external-port 1024-65535 local-port 0-65535 subnet 192.168.20.55/32 } rule 9001 { action deny description "Deny everything else" external-port 0-65535 local-port 0-65535 subnet 0.0.0.0/0 } } listen-on eth2.10 listen-on eth2.20 nat-pmp enable port 55015 secure-mode enable wan eth0 } } system { host-name stargate login { user halo2 { authentication { encrypted-password redacted } full-name "nonofyourbusiness" level halo2 } user halo { authentication { encrypted-password redacted plaintext-password "" } full-name "whydoyouwantthis" level halo2 } } ntp { server 0.ubnt.pool.ntp.org { } server 1.ubnt.pool.ntp.org { } server 2.ubnt.pool.ntp.org { } server 3.ubnt.pool.ntp.org { } } offload { hwnat disable ipsec enable ipv4 { forwarding enable vlan enable } ipv6 { forwarding disable vlan disable } } syslog { global { facility all { level notice } facility protocols { level debug } } host 192.168.10.15 { facility all { level debug } } } time-zone America/Toronto } vpn { ipsec { auto-firewall-nat-exclude disable ipsec-interfaces { interface eth0 } nat-networks { allowed-network 0.0.0.0/0 { } } nat-traversal enable } l2tp { remote-access { authentication { local-users { username halo { password "@!abcdcba2016@!" } } mode local } client-ip-pool { start 192.168.177.101 stop 192.168.177.110 } dhcp-interface eth0 dns-servers { server-1 8.8.8.8 server-2 8.8.4.4 } ipsec-settings { authentication { mode pre-shared-secret pre-shared-secret "@!abcdcba2016" } ike-lifetime 3600 } } } } /* Warning: Do not remove the following line. */ /* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */ /* Release version: v1.9.0.4901118.160804.1131 */
Any suggestions PLEASE