Quantcast
Viewing all articles
Browse latest Browse all 20028

ipv6 Tests Fail -- EdgeOS Firmware v1.9.0

ERL and firmware v1.9.0

Cable Modem in Bridge Mode

I upgraded my ERL from v1.8.5 to v1.9.0 on August 11, 2016 and since that date I have not been able to pass any ipv6 tests using the following 2 sites: test-ipv6.com and http://ipv6-test.com/

 

1.. my ERl gets ipv6 addresses assigned to eth0/128  eth1/64  eth2.10/64  eth2.20/64

2.. Internally I can ping6 each address but externally ping6 fails on each connected device I test.

3. I have 2 wind10 machines and 1 Linux machine plus various Apple devices like iPads, iPhones and Mac's --- all of these device get ipv6 addresses but they all are unable to pass ipv6 tests.

4. My Linux machine running Ubuntu 16.04 LTS and with a terminal session can successfully run a traceroute6 but ping6 fails.and all the ipv6 tests sites fail. You would think that if traceroute6 works ping6 would all work but not so. Ping6 -c 6 -n ipv6.google.co returns Host unrachable.

5. To take out the Cable Modem and my ISP out of the equation as a possible problem, I shutdown my ERL, I did a hard reset on the Cable Modem which converts it into a Gateway .... in Gateway mode I have 4 devices connected to it --- my Linux workstation, 2 Win10 computers [1 wired and the other wireless]  and a iPhone6 connected wirelessly --- in Gateway mode all those device pass the ipv6 tests.

6..placing the Gateway back into Bridge mode and reconnecting my ERL --- all ipv6 tests fail.

So I have to conclude that either something is wrong with my EdgeOS configuration or something has changed in EdgeOS v1.9.0 firmware.

firewall {
    all-ping enable
    broadcast-ping disable
    group {
        address-group BOGONS {
            address 10.0.0.0/8
            address 100.64.0.0/10
            address 127.0.0.0/8
            address 169.254.0.0/16
            address 172.16.0.0/12
            address 192.0.0.0/24
            address 192.0.2.0/24
            address 192.168.0.0/16
            address 198.18.0.0/15
            address 198.51.100.0/24
            address 203.0.113.0/24
            address 224.0.0.0/4
            address 240.0.0.0/4
            description "Rogue Networks"
        }
        address-group MODEM_IP {
            address 192.168.100.1
            description "Access to Cable Modem"
        }
        address-group PRINTER_IP {
            address 192.168.10.36
            address 192.168.10.44
            description "Allowed Printers for VLAN 20 to use"
        }
    }
    ipv6-name WANv6_IN {
        default-action drop
        description "WAN inbound traffic forwarded to LAN"
        enable-default-log
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
        rule 30 {
            action accept
            description "Allow IPv6 icmp"
            protocol ipv6-icmp
        }
    }
    ipv6-name WANv6_LOCAL {
        default-action drop
        description "WAN inbound traffic to the router"
        enable-default-log
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
        rule 30 {
            action accept
            description "Allow IPv6 icmp"
            protocol ipv6-icmp
        }
        rule 40 {
            action accept
            description "allow dhcpv6"
            destination {
                port 546
            }
            protocol udp
            source {
                port 547
            }
        }
    }
    ipv6-receive-redirects disable
    ipv6-src-route disable
    ip-src-route disable
    log-martians enable
    name VLAN_IN {
        default-action accept
        description "segregate VLANS"
        rule 10 {
            action accept
            description "Accept established / related"
            protocol all
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "drop invalid"
            protocol all
            state {
                invalid enable
            }
        }
        rule 50 {
            action accept
            description "Cable Modem GUI access"
            destination {
                group {
                    address-group MODEM_IP
                }
            }
            log disable
            protocol all
            source {
            }
            state {
                new enable
            }
        }
        rule 60 {
            action accept
            description "Printer access for VLAN20"
            destination {
                group {
                    address-group PRINTER_IP
                }
            }
        }
        rule 70 {
            action drop
            description "drop all LANs"
            destination {
                address 192.168.0.0/16
            }
            protocol all
            state {
                new enable
            }
        }
    }
    name WAN_IN {
        default-action drop
        description "WAN to internal"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
    }
    name WAN_LOCAL {
        default-action drop
        description "WAN to router"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
        rule 30 {
            action drop
            description "Drop Bogon source"
            log disable
            protocol all
            source {
                group {
                    address-group BOGONS
                }
            }
        }
        rule 40 {
            action accept
            description "Allow icmp"
            log disable
            protocol icmp
        }
        rule 50 {
            action accept
            description "Allow IKE for Remote VPN Server"
            destination {
                port 500
            }
            log disable
            protocol udp
        }
        rule 60 {
            action accept
            description "Allow L2TP for Remote VPN Server"
            destination {
                port 1701
            }
            log disable
            protocol udp
        }
        rule 70 {
            action accept
            description "Allow ESP for Remote VPN server"
            log disable
            protocol 50
        }
        rule 80 {
            action accept
            description "Allow NAT-T for Remote VPN Server"
            destination {
                port 4500
            }
            log disable
            protocol udp
        }
    }
    receive-redirects disable
    send-redirects enable
    source-validation disable
    syn-cookies enable
}
interfaces {
    ethernet eth0 {
        address dhcp
        description "IPv4 and IPv6-Internet"
        dhcpv6-pd {
            no-dns
            pd 0 {
                interface eth1 {
                    host-address ::1
                    no-dns
                    service slaac
                }
                prefix-length /64
            }
            pd 1 {
                interface eth2.10 {
                    host-address ::1
                    no-dns
                    service slaac
                }
                prefix-length /64
            }
            pd 2 {
                interface eth2.20 {
                    host-address ::1
                    no-dns
                    service slaac
                }
                prefix-length /64
            }
            rapid-commit enable
        }
        duplex auto
        firewall {
            in {
                ipv6-name WANv6_IN
                name WAN_IN
            }
            local {
                ipv6-name WANv6_LOCAL
                name WAN_LOCAL
            }
        }
        speed auto
    }
    ethernet eth1 {
        address 192.168.1.1/24
        description Local
        duplex auto
        firewall {
            in {
                name VLAN_IN
            }
            local {
            }
        }
        speed auto
    }
    ethernet eth2 {
        address 192.168.2.1/24
        description "Local 2"
        duplex auto
        speed auto
        vif 10 {
            address 192.168.10.1/24
            description vlan10
            firewall {
                in {
                    name VLAN_IN
                }
                local {
                }
            }
            mtu 1500
        }
        vif 20 {
            address 192.168.20.1/24
            description vlan20
            firewall {
                in {
                    name VLAN_IN
                }
                local {
                }
            }
            mtu 1500
        }
        vif 30 {
            address 192.168.30.1/24
            description vlan30
            firewall {
                in {
                    name VLAN_IN
                }
                local {
                }
            }
            mtu 1500
        }
    }
    loopback lo {
    }
}
service {
    dhcp-server {
        disabled false
        hostfile-update disable
        shared-network-name LAN1 {
            authoritative enable
            subnet 192.168.1.0/24 {
                default-router 192.168.1.1
                dns-server 8.8.8.8
                dns-server 8.8.4.4
                lease 86400
                start 192.168.1.101 {
                    stop 192.168.1.110
                }
            }
        }
        shared-network-name LAN2 {
            authoritative enable
            subnet 192.168.2.0/24 {
                default-router 192.168.2.1
                dns-server 8.8.8.8
                dns-server 8.8.4.4
                lease 86400
                start 192.168.2.101 {
                    stop 192.168.2.110
                }
            }
        }
        shared-network-name vlan10 {
            authoritative disable
            subnet 192.168.10.0/24 {
                default-router 192.168.10.1
                dns-server 8.8.8.8
                dns-server 8.8.4.4
                lease 86400
                start 192.168.10.100 {
                    stop 192.168.10.110
                }
            }
        }
        shared-network-name vlan20 {
            authoritative disable
            subnet 192.168.20.0/24 {
                default-router 192.168.20.1
                dns-server 8.8.8.8
                dns-server 8.8.4.4
                lease 86400
                start 192.168.20.100 {
                    stop 192.168.20.115
                }
            }
        }
        shared-network-name vlan30 {
            authoritative disable
            subnet 192.168.30.0/24 {
                default-router 192.168.30.1
                dns-server 8.8.8.8
                dns-server 8.8.4.4
                lease 86400
                start 192.168.30.100 {
                    stop 192.168.30.105
                }
            }
        }
        use-dnsmasq disable
    }
    dns {
        forwarding {
            cache-size 150
            listen-on eth1
            listen-on eth2
            name-server 2001:4860:4860::8888
            name-server 2001:4860:4860::8844
        }
    }
    gui {
        http-port 80
        https-port 443
        older-ciphers enable
    }
    nat {
        rule 5010 {
            description "masquerade for WAN"
            outbound-interface eth0
            type masquerade
        }
    }
    ssh {
        port 22
        protocol-version v2
    }
    upnp2 {
        acl {
            rule 10 {
                action deny
                description "Block Port 3074 to Force a Different Port For Xbox"
                external-port 3074
                local-port 0-65535
                subnet 192.168.20.0/24
            }
            rule 20 {
                action allow
                description "Allow DiskStation"
                external-port 1024-65535
                local-port 0-65535
                subnet 192.168.10.15/32
            }
            rule 30 {
                action allow
                description "Allow Apple Airport Time Capsule"
                external-port 1024-65535
                local-port 0-65535
                subnet 192.168.20.254/32
            }
            rule 40 {
                action allow
                description "Allow XBOX360_LAB"
                external-port 1024-65535
                local-port 0-65535
                subnet 192.168.20.50/32
            }
            rule 50 {
                action allow
                description "Allow XBOX360_AMY"
                external-port 1024-65535
                local-port 0-65535
                subnet 192.168.20.55/32
            }
            rule 9001 {
                action deny
                description "Deny everything else"
                external-port 0-65535
                local-port 0-65535
                subnet 0.0.0.0/0
            }
        }
        listen-on eth2.10
        listen-on eth2.20
        nat-pmp enable
        port 55015
        secure-mode enable
        wan eth0
    }
}
system {
    host-name stargate
    login {
        user halo2 {
            authentication {
                encrypted-password redacted
            }
            full-name "nonofyourbusiness"
            level halo2
        }
        user halo {
            authentication {
                encrypted-password redacted
                plaintext-password ""
            }
            full-name "whydoyouwantthis"
            level halo2
        }
    }
    ntp {
        server 0.ubnt.pool.ntp.org {
        }
        server 1.ubnt.pool.ntp.org {
        }
        server 2.ubnt.pool.ntp.org {
        }
        server 3.ubnt.pool.ntp.org {
        }
    }
    offload {
        hwnat disable
        ipsec enable
        ipv4 {
            forwarding enable
            vlan enable
        }
        ipv6 {
            forwarding disable
            vlan disable
        }
    }
    syslog {
        global {
            facility all {
                level notice
            }
            facility protocols {
                level debug
            }
        }
        host 192.168.10.15 {
            facility all {
                level debug
            }
        }
    }
    time-zone America/Toronto
}
vpn {
    ipsec {
        auto-firewall-nat-exclude disable
        ipsec-interfaces {
            interface eth0
        }
        nat-networks {
            allowed-network 0.0.0.0/0 {
            }
        }
        nat-traversal enable
    }
    l2tp {
        remote-access {
            authentication {
                local-users {
                    username halo {
                        password "@!abcdcba2016@!"
                    }
                }
                mode local
            }
            client-ip-pool {
                start 192.168.177.101
                stop 192.168.177.110
            }
            dhcp-interface eth0
            dns-servers {
                server-1 8.8.8.8
                server-2 8.8.4.4
            }
            ipsec-settings {
                authentication {
                    mode pre-shared-secret
                    pre-shared-secret "@!abcdcba2016"
                }
                ike-lifetime 3600
            }
        }
    }
}


/* Warning: Do not remove the following line. */
/* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */
/* Release version: v1.9.0.4901118.160804.1131 */

Any suggestions PLEASE

 

 

 


Viewing all articles
Browse latest Browse all 20028

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>