Hello,
ERL-3 running EdgeOS 1.9.0, connecting to the internet using the PPPoE protocol, configured as WAN+2LAN (eth1 = WAN, eth0 and eth2 = LAN). I have issues getting IPv6 addresses on LAN interfaces. PPPoE interface gets a /128 IPv6 address range and eth1 a /64 and ping6 works as I am getting replies from google.com for example from ERL-3 CLI. I have already tried various tutorials found on the internet to no avail. Here is my config.boot, edited to remove sensitive info:
firewall { all-ping enable broadcast-ping disable ipv6-name WAN6_IN { default-action drop rule 10 { action accept description "allow established" protocol all state { established enable related enable } } rule 20 { action drop description "drop invalid packets" protocol all state { invalid enable } } rule 30 { action accept description "allow ICMPv6" protocol icmpv6 } } ipv6-name WAN6_LOCAL { default-action drop rule 10 { action accept description "allow established" protocol all state { established enable related enable } } rule 20 { action drop description "drop invalid packets" protocol all state { invalid enable } } rule 30 { action accept description "allow ICMPv6" protocol icmpv6 } rule 40 { action accept description "allow DHCPv6 client/server" destination { port 546 } protocol udp source { port 547 } } } ipv6-receive-redirects disable ipv6-src-route disable ip-src-route disable log-martians enable name WAN_IN { default-action drop description "WAN to internal" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } } name WAN_LOCAL { default-action drop description "WAN to router" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } rule 21 { action accept description https destination { port 443 } log enable protocol tcp_udp source { group { address-group NETv4_pppoe0 } } state { established enable invalid disable new enable related disable } } rule 50 { action accept description "Inbound traffic to WEB GUI" destination { port 8443 } log disable protocol tcp_udp } } name https { default-action drop rule 21 { action accept description https destination { port 8443 } log enable protocol tcp_udp } } options { mss-clamp { mss 1412 } } receive-redirects disable send-redirects enable source-validation disable syn-cookies enable } interfaces { ethernet eth0 { address 192.168.1.1/24 description Local duplex auto speed auto } ethernet eth1 { description "Internet (PPPoE)" duplex auto firewall { in { ipv6-name WAN6_IN } local { ipv6-name WAN6_LOCAL } } pppoe 0 { default-route auto dhcpv6-pd { pd 0 { interface eth1 { service slaac } prefix-length /64 } rapid-commit enable } firewall { in { name WAN_IN } local { name WAN_LOCAL } } ipv6 { address { autoconf } dup-addr-detect-transmits 1 enable { } } mtu 1492 name-server auto password <password> user-id <user-id> } speed auto } ethernet eth2 { address 192.168.2.1/24 description "Local 2" duplex auto speed auto } loopback lo { } } port-forward { auto-firewall enable hairpin-nat enable lan-interface eth2 rule 1 { description "POP1 LuCI" forward-to { address 192.168.1.100 port 80 } original-port 1974 protocol tcp_udp } rule 2 { description "POP1 Transmission" forward-to { address 192.168.1.100 port 9091 } original-port 9090 protocol tcp_udp } rule 3 { description "POP1 SSH" forward-to { address 192.168.1.100 port 22 } original-port 28 protocol tcp_udp } rule 4 { description "POP1 FTP" forward-to { address 192.168.1.100 port 21 } original-port 21 protocol tcp_udp } rule 5 { description "POP2 LuCI" forward-to { address 192.168.2.100 port 80 } original-port 1984 protocol tcp_udp } rule 6 { description "POP2 SSH" forward-to { address 192.168.2.100 port 22 } original-port 29 protocol tcp_udp } rule 7 { description "POP2 Transmission" forward-to { address 192.168.2.200 port 9091 } original-port 9092 protocol tcp_udp } wan-interface pppoe0 } protocols { static { interface-route6 ::/0 { next-hop-interface pppoe0 { } } } } service { dns { dynamic { interface pppoe0 { service dyndns { host-name <host-name> login <username> password <password> protocol <protocol> server <server> } web dyndns } } forwarding { cache-size 150 listen-on eth0 listen-on eth2 } } gui { http-port 80 https-port 8443 older-ciphers enable } nat { rule 5010 { outbound-interface pppoe0 type masquerade } } ssh { port 22 protocol-version v2 } } system { host-name Gateway login { user admin { authentication { encrypted-password <encrypted-password> plaintext-password "" } level admin } } ntp { server 0.ubnt.pool.ntp.org { } server 1.ubnt.pool.ntp.org { } server 2.ubnt.pool.ntp.org { } server 3.ubnt.pool.ntp.org { } } offload { hwnat disable ipv4 { forwarding enable gre enable pppoe enable } ipv6 { forwarding enable pppoe enable } } syslog { global { facility all { level notice } facility protocols { level debug } } } time-zone UTC traffic-analysis { dpi enable export enable } } /* Warning: Do not remove the following line. */ /* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */ /* Release version: v1.9.0.4901118.160804.1131 */
Thank you in advance.
nitroshift