Quantcast
Viewing all articles
Browse latest Browse all 20028

Edgerouter Lite IPv6 setup with PPPoE

Hello,

 

ERL-3 running EdgeOS 1.9.0, connecting to the internet using the PPPoE protocol, configured as WAN+2LAN (eth1 = WAN, eth0 and eth2 = LAN). I have issues getting IPv6 addresses on LAN interfaces. PPPoE interface gets a /128 IPv6 address range and eth1 a /64 and ping6 works as I am getting replies from google.com for example from ERL-3 CLI. I have already tried various tutorials found on the internet to no avail. Here is my config.boot, edited to remove sensitive info:

 

firewall {
    all-ping enable
    broadcast-ping disable
    ipv6-name WAN6_IN {
        default-action drop
        rule 10 {
            action accept
            description "allow established"
            protocol all
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "drop invalid packets"
            protocol all
            state {
                invalid enable
            }
        }
        rule 30 {
            action accept
            description "allow ICMPv6"
            protocol icmpv6
        }
    }
    ipv6-name WAN6_LOCAL {
        default-action drop
        rule 10 {
            action accept
            description "allow established"
            protocol all
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "drop invalid packets"
            protocol all
            state {
                invalid enable
            }
        }
        rule 30 {
            action accept
            description "allow ICMPv6"
            protocol icmpv6
        }
        rule 40 {
            action accept
            description "allow DHCPv6 client/server"
            destination {
                port 546
            }
            protocol udp
            source {
                port 547
            }
        }
    }
    ipv6-receive-redirects disable
    ipv6-src-route disable
    ip-src-route disable
    log-martians enable
    name WAN_IN {
        default-action drop
        description "WAN to internal"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
    }
    name WAN_LOCAL {
        default-action drop
        description "WAN to router"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
        rule 21 {
            action accept
            description https
            destination {
                port 443
            }
            log enable
            protocol tcp_udp
            source {
                group {
                    address-group NETv4_pppoe0
                }
            }
            state {
                established enable
                invalid disable
                new enable
                related disable
            }
        }
        rule 50 {
            action accept
            description "Inbound traffic to WEB GUI"
            destination {
                port 8443
            }
            log disable
            protocol tcp_udp
        }
    }
    name https {
        default-action drop
        rule 21 {
            action accept
            description https
            destination {
                port 8443
            }
            log enable
            protocol tcp_udp
        }
    }
    options {
        mss-clamp {
            mss 1412
        }
    }
    receive-redirects disable
    send-redirects enable
    source-validation disable
    syn-cookies enable
}
interfaces {
    ethernet eth0 {
        address 192.168.1.1/24
        description Local
        duplex auto
        speed auto
    }
    ethernet eth1 {
        description "Internet (PPPoE)"
        duplex auto
        firewall {
            in {
                ipv6-name WAN6_IN
            }
            local {
                ipv6-name WAN6_LOCAL
            }
        }
        pppoe 0 {
            default-route auto
            dhcpv6-pd {
                pd 0 {
                    interface eth1 {
                        service slaac
                    }
                    prefix-length /64
                }
                rapid-commit enable
            }
            firewall {
                in {
                    name WAN_IN
                }
                local {
                    name WAN_LOCAL
                }
            }
            ipv6 {
                address {
                    autoconf
                }
                dup-addr-detect-transmits 1
                enable {
                }
            }
            mtu 1492
            name-server auto
            password <password>
            user-id <user-id>
        }
        speed auto
    }
    ethernet eth2 {
        address 192.168.2.1/24
        description "Local 2"
        duplex auto
        speed auto
    }
    loopback lo {
    }
}
port-forward {
    auto-firewall enable
    hairpin-nat enable
    lan-interface eth2
    rule 1 {
        description "POP1 LuCI"
        forward-to {
            address 192.168.1.100
            port 80
        }
        original-port 1974
        protocol tcp_udp
    }
    rule 2 {
        description "POP1 Transmission"
        forward-to {
            address 192.168.1.100
            port 9091
        }
        original-port 9090
        protocol tcp_udp
    }
    rule 3 {
        description "POP1 SSH"
        forward-to {
            address 192.168.1.100
            port 22
        }
        original-port 28
        protocol tcp_udp
    }
    rule 4 {
        description "POP1 FTP"
        forward-to {
            address 192.168.1.100
            port 21
        }
        original-port 21
        protocol tcp_udp
    }
    rule 5 {
        description "POP2 LuCI"
        forward-to {
            address 192.168.2.100
            port 80
        }
        original-port 1984
        protocol tcp_udp
    }
    rule 6 {
        description "POP2 SSH"
        forward-to {
            address 192.168.2.100
            port 22
        }
        original-port 29
        protocol tcp_udp
    }
    rule 7 {
        description "POP2 Transmission"
        forward-to {
            address 192.168.2.200
            port 9091
        }
        original-port 9092
        protocol tcp_udp
    }
    wan-interface pppoe0
}
protocols {
    static {
        interface-route6 ::/0 {
            next-hop-interface pppoe0 {
            }
        }
    }
}
service {
    dns {
        dynamic {
            interface pppoe0 {
                service dyndns {
                    host-name <host-name>
                    login <username>
                    password <password>
                    protocol <protocol>
                    server <server>
                }
                web dyndns
            }
        }
        forwarding {
            cache-size 150
            listen-on eth0
            listen-on eth2
        }
    }
    gui {
        http-port 80
        https-port 8443
        older-ciphers enable
    }
    nat {
        rule 5010 {
            outbound-interface pppoe0
            type masquerade
        }
    }
    ssh {
        port 22
        protocol-version v2
    }
}
system {
    host-name Gateway
    login {
        user admin {
            authentication {
                encrypted-password <encrypted-password>
                plaintext-password ""
            }
            level admin
        }
    }
    ntp {
        server 0.ubnt.pool.ntp.org {
        }
        server 1.ubnt.pool.ntp.org {
        }
        server 2.ubnt.pool.ntp.org {
        }
        server 3.ubnt.pool.ntp.org {
        }
    }
    offload {
        hwnat disable
        ipv4 {
            forwarding enable
            gre enable
            pppoe enable
        }
        ipv6 {
            forwarding enable
            pppoe enable
        }
    }
    syslog {
        global {
            facility all {
                level notice
            }
            facility protocols {
                level debug
            }
        }
    }
    time-zone UTC
    traffic-analysis {
        dpi enable
        export enable
    }
}


/* Warning: Do not remove the following line. */
/* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */
/* Release version: v1.9.0.4901118.160804.1131 */

Thank you in advance.

 

nitroshift


Viewing all articles
Browse latest Browse all 20028

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>