Quantcast
Channel: EdgeRouter topics
Viewing all articles
Browse latest Browse all 20028

IPv6 question... probably did something stupid...

$
0
0

Hi folks, brand new EdgeRouter owner!

 

Was running a Asus RT-N66U, and was sick and tired of it going bonkers every now and then (especially with high wifi load).  So bought a EdgeRouter PoE and a Unifi UAP-AC-Pro, and loving it for the most part - management is pretty simple (unless you're stupid and screw up by, oh say, accidentally blocking all IPs from accessing the router...), and range + speed is not only better, but more reliable.

 

Now, I'm trying to get IPv6 going on the router, and I'm having issues getting things going.

 

I followed the guides and read the forums for how to get things going (I'm on CenturyLink DSL, so I started with the CenturyLink IPv6 template), but I don't seem to be able to get any IPv6 addresses.  Nothing else is broken (as in IPv4 works, and everything else works), but no IPv6 goodness.

 

The only thing I'm hoping I *don't* have to do is calculate the IPv4 --> IPv6 like in the template.  My DSL goes down often enough that it would make doing it annoying - and on top of that, the RT-N66U did this automatically...

 

This is the current config I have right now (I stripped out all the port forwarding and static IP mapping stuff since it doesn't seem germane and shrinks the thing down):

 

firewall {
    all-ping enable
    broadcast-ping disable
    group {
        network-group GUEST-NETWORKS {
            description "Describes the address that make up the guest network groups"
            network 192.168.4.0/24
        }
        network-group LAN-NETWORKS {
            description "Describes the addresses that make up the internal LAN network groups"
            network 192.168.0.0/16
            network 172.16.0.0/12
            network 10.0.0.0/8
        }
        network-group MANAGEMENT-NETWORKS {
            description "Describes the addresses that make up the management LAN network groups"
            network 192.168.2.0/24
        }
    }
    ipv6-name WAN6-IN {
        default-action drop
        description "WAN IPv6 to internal"
        enable-default-log
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
        rule 50 {
            action accept
            description "Allow ICMPv6"
            log enable
            protocol icmpv6
        }
    }
    ipv6-name WAN6-LOCAL {
        default-action drop
        description "WAN IPv6 to router"
        enable-default-log
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
        rule 50 {
            action accept
            description "Allow ICMPv6"
            log enable
            protocol icmpv6
        }
    }
    ipv6-receive-redirects disable
    ipv6-src-route disable
    ip-src-route disable
    log-martians enable
    modify PPPOE-OUT {
        description "TCP clamping"
        rule 10 {
            action modify
            modify {
                tcp-mss 1452
            }
            protocol tcp
            tcp {
                flags SYN
            }
        }
    }
    name GUEST-PROTECT-IN {
        default-action accept
        description "Protect inbound traffic from LAN network addresses"
        rule 10 {
            action accept
            description "Accept Established/Related"
            log disable
            protocol all
            state {
                established enable
                invalid disable
                new disable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop LAN-NETWORKS"
            destination {
                group {
                    network-group LAN-NETWORKS
                }
            }
            log disable
            protocol all
            source {
                group {
                }
            }
        }
    }
    name GUEST-PROTECT-LOCAL {
        default-action drop
        description "Protect the router from guest traffic"
        enable-default-log
        rule 10 {
            action accept
            description "Accept DNS"
            destination {
                port 53
            }
            log disable
            protocol udp
        }
        rule 20 {
            action accept
            description "Accept DHCP"
            destination {
                port 67
            }
            log disable
            protocol udp
        }
    }
    name LAN-PROTECT-IN {
        default-action accept
        description "Protect inbound traffic from other LAN addresses"
        rule 10 {
            action accept
            description "Accept Established/Related"
            log disable
            protocol all
            state {
                established enable
                invalid disable
                new disable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop the management network address range"
            destination {
                group {
                    network-group MANAGEMENT-NETWORKS
                }
            }
            log disable
            protocol all
        }
        rule 30 {
            action drop
            description "Drop the guest network address range"
            destination {
                group {
                    network-group GUEST-NETWORKS
                }
            }
            log disable
            protocol all
        }
    }
    name PPPOE-IN {
        default-action drop
        description "WAN to internal"
        enable-default-log
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
    }
    name PPPOE-LOCAL {
        default-action drop
        description "WAN to router"
        enable-default-log
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
    }
    options {
        mss-clamp {
            mss 1412
        }
    }
    receive-redirects disable
    send-redirects enable
    source-validation disable
    syn-cookies enable
}
interfaces {
    ethernet eth0 {
        address 192.168.2.1/24
        description Management
        duplex auto
        poe {
            output off
        }
        speed auto
    }
    ethernet eth1 {
        description "Internet (PPPoE)"
        duplex auto
        poe {
            output off
        }
        pppoe 0 {
            default-route auto
            firewall {
                in {
                    ipv6-name WAN6-IN
                    name PPPOE-IN
                }
                local {
                    ipv6-name WAN6-LOCAL
                    name PPPOE-LOCAL
                }
            }
            ipv6 {
                dup-addr-detect-transmits 1
                router-advert {
                    cur-hop-limit 64
                    link-mtu 1472
                    managed-flag false
                    max-interval 300
                    other-config-flag false
                    prefix 2602::/64 {
                        autonomous-flag true
                        on-link-flag true
                        valid-lifetime 2592000
                    }
                    reachable-time 0
                    retrans-timer 0
                    send-advert true
                }
            }
            mtu 1492
            name-server auto
            password ********
            user-id ********
        }
        speed auto
    }
    ethernet eth2 {
        description Local
        duplex auto
        poe {
            output off
        }
        speed auto
    }
    ethernet eth3 {
        description Local
        duplex auto
        poe {
            output off
        }
        speed auto
    }
    ethernet eth4 {
        description Local
        duplex auto
        poe {
            output off
        }
        speed auto
    }
    loopback lo {
    }
    switch switch0 {
        address 192.168.0.1/16
        description Local
        firewall {
            in {
                name LAN-PROTECT-IN
            }
            local {
            }
        }
        mtu 1500
        switch-port {
            interface eth2
            interface eth3
            interface eth4
        }
        vif 1000 {
            address 192.168.4.1/24
            description "Guest Network VLAN"
            firewall {
                in {
                    name GUEST-PROTECT-IN
                }
                local {
                    name GUEST-PROTECT-LOCAL
                }
            }
            mtu 1500
        }
    }
    tunnel tun0 {
        6rd-prefix 2602::/24
        address 2602::1/24
        description "CenturyLink IPv6 tunnel"
        encapsulation sit
        local-ip 0.0.0.0
        mtu 1472
        multicast disable
        remote-ip 205.171.2.64
        ttl 255
    }
}
port-forward {
    auto-firewall enable
    hairpin-nat enable
    lan-interface switch0
    wan-interface pppoe0
}
protocols {
    static {
        interface-route6 ::/0 {
            next-hop-interface tun0 {
            }
        }
    }
}
service {
    dhcp-server {
        disabled false
        hostfile-update disable
        shared-network-name ConfigLAN {
            authoritative disable
            subnet 192.168.2.0/24 {
                default-router 192.168.2.1
                dns-server 192.168.2.1
                lease 86400
                start 192.168.2.10 {
                    stop 192.168.2.19
                }
            }
        }
        shared-network-name GuestLAN {
            authoritative disable
            subnet 192.168.4.0/24 {
                default-router 192.168.4.1
                dns-server 192.168.4.1
                lease 86400
                start 192.168.4.10 {
                    stop 192.168.4.240
                }
            }
        }
        shared-network-name PrivateLAN {
            authoritative disable
            subnet 192.168.0.0/16 {
                default-router 192.168.0.1
                dns-server 192.168.0.1
                lease 86400
                start 192.168.0.10 {
                    stop 192.168.0.100
                }
                unifi-controller 192.168.0.116
            }
        }
    }
    dns {
        dynamic {
            interface pppoe0 {
                service custom-dnsomatic {
                    host-name all.dnsomatic.com
                    login ********
                    password ********
                    protocol dyndns2
                    server updates.dnsomatic.com
                }
            }
        }
        forwarding {
            cache-size 150
            listen-on eth0
            listen-on switch0
            listen-on switch0.1000
        }
    }
    gui {
        https-port 443
        listen-address 192.168.2.1
        listen-address 192.168.0.1
    }
    nat {
        rule 5010 {
            outbound-interface pppoe0
            type masquerade
        }
    }
    snmp {
        community router {
            authorization ro
        }
    }
    ssh {
        listen-address 192.168.2.1
        listen-address 192.168.0.1
        port 22
        protocol-version v2
    }
    upnp {
        listen-on eth0 {
            outbound-interface pppoe0
        }
        listen-on switch0 {
            outbound-interface pppoe0
        }
    }
}
system {
    host-name edgerouter
    login {
        user wctsiang {
            authentication {
                encrypted-password ********
                plaintext-password ""
            }
            full-name "********"
            level admin
        }
    }
    ntp {
        server 0.ubnt.pool.ntp.org {
        }
        server 1.ubnt.pool.ntp.org {
        }
        server 2.ubnt.pool.ntp.org {
        }
        server 3.ubnt.pool.ntp.org {
        }
    }
    offload {
        ipv4 {
            pppoe enable
            vlan enable
        }
    }
    syslog {
        global {
            facility all {
                level notice
            }
            facility protocols {
                level debug
            }
        }
        host 192.168.0.111 {
            facility all {
                level info
            }
        }
    }
    time-zone America/Los_Angeles
    traffic-analysis {
        dpi enable
        export enable
    }
}


/* Warning: Do not remove the following line. */
/* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */
/* Release version: v1.8.0.4853089.160219.1607 */

Thanks in advance for any help or suggestions!


Viewing all articles
Browse latest Browse all 20028

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>