Hi folks, brand new EdgeRouter owner!
Was running a Asus RT-N66U, and was sick and tired of it going bonkers every now and then (especially with high wifi load). So bought a EdgeRouter PoE and a Unifi UAP-AC-Pro, and loving it for the most part - management is pretty simple (unless you're stupid and screw up by, oh say, accidentally blocking all IPs from accessing the router...), and range + speed is not only better, but more reliable.
Now, I'm trying to get IPv6 going on the router, and I'm having issues getting things going.
I followed the guides and read the forums for how to get things going (I'm on CenturyLink DSL, so I started with the CenturyLink IPv6 template), but I don't seem to be able to get any IPv6 addresses. Nothing else is broken (as in IPv4 works, and everything else works), but no IPv6 goodness.
The only thing I'm hoping I *don't* have to do is calculate the IPv4 --> IPv6 like in the template. My DSL goes down often enough that it would make doing it annoying - and on top of that, the RT-N66U did this automatically...
This is the current config I have right now (I stripped out all the port forwarding and static IP mapping stuff since it doesn't seem germane and shrinks the thing down):
firewall { all-ping enable broadcast-ping disable group { network-group GUEST-NETWORKS { description "Describes the address that make up the guest network groups" network 192.168.4.0/24 } network-group LAN-NETWORKS { description "Describes the addresses that make up the internal LAN network groups" network 192.168.0.0/16 network 172.16.0.0/12 network 10.0.0.0/8 } network-group MANAGEMENT-NETWORKS { description "Describes the addresses that make up the management LAN network groups" network 192.168.2.0/24 } } ipv6-name WAN6-IN { default-action drop description "WAN IPv6 to internal" enable-default-log rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } rule 50 { action accept description "Allow ICMPv6" log enable protocol icmpv6 } } ipv6-name WAN6-LOCAL { default-action drop description "WAN IPv6 to router" enable-default-log rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } rule 50 { action accept description "Allow ICMPv6" log enable protocol icmpv6 } } ipv6-receive-redirects disable ipv6-src-route disable ip-src-route disable log-martians enable modify PPPOE-OUT { description "TCP clamping" rule 10 { action modify modify { tcp-mss 1452 } protocol tcp tcp { flags SYN } } } name GUEST-PROTECT-IN { default-action accept description "Protect inbound traffic from LAN network addresses" rule 10 { action accept description "Accept Established/Related" log disable protocol all state { established enable invalid disable new disable related enable } } rule 20 { action drop description "Drop LAN-NETWORKS" destination { group { network-group LAN-NETWORKS } } log disable protocol all source { group { } } } } name GUEST-PROTECT-LOCAL { default-action drop description "Protect the router from guest traffic" enable-default-log rule 10 { action accept description "Accept DNS" destination { port 53 } log disable protocol udp } rule 20 { action accept description "Accept DHCP" destination { port 67 } log disable protocol udp } } name LAN-PROTECT-IN { default-action accept description "Protect inbound traffic from other LAN addresses" rule 10 { action accept description "Accept Established/Related" log disable protocol all state { established enable invalid disable new disable related enable } } rule 20 { action drop description "Drop the management network address range" destination { group { network-group MANAGEMENT-NETWORKS } } log disable protocol all } rule 30 { action drop description "Drop the guest network address range" destination { group { network-group GUEST-NETWORKS } } log disable protocol all } } name PPPOE-IN { default-action drop description "WAN to internal" enable-default-log rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } } name PPPOE-LOCAL { default-action drop description "WAN to router" enable-default-log rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } } options { mss-clamp { mss 1412 } } receive-redirects disable send-redirects enable source-validation disable syn-cookies enable } interfaces { ethernet eth0 { address 192.168.2.1/24 description Management duplex auto poe { output off } speed auto } ethernet eth1 { description "Internet (PPPoE)" duplex auto poe { output off } pppoe 0 { default-route auto firewall { in { ipv6-name WAN6-IN name PPPOE-IN } local { ipv6-name WAN6-LOCAL name PPPOE-LOCAL } } ipv6 { dup-addr-detect-transmits 1 router-advert { cur-hop-limit 64 link-mtu 1472 managed-flag false max-interval 300 other-config-flag false prefix 2602::/64 { autonomous-flag true on-link-flag true valid-lifetime 2592000 } reachable-time 0 retrans-timer 0 send-advert true } } mtu 1492 name-server auto password ******** user-id ******** } speed auto } ethernet eth2 { description Local duplex auto poe { output off } speed auto } ethernet eth3 { description Local duplex auto poe { output off } speed auto } ethernet eth4 { description Local duplex auto poe { output off } speed auto } loopback lo { } switch switch0 { address 192.168.0.1/16 description Local firewall { in { name LAN-PROTECT-IN } local { } } mtu 1500 switch-port { interface eth2 interface eth3 interface eth4 } vif 1000 { address 192.168.4.1/24 description "Guest Network VLAN" firewall { in { name GUEST-PROTECT-IN } local { name GUEST-PROTECT-LOCAL } } mtu 1500 } } tunnel tun0 { 6rd-prefix 2602::/24 address 2602::1/24 description "CenturyLink IPv6 tunnel" encapsulation sit local-ip 0.0.0.0 mtu 1472 multicast disable remote-ip 205.171.2.64 ttl 255 } } port-forward { auto-firewall enable hairpin-nat enable lan-interface switch0 wan-interface pppoe0 } protocols { static { interface-route6 ::/0 { next-hop-interface tun0 { } } } } service { dhcp-server { disabled false hostfile-update disable shared-network-name ConfigLAN { authoritative disable subnet 192.168.2.0/24 { default-router 192.168.2.1 dns-server 192.168.2.1 lease 86400 start 192.168.2.10 { stop 192.168.2.19 } } } shared-network-name GuestLAN { authoritative disable subnet 192.168.4.0/24 { default-router 192.168.4.1 dns-server 192.168.4.1 lease 86400 start 192.168.4.10 { stop 192.168.4.240 } } } shared-network-name PrivateLAN { authoritative disable subnet 192.168.0.0/16 { default-router 192.168.0.1 dns-server 192.168.0.1 lease 86400 start 192.168.0.10 { stop 192.168.0.100 } unifi-controller 192.168.0.116 } } } dns { dynamic { interface pppoe0 { service custom-dnsomatic { host-name all.dnsomatic.com login ******** password ******** protocol dyndns2 server updates.dnsomatic.com } } } forwarding { cache-size 150 listen-on eth0 listen-on switch0 listen-on switch0.1000 } } gui { https-port 443 listen-address 192.168.2.1 listen-address 192.168.0.1 } nat { rule 5010 { outbound-interface pppoe0 type masquerade } } snmp { community router { authorization ro } } ssh { listen-address 192.168.2.1 listen-address 192.168.0.1 port 22 protocol-version v2 } upnp { listen-on eth0 { outbound-interface pppoe0 } listen-on switch0 { outbound-interface pppoe0 } } } system { host-name edgerouter login { user wctsiang { authentication { encrypted-password ******** plaintext-password "" } full-name "********" level admin } } ntp { server 0.ubnt.pool.ntp.org { } server 1.ubnt.pool.ntp.org { } server 2.ubnt.pool.ntp.org { } server 3.ubnt.pool.ntp.org { } } offload { ipv4 { pppoe enable vlan enable } } syslog { global { facility all { level notice } facility protocols { level debug } } host 192.168.0.111 { facility all { level info } } } time-zone America/Los_Angeles traffic-analysis { dpi enable export enable } } /* Warning: Do not remove the following line. */ /* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */ /* Release version: v1.8.0.4853089.160219.1607 */
Thanks in advance for any help or suggestions!