I must be missing something very, very basic here.
I am running 1.8.1 with two NICs (re0 LAN, re1 WAN). The WAN link receives its IPv4 address via PPPoE, NATs IPv4 traffic from LAN to WAN without issue, port forwards from WAN interface to random servers on the LAN, etc. It's your basic textbook working configuration, and has been operational for awhile across multiple m0n0wall versions.
Enter IPv6. I've been trying to spin up a HE tunnelbroker tunnel, to no avail.
The tunnelbroker side of things works fine. The link goes up, the WAN IPv6 address (denoted here as "A:B:C:D::2") is pingable from the outside.
So is the /64 routed to me via tunnelbroker ... almost. I have followed multiple mostly congruent HOWTOs for tunnelbroker/m0n0 configuration, so I have configured the LAN IPv6 interface as A:B:C:D+1::1 (i.e., the first address on the /64 routed to me). IPv6 ACLs are in place on both the WAN and LAN interface to permit any/any/any, and I'll lock that down when I can verify end-to-end connectivity.
I can ping6 the m0n0wall LAN IPv6 interface ("A:B:C:D+1::1") from the outside world with no issues. I can ping6 between machines on the LAN subnet ( ::5 and ::59, for example) with no issues.
I cannot ping6 the m0n0wall LAN IPv6 interface ( ::1 ) from either ::5 or ::59, nor can it ping6 them. I placed a gratuitous "deny/deny/deny log" at the end of the LAN IPv6 ACL list, but see no hits there. I don't think it's a switch issue, as the machines that can ping each other are connected to the same physical switch as the m0n0wall's LAN interface.
My suspicion is that there's a hidden default ACL in there somewhere that is pre-emptively dropping IPv6 packets from LAN before it gets to my "permit any/any/any" ACL ... but status.php doesn't seem to have anything substantial added or missing from the IPv6 list over the IPv4 list.
Am I missing something really, really basic here, do I have a weird hardware issue that affects IPv6 but not IPv4, or is 1.8.1 subtly broken for IPv6?
I'm happy with m0n0wall, and I don't really want to evaluate other solutions right now. That having been said, I don't have much hair left, and I'd like to keep what I've got ... so if this is simply not doable, I'll have to start looking at pfsense.
Thanks in advance for any guidance,
-- Chris
|