Всем привет! Verizon Fios только что включил IPv6 у меня на участке, и это не работает. Раньше я использовал туннель HE.net 6-in-4, и всё отлично функционировало.
Конфигурация Verizon Fios:
/ipv6 settings set max-neighbor-entries=8192
/ipv6 dhcp-client add add-default-route=no disabled=no interface=WAN pool-name=Home-Main-DHCP-Pool-IPV6 request=prefix pool-prefix-length=56 prefix-hint=::/56 use-peer-dns=no
/ipv6 address add address=::1 from-pool=Home-Main-DHCP-Pool-IPV6 interface=LAN advertise=yes
/ipv6 firewall address-list add address=[SOMETHING] list="IPv6 Block"
/ipv6 firewall filter add action=jump chain=forward comment="jump to kid-control rules" jump-target=kid-control
[Несколько MAC-адресов сетевых устройств, которые нужно заблокировать для использования IPv6]
/ipv6 firewall filter add action=drop chain=forward comment="Drop AppleTV" src-mac-address=[Private]
/ipv6 firewall filter add action=drop chain=forward comment="IPv6 block" dst-address-list="IPv6 Block" out-interface=WAN
/ipv6 firewall filter add action=accept chain=input comment="Allow UDP" protocol=udp
/ipv6 firewall filter add action=accept chain=input comment="Allow TCP" protocol=tcp
/ipv6 firewall filter add action=accept chain=input comment="WireGuard на MikroTik домашней сети" dst-address=::1/128 dst-port=52850 protocol=udp
/ipv6 firewall filter add action=accept chain=input comment="WireGuard на MikroTik гостевой сети" dst-address=::1/128 dst-port=52860 protocol=udp
/ipv6 firewall filter add chain=input action=drop connection-state=invalid comment="Drop (invalid)"
/ipv6 firewall filter add chain=input action=accept connection-state=established,related comment="Accept (established, related)"
/ipv6 firewall filter add chain=input action=accept connection-state=new in-interface=!WAN comment="Accept new"
/ipv6 firewall filter add chain=input action=accept in-interface=WAN protocol=udp src-port=547 limit=10,20:packet comment="Accept DHCP (10/сек) - сервер"
/ipv6 firewall filter add chain=input action=drop in-interface=WAN protocol=udp src-port=547 comment="Drop DHCP (>10/сек) - сервер"
/ipv6 firewall filter add chain=input action=accept in-interface=WAN protocol=udp src-port=546 limit=10,20:packet comment="Accept DHCP (10/сек) - клиент"
/ipv6 firewall filter add chain=input action=drop in-interface=WAN protocol=udp src-port=546 comment="Drop DHCP (>10/сек) - клиент"
/ipv6 firewall filter add chain=input action=accept in-interface=WAN protocol=icmpv6 limit=10,20:packet comment="Accept внешний ICMP (10/сек)"
/ipv6 firewall filter add chain=input action=drop in-interface=WAN protocol=icmpv6 comment="Drop внешний ICMP (>10/сек)"
/ipv6 firewall filter add chain=input action=accept in-interface=!WAN protocol=icmpv6 comment="Accept внутренний ICMP"
/ipv6 firewall filter add chain=input action=drop in-interface=WAN comment="Drop внешний трафик"
/ipv6 firewall filter add chain=input action=reject comment="Отказать всему остальному"
/ipv6 firewall filter add chain=output action=accept comment="Принять всё"
/ipv6 firewall filter add chain=forward action=drop connection-state=invalid comment="Drop (invalid)"
/ipv6 firewall filter add chain=forward action=accept connection-state=established,related comment="Accept (established, related)"
/ipv6 firewall filter add chain=forward action=accept connection-state=new in-interface=!WAN comment="Accept new"
/ipv6 firewall filter add chain=forward action=accept in-interface=WAN protocol=icmpv6 limit=20,50:packet comment="Accept внешний ICMP (20/сек)"
/ipv6 firewall filter add chain=forward action=drop in-interface=ether1 protocol=icmpv6 comment="Drop внешний ICMP (>20/сек)"
/ipv6 firewall filter add chain=forward action=accept in-interface=!WAN comment="Accept внутренний"
/ipv6 firewall filter add chain=forward action=accept out-interface=WAN comment="Accept исходящий"
/ipv6 firewall filter add chain=forward action=drop in-interface=WAN comment="Drop внешний"
/ipv6 firewall filter add chain=forward action=reject comment="Отказать всему остальному"
/ipv6 nd set [ find default=yes ] interface=LAN managed-address-configuration=yes
Моя предыдущая конфигурация HE.net 6-to-4 была:
/ipv6 settings set max-neighbor-entries=8192
/ipv6 route add disabled=no dst-address=2000::/3 gateway=2001:470:1f06:226::1
/ipv6 address add address=2001:470:1f07:226:: interface=LAN
/ipv6 address add address=2001:470:1f06:226::2 advertise=no interface=sit1
/ipv6 firewall address-list add address=[SOMETHING] list="IPv6 Block"
/ipv6 firewall filter add action=jump chain=forward comment="jump to kid-control rules" jump-target=kid-control
[Несколько MAC-адресов сетевых устройств, которые нужно заблокировать для использования IPv6]
/ipv6 firewall filter add action=drop chain=forward comment="Drop AppleTV" src-mac-address=[Private]
/ipv6 firewall filter add action=drop chain=forward comment="IPv6 block" dst-address-list="IPv6 Block" out-interface=sit1
/ipv6 firewall filter add action=accept chain=input comment="Router Разрешить IPv6 ICMP" protocol=icmpv6
/ipv6 firewall filter add action=accept chain=forward comment="Router Разрешить IPv6 ICMP" protocol=icmpv6
/ipv6 firewall filter add action=accept chain=input comment="Allow UDP" protocol=udp
/ipv6 firewall filter add action=accept chain=input comment="Allow TCP" protocol=tcp
/ipv6 firewall filter add action=accept chain=forward comment="Allow any to internet" out-interface=sit1
/ipv6 firewall filter add action=accept chain=input comment="Allow established and related connections" connection-state=established,related
/ipv6 firewall filter add action=accept chain=forward comment="Allow established and related connections" connection-state=established,related
/ipv6 firewall filter add action=accept chain=input comment="WireGuard на MikroTik домашней сети" dst-address=2001:470:1f06:226::2/128 dst-port=52850 protocol=udp
/ipv6 firewall filter add action=accept chain=input comment="WireGuard на MikroTik гостевой сети" dst-address=2001:470:1f06:226::2/128 dst-port=52860 protocol=udp
/ipv6 firewall filter add action=drop chain=input comment="Drop всё остальное"
/ipv6 firewall filter add action=drop chain=forward comment="Drop всё остальное"
/ipv6 nd set [ find default=yes ] interface=LAN managed-address-configuration=yes
Буду признателен за любую помощь.
DNS работает в обоих случаях:
/ip dns set allow-remote-requests=yes cache-max-ttl=5m cache-size=8196KiB max-concurrent-queries=1000 max-concurrent-tcp-sessions=500 use-doh-server=https://security.cloudflare-dns.com/dns-query verify-doh-cert=yes
/ip dns static add address=1.1.1.2 name=security.cloudflare-dns.com ttl=5m
/ip dns static add address=1.0.0.2 name=security.cloudflare-dns.com ttl=5m
/ip dns static add address=2606:4700:4700::1112 name=security.cloudflare-dns.com ttl=5m type=AAAA
/ip dns static add address=2606:4700:4700::1002 name=security.cloudflare-dns.com ttl=5m type=AAAA
Устройства получают IPv6-адреса и могут разрешать DNS. Но я не могу пройти PING и Traceroute. Думаю, проблема либо в маршрутизации, либо в фаерволе. Наверное, что-то мелкое.
Конфигурация Verizon Fios:
/ipv6 settings set max-neighbor-entries=8192
/ipv6 dhcp-client add add-default-route=no disabled=no interface=WAN pool-name=Home-Main-DHCP-Pool-IPV6 request=prefix pool-prefix-length=56 prefix-hint=::/56 use-peer-dns=no
/ipv6 address add address=::1 from-pool=Home-Main-DHCP-Pool-IPV6 interface=LAN advertise=yes
/ipv6 firewall address-list add address=[SOMETHING] list="IPv6 Block"
/ipv6 firewall filter add action=jump chain=forward comment="jump to kid-control rules" jump-target=kid-control
[Несколько MAC-адресов сетевых устройств, которые нужно заблокировать для использования IPv6]
/ipv6 firewall filter add action=drop chain=forward comment="Drop AppleTV" src-mac-address=[Private]
/ipv6 firewall filter add action=drop chain=forward comment="IPv6 block" dst-address-list="IPv6 Block" out-interface=WAN
/ipv6 firewall filter add action=accept chain=input comment="Allow UDP" protocol=udp
/ipv6 firewall filter add action=accept chain=input comment="Allow TCP" protocol=tcp
/ipv6 firewall filter add action=accept chain=input comment="WireGuard на MikroTik домашней сети" dst-address=::1/128 dst-port=52850 protocol=udp
/ipv6 firewall filter add action=accept chain=input comment="WireGuard на MikroTik гостевой сети" dst-address=::1/128 dst-port=52860 protocol=udp
/ipv6 firewall filter add chain=input action=drop connection-state=invalid comment="Drop (invalid)"
/ipv6 firewall filter add chain=input action=accept connection-state=established,related comment="Accept (established, related)"
/ipv6 firewall filter add chain=input action=accept connection-state=new in-interface=!WAN comment="Accept new"
/ipv6 firewall filter add chain=input action=accept in-interface=WAN protocol=udp src-port=547 limit=10,20:packet comment="Accept DHCP (10/сек) - сервер"
/ipv6 firewall filter add chain=input action=drop in-interface=WAN protocol=udp src-port=547 comment="Drop DHCP (>10/сек) - сервер"
/ipv6 firewall filter add chain=input action=accept in-interface=WAN protocol=udp src-port=546 limit=10,20:packet comment="Accept DHCP (10/сек) - клиент"
/ipv6 firewall filter add chain=input action=drop in-interface=WAN protocol=udp src-port=546 comment="Drop DHCP (>10/сек) - клиент"
/ipv6 firewall filter add chain=input action=accept in-interface=WAN protocol=icmpv6 limit=10,20:packet comment="Accept внешний ICMP (10/сек)"
/ipv6 firewall filter add chain=input action=drop in-interface=WAN protocol=icmpv6 comment="Drop внешний ICMP (>10/сек)"
/ipv6 firewall filter add chain=input action=accept in-interface=!WAN protocol=icmpv6 comment="Accept внутренний ICMP"
/ipv6 firewall filter add chain=input action=drop in-interface=WAN comment="Drop внешний трафик"
/ipv6 firewall filter add chain=input action=reject comment="Отказать всему остальному"
/ipv6 firewall filter add chain=output action=accept comment="Принять всё"
/ipv6 firewall filter add chain=forward action=drop connection-state=invalid comment="Drop (invalid)"
/ipv6 firewall filter add chain=forward action=accept connection-state=established,related comment="Accept (established, related)"
/ipv6 firewall filter add chain=forward action=accept connection-state=new in-interface=!WAN comment="Accept new"
/ipv6 firewall filter add chain=forward action=accept in-interface=WAN protocol=icmpv6 limit=20,50:packet comment="Accept внешний ICMP (20/сек)"
/ipv6 firewall filter add chain=forward action=drop in-interface=ether1 protocol=icmpv6 comment="Drop внешний ICMP (>20/сек)"
/ipv6 firewall filter add chain=forward action=accept in-interface=!WAN comment="Accept внутренний"
/ipv6 firewall filter add chain=forward action=accept out-interface=WAN comment="Accept исходящий"
/ipv6 firewall filter add chain=forward action=drop in-interface=WAN comment="Drop внешний"
/ipv6 firewall filter add chain=forward action=reject comment="Отказать всему остальному"
/ipv6 nd set [ find default=yes ] interface=LAN managed-address-configuration=yes
Моя предыдущая конфигурация HE.net 6-to-4 была:
/ipv6 settings set max-neighbor-entries=8192
/ipv6 route add disabled=no dst-address=2000::/3 gateway=2001:470:1f06:226::1
/ipv6 address add address=2001:470:1f07:226:: interface=LAN
/ipv6 address add address=2001:470:1f06:226::2 advertise=no interface=sit1
/ipv6 firewall address-list add address=[SOMETHING] list="IPv6 Block"
/ipv6 firewall filter add action=jump chain=forward comment="jump to kid-control rules" jump-target=kid-control
[Несколько MAC-адресов сетевых устройств, которые нужно заблокировать для использования IPv6]
/ipv6 firewall filter add action=drop chain=forward comment="Drop AppleTV" src-mac-address=[Private]
/ipv6 firewall filter add action=drop chain=forward comment="IPv6 block" dst-address-list="IPv6 Block" out-interface=sit1
/ipv6 firewall filter add action=accept chain=input comment="Router Разрешить IPv6 ICMP" protocol=icmpv6
/ipv6 firewall filter add action=accept chain=forward comment="Router Разрешить IPv6 ICMP" protocol=icmpv6
/ipv6 firewall filter add action=accept chain=input comment="Allow UDP" protocol=udp
/ipv6 firewall filter add action=accept chain=input comment="Allow TCP" protocol=tcp
/ipv6 firewall filter add action=accept chain=forward comment="Allow any to internet" out-interface=sit1
/ipv6 firewall filter add action=accept chain=input comment="Allow established and related connections" connection-state=established,related
/ipv6 firewall filter add action=accept chain=forward comment="Allow established and related connections" connection-state=established,related
/ipv6 firewall filter add action=accept chain=input comment="WireGuard на MikroTik домашней сети" dst-address=2001:470:1f06:226::2/128 dst-port=52850 protocol=udp
/ipv6 firewall filter add action=accept chain=input comment="WireGuard на MikroTik гостевой сети" dst-address=2001:470:1f06:226::2/128 dst-port=52860 protocol=udp
/ipv6 firewall filter add action=drop chain=input comment="Drop всё остальное"
/ipv6 firewall filter add action=drop chain=forward comment="Drop всё остальное"
/ipv6 nd set [ find default=yes ] interface=LAN managed-address-configuration=yes
Буду признателен за любую помощь.
DNS работает в обоих случаях:
/ip dns set allow-remote-requests=yes cache-max-ttl=5m cache-size=8196KiB max-concurrent-queries=1000 max-concurrent-tcp-sessions=500 use-doh-server=https://security.cloudflare-dns.com/dns-query verify-doh-cert=yes
/ip dns static add address=1.1.1.2 name=security.cloudflare-dns.com ttl=5m
/ip dns static add address=1.0.0.2 name=security.cloudflare-dns.com ttl=5m
/ip dns static add address=2606:4700:4700::1112 name=security.cloudflare-dns.com ttl=5m type=AAAA
/ip dns static add address=2606:4700:4700::1002 name=security.cloudflare-dns.com ttl=5m type=AAAA
Устройства получают IPv6-адреса и могут разрешать DNS. Но я не могу пройти PING и Traceroute. Думаю, проблема либо в маршрутизации, либо в фаерволе. Наверное, что-то мелкое.
