Clients get IPv6 addresses, but no working network connection
-
My situation.
pfSense running on Netgate SG3100 router, connected to fiber.
pfSense has a IPv6 address. Ping IPv4 and IPv6 from the router to the internet is working.
My clients in the local network do get a valid IPv6 address, and a IPv4 address. Networking between clients, and to the internet, is working on IPv4, but not on IPv6.
However, I also have a OpenVPN server on the router. When I connect from an external location, to my router, I have a working IPv6 connection (internet tunneled over OpenVPN)!
Somewhere, the routing gets wrong in the internal network side of the router.
My setup used to work correctly. I suspect an upgrade of some kind has caused this issue.
Help is appreciated. -
@innostus This may seem like a very silly question but: do you have an allow rule on your LAN that passes IPV6 traffic?
-
@luckman212 Silly questions don't exist
Protocol Source Port Destination Port Gateway Queue Schedule Description Actions
IPv4+6 * LAN net * * * * none Default allow LAN to any ruleIs this what you mean?
-
Run Packet Capture on the LAN port, filtering on ICMP6, to see if you have Router Advertisements going out.
-
@jknott
During the first seconds I also started a ping6 to google.com.
Is this enough data? What should I be looking for?14:51:11.620463 IP6 2a02:a442:5457::cc41 > 2a00:1450:400e:801::200e: ICMP6, echo request, seq 1, length 64
14:51:12.650994 IP6 2a02:a442:5457::cc41 > 2a00:1450:400e:801::200e: ICMP6, echo request, seq 2, length 64
14:51:13.674961 IP6 2a02:a442:5457::cc41 > 2a00:1450:400e:801::200e: ICMP6, echo request, seq 3, length 64
14:51:14.699007 IP6 2a02:a442:5457::cc41 > 2a00:1450:400e:801::200e: ICMP6, echo request, seq 4, length 64
14:51:15.722957 IP6 2a02:a442:5457::cc41 > 2a00:1450:400e:801::200e: ICMP6, echo request, seq 5, length 64
14:51:16.746940 IP6 fe80::e820:59ff:fee4:c5b0 > fe80::208:a2ff:fe12:49f2: ICMP6, neighbor solicitation, who has fe80::208:a2ff:fe12:49f2, length 32
14:51:16.747037 IP6 fe80::208:a2ff:fe12:49f2 > fe80::e820:59ff:fee4:c5b0: ICMP6, neighbor advertisement, tgt is fe80::208:a2ff:fe12:49f2, length 24
14:51:21.673303 IP6 fe80::208:a2ff:fe12:49f2 > fe80::e820:59ff:fee4:c5b0: ICMP6, neighbor solicitation, who has fe80::e820:59ff:fee4:c5b0, length 32
14:51:21.673795 IP6 fe80::e820:59ff:fee4:c5b0 > fe80::208:a2ff:fe12:49f2: ICMP6, neighbor advertisement, tgt is fe80::e820:59ff:fee4:c5b0, length 24 -
Here's what Router Advertisements look like. You'll see they occur every few minutes. They can also occur after being requested.
These were captured in Wireshark and I used display filters to show only the RAs.
-
No. Time Source Destination Protocol Length Info
6370 183.350531899 fe80::208:a2ff:fe12:49f2 ff02::1 ICMPv6 198 Router Advertisement from 00:08:a2:12:49:f2
29679 664.793636676 fe80::208:a2ff:fe12:49f2 ff02::1 ICMPv6 198 Router Advertisement from 00:08:a2:12:49:f2
32056 1034.144777006 fe80::208:a2ff:fe12:49f2 ff02::1 ICMPv6 198 Router Advertisement from 00:08:a2:12:49:f2