So Verizon Fios just turned on IPv6 in my location, and is not working. Before that, I used HE.net 6-in-4 tunnel, and it worked without any issues.
Verizon Fios config:
Code: Select all
/ipv6 settings set max-neighbor-entries=8192
/ipv6 dhcp-client add add-default-route=no disabled=no interface=WAN pool-name=Home-Main-DHCP-Pool-IPV6 request=prefix pool-prefix-length=56 prefix-hint=::/56 use-peer-dns=no
/ipv6 address add address=::1 from-pool=Home-Main-DHCP-Pool-IPV6 interface=LAN advertise=yes
/ipv6 firewall address-list add address=[SOMETHING] list="IPv6 Block"
/ipv6 firewall filter add action=jump chain=forward comment="jump to kid-control rules" jump-target=kid-control
[Multiple MACs of network devices at time to be blocked from using IPv6]
/ipv6 firewall filter add action=drop chain=forward comment="Drop AppleTV" src-mac-address=[Private]
/ipv6 firewall filter add action=drop chain=forward comment="IPv6 block" dst-address-list="IPv6 Block" out-interface=WAN
/ipv6 firewall filter add action=accept chain=input comment="Allow UDP" protocol=udp
/ipv6 firewall filter add action=accept chain=input comment="Allow TCP" protocol=tcp
/ipv6 firewall filter add action=accept chain=input comment="WireGuard on MikroTik Home Network" dst-address=::1/128 dst-port=52850 protocol=udp
/ipv6 firewall filter add action=accept chain=input comment="WireGuard on MikroTik Guest Network" dst-address=::1/128 dst-port=52860 protocol=udp
/ipv6 firewall filter add chain=input action=drop connection-state=invalid comment="Drop (invalid)"
/ipv6 firewall filter add chain=input action=accept connection-state=established,related comment="Accept (established, related)"
/ipv6 firewall filter add chain=input action=accept connection-state=new in-interface=!WAN comment="Accept new"
/ipv6 firewall filter add chain=input action=accept in-interface=WAN protocol=udp src-port=547 limit=10,20:packet comment="Accept DHCP (10/sec) - server"
/ipv6 firewall filter add chain=input action=drop in-interface=WAN protocol=udp src-port=547 comment="Drop DHCP (>10/sec) - server"
/ipv6 firewall filter add chain=input action=accept in-interface=WAN protocol=udp src-port=546 limit=10,20:packet comment="Accept DHCP (10/sec) - client"
/ipv6 firewall filter add chain=input action=drop in-interface=WAN protocol=udp src-port=546 comment="Drop DHCP (>10/sec) - client"
/ipv6 firewall filter add chain=input action=accept in-interface=WAN protocol=icmpv6 limit=10,20:packet comment="Accept external ICMP (10/sec)"
/ipv6 firewall filter add chain=input action=drop in-interface=WAN protocol=icmpv6 comment="Drop external ICMP (>10/sec)"
/ipv6 firewall filter add chain=input action=accept in-interface=!WAN protocol=icmpv6 comment="Accept internal ICMP"
/ipv6 firewall filter add chain=input action=drop in-interface=WAN comment="Drop external"
/ipv6 firewall filter add chain=input action=reject comment="Reject everything else"
/ipv6 firewall filter add chain=output action=accept comment="Accept all"
/ipv6 firewall filter add chain=forward action=drop connection-state=invalid comment="Drop (invalid)"
/ipv6 firewall filter add chain=forward action=accept connection-state=established,related comment="Accept (established, related)"
/ipv6 firewall filter add chain=forward action=accept connection-state=new in-interface=!WAN comment="Accept new"
/ipv6 firewall filter add chain=forward action=accept in-interface=WAN protocol=icmpv6 limit=20,50:packet comment="Accept external ICMP (20/sec)"
/ipv6 firewall filter add chain=forward action=drop in-interface=ether1 protocol=icmpv6 comment="Drop external ICMP (>20/sec)"
/ipv6 firewall filter add chain=forward action=accept in-interface=!WAN comment="Accept internal"
/ipv6 firewall filter add chain=forward action=accept out-interface=WAN comment="Accept outgoing"
/ipv6 firewall filter add chain=forward action=drop in-interface=WAN comment="Drop external"
/ipv6 firewall filter add chain=forward action=reject comment="Reject everything else"
/ipv6 nd set [ find default=yes ] interface=LAN managed-address-configuration=yes
Code: Select all
/ipv6 settings set max-neighbor-entries=8192
/ipv6 route add disabled=no dst-address=2000::/3 gateway=2001:470:1f06:226::1
/ipv6 address add address=2001:470:1f07:226:: interface=LAN
/ipv6 address add address=2001:470:1f06:226::2 advertise=no interface=sit1
/ipv6 firewall address-list add address=[SOMETHING] list="IPv6 Block"
/ipv6 firewall filter add action=jump chain=forward comment="jump to kid-control rules" jump-target=kid-control
[Multiple MACs of network devices at time to be blocked from using IPv6]
/ipv6 firewall filter add action=drop chain=forward comment="Drop AppleTV" src-mac-address=[Private]
/ipv6 firewall filter add action=drop chain=forward comment="IPv6 block" dst-address-list="IPv6 Block" out-interface=sit1
/ipv6 firewall filter add action=accept chain=input comment="Router Allow IPv6 ICMP" protocol=icmpv6
/ipv6 firewall filter add action=accept chain=forward comment="Router Allow IPv6 ICMP" protocol=icmpv6
/ipv6 firewall filter add action=accept chain=input comment="Allow UDP" protocol=udp
/ipv6 firewall filter add action=accept chain=input comment="Allow TCP" protocol=tcp
/ipv6 firewall filter add action=accept chain=forward comment="Allow any to internet" out-interface=sit1
/ipv6 firewall filter add action=accept chain=input comment="Allow established and related connections" connection-state=established,related
/ipv6 firewall filter add action=accept chain=forward comment="Allow established and related connections" connection-state=established,related
/ipv6 firewall filter add action=accept chain=input comment="WireGuard on MikroTik Home Network" dst-address=2001:470:1f06:226::2/128 dst-port=52850 protocol=udp
/ipv6 firewall filter add action=accept chain=input comment="WireGuard on MikroTik Guest Network" dst-address=2001:470:1f06:226::2/128 dst-port=52860 protocol=udp
/ipv6 firewall filter add action=drop chain=input comment="Drop everything else"
/ipv6 firewall filter add action=drop chain=forward comment="Drop everything else"
/ipv6 nd set [ find default=yes ] interface=LAN managed-address-configuration=yes
DNS works in both cases:
Code: Select all
/ip dns set allow-remote-requests=yes cache-max-ttl=5m cache-size=8196KiB max-concurrent-queries=1000 max-concurrent-tcp-sessions=500 use-doh-server=https://security.cloudflare-dns.com/dns-query verify-doh-cert=yes
/ip dns static add address=1.1.1.2 name=security.cloudflare-dns.com ttl=5m
/ip dns static add address=1.0.0.2 name=security.cloudflare-dns.com ttl=5m
/ip dns static add address=2606:4700:4700::1112 name=security.cloudflare-dns.com ttl=5m type=AAAA
/ip dns static add address=2606:4700:4700::1002 name=security.cloudflare-dns.com ttl=5m type=AAAA
I am not able to get PING nor Tracert. I am suspecting either route issue or firewall. Probably something small.