Cell phone is a Xiaomi 9T pro , router OS is 6.48.2 on a RB751G-2HnD. What else do you need ?Are you "talking" to yourself?
Only you know the details and you talk to yourself, who wins among you?
You don't provide any useful information, such as device used, routerOS version, etc.
Thank you jvanhambelgium . I run a VPN between 2 locations and use location's (A) IPV4 from/for location (B) as well, but like you said as the provider in location (B) offers IPV6 and Android devices prefer the IPV6 over IPV4 .On APN's you can control it better and and use IPv4 only. I used that also on my Android.
What else do you need ?
I run a VPN between 2 locations and use location's (A) IPV4 from/for location (B) as well,
but like you said as the provider in location (B) offers IPV6 and Android devices prefer the IPV6 over IPV4
I am sure that are better ways to phrase the above...You thought it and you said it to yourself?
No.I am sure that are better ways to phrase the above...You thought it and you said it to yourself?
Ah, is something missing? I probably just thought and told myself ...As I don't understand the grammar of this : "If is not the smartphone than instaurate the VPN connection, but is the RouterBOARD, "
I do not see any "connection-state" (or "log-prefix") on what I wrote, did you imagine it with yourself?chain=forward action=drop connection-state=established,related log=no log-prefix=""
is this above correct ?
/ipv6 firewall filter
add chain=forward action=drop
/ipv6 firewall filter
add chain=forward action=drop
/ipv6 firewall raw
add chain=prerouting action=drop
add chain=output action=drop
/ipv6 firewall filter
remove [find]
add chain=input action=drop
add chain=forward action=drop
add chain=output action=drop
On what basis do you write such a thing?This IPv6 traffic is not passing through your Routerboard I guess
it would not be possible anyway since the IPv6 package is disabled.
Has just set and used a rule, and the package is disabled?the IPv6 package is disabled
/ipv6 firewall raw
add chain=prerouting action=drop
Ah did not know that. I was under the impression that if you disable your IPv6 package there would not be any IPv6 communications possible through the router.On what basis do you write such a thing?This IPv6 traffic is not passing through your Routerboard I guess
it would not be possible anyway since the IPv6 package is disabled.
Disabling the IPv6 packet does not disable IPv6 traffic passing through the RouterBOARD.Has just set and used a rule, and the package is disabled?the IPv6 package is disabled
At this point, if IPv6 are not dropped, disable IPv6 package and reboot.Did return counters but none of the others, so probably IPV6 like you said cannot be blocked towards the phone . I appreciate the input ! ! !
In my case I might have explained it incorrect. My RB3011 has the IPV6 package installed & enabled.For disable IPv6 traffic, also you can paste last set of firewall rule I posted.
But if you disable IPv6 packet, how can you access to "IPv6 forwarding" settings?
The IPv6 forward simply enable or disable the automatic forwarding of packet between internal lan/ vlan, etc.IPv6/Settings => IPv6 "forwarding" is not ticked , so I assume no IPv6 packets could get through my RB3011 (not from the outside>in, not from the inside>out)
Really ? I'm learning new things on RouterOS every day stillThe IPv6 forward simply enable or disable the automatic forwarding of packet between internal lan/ vlan, etc.IPv6/Settings => IPv6 "forwarding" is not ticked , so I assume no IPv6 packets could get through my RB3011 (not from the outside>in, not from the inside>out)
Can be used to separate internal networks without the use of firewall rules.
BUT it still permit the IPv6 traffic from WAN to the LANs
I have a question, but not completely sure is this correct topic.Code: Select all/ipv6 firewall filter add chain=forward action=drop
Euh .... if you introduce ROUGE routers on your network with their own Internet connectivty offcourse there is a huge issue! Nothing to do with Mikrotik itself.Every advice here is missleading and gives the impression to the reader that by disabling ipv6 in mikrotik or by dropping the packets in firewall you are blocking the ipv6 = WRONG.
If there is a connected router in then network OTHER than mikrotik and this rogue router has enabled RA advertising all the capaple ipv6 devices will "get" a public ipv6 from this router and go to internet by this rogue router.
This is a terrible security threat and it has been handled by Cisco with the "ipv6 RA guard" blocking RA traffic in Layer 2 level per interface port.
A good read: https://www.rfc-editor.org/rfc/rfc6105
Sure, dozens of possibilities to still slip/sneek through since no Mikrotik has no true UTM/IDP-capabilities that could detect & block various tunneling/evasive tooling/protocols (eg. Teredo or other 6-in-4)It can always be that any device on your network sets up a IPv6-over-IPv4 tunnel and uses it to access IPv6. It can even forward IPv6 traffic for others.
my cell phone when connected to the WiFi gets an IPV6 address from the ISP. Is there a way to block the phone from receiving one ?
A better question, what can i do with IPv6 that are so good that I need to enable it?Why do you want to disable IPv6?