Bonjour à tous,
J'ai remplacé depuis plusieurs années, bien avantageusement le modem Zyxel OVH par un erl-3 (maintenant en firmware 2.0.9) pour la partie IPV4 (connexion OVH FTTH Profile A pppoe sans Vlan, collecte Kosc).
Ayant enfin fait l'effort de mieux comprendre IPV6, je pensais mettre en pratique sur une connexion de configuration simple avant de m'attaquer à un autre connexion Orange en ipv4 seule sur un ER4 (possibilité d'utiliser dhclient6.service en place de dibbler).
Je n'arrive malheureusement pas à obtenir d'IPv6, l'obtention de l'IPv4 /32 reste fonctionnelle.
J'ai suivi les recommandations de Kgersen
https://lafibre.info/ovh-fai/ovh-fibre-pro-et-ipv6-comment-la-faire-fonctionner-sur-routeur-mikrotik/msg1086270/#msg1086270 , et ma configuration est assez conforme à ce que l'on trouve sur le forum et ailleurs pour l'auto-configuration IPv6 en pppoe.
j'ai essayé quelques variantes de configuration de dhcpv6-pd (prefix-only, dhcpv6-stateless, slaac), de pppoe (rapid-commit disable, multilink...), de firewall mss-clamp-6 à 1432, sans succès.
La commande $ show interfaces ne m'affiche pas l'IPv6 /56 attribuée par OVH.
Est-ce toujours un défaut de conformité RFC4638 permettant PMTUD, comme le rapportait LROB il y a 2 ans
https://lafibre.info/ovh-fai/besoin-daide-ovh-ftth-mikrotik-ipv6/msg1062640/#msg1062640 ? Je n'arrive pas à transcrire sur EdgeRouter le contournement qu'il propose pour Mikrotik!
Pouvez-vous m'apporter votre expertise?
Ci-dessous ma configuration complète:
Eth0 LAN1
Eth1 ONT
merci, konki
firewall {
all-ping enable
broadcast-ping disable
ipv6-name WAN6_IN {
default-action drop
description "WANv6 inbound traffic forwarded to LAN"
rule 10 {
action accept
description "Allow established/related"
state {
established enable
related enable
}
}
rule 20 {
action drop
description "Drop invalid state"
state {
invalid enable
}
}
rule 30 {
action accept
description "Allow ICMPv6"
protocol icmpv6
}
}
ipv6-name WAN6_LOCAL {
default-action drop
description "WANv6 inbound traffic to the router"
rule 10 {
action accept
description "Allow established/related"
state {
established enable
related enable
}
}
rule 20 {
action drop
description "Drop invalid state"
state {
invalid enable
}
}
rule 30 {
action accept
description "Allow ICMPv6"
protocol icmpv6
}
rule 40 {
action accept
description "Allow DHCPv6"
destination {
port 546
}
protocol udp
source {
port 547
}
}
}
ipv6-name WAN6_OUT {
default-action accept
description "WANv6 outbound traffic"
rule 10 {
action accept
description "Allow established/related"
state {
established enable
related enable
}
}
rule 20 {
action reject
description "Reject invalid state"
state {
invalid enable
}
}
}
ipv6-receive-redirects disable
ipv6-src-route disable
ip-src-route disable
log-martians enable
name WAN_IN {
default-action drop
description "packets from Internet to LAN & WLAN"
rule 10 {
action accept
description "allow established/related sessions"
state {
established enable
related enable
}
}
rule 20 {
action drop
description "drop invalid state"
state {
invalid enable
}
}
}
name WAN_LOCAL {
default-action drop
description "packets from Internet to the router"
rule 10 {
action accept
description "allow established/related session to the router"
state {
established enable
related enable
}
}
rule 70 {
action accept
description "Allow Ping"
destination {
group {
address-group ADDRv4_eth0
}
}
limit {
burst 1
rate 50/minute
}
log enable
protocol icmp
}
rule 80 {
action drop
description "drop invalid state"
log disable
state {
invalid enable
}
}
}
name WAN_OUT {
default-action accept
description "wan outbound traffic"
rule 10 {
action accept
description "Allow established/related"
state {
established enable
related enable
}
}
rule 20 {
action drop
description "Restrict Internet access for IP/MAC"
source {
mac-address xx:xx:xx:xx:xx:xx
}
state {
new enable
}
}
rule 90 {
action drop
description "drop invalid state"
state {
invalid enable
}
}
}
options {
mss-clamp {
interface-type pppoe
interface-type tun
interface-type pptp
mss 1412
}
mss-clamp6 {
interface-type pppoe
mss 1432
}
}
receive-redirects disable
send-redirects enable
source-validation disable
syn-cookies enable
}
interfaces {
ethernet eth0 {
address 192.168.2.1/24
description "eth0 LOCAL LAN SWITCH"
duplex auto
firewall {
out {
name WAN_OUT
ipv6-name WAN6_OUT
}
}
ipv6 {
dup-addr-detect-transmits 1
router-advert {
cur-hop-limit 64
link-mtu 0
managed-flag false
max-interval 600
other-config-flag false
prefix ::/64 {
autonomous-flag true
on-link-flag true
preferred-lifetime 14400
valid-lifetime 18000
}
reachable-time 0
retrans-timer 0
send-advert true
}
}
speed auto
}
ethernet eth1 {
description "Eth1 KOSC ONT FTTH"
duplex auto
pppoe 0 {
default-route auto
dhcpv6-pd {
pd 0 {
interface eth0 {
host-address ::1
prefix-id ::1
service dhcpv6-stateless
}
interface eth2 {
host-address ::1
prefix-id ::1
service dhcpv6-stateless
}
prefix-length 56
}
rapid-commit enable
}
firewall {
in {
ipv6-name WAN6_IN
name WAN_IN
}
local {
ipv6-name WAN6_LOCAL
name WAN_LOCAL
}
out {
ipv6-name WAN6_OUT
name WAN_OUT
}
}
ipv6 {
address {
autoconf
}
dup-addr-detect-transmits 1
enable {
}
}
mtu 1492
name-server auto
password xxxxxxx
user-id xxxxxxxxxxxxxxx@ovh.kosc
}
speed auto
}
ethernet eth2 {
description "eth2 LOCAL LAN SWITCH"
disable
duplex auto
speed auto
}
loopback lo {
}
}
service {
dhcp-server {
disabled false
hostfile-update disable
shared-network-name LAN {
authoritative enable
subnet 192.168.2.0/24 {
default-router 192.168.2.1
dns-server 192.168.2.1
domain-name ********
lease 86400
ntp-server 192.168.2.1
start 192.168.2.2 {
stop 192.168.2.254
}
}
}
static-arp disable
use-dnsmasq disable
}
dns {
forwarding {
cache-size 1024
listen-on eth2
listen-on eth0
listen-on lo
}
}
gui {
http-port 80
https-port 443
older-ciphers enable
}
nat {
rule 5010 {
description "Masquerade for WAN"
log disable
outbound-interface pppoe0
protocol all
type masquerade
}
}
ssh {
listen-address 192.168.2.1
port *******
protocol-version v2
}
ubnt-discover {
disable
}
unms {
disable
}
upnp2 {
acl {
rule 100 {
action deny
description IPSEC-NAT-T
external-port 4500
local-port 0-65535
subnet 0.0.0.0/0
}
rule 200 {
action allow
description ALLOW
external-port 1024-65535
local-port 0-65535
subnet 0.0.0.0/0
}
rule 9000 {
action deny
description DENY
external-port 0-65535
local-port 0-65535
subnet 0.0.0.0/0
}
}
listen-on eth0
listen-on eth2
nat-pmp enable
secure-mode enable
wan pppoe0
}
}
system {
analytics-handler {
send-analytics-report false
}
config-management {
commit-revisions 5
}
crash-handler {
send-crash-report false
}
domain-name *******
host-name ubntbureau
login {
user ubnt {
authentication {
encrypted-password *******************
plaintext-password ""
}
level admin
}
}
name-server 2a07:e340::2
name-server 80.67.169.12
ntp {
server 0.ubnt.pool.ntp.org {
}
server 1.ubnt.pool.ntp.org {
}
server 2.ubnt.pool.ntp.org {
}
server 3.ubnt.pool.ntp.org {
}
}
offload {
hwnat disable
ipsec enable
ipv4 {
forwarding enable
pppoe enable
table-size 65536
vlan enable
}
ipv6 {
forwarding enable
table-size 65536
pppoe enable
}
}
syslog {
global {
archive {
files 2
size 1024
}
facility all {
level err
}
facility protocols {
level err
}
}
}
time-zone Europe/Paris
traffic-analysis {
dpi enable
export enable
}
}
/* Warning: Do not remove the following line. */
/* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:suspend@1:system@5:ubnt-l2tp@1:ubnt-pptp@1:ubnt-udapi-server@1:ubnt-unms@2:ubnt-util@1:vrrp@1:vyatta-netflow@1:webgui@1:webproxy@1:zone-policy@1" === */
/* Release version: v2.0.9-hotfix.7.5622762.230615.1131 */