Having successfully set up IPv6 on my router, using the default settings and following this guide, I now want to add my guest network into the mix. However, I’m having problems once I’ve set up the address and ND settings:
> ipv6/address print
Flags: X - DISABLED; D - DYNAMIC; G - GLOBAL, L - LINK-LOCAL
Columns: ADDRESS, INTERFACE, ADVERTISE
# ADDRESS INTERFACE ADVERTISE
;;; IPv6-Home
0 G 2406:5a00:xxxx:xxxx::1/64 bridge yes
1 DL fe80::1fc2:xxxx:xxxx:xxxx/64 back-to-home-vpn no
2 D ::1/128 lo no
;;; back-to-home-vpn
3 DG fc00:0:0:216::1/64 back-to-home-vpn yes
4 DL fe80::4aa9:xxxx:xxxx:xxxx/64 bridge no
5 DL fe80::48a9:xxxx:xxxx:xxxx/64 IoT_LAN no
6 DL fe80::48a9:xxxx:xxxx:xxxx/64 Guest_LAN no
7 DL fe80::4aa9:xxxx:xxxx:xxxx/64 ether2 no
8 DL fe80::4aa9:xxxx:xxxx:xxxx/64 vlan10-DHCP no
;;; IPv6-Guest
9 X G 2406:xxxx:xxxx:xxxx::2/64 Guest_LAN yes
and…
> ipv6 nd/print
Flags: X - disabled, I - invalid; * - default
0 * interface=bridge ra-interval=3m20s-10m ra-delay=3s mtu=unspecified reachable-time=unspecified retransmit-interval=unspecified ra-lifetime=30m ra-preference=medium hop-limit=unspecified
advertise-mac-address=no advertise-dns=yes managed-address-configuration=no other-configuration=yes dns=2a07:a8c0::fd:a4c2,xxxx:xxxx::xx:xxxx
1 X interface=Guest_LAN ra-interval=3m20s-10m ra-delay=3s mtu=unspecified reachable-time=unspecified retransmit-interval=unspecified ra-lifetime=30m ra-preference=medium hop-limit=unspecified
advertise-mac-address=no advertise-dns=yes managed-address-configuration=no other-configuration=yes dns=2a07:a8c0::fd:a4c2,xxxx:xxxx::xx:xxxxx
I have both entries currently disabled. I suspect I might need to add some firewall rules? But that’s something I have no knowledge about and would love some guidance.
Here’s the IPv6 Firewall & Nat rules:
/ipv6/firewall/nat> print
Flags: X - disabled, I - invalid; D - dynamic
0 D ;;; back-to-home-vpn
chain=srcnat action=masquerade in-interface=back-to-home-vpn
1 ;;; NextDNS-TCP
chain=dstnat action=dst-nat to-address=2a07:a8c0::fd:a4c2/128 to-ports=53 protocol=tcp dst-port=53 log=no log-prefix=""
2 ;;; NextDNS-UDP
chain=dstnat action=dst-nat to-address=2a07:xxxx::xx:xxxx/128 to-ports=53 protocol=udp dst-port=53 log=no log-prefix=""
3 ;;; NextDNS-DoT
chain=dstnat action=dst-nat to-address=2a07:xxxx::xx:xxxx/128 to-ports=853 protocol=tcp dst-port=853 log=no log-prefix=""
/ipv6/firewall/filter> print
Flags: X - disabled, I - invalid; D - dynamic
0 D ;;; back-to-home-vpn
chain=forward action=drop src-address-list=back-to-home-lan-restricted-peers out-interface-list=LAN
1 D ;;; back-to-home-vpn
chain=input action=accept protocol=udp dst-port=46233
2 ;;; defconf: accept established,related,untracked
chain=input action=accept connection-state=established,related,untracked
3 ;;; defconf: drop invalid
chain=input action=drop connection-state=invalid
4 ;;; defconf: accept ICMPv6
chain=input action=accept protocol=icmpv6
5 ;;; defconf: accept UDP traceroute
chain=input action=accept protocol=udp port=33434-33534
6 ;;; defconf: accept DHCPv6-Client prefix delegation.
chain=input action=accept protocol=udp src-address=fe80::/10 dst-port=546
7 ;;; defconf: accept IKE
chain=input action=accept protocol=udp dst-port=500,4500
8 ;;; defconf: accept ipsec AH
chain=input action=accept protocol=ipsec-ah
9 ;;; defconf: accept ipsec ESP
chain=input action=accept protocol=ipsec-esp
10 ;;; defconf: accept all that matches ipsec policy
chain=input action=accept ipsec-policy=in,ipsec
11 ;;; defconf: drop everything else not coming from LAN
chain=input action=drop in-interface-list=!LAN
12 ;;; defconf: accept established,related,untracked
chain=forward action=accept connection-state=established,related,untracked
13 ;;; defconf: drop invalid
chain=forward action=drop connection-state=invalid
14 ;;; defconf: drop packets with bad src ipv6
chain=forward action=drop src-address-list=bad_ipv6
Filter is MT default, with no changes (that I’m aware of)
Any help would be much appreciated!