@asellus
I've done some checking and i found that all of my IPv6 traffic went Unreplied after Syn Sent.
Mikrotik -> IPv6 -> Firewall -> Connection Tab
I even try ping from inside Mikrotik Terminal and here's the results:
CODE
[admin@MikroTik] > ping [:resolve ipv6.google.com]
HOST SIZE TTL TIME STATUS
2404:6800:4001:803::1012 timeout
2404:6800:4001:803::1012 timeout
2404:6800:4001:803::1012 timeout
2001:e68:4410:64a7:: 104 64 2ms address unreachable
sent=4 received=0 packet-loss=100%
[admin@MikroTik] > ping 2001:200:dff:fff1:216:3eff:feb1:44d7
HOST SIZE TTL TIME STATUS
2001:200:dff:fff1:216:3eff:feb1:44d7 timeout
2001:200:dff:fff1:216:3eff:feb1:44d7 timeout
sent=2 received=0 packet-loss=100%
[admin@MikroTik] > ping [:resolve ipv6.google.com]
HOST SIZE TTL TIME STATUS
2404:6800:4001:803::1012 timeout
2404:6800:4001:803::1012 timeout
2404:6800:4001:803::1012 timeout
2404:6800:4001:803::1012 timeout
sent=4 received=0 packet-loss=100%
[admin@MikroTik] >
Here's the info on Firewall -> Connection
CODE
[admin@MikroTik] /ipv6 firewall connection> print
Flags: S - seen reply, A - assured
# PROTOCOL SRC-ADDRESS DST-ADDRESS TCP-STATE
0 SA tcp fe80::a02b:1dd9:d366:c5ef fe80::a00:27ff:fe9d:aaa2 established
1 icmpv6 2001:e68:4410:64a7:35c2:... 2001:200:dff:fff1:216:3e...
2 tcp 2001:e68:4410:64a7:35c2:... 2404:6800:4001:c01::5f syn-sent
3 tcp 2001:e68:4410:64a7:35c2:... 2a02:26f0:8:181::eed syn-sent
4 tcp 2001:e68:4410:64a7:35c2:... 2401:3400:2000:1::17 syn-sent
5 tcp 2001:e68:4410:64a7:35c2:... 2401:3400:2000:1::17 syn-sent
6 tcp 2001:e68:4410:64a7:35c2:... 2a02:26f0:8:181::eed syn-sent
[admin@MikroTik] /ipv6 firewall connection> print
Flags: S - seen reply, A - assured
# PROTOCOL SRC-ADDRESS DST-ADDRESS TCP-STATE
0 SA tcp fe80::a02b:1dd9:d366:c5ef fe80::a00:27ff:fe9d:aaa2 established
1 icmpv6 2001:e68:4410:64a7:35c2:... 2001:200:dff:fff1:216:3e...
2 icmpv6 2001:e68:4410:64a7:35c2:... 2404:6800:4001:803::1012
[admin@MikroTik] /ipv6 firewall connection>
As of the moment, here's my firewall IPv6 current rules
CODE
/ipv6 firewall filter
add action=accept chain=input comment="Router - Allow IPv6 ICMP" disabled=yes protocol=icmpv6
add action=accept chain=input comment="Router - Accept established connections" connection-state=established disabled=yes
add action=accept chain=input comment="Router - Accept related connections" connection-state=related disabled=yes
add action=drop chain=input comment="Router - Drop invalid connections" connection-state=invalid disabled=yes
add action=accept chain=input comment="Router- UDP" disabled=yes protocol=udp
add action=accept chain=input comment="Router - From our LAN" disabled=yes in-interface=ether1
add action=drop chain=input comment="Router - Drop other traffic" disabled=yes
add action=drop chain=forward comment="LAN - Drop invalid Connections" connection-state=invalid disabled=yes
add action=accept chain=forward comment="LAN - Accept UDP" disabled=no protocol=udp
add action=accept chain=forward comment="LAN - Accept ICMPv6 " disabled=yes protocol=icmpv6
add action=accept chain=forward comment="LAN - Accept established Connections" connection-state=established disabled=yes
add action=accept chain=forward comment="LAN - Accept related connections" connection-state=related disabled=yes
add action=accept chain=forward comment="LAN - Internal traffic" disabled=yes in-interface=ether1
add action=log chain=forward comment="LAN - Log everything else" disabled=yes log-prefix="Log IPv6"
add action=reject chain=forward comment="LAN - Drop everything else" connection-state=new disabled=yes in-interface=ether2 reject-with=icmp-no-route
add action=drop chain=input disabled=yes in-interface=sit1
add action=accept chain=forward disabled=yes protocol=icmpv6
add action=accept chain=forward connection-state=established disabled=yes
add action=accept chain=forward connection-state=related disabled=yes
add action=accept chain=forward disabled=yes
add action=accept chain=input connection-state=established disabled=yes
[admin@MikroTik] /ipv6 firewall>
And as you can see no rules are active and even if i active all or some of the rules, it still fails to ping or respond. DNS however responding though and correctly resolve name-> ipv6 .
My current setup,
Host OS: Windows 7 Ultimate 64
Virtualization: Virtualbox
Hardware : 2 Physical NIC (bridge setup both inside Virtualbox)
Software : Mikrotik 5.25
I can confirm that pfSense with HE.net Tunnelbroker setup works and all my LAN client can obtain address either via RA or DHCPv6. I can confirm also that Mikrotik with HE.Net tunnelbroker setup also works with/without firewall rules. Any comments from the forumers is much appreciated and please do not hesitate to ask for more information if needed.
p/s: Maybe it's not my time yet?
Regards