I’ve had Frontier fiber internet for the past 2-ish years. No complaints at all, but the nerd in me desires IPv6. I have the Frontier provided ONT device but declined their router. I have a MikroTik RB5009 which has been “searching” for an IPv6 prefix.

Anyway, I found this link during my research some time ago, and it finally looks like Frontier is enabling IPv6 for people.

I’m still not sure I’ll be able to get it until I get the settings just right, but thought I’d share.

  • walden@wetshav.ingOP
    link
    fedilink
    English
    arrow-up
    1
    ·
    2 days ago

    I’m still not seeing anything, but it dawned on me that’s probably to be expected since my WAN port (ether2) isn’t part of my main bridge (bridge1)…

    So, I tried including ether2 in bridge1, but didn’t see anything different. I disabled and enabled ether2 but that didn’t make anything pop up on wireshark.

    In addition to following this guide that you linked I also tried filtering for ipv6. I also tried udp.dstport == 37008. No results there.

    Oh well, I’ll just keep waiting and watching!

    • SteveTech@aussie.zone
      link
      fedilink
      English
      arrow-up
      2
      ·
      2 days ago

      Your WAN shouldn’t be part of your bridge. Are you getting any traffic in Wireshark? You do also need to enable packet sniffer on the router and point it to the IP of the computer you’re running Wireshark on.

      • walden@wetshav.ingOP
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 day ago

        Ah, thanks. Now I’m seeing lots of stuff when filter ipv6, but it all seems to be local. I replugged ether2 during the capture but nothing stands out. Lots of MDNS, ICMPv6, DHCPv6, and MNDP listed for Protocol. Source is always fe80::xxx, Destination is always ff02::…

        • SteveTech@aussie.zone
          link
          fedilink
          English
          arrow-up
          1
          ·
          23 hours ago

          Yeah thats normal, fe80:: is link local, ff02:: is broadcast. Is the source always your router’s address, or is there another addresses there? DHCPv6 and ICMPv6 (for SLAAC), are the important protocols there.

          • walden@wetshav.ingOP
            link
            fedilink
            English
            arrow-up
            1
            ·
            12 hours ago

            Today I see some interesting things under the TCP protocol. They’re marked as [TCP Retransmission]. Source is 2600:1000:b150:3c0:redacted, destination is 2001:470:1f06:redacted.

            To answer your question from yesterday, the ICMPv6 stuff that I see is coming from a couple of Amcrest cameras, and they say “Router Solicitation from xx:xx:xx:mac address”.

            • SteveTech@aussie.zone
              link
              fedilink
              English
              arrow-up
              2
              ·
              3 hours ago

              I see is coming from a couple of Amcrest cameras

              Oh yeah, that still seems to be from your LAN. On the Mikrotik set your WAN interface in the filters tab of the packet sniffer. Also if you haven’t already, your WAN shouldn’t be bridged with your LAN, since your router will route between them, a bridge is like a network switch.

              Basically I’d like to see the Router Solicitation on your WAN from your Router, and hope that your ISP responds back with a Router Advertisement; or a Solicit for DHCPv6, and the whole exchange.

              Also 2001:470:1f06:redacted looks like a Hurricane Electric IP.

              • walden@wetshav.ingOP
                link
                fedilink
                English
                arrow-up
                1
                ·
                2 hours ago

                Interesting re: Hurricane Electric. I removed that config a long time ago, but the Hurricane Electric site still has the tunnel set up so maybe it pings from time to time.

                My WAN port isn’t part of the bridge, I just did that temporarily as an experiment but it’s back to normal now.

                That makes sense about filtering – I didn’t notice that tab before in the Packet Sniffer!

                I think there’s a little bit of action when I hit “renew” on the IPv6 DHCP Client. I tried with “User Peer DNS” checked and unchecked but I couldn’t pick out a difference. Anything in the below list that sticks out?

                wireshark

                image

                • SteveTech@aussie.zone
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  ·
                  1 hour ago

                  Well, your router is trying, but your ISP isn’t replying, so I’d say you don’t have IPv6 yet.

                  I have had ISPs where if you send a bunch of DHCP solicits/discovers too quickly, then they stop replying. So maybe disable DHCPv6 for a few hours, and enable it while watching it on the packet sniffer, incase it sends a weird response.

                  Also it shouldn’t make any difference, but in IPv6/ND change all to bridge; your router looks like it’s advertising itself as a default route to your ISP’s router, and that just seems wrong.