I tried it all, especially the shotgun approach!
I setup the Windows 10 firewall for both Inbound and
Unfortunately I did not get a higher score than 15/20 anyhow.
Some strange things:
1
root@R7800:/$ ip6tables -t nat -F
ip6tables v1.4.10: can't initialize ip6tables table `nat': Table does not exist (do you need to insmod?)
Perhaps ip6tables or your kernel needs to be upgraded.
2.
root@R7800:/$ ip6tables -L
Chain INPUT (policy ACCEPT)
target prot opt source destination
IPv6-CONE all anywhere anywhere
[8 bytes of unknown target data]
Chain FORWARD (policy ACCEPT)
target prot opt source destination
IPv6-CONE all anywhere anywhere
[8 bytes of unknown target data]
root@R7800:/$
root@R7800:/$ ip6tables -S
Can't find library for target `IPv6-CONE'
-A INPUT -i sit1 -j IPv6-CONE
The IPv6 connection type can be set to different types:
Code:
"Advanced, Advanced Setup, IPv6": "Internet Connection Type":
Auto Detect =>
Microsoft Edge: http://ipv6-test.com/? Result: 14/20
ip6tables -P INPUT ACCEPT
ip6tables -P FORWARD ACCEPT
ip6tables -P OUTPUT ACCEPT
ip6tables -t nat -F
ip6tables -t mangle -F
ip6tables -F
ip6tables -X
Microsoft Edge: http://ipv6-test.com/? Result: 15/20
"Advanced, Advanced Setup, IPv6": "Internet Connection Type":
Auto Config =>
Microsoft Edge: http://ipv6-test.com/? Result: 4/20
ip6tables -P INPUT ACCEPT
ip6tables -P FORWARD ACCEPT
ip6tables -P OUTPUT ACCEPT
ip6tables -t nat -F
ip6tables -t mangle -F
ip6tables -F
ip6tables -X
Microsoft Edge: http://ipv6-test.com/? Result: 4/20
"Advanced, Advanced Setup, IPv6": "Internet Connection Type":
6to4 Tunnel =>
Microsoft Edge: http://ipv6-test.com/? Result: 14/20
ip6tables -P INPUT ACCEPT
ip6tables -P FORWARD ACCEPT
ip6tables -P OUTPUT ACCEPT
ip6tables -t nat -F
ip6tables -t mangle -F
ip6tables -F
ip6tables -X
Microsoft Edge: http://ipv6-test.com/? Result: 15/20
"Advanced, Advanced Setup, IPv6": "Internet Connection Type":
6rd (Not easy: 6rd (IPv6 Rapid Deployment) Configuration)
Pass Through =>
Microsoft Edge: http://ipv6-test.com/? Result: 4/20
ip6tables -P INPUT ACCEPT
ip6tables -P FORWARD ACCEPT
ip6tables -P OUTPUT ACCEPT
ip6tables -t nat -F
ip6tables -t mangle -F
ip6tables -F
ip6tables -X
Microsoft Edge: http://ipv6-test.com/? Result: 4/20
"Advanced, Advanced Setup, IPv6": "Internet Connection Type":
Fixed => (Not easy: Configuration)
"Advanced, Advanced Setup, IPv6": "Internet Connection Type":
DHCP =>
Microsoft Edge: http://ipv6-test.com/? Result: 4/20
ip6tables -P INPUT ACCEPT
ip6tables -P FORWARD ACCEPT
ip6tables -P OUTPUT ACCEPT
ip6tables -t nat -F
ip6tables -t mangle -F
ip6tables -F
ip6tables -X
Microsoft Edge: http://ipv6-test.com/? Result: 4/20
PPPoE => (Not tested)
The net-wall source code is not public.
Other things to investigate are:
network port/switch settings (
ethtool a.o.)
Router settings:
WAN setup:
NAT Filtering Secured Open
Disable SIP ALG
LAN setup:
RIP Version
Security:
Services Blocking: -> Never?!
https://docs.microsoft.com/en-us/pr...ows-server-2008-R2-and-2008/cc749323(v=ws.10)
PS
I've updated directly with "ip6tables" commands,
and I have not seen them being changed (as Voxel has seen with ipv4 iptables).
Thanks
@kamoj Finallly, if nothing else works, there is always the shotgun approach:
Code:
ip6tables -P INPUT ACCEPT
ip6tables -P FORWARD ACCEPT
ip6tables -P OUTPUT ACCEPT
ip6tables -t nat -F
ip6tables -t mangle -F
ip6tables -F
ip6tables -X
This will purge all firewall rules and allow anything in.