Builder71
Very Senior Member
updated my good old n66u today to 19e3, no problems seen so far. Thanks John!
Same here, thx.
19B8 -> 19E3
updated my good old n66u today to 19e3, no problems seen so far. Thanks John!
Some people may get better performance from this fork, but it's really based on each individual environment. You need to try it for yourself.hi dears
i have one rt-n66u & have problem about mac filter. after many search i know [fork] merlin dont have problem about this. and now have some question:
1- [fork] merlin better or asuswrt-merlin
You need to use the ASUS Firmware Restoration tool to downlevel from the later ASUS and Merlin builds. You can find instructions and the application on the ASUS support website.2- how can install [fork] merlin? because my fw now is merlin 380.62-beta & when i want update [fork] merlin fw like normal fw, modem show an error about certificate & dont update!!!
Yes, you can go forward using the normal router gui.3- after update to [fork] merlin may i back to merlin more??
thank you
Use the Asus recovery tool and flash the latest Johns fork. I just did just that to my N66R and did a factory reset afterwards then configured the router. Billhi dears
i have one rt-n66u & have problem about mac filter. after many search i know [fork] merlin dont have problem about this. and now have some question:
1- [fork] merlin better or asuswrt-merlin?
2- how can install [fork] merlin? because my fw now is merlin 380.62-beta & when i want update [fork] merlin fw like normal fw, modem show an error about certificate & dont update!!!
3- after update to [fork] merlin may i back to merlin more??
thank you
Since your IPv6 address is unique, you really aren't 'forwarding' any ports. You are just opening the firewall for the specific address and port. I double checked, and the correct firewall rules are being generated.Turn off the IPV6 firewall - this allows access to the server of course but I don't want the firewall off
Turn on the firewall and forward port X as follows to:
This is to be expected. Link local address are 'local' and not routeable.- The IPv6 link Local address of my server - this fails
I'm guessing your are using Windows clients. Microsoft, in it's infinite wisdom defaults to NOT generating the public address based on the MAC, but using a pseudo-random algorithm based on the MAC (AFAIK, it's a sticky algorithm). Easiest way to see what this address is is to do an 'ipconfig /all' on the Windows machine. Alternatively, I've attached a zip file that contains some useful cmd files for changing the Windows IPv6 options. One of them disables this random address generation and makes windows use the Modified EUI-64 standard.- The Public IPv6 Address based on the MAC address and Prefix - this also fails
Also expected.- The Public TEMPORARY IPv6 address - This works but of course as a temporary address there is little point using it
That's why we added the 'No release' option. But ultimately, it's a limitation of the ISP not providing static addresses.The big challenge of course with either of these addresses is they are based on the allocated prefix which is not fixed only sticky
You can check the public address generation via the following....
if the MAC is
m1:m2:m3:m4:m5:m6
EUI-64 will give an address
prefix:m1<m2&2>:m3FF:FEm4:m5m6 (the m2 entry is and'ed with 0x02)
If you are still having a problem, the Mac OS firewall may be blocking the access.
That's why we added the 'No release' option. But ultimately, it's a limitation of the ISP not providing static addresses.
Since your IPv6 address is unique, you really aren't 'forwarding' any ports. You are just opening the firewall for the specific address and port. I double checked, and the correct firewall rules are being generated.
Glad to hear the pieces came together and you figured it out.If I set the HOSTNAME of my server to my permanent IPv6 address as a test then of course the firewall rule can be used with that IPV6 address and all is well (until the prefix changes) and will allow the connection.
Sorry, but AFAIK not possible. MAC addresses can't travel outside of the originating lan. So it is possible to filter on outgoing (source) MACs, but there is no info available to filter on incoming (destination) MACs.On the point of sticky IPv6 prefixes is there any plans to allow a MAC address to be specified as the destination so any call to port X will got to a certain MAC address.
On the point of sticky IPv6 prefixes is there any plans to allow a MAC address to be specified as the destination so any call to port X will got to a certain MAC address.
Sorry, but AFAIK not possible. MAC addresses can't travel outside of the originating lan. So it is possible to filter on outgoing (source) MACs, but there is no info available to filter on incoming (destination) MACs.
Hmmm....I did a little more research and there may be a way with EUI-64 (SLAAC) addresses I need to experiment a bit.
This sounds like the solution!Hmmm....I did a little more research and there may be a way with EUI-64 (SLAAC) addresses I need to experiment a bit.
That's the one I found
Interesting. Looks like Windows clients will have to issue the following to disable RFC 4941.Let us know if it works in practice.
IPv6's Privacy Extensions are a potential problem.
That was one of the cmd scripts in the zip I attached a couple of posts back.Interesting. Looks like Windows clients will have to issue the following to disable RFC 4941.
Doh! As usual you're way ahead of us John.That was one of the cmd scripts in the zip I attached a couple of posts back.
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!