I have VDSL, not fiber, with the BGW210-700 modem, set to IP Passthrough.
IPv6 is working for me. Sanitized - if I screwed up anything in the "find & replace" process, please let me know.
AT&T modem is on eth0. LAN is on eth1. eth2 is unused.
zzzzzz@nnnn:~$ show configuration all
firewall {
all-ping enable
broadcast-ping disable
group {
address-group BlockExternalIPv4 {
address 192.168.1.254
description WanOutDropList
}
}
ipv6-name WANv6_IN {
default-action drop
description "WAN inbound traffic forwarded to LAN"
enable-default-log
rule 10 {
action accept
description "Allow established/related sessions"
state {
established enable
related enable
}
}
rule 20 {
action drop
description "Drop invalid state"
state {
invalid enable
}
}
rule 30 {
action accept
description "Allow IPv6 icmp"
protocol ipv6-icmp
}
}
ipv6-name WANv6_LOCAL {
default-action drop
description "WAN inbound traffic to the router"
enable-default-log
rule 10 {
action accept
description "Allow established/related sessions"
state {
established enable
related enable
}
}
rule 20 {
action drop
description "Drop invalid state"
state {
invalid enable
}
}
rule 30 {
action accept
description "Allow IPv6 icmp"
protocol ipv6-icmp
}
rule 40 {
action accept
description "allow dhcpv6"
destination {
port 546
}
protocol udp
source {
port 547
}
}
}
ipv6-receive-redirects disable
ipv6-src-route disable
ip-src-route disable
log-martians enable
name GLAN_IN {
default-action accept
description "Guest LAN to WAN"
rule 1 {
action drop
description "Block Guest to WAN IPv4"
destination {
group {
address-group BlockExternalIPv4
}
}
log enable
protocol all
source {
group {
}
}
state {
established enable
invalid disable
new enable
related enable
}
}
}
name WAN_IN {
default-action drop
description "WAN to internal"
rule 10 {
action accept
description "Allow established/related"
state {
established enable
related enable
}
}
rule 20 {
action drop
description "Drop invalid state"
state {
invalid enable
}
}
}
name WAN_LOCAL {
default-action drop
description "WAN to router"
rule 10 {
action accept
description "Allow established/related"
state {
established enable
related enable
}
}
rule 20 {
action drop
description "Drop invalid state"
state {
invalid enable
}
}
}
receive-redirects disable
send-redirects enable
source-validation disable
syn-cookies enable
}
interfaces {
ethernet eth0 {
address dhcp
description Internet
dhcpv6-pd {
pd 0 {
interface eth0 {
service slaac
}
interface eth1 {
host-address ::1
}
prefix-length /64
}
pd 1 {
interface eth1 {
host-address ::1
prefix-id 1
service slaac
}
interface eth1.14 {
host-address ::1
prefix-id 2
service slaac
}
prefix-length /60
}
rapid-commit enable
}
duplex auto
firewall {
in {
ipv6-name WANv6_IN
name WAN_IN
}
local {
ipv6-name WANv6_LOCAL
name WAN_LOCAL
}
}
ipv6 {
address {
autoconf
}
dup-addr-detect-transmits 1
router-advert {
cur-hop-limit 64
link-mtu 0
managed-flag true
max-interval 600
other-config-flag false
reachable-time 0
retrans-timer 0
send-advert true
}
}
speed auto
}
ethernet eth1 {
address 10.0.0.254/24
description Local
duplex auto
speed auto
vif 1 {
ipv6 {
address {
autoconf
}
dup-addr-detect-transmits 1
}
}
vif 14 {
address 10.0.1.254/24
description GuestWiFi
firewall {
in {
name GLAN_IN
}
}
mtu 1500
}
}
ethernet eth2 {
address 192.168.2.1/24
description "Local 2"
disable
duplex auto
speed auto
}
loopback lo {
}
}
port-forward {
auto-firewall enable
hairpin-nat enable
lan-interface eth1
lan-interface eth1.14
wan-interface eth0
}
service {
dhcp-relay {
interface eth1
interface eth1.14
server 10.0.0.254
server 10.0.1.254
}
dhcp-server {
disabled false
hostfile-update disable
shared-network-name LAN15 {
authoritative disable
subnet 10.0.0.0/24 {
default-router 10.0.0.254
dns-server 8.8.8.8
dns-server 8.8.4.4
lease 4320
start 10.0.0.16 {
stop 10.0.0.127
}
static-mapping AmazonFireStick {
ip-address 10.0.0.x
mac-address 70:48:0f:zz:zz:zz
}
}
}
shared-network-name VLAN14 {
authoritative disable
subnet 10.0.1.0/24 {
default-router 10.0.1.254
dns-server 8.8.8.8
dns-server 8.8.4.4
lease 1440
start 10.0.1.128 {
stop 10.0.1.248
...
}
}
}
static-arp disable
use-dnsmasq disable
}
dns {
forwarding {
cache-size 150
listen-on eth1
}
}
gui {
http-port 80
https-port 443
older-ciphers enable
}
nat {
rule 5010 {
description "masquerade for WAN"
outbound-interface eth0
type masquerade
}
}
ssh {
port 22
protocol-version v2
}
}
system {
conntrack {
expect-table-size 2048
hash-size 32768
modules {
sip {
disable
}
}
table-size 262144
}
host-name nnnn
login {
user username {
authentication {
encrypted-password ****************
plaintext-password ****************
}
full-name "ssh login"
level LLLLLLLL
}
user username2 {
authentication {
encrypted-password ****************
plaintext-password ****************
}
full-name ""
level LLLLLLLLL
}
}
name-server 8.8.8.8
name-server 8.8.4.4
ntp {
server 0.nnnn.pool.ntp.org {
}
server 1.nnnn.pool.ntp.org {
}
server 2.nnnn.pool.ntp.org {
}
server 3.nnnn.pool.ntp.org {
}
}
offload {
hwnat disable
ipv4 {
forwarding enable
}
}
package {
repository wheezy {
components "main contrib non-free"
distribution wheezy
password ****************
url »
http.us.debian.org/debian username ""
}
}
syslog {
global {
facility all {
level notice
}
facility protocols {
level debug
}
}
host 10.0.0.19 {
facility all {
level err
}
}
}
time-zone America/Chicago
traffic-analysis {
dpi enable
export enable
}
}
traffic-control {
}