Hi Packettracer
Yes, the TTL ping should be directed to Router 2. Anyway, pinging the OS Router did trigger the ICMPv6 message, so I kept with this. I'll correct my post.
You're right, I left the router discovery enabled on the interface, so the volatile currenthoplimit. I correct my post.
I have troubles managing the Packet too big and parameter problems. The problem is that they need to pass Router1, but to get bounced back by OS router. I set a low MTU on OS Router, but it didn't generate a packet too big message, it started fragmenting. ( By the way, isn't packet fragmentation prohibited in IPv6 ? Thus the reason for the packet too big message ? )
As for Parameter problem, I didn't manage to trigger one yet. I'll give it another try.
So I went for packet crafting instead of raw packet replay, for the messages I have a hard time to trigger/contol. But it's les reliable for analysis, because they can be mis crafted.
For the 7 other types ( RA, RS, NA, NS, ...) they seem to be blocked inbound using IPv6 Simple Security. But I have to check more carefully.
What happens, if I disable Simple Security, enable firewall in allow mode and define a rule allowing any outgoing traffic: Do I get an ICMPv6 echo reply to an outgoing ICMPv6 echo request? If yes, this would mean there is an ICMPv6 state machine and I don't have to switch on Simple Security to allow incoming ICMPv6 echo replies. Furthermore this would mean that enabled Simple Security just establishes the invisible outbound rule for ICMPv6 echo requests and any corresponding ICMPv6 echo reply is allowed because it belongs to the ICMPv6 flow established by the outgoing request but not because there is an incoming ICMPv6 echo reply rule due to enabled Simple Security.
yes, you get an ICMPv6 echo reply. better : turn simple security off / allow mode / Allow TCP 80 out.
Then, set a currenthoplimit=2
You'll get an ICMPv6 Time exceeded message back in.
There is a complete IPv6 state machine : ICMPv6 state machine
(outbound-non-ICMPv6) traffic-related ICMPv6 authorisations.
Disabling IPv6 Simple Security triggers a very square and straightforward functioning :
everything behaves according to the rules, no invisible premissions, ...
So far, IPv6 Simple Security add this :
Invisible inbound rule for :
Echo reply
Time Exceeded
Parameter problem
Invisible outbound rule THAT OVERRIDES THE ALLOW MODE RESTRICTIVE EFFECT ( ISS + Allow mode is restrictive ) for :
Echo request ( and thus because of state, echo reply is allowed in )
nb : Using an ICMPv6 deny rule works 100%, and overrides any rule
nb2 : I need to recheck the ping request/ping reply for each way ( Lan)Wan / Wan/Lan )
nb3 : I'll check soon some other traffic ( IPSec, Mobile prefix messages ), as well as give a special attention to :
Router Renumbering ( 138 )
Node Information ( Query and Reply )
These two should be allowed within a site
nb4 : I need to re-read these two RFCs
Thanks for your help and ideas
I wish very much to better my IPv6 skills