I am seeing thousands of IPS blocked attacks (rule 460 and 461) generated by 2001:470:b:*::1, which is the address of utm. The destinations are my computers also using ipv6. These blocked attacks constitute 98% of the blocked attacks. This was reported in the network protection group in this thread. Is this a bug in the rules or is utm generating bad ICMP packets? (The rules are both broken together, at least there are equal numbers of both attacks.)
Hi bd Are you using HE as just a Tunnel or HE as a Tunnel and been assigned a subnet? You have to ask seperately for a Subnet and to get a seperate Tunnel ID and password.
Are you using the IPv6 address range that has been assigned by HE? 1. For the IPv6 Tunnel you will have a ::1 and a ::2 address, the ::2 is terminated at the UTM Box. 2. You normaly are given a /48 range of IPv6 address to use. 3. The ::2 is the exit point.
Make sure that the IPv6 address that you use are in this range. If you have the Mac address of the strange host you can do a mac address lookup in google and that should tell you the manufacture.
Hi bd Are you using HE as just a Tunnel or HE as a Tunnel and been assigned a subnet? You have to ask seperately for a Subnet and to get a seperate Tunnel ID and password.
Are you using the IPv6 address range that has been assigned by HE? 1. For the IPv6 Tunnel you will have a ::1 and a ::2 address, the ::2 is terminated at the UTM Box. 2. You normaly are given a /48 range of IPv6 address to use. 3. The ::2 is the exit point.
Make sure that the IPv6 address that you use are in this range. If you have the Mac address of the strange host you can do a mac address lookup in google and that should tell you the manufacture.