Pascal Hambourg <pascal.mail@xxxxxxxxxxxxxxx> writes: > However it appears that ICMPv6 types related to neighbor discovery > (router advertisement, neighbor solicitation/advertisement...) are > always in the INVALID state. Well, I am confused; I am not able to reproduce what I saw before... (before last reboot) :-| I now only have these kernel messages: IN=eth0 OUT= MAC=33:33:00:00:00:02:00:0f:1f:c9:4e:7d:86:dd SRC=fe80:0000:0000:0000:020f:1fff:fec9:4e7d DST=ff02:0000:0000:0000:0000:0000:0000:0002 LEN=56 TC=0 HOPLIMIT=255 FLOWLBL=0 PROTO=ICMPv6 TYPE=133 CODE=0 IN=eth0 OUT= MAC=33:33:00:00:00:02:00:0e:35:6c:eb:d0:86:dd SRC=fe80:0000:0000:0000:020e:35ff:fe6c:ebd0 DST=ff02:0000:0000:0000:0000:0000:0000:0002 LEN=56 TC=0 HOPLIMIT=255 FLOWLBL=0 PROTO=ICMPv6 TYPE=133 CODE=0 ip6tables -nvL shows: petole:~# ip6tables -nvL Chain INPUT (policy ACCEPT 0 packets, 0 bytes) pkts bytes target prot opt in out source destination 180 19680 ACCEPT 0 * * ::/0 ::/0 state RELATED,ESTABLISHED 5 340 LOG 0 * * ::/0 ::/0 state INVALID LOG flags 0 level 4 5 340 DROP 0 * * ::/0 ::/0 state INVALID 0 0 ACCEPT 0 lo * ::/0 ::/0 0 0 ACCEPT 0 eth0 * fe80::/64 ::/0 0 0 ACCEPT 0 eth0 * 2001:6f8:3f1::/48 ::/0 13 1352 ACCEPT icmpv6 * * ::/0 ::/0 0 0 ACCEPT tcp * * ::/0 ::/0 tcp dpt:22 0 0 ACCEPT tcp * * ::/0 ::/0 tcp dpt:25 0 0 ACCEPT tcp * * ::/0 ::/0 tcp dpt:80 0 0 ACCEPT tcp * * ::/0 ::/0 tcp dpt:443 0 0 ACCEPT tcp * * ::/0 ::/0 tcp dpt:465 0 0 ACCEPT tcp * * ::/0 ::/0 tcp dpt:993 0 0 DROP 0 * * ::/0 ::/0 Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) pkts bytes target prot opt in out source destination 0 0 ACCEPT 0 * * ::/0 ::/0 state RELATED,ESTABLISHED 0 0 LOG 0 * * ::/0 ::/0 state INVALID LOG flags 0 level 4 0 0 DROP 0 * * ::/0 ::/0 state INVALID 0 0 ACCEPT 0 eth0 * 2001:6f8:3f1::/48 ::/0 0 0 DROP 0 * * ::/0 ::/0 Chain OUTPUT (policy ACCEPT 194 packets, 20168 bytes) pkts bytes target prot opt in out source destination -- Nicolas -- To unsubscribe from this list: send the line "unsubscribe netfilter" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html