Hi! I have set up a (SixXS[1]) IPv6 tunnel on my linux router and have the problem, that after a while I become unavailable over IPv6 for the outside world. Then I I perform some IPv6 activity, like "ping6 ipv6.google.com" I become accessible again for a while. A SixXS FAQ entry[2] suggests adding an iptables rule: iptables -t nat -A POSTROUTING --proto ! 41 -o [Your IPv4 Interface] -j MASQUERADE This way I get (iptables -t nat -L ...): Chain POSTROUTING (policy ACCEPT) target prot opt source destination postrouting_rule all -- anywhere anywhere MASQUERADE all -- anywhere anywhere MASQUERADE !ipv6 -- anywhere anywhere # the added rule I am not an iptables expert, but to me it seems the first MASQUERADE rule matches all packets and the new one does not make any difference. Can someone confirm that ? More info: kernel 2.4.30 (OpenWRT 1.0 - update is not really an option, unfortunately) iptables v1.3.3 tunnel set up by AICCU 2007.01.15-console by Jeroen Massar tunnel config excerpt: # Protocol and server to use for setting up the tunnel (defaults: none) #protocol <tic|tsp|l2tp> #server <server to use> protocol tic server tic.sixxs.net ipv6_interface sixxs Tunnel type: 6in4-heartbeat Regards, David [1] https://www.sixxs.net/ [2] https://www.sixxs.net/faq/connectivity/?faq=conntracking -- To unsubscribe from this list: send the line "unsubscribe netfilter" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html