Hi Im using tinc vpn to bridge networks together. And im using ebtables to block dhcp traffic for ipv4 on each node in tinc. One of my nodes have recently began using ipv6. The isp is using auto configuration to give out ipv6 addresses. The problem is that every computer in my bridged network is getting ipv6 addresses from that node. The other computers behind the other nodes have no use for ipv6 addresses it gets through the tinc tunnel. Is there a way to block ipv6 auto configuration traffic entering the tinc tunnel on each node? This is the bridging: root@JOTVPN:~# brctl show bridge name bridge id STP enabled interfaces bridge 8000.000c29638a7e no eth0 vpn This is what I have tried so far: ip6tables -A FORWARD -o bridge -p ipv6-icmp -m icmp6 --icmpv6-type 133 -j DROP ip6tables -A FORWARD -i bridge -p ipv6-icmp -m icmp6 --icmpv6-type 134 -j DROP root@JOTVPN:~# ip6tables --list-rules -P INPUT ACCEPT -P FORWARD ACCEPT -P OUTPUT ACCEPT -A FORWARD -o bridge -p ipv6-icmp -m icmp6 --icmpv6-type 133 -j DROP -A FORWARD -i bridge -p ipv6-icmp -m icmp6 --icmpv6-type 134 -j DROP But its not working Do someone know how to fix this? Best Regards, Håvard Rabbe-- To unsubscribe from this list: send the line "unsubscribe netfilter" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html