Can you check with tcpdump on the host and sniff the vnetX device of the VM to see if you ICMPv6 packages reach the VM?
Security Grouping with IPv6 works with KVM, so it has to be a configuration issue somewhere. Wido On 4/30/21 8:59 PM, Hean Seng wrote: > Hi > > I am using 4.15 , hypervisor is ubuntu 18 , KVM , yes, I am on advance with > SG > > I set the Security Group: > > ICMP > -1 -1 ::/0 > > But seems still cannot ping the VM. > > Or even add in rules for ALL > > All . All ::/0 > > > Seems not able to PING. > > > After configure , this is the rules in ip6tables > > > Chain i-2-10-VM (1 references) > target prot opt source destination > ACCEPT ipv6-icmp anywhere anywhere > ACCEPT all anywhere anywhere state NEW > DROP all anywhere anywhere > > > > > Chain i-2-10-VM-eg (1 references) > > target prot opt source destination > > RETURN all anywhere anywhere > > > Chain i-2-10-def (2 references) > > target prot opt source destination > > ACCEPT all anywhere anywhere state > RELATED,ESTABLISHED > > ACCEPT ipv6-icmp fe80::/64 ip6-allnodes PHYSDEV > match --physdev-out vnet3 --physdev-is-bridged ipv6-icmp > router-advertisement HL match HL == 255 > > RETURN ipv6-icmp anywhere ip6-allrouters PHYSDEV > match --physdev-in vnet3 --physdev-is-bridged ipv6-icmp router-solicitation > HL match HL == 255 > > DROP ipv6-icmp anywhere anywhere PHYSDEV > match --physdev-in vnet3 --physdev-is-bridged ipv6-icmp router-advertisement > > RETURN ipv6-icmp anywhere anywhere PHYSDEV > match --physdev-in vnet3 --physdev-is-bridged ipv6-icmp > neighbour-solicitation HL match HL == 255 > > ACCEPT ipv6-icmp anywhere anywhere PHYSDEV > match --physdev-out vnet3 --physdev-is-bridged ipv6-icmp > neighbour-solicitation HL match HL == 255 > > RETURN ipv6-icmp anywhere anywhere PHYSDEV > match --physdev-in vnet3 --physdev-is-bridged ipv6-icmp > neighbour-advertisement match-set i-2-10-VM-6 src HL match HL == 255 > > ACCEPT ipv6-icmp anywhere anywhere PHYSDEV > match --physdev-out vnet3 --physdev-is-bridged ipv6-icmp > neighbour-advertisement HL match HL == 255 > > RETURN ipv6-icmp anywhere anywhere PHYSDEV > match --physdev-in vnet3 --physdev-is-bridged ipv6-icmp packet-too-big > match-set i-2-10-VM-6 src > > ACCEPT ipv6-icmp anywhere anywhere PHYSDEV > match --physdev-out vnet3 --physdev-is-bridged ipv6-icmp packet-too-big > > RETURN ipv6-icmp anywhere anywhere PHYSDEV > match --physdev-in vnet3 --physdev-is-bridged ipv6-icmp > destination-unreachable match-set i-2-10-VM-6 src > > ACCEPT ipv6-icmp anywhere anywhere PHYSDEV > match --physdev-out vnet3 --physdev-is-bridged ipv6-icmp > destination-unreachable > > RETURN ipv6-icmp anywhere anywhere PHYSDEV > match --physdev-in vnet3 --physdev-is-bridged ipv6-icmp time-exceeded > match-set i-2-10-VM-6 src > > ACCEPT ipv6-icmp anywhere anywhere PHYSDEV > match --physdev-out vnet3 --physdev-is-bridged ipv6-icmp time-exceeded > > RETURN ipv6-icmp anywhere anywhere PHYSDEV > match --physdev-in vnet3 --physdev-is-bridged ipv6-icmp parameter-problem > match-set i-2-10-VM-6 src > > ACCEPT ipv6-icmp anywhere anywhere PHYSDEV > match --physdev-out vnet3 --physdev-is-bridged ipv6-icmp parameter-problem > > RETURN ipv6-icmp anywhere ff02::16 PHYSDEV > match --physdev-in vnet3 --physdev-is-bridged > > RETURN udp fe80::1c00:f6ff:fe00:56 ff02::1:2 PHYSDEV > match --physdev-in vnet3 --physdev-is-bridged udp spt:dhcpv6-client > > ACCEPT udp fe80::/64 fe80::1c00:f6ff:fe00:56 PHYSDEV > match --physdev-out vnet3 --physdev-is-bridged udp dpt:dhcpv6-client > > DROP udp anywhere !fe80::/64 PHYSDEV match > --physdev-in vnet3 --physdev-is-bridged udp spt:dhcpv6-server > > RETURN udp anywhere anywhere PHYSDEV match > --physdev-in vnet3 --physdev-is-bridged udp dpt:domain match-set > i-2-10-VM-6 src > > RETURN tcp anywhere anywhere PHYSDEV match > --physdev-in vnet3 --physdev-is-bridged tcp dpt:domain match-set > i-2-10-VM-6 src > > DROP all anywhere anywhere PHYSDEV match > --physdev-in vnet3 --physdev-is-bridged ! match-set i-2-10-VM-6 src > > i-2-10-VM-eg all anywhere anywhere PHYSDEV > match --physdev-in vnet3 --physdev-is-bridged match-set i-2-10-VM-6 src > > i-2-10-VM all anywhere anywhere PHYSDEV match > --physdev-out vnet3 --physdev-is-bridged > > > > > > On Sat, May 1, 2021 at 1:42 AM Gabriel Bräscher <gabrasc...@gmail.com> > wrote: > >> Hi Hean, >> >> What version of CloudStack are you using? >> >> KVM does support IPv6 indeed when deploying Advanced Networking with >> Security Groups (SG) enabled. >> It should work fine. The only difference regarding setting IPv4 rules for >> SG is that the CIDR list is an IPv6 CIDR (e.g. cidrlist="::/0", instead of >> cidrlist="0.0.0.0/0"). >> >> From what you mentioned it is probably missing SG Ingress rules for IPv6 >> and, by default, it is dropping all the IPv6 packages. >> >> Regards, >> Gabriel. >> >> Em sex., 30 de abr. de 2021 às 12:17, Hean Seng <heans...@gmail.com> >> escreveu: >> >>> We using share network, on Security Group, KVM . >>> >>> On Fri, Apr 30, 2021 at 6:28 PM Alex Mattioli < >> alex.matti...@shapeblue.com >>>> >>> wrote: >>> >>>> Hi Hean, >>>> >>>> What type of network and hypervisor are you using? Also, which version >> of >>>> ACS? >>>> >>>> Regards, >>>> Alex >>>> >>>> >>>> >>>> >>>> >>>> -----Original Message----- >>>> From: Hean Seng <heans...@gmail.com> >>>> Sent: 30 April 2021 08:34 >>>> To: users@cloudstack.apache.org >>>> Subject: IPv6 Issue in Cloudstack >>>> >>>> Hi >>>> >>>> I setup the IPv6 in VM. Outbound form VM is no issue, can ping all the >>>> Ipv6 ip outside . >>>> >>>> But Inboud th IPv6 IP in VM seems all not accessible . >>>> >>>> And seem there no Security Group to manange the IPv6 rules . The SG is >>>> only for IPv4. >>>> >>>> and I saw ipv6tables -L , there is a lot of rules there . Not sure is >>>> preconfigured by Cloudstack or Default Linux. And I guess that is >>> blocking >>>> access >>>> >>>> Anybody have experience on enabling IPv6 in Cloudstack VM and the >>>> Ipv6table rules there ? >>>> >>>> >>>> -- >>>> Regards, >>>> Hean Seng >>>> >>> >>> >>> -- >>> Regards, >>> Hean Seng >>> >> > >