IPv6 discussions

xiaofan

High Supremacy Member
Joined
Sep 16, 2018
Messages
31,796
Reaction score
9,100
Ahh /56 :love:

Polly you can post your OpenWRT configs here, so others may help chip in and try nailing it as well:

# cat /etc/config/network
# cat /etc/config/dhcp
# cat /etc/config/firewall
# ifstatus wan6

Here are the settings (removed wireguard stuff and static IPv4 address assignments to make the things shorter). I have tried /60 or /64 for the LAN/LAN2 but that does not matter.

Bash:
root@openwrt38:~# cat /etc/config/network

config interface 'loopback'
        option device 'lo'
        option proto 'static'
        option ipaddr '127.0.0.1'
        option netmask '255.0.0.0'

config globals 'globals'
        option ula_prefix 'fdac:f49f:363d::/48'
        option packet_steering '1'

config device
        option name 'br-lan'
        option type 'bridge'
        list ports 'eth0'

config interface 'lan'
        option device 'br-lan'
        option proto 'static'
        option ipaddr '192.168.38.1'
        option netmask '255.255.255.0'
        option ip6assign '60'
        list ip6class 'wan6'
        option ip6hint '0'

config interface 'wan'
        option device 'eth1'
        option proto 'dhcp'
        option peerdns '1'

config interface 'wan6'
        option device 'eth1'
        option proto 'dhcpv6'
        option reqaddress 'try'
        option reqprefix '56'
        option norelease '1'
        option peerdns '1'

config interface 'tailscale'
        option proto 'none'
        option device 'tailscale0'

config interface 'zerotier'
        option proto 'none'
        option device 'ztyqbuckbd'

config interface 'lan2'
        option proto 'static'
        option device 'eth2'
        option ipaddr '192.168.78.1'
        option netmask '255.255.255.0'
        option ip6assign '60'
        option ip6hint 'f0'
        list ip6class 'wan6'

root@openwrt38:~# cat /etc/config/dhcp

config dnsmasq
        option domainneeded '1'
        option localise_queries '1'
        option rebind_protection '1'
        option rebind_localhost '1'
        option local '/lan/'
        option expandhosts '1'
        option cachesize '1000'
        option authoritative '1'
        option readethers '1'
        option leasefile '/tmp/dhcp.leases'
        option localservice '1'
        option ednspacket_max '1232'
        option domain 'mypfddns.duckdns.org'
        list server '/mask.icloud.com/'
        list server '/mask-h2.icloud.com/'
        list server '/use-application-dns.net/'
        list server '127.0.0.1#5053'
        list server '127.0.0.1#5054'
        list server '127.0.0.1#5055'
        option doh_backup_noresolv '-1'
        option noresolv '1'
        list doh_backup_server '/mask.icloud.com/'
        list doh_backup_server '/mask-h2.icloud.com/'
        list doh_backup_server '/use-application-dns.net/'
        list doh_server '127.0.0.1#5053'
        list doh_server '127.0.0.1#5054'
        list doh_server '127.0.0.1#5055'
        option serversfile '/var/run/adblock-fast/dnsmasq.servers'

config dhcp 'lan'
        option interface 'lan'
        option start '100'
        option limit '150'
        option leasetime '12h'
        option dhcpv4 'server'
        option dhcpv6 'server'
        option ra 'server'
        list ra_flags 'managed-config'
        list ra_flags 'other-config'
        option ndp 'relay'

config dhcp 'wan'
        option interface 'wan'
        option ignore '1'

config odhcpd 'odhcpd'
        option maindhcp '0'
        option leasefile '/tmp/hosts/odhcpd'
        option leasetrigger '/usr/sbin/odhcpd-update'
        option loglevel '4'

config dhcp 'lan2'
        option interface 'lan2'
        option start '100'
        option limit '150'
        option leasetime '12h'
        option ra 'server'
        list ra_flags 'managed-config'
        list ra_flags 'other-config'
        option dhcpv6 'server'
        option ndp 'relay'

root@openwrt38:~# cat /etc/config/firewall

config defaults
        option input 'REJECT'
        option output 'ACCEPT'
        option forward 'REJECT'
        option synflood_protect '1'

config zone 'lan'
        option name 'lan'
        option input 'ACCEPT'
        option output 'ACCEPT'
        option forward 'ACCEPT'
        list network 'lan'
        list network 'wg_lan'
        list network 'lan2'

config zone 'wan'
        option name 'wan'
        option input 'REJECT'
        option output 'ACCEPT'
        option forward 'REJECT'
        option masq '1'
        option mtu_fix '1'
        list network 'wan'
        list network 'wan6'

config forwarding
        option src 'lan'
        option dest 'wan'

config rule
        option name 'Allow-DHCP-Renew'
        option src 'wan'
        option proto 'udp'
        option dest_port '68'
        option target 'ACCEPT'
        option family 'ipv4'

config rule
        option name 'Allow-Ping'
        option src 'wan'
        option proto 'icmp'
        option icmp_type 'echo-request'
        option family 'ipv4'
        option target 'ACCEPT'

config rule
        option name 'Allow-IGMP'
        option src 'wan'
        option proto 'igmp'
        option family 'ipv4'
        option target 'ACCEPT'

config rule
        option name 'Allow-DHCPv6'
        option src 'wan'
        option proto 'udp'
        option dest_port '546'
        option family 'ipv6'
        option target 'ACCEPT'

config rule
        option name 'Allow-MLD'
        option src 'wan'
        option proto 'icmp'
        option src_ip 'fe80::/10'
        list icmp_type '130/0'
        list icmp_type '131/0'
        list icmp_type '132/0'
        list icmp_type '143/0'
        option family 'ipv6'
        option target 'ACCEPT'

config rule
        option name 'Allow-ICMPv6-Input'
        option src 'wan'
        option proto 'icmp'
        list icmp_type 'echo-request'
        list icmp_type 'echo-reply'
        list icmp_type 'destination-unreachable'
        list icmp_type 'packet-too-big'
        list icmp_type 'time-exceeded'
        list icmp_type 'bad-header'
        list icmp_type 'unknown-header-type'
        list icmp_type 'router-solicitation'
        list icmp_type 'neighbour-solicitation'
        list icmp_type 'router-advertisement'
        list icmp_type 'neighbour-advertisement'
        option limit '1000/sec'
        option family 'ipv6'
        option target 'ACCEPT'

config rule
        option name 'Allow-ICMPv6-Forward'
        option src 'wan'
        option dest '*'
        option proto 'icmp'
        list icmp_type 'echo-request'
        list icmp_type 'echo-reply'
        list icmp_type 'destination-unreachable'
        list icmp_type 'packet-too-big'
        list icmp_type 'time-exceeded'
        list icmp_type 'bad-header'
        list icmp_type 'unknown-header-type'
        option limit '1000/sec'
        option family 'ipv6'
        option target 'ACCEPT'

config rule
        option name 'Allow-IPSec-ESP'
        option src 'wan'
        option dest 'lan'
        option proto 'esp'
        option target 'ACCEPT'

config rule
        option name 'Allow-ISAKMP'
        option src 'wan'
        option dest 'lan'
        option dest_port '500'
        option proto 'udp'
        option target 'ACCEPT'

config zone
        option name 'vpn'
        option input 'ACCEPT'
        option output 'ACCEPT'
        option forward 'ACCEPT'
        option masq '1'
        list network 'zerotier'

config forwarding
        option src 'vpn'
        option dest 'lan'

config forwarding
        option src 'lan'
        option dest 'vpn'

config zone
        option name 'tailscale'
        option input 'ACCEPT'
        option output 'ACCEPT'
        option forward 'ACCEPT'
        option masq '1'
        option mtu_fix '1'
        list network 'tailscale'

config forwarding
        option src 'tailscale'
        option dest 'lan'

config forwarding
        option src 'lan'
        option dest 'tailscale'
 
Last edited:

xiaofan

High Supremacy Member
Joined
Sep 16, 2018
Messages
31,796
Reaction score
9,100
One more.

Bash:
root@openwrt38:~#  ifstatus wan6
{
        "up": true,
        "pending": false,
        "available": true,
        "autostart": true,
        "dynamic": false,
        "uptime": 390555,
        "l3_device": "eth1",
        "proto": "dhcpv6",
        "device": "eth1",
        "metric": 0,
        "dns_metric": 0,
        "delegation": true,
        "ipv4-address": [

        ],
        "ipv6-address": [
                {
                        "address": "2400:d802:xxx:xxxx::81",
                        "mask": 128,
                        "preferred": 84661,
                        "valid": 84661
                }
        ],
        "ipv6-prefix": [
                {
                        "address": "2400:d802:dxx:8300::",
                        "mask": 56,
                        "preferred": 84661,
                        "valid": 84661,
                        "class": "wan6",
                        "assigned": {
                                "lan": {
                                        "address": "2400:d802:dxx:8300::",
                                        "mask": 60
                                },
                                "lan2": {
                                        "address": "2400:d802:dxx:83f0::",
                                        "mask": 60
                                }
                        }
                }
        ],
        "ipv6-prefix-assignment": [

        ],
        "route": [
                {
                        "target": "::",
                        "mask": 0,
                        "nexthop": "fe80::200:5eff:fe00:145",
                        "metric": 512,
                        "valid": 1222,
                        "source": "2400:d802:dxx:8300::/56"
                },
                {
                        "target": "::",
                        "mask": 0,
                        "nexthop": "fe80::200:5eff:fe00:145",
                        "metric": 512,
                        "valid": 1222,
                        "source": "2400:d802:xxx:xxxx::81/128"
                }
        ],
        "dns-server": [
                "2400:d800::1",
                "2400:d800::2"
        ],
        "dns-search": [

        ],
        "neighbors": [

        ],
        "inactive": {
                "ipv4-address": [

                ],
                "ipv6-address": [

                ],
                "route": [

                ],
                "dns-server": [

                ],
                "dns-search": [

                ],
                "neighbors": [

                ]
        },
        "data": {
                "passthru": "001700202400d8000000000000000000000000012400d800000000000000000000000002"
        }
}
 

bert64

Senior Member
Joined
Jan 20, 2020
Messages
1,027
Reaction score
539
From external to :83f0::4b7. It goes through the Singtel server and then stops at the OpenWRT38 WAN IPv6 address, and never reaches :83f0::4b7.

Bash:
root@openwrt18:~# mtr 2400:d802:dxx:83f0::4b7
                                                 My traceroute  [v0.95]
openwrt18 (2400:d802:xxx:xx00::1) -> 2400:d802:dxx:83f0::4b7 (2400:d802:dxx:83f0::4b7)         2025-10-09T22:05:14+0800
Keys:  Help   Display mode   Restart statistics   Order of fields   quit
                                                                               Packets               Pings
 Host                                                                        Loss%   Snt   Last   Avg  Best  Wrst StDev
 1. 2400:d801:4001:611::                                                      0.0%    70    1.4   1.5   1.1   2.2   0.2
 2. 2400:d802:d12:xxxx::81                                                    0.0%    70    1.8   2.1   1.8   2.8   0.2 (OpenWRT38 WAN)
 3. (waiting for reply)

From external to :8300::48f as a comparison. It goes through the Singtel server, then OpenWRT38 WAN IPv6 address and lastly to :8300::48f.

Bash:
root@openwrt18:~# mtr 2400:d802:dxx:8300::48f.
                                                 My traceroute  [v0.95]
openwrt18 (2400:d802:xxx:xx00::1) -> 2400:d802:dxx:8300::48f (2400:d802:dxx:8300::48f)         2025-10-09T21:55:23+0800
 Host  Help   Display mode   Restart statistics   Order of fields   quit
                                                                               Packets               Pings
 Host                                                                        Loss%   Snt   Last   Avg  Best  Wrst StDev
 1. 2400:d801:4001:611::                                                      4.6%   173    1.9   1.6   1.0  11.2   0.9
 2. 2400:d802:d12:xxxx::81                                                    0.6%   173    2.4   2.2   1.8   3.1   0.3 (OpenWRT38 WAN)
 3. 2400:d802:dxx:8300::48f                                                   0.0%   173    2.1   2.3   1.8   3.0   0.3
This would suggest the route back is correct, but they have broken egress filtering which is stopping your outbound traffic... Quite a mess!

I'm assuming that if you do a traffic capture on an external host, you never receive anything sourced from :83f0:: but you do receive from :8300::, either from a host on lan2 or the router itself when specifying its lan2 address as source, but you do see the traffic exit out of the wan interface of your router?
 

hwzlite

Master Member
Joined
Jan 27, 2007
Messages
3,037
Reaction score
3,160
Here are the settings (removed wireguard stuff and static IPv4 address assignments to make the things shorter). I have tried /60 or /64 for the LAN/LAN2 but that does not matter.

Code:
root@openwrt38:~# cat /etc/config/firewall
....
config rule
        option name 'Allow-ICMPv6-Input'
        option src 'wan'
        option proto 'icmp'
        list icmp_type 'echo-request'
        list icmp_type 'echo-reply'
        list icmp_type 'destination-unreachable'
        list icmp_type 'packet-too-big'
        list icmp_type 'time-exceeded'
        list icmp_type 'bad-header'
        list icmp_type 'unknown-header-type'
        list icmp_type 'router-solicitation'
        list icmp_type 'neighbour-solicitation'
        list icmp_type 'router-advertisement'
        list icmp_type 'neighbour-advertisement'
        option limit '1000/sec'
        option family 'ipv6'
        option target 'ACCEPT'

config rule
        option name 'Allow-ICMPv6-Forward'
        option src 'wan'
        option dest '*'
        option proto 'icmp'
        list icmp_type 'echo-request'
        list icmp_type 'echo-reply'
        list icmp_type 'destination-unreachable'
        list icmp_type 'packet-too-big'
        list icmp_type 'time-exceeded'
        list icmp_type 'bad-header'
        list icmp_type 'unknown-header-type'
        option limit '1000/sec'
        option family 'ipv6'
        option target 'ACCEPT'
...

Hmmm..... does it make any diff. by changing above from option src 'wan' to option src '*' ?
Which basically allows from all source zones instead.
 

xiaofan

High Supremacy Member
Joined
Sep 16, 2018
Messages
31,796
Reaction score
9,100
Hmmm..... does it make any diff. by changing above from option src 'wan' to option src '*' ?
Which basically allows from all source zones instead.

Just tried, it does not help.

If you think about it, LAN and LAN2 both belong to the same firewall zone. Why would the above changes work?
 

hwzlite

Master Member
Joined
Jan 27, 2007
Messages
3,037
Reaction score
3,160
Just tried, it does not help.

If you think about it, LAN and LAN2 both belong to the same firewall zone. Why would the above changes work?

Ohh.... this ideal is something I came across previously meddling with macvlan method .
You can see the uci example there on "# Allow ipv6 traffic to Guest" & "# Allow ipv6 traffic to IOT" .
 

xiaofan

High Supremacy Member
Joined
Sep 16, 2018
Messages
31,796
Reaction score
9,100
Ohh.... this ideal is something I came across previously meddling with macvlan method .
You can see the uci example there on "# Allow ipv6 traffic to Guest" & "# Allow ipv6 traffic to IOT" .

I see. That is because the user in the OpenWRT forum has different firewall zones like Guest and IOT.

His network configurations.
Bash:
config device
    option name 'br-lan'
    option type 'bridge'
    list ports 'lan1'
    list ports 'lan2'

config interface 'lan'
    option proto 'static'
    option device 'br-lan.55'
    option ipaddr '192.168.0.1'
    option netmask '255.255.255.0'
    option ip6assign '64'
    option ip6ifaceid '::1'
    list ip6class 'wan6lan'

config bridge-vlan
    option device 'br-lan'
    option vlan '8'

config bridge-vlan
    option device 'br-lan'
    list ports 'lan1:u*'
    list ports 'lan2:u*'
    option vlan '55'

config bridge-vlan
    option device 'br-lan'
    option vlan '7'

config interface 'IOT'
    option proto 'static'
    option device 'br-lan.7'
    option ipaddr '172.16.7.1'
    option netmask '255.255.255.0'
    option ip6assign '64'
    option ip6ifaceid '::1'
    list ip6class 'wan6iot'

config interface 'GUEST'
    option proto 'static'
    option device 'br-lan.8'
    option ipaddr '192.168.8.1'
    option netmask '255.255.255.0'
    option ip6assign '64'
    option ip6ifaceid '::1'
    list ip6class 'wan6guest'

His firewall zones.
Bash:
# Adding new firewall zones
uci add firewall zone
uci set firewall.@zone[-1].name='lan'
uci set firewall.@zone[-1].input='ACCEPT'
uci set firewall.@zone[-1].output='ACCEPT'
uci set firewall.@zone[-1].forward='ACCEPT'
uci add_list firewall.@zone[-1].network='lan'
uci add firewall forwarding
uci set firewall.@forwarding[-1].src='lan'
uci set firewall.@forwarding[-1].dest='wan'
uci add firewall forwarding
uci set firewall.@forwarding[-1].src='lan'
uci set firewall.@forwarding[-1].dest='IOT'
uci commit firewall

uci add firewall zone
uci set firewall.@zone[-1].name='wan'
uci set firewall.@zone[-1].input='REJECT'
uci set firewall.@zone[-1].output='ACCEPT'
uci set firewall.@zone[-1].forward='REJECT'
uci set firewall.@zone[-1].masq='1'
uci set firewall.@zone[-1].mtu_fix='1'
uci add_list firewall.@zone[-1].network='wan'
uci add_list firewall.@zone[-1].network='wan6'
uci add_list firewall.@zone[-1].network='wan6guest'
uci add_list firewall.@zone[-1].network='wan6iot'
uci add_list firewall.@zone[-1].network='wan6lan'
uci commit firewall

uci add firewall zone
uci set firewall.@zone[-1].name='GUEST'
uci set firewall.@zone[-1].input='REJECT'
uci set firewall.@zone[-1].output='ACCEPT'
uci set firewall.@zone[-1].forward='REJECT'
uci add_list firewall.@zone[-1].network='GUEST'
uci add firewall forwarding
uci set firewall.@forwarding[-1].src='GUEST'
uci set firewall.@forwarding[-1].dest='wan'
uci commit firewall

uci add firewall zone
uci set firewall.@zone[-1].name='IOT'
uci set firewall.@zone[-1].input='REJECT'
uci set firewall.@zone[-1].output='ACCEPT'
uci set firewall.@zone[-1].forward='REJECT'
uci add_list firewall.@zone[-1].network='IOT'
uci add firewall forwarding
uci set firewall.@forwarding[-1].src='IOT'
uci set firewall.@forwarding[-1].dest='wan'
uci commit firewall
service firewall restart
 

xiaofan

High Supremacy Member
Joined
Sep 16, 2018
Messages
31,796
Reaction score
9,100

APNIC: IPv6 in the region (SG)​

Capable: The percentage of users able to access online content using IPv6 in this Economy.
Preferred: ‘Dual stack’ (IPv4 and IPv6 enabled) systems that prefer to use IPv6 if given a choice.

More breakdown at "ASN" tab.

From the above link.

AS4773 == M1, Fibre and Mobile combined
AS4817 SIMBA -- more for Mobile now as the 2.5G Fibre Internet service just started
AS4657 -- maybe this is for Starhub Mobile??
AS3758 -- Maybe this is for Singtel Business Broadband??

ASN
AS Name
IPv6 Capable
IPv6 Preferred
Samples
SINGTEL-FIBRE Singtel Fibre Broadband​
0.12%​
0.06%​
135434​
MOBILEONELTD-AS-AP MobileOne Ltd. MobileInternet Service Provider Singapore​
53.03%​
52.24%​
111581​
STARHUB-NGNBN Starhub Ltd​
61.52%​
61.02%​
93690​
SINGTELMOBILE-AS-AP SINGTEL MOBILE INTERNET SERVICE PROVIDER Singapore​
4.64%​
4.44%​
75069​
STARHUB-INTERNET StarHub Ltd​
0.69%​
0.65%​
36482​
STPL-SG-AP Simba Telecom Pte Ltd​
58.12%​
57.52%​
34510​
MYREPUBLIC-SG MyRepublic Ltd.​
0.06%​
0.04%​
23881​
SINGNET SingNet​
0.68%​
0.46%​
6343​
VIEWQWEST-SG-AP Viewqwest Pte Ltd​
0.14%​
0.04%​
5657​
WHIZCOMMS-AS-AP Whiz Communications Pte Ltd​
0.08%​
0.08%​
2457​

The above was in Dec 2023.

Now in Oct 2025 -- actually it is going backwards for IPv6 adoption in Singapore, probably due to significant drop in M1 (Fibre and Mobile combined) and Starhub Fibre Broadband.

0CwdWwQ.png


ASNAS NameIPv6 CapableIPv6 PreferredSamples
AS9506SINGTEL-FIBRE Singtel Fibre Broadband2.15%2.1%456,303
AS55430STARHUB-NGNBN Starhub Ltd43.65%42.79%348,793
AS4773MOBILEONELTD-AS-AP MobileOne Ltd. MobileInternet Service Provider Singapore27.17%26.47%228,861
AS45143SINGTELMOBILE-AS-AP SINGTEL MOBILE INTERNET SERVICE PROVIDER Singapore4.54%4.44%169,952
AS4817STPL-SG-AP Simba Telecom Pte Ltd47.39%46.52%132,157
AS4657STARHUB-INTERNET StarHub Ltd3.76%3.67%108,580
AS141995CAPL-AS-AP Contabo Asia Private Limited3.68%1.53%86,720
AS212238CDNEXT4.94%3.86%85,010
AS30058FDCSERVERS15.49%0.51%82,270
AS63949AKAMAI-LINODE-AP Akamai Connected Cloud9.07%4.13%71,658
AS21859ZEN-ECN8.74%8.06%71,421
AS56300MYREPUBLIC-SG MyRepublic Ltd.0.06%0.04%70,228
AS16509AMAZON-0230.32%18.59%46,580
AS45102ALIBABA-CN-NET Alibaba US Technology Co., Ltd.1.45%0.21%43,381
AS3758SINGNET SingNet2.18%2.01%40,749
AS62610ZEN-DPS0.06%0.06%40,301
AS199524GCORE2.56%0.32%30,536
AS14061DIGITALOCEAN-ASN5.3%4.33%30,419
AS132203TENCENT-NET-AP-CN Tencent Building, Kejizhongyi Avenue0.87%0.6%27,096
AS18106VIEWQWEST-SG-AP Viewqwest Pte Ltd0.2%0.17%23,794
AS137409GSLNETWORKS-AS-AP GSL Networks Pty LTD1.2%1.11%21,672
AS984OWS-NETWORK0.1%0.08%20,863
AS53813ZSCALER-INC15.87%0.97%20,773
AS13335CLOUDFLARENET80.22%27.16%18,911
AS135600WHIZCOMMS-AS-AP Whiz Communications Pte Ltd0.08%0.07%18,262
 

xiaofan

High Supremacy Member
Joined
Sep 16, 2018
Messages
31,796
Reaction score
9,100
Somehow I cannot get IPv6 with M1 Maxx S$10 plan even with 5G SA connection. This is very strange.

Singtel 5G SA connection on the same Poco X7 Pro phone has no issues with IPv6.

***********
test-ipv6.com will stay online! see status.test-ipv6.com

Your IPv4 address on the public Internet appears to be 119.56.77.62

Your Internet Service Provider (ISP) appears to be MOBILEONELTD-AS-AP MobileOne Ltd. Mobile Internet Service Provider Singapore

No IPv6 address detected [more info]

You appear to be able to browse the IPv4 Internet only. You will not be able to reach IPv6-only sites.

To ensure the best Internet performance and connectivity, ask your ISP about native IPv6. [more info]

Your DNS server (possibly run by your ISP) appears to have IPv6 Internet access.
 
Last edited:

xiaofan

High Supremacy Member
Joined
Sep 16, 2018
Messages
31,796
Reaction score
9,100
SIMBA S$12 plan, Poco X6 Pro, 4G LTE-A connection, no issues with IPv6.

*********
test-ipv6.com will stay online! see status.test-ipv6.com

Your IPv4 address on the public Internet appears to be 210.10.4.15

Your IPv6 address on the public Internet appears to be 2400:79e0:9070:......

Your Internet Service Provider (ISP) appears to be STPL-SG-AP Simba Telecom Pte Ltd

Since you have IPv6, we are including a tab that shows how well you can reach other IPv6 sites. [more info]

Your DNS server (possibly run by your ISP) appears to have IPv6 Internet access.
 

xiaofan

High Supremacy Member
Joined
Sep 16, 2018
Messages
31,796
Reaction score
9,100
M1 Prepaid 5G S$15 SIM (150 GB data for 30 days only, 180 days validity), 4G LTE connection, Poco X6 Pro, no issues with IPv6.

*********
test-ipv6.com will stay online! see status.test-ipv6.com

Your IPv4 address on the public Internet appears to be 119.56.16.229

Your IPv6 address on the public Internet appears to be 2401:7400:401b:........

Your Internet Service Provider (ISP) appears to be MOBILEONELTD-AS-AP MobileOne Ltd. Mobile Internet Service Provider Singapore

Since you have IPv6, we are including a tab that shows how well you can reach other IPv6 sites. [more info]

Your DNS server (possibly run by your ISP) appears to have IPv6 Internet access.
 

xiaofan

High Supremacy Member
Joined
Sep 16, 2018
Messages
31,796
Reaction score
9,100
StarHub Prepaid S plan, Poco X4 GT, 5G SA connection, no issues with IPv6

************
test-ipv6.com will stay online! see status.test-ipv6.com

Your IPv4 address on the public Internet appears to be 122.11.246.11
(STARHUB-INTERNET StarHub Ltd)

Your IPv6 address on the public Internet appears to be 2406:3000:20f:......
(STARHUB-MOBILE2 StarHub Ltd)

Since you have IPv6, we are including a tab that shows how well you can reach other IPv6 sites. [more info]

Your DNS server (possibly run by your ISP) appears to have IPv6 Internet access.
 

xiaofan

High Supremacy Member
Joined
Sep 16, 2018
Messages
31,796
Reaction score
9,100
Starhub Eight 4G, Poco C85, no support of IPv6. This is expected.

************
test-ipv6.com will stay online! see status.test-ipv6.com

Your IPv4 address on the public Internet appears to be 117.20.154.56

Your Internet Service Provider (ISP) appears to be STARHUB-INTERNET StarHub Ltd

No IPv6 address detected [more info]

You appear to be able to browse the IPv4 Internet only. You will not be able to reach IPv6-only sites.

To ensure the best Internet performance and connectivity, ask your ISP about native IPv6. [more info]

Your DNS server (possibly run by your ISP) appears to have IPv6 Internet access.
 

cnnwatcher

Banned
Joined
Nov 27, 2025
Messages
4
Reaction score
0
Starhub Eight 4G, Poco C85, no support of IPv6. This is expected.

************
test-ipv6.com will stay online! see status.test-ipv6.com

Your IPv4 address on the public Internet appears to be 117.20.154.56

Your Internet Service Provider (ISP) appears to be STARHUB-INTERNET StarHub Ltd

No IPv6 address detected [more info]

You appear to be able to browse the IPv4 Internet only. You will not be able to reach IPv6-only sites.

To ensure the best Internet performance and connectivity, ask your ISP about native IPv6. [more info]

Your DNS server (possibly run by your ISP) appears to have IPv6 Internet access.
why is it expected?
 

xiaofan

High Supremacy Member
Joined
Sep 16, 2018
Messages
31,796
Reaction score
9,100
why is it expected?

Please refer to Post #3 from @Mach3.2 .

For Singtel/Starhub, the expectation as of now is that 5G SA will have IPv6 support and 4G LTE will not have IPv6.

From Post #3.
****************************************************
Mobile ISP IPv6 support matrix
ISPIPv6 SupportDetails/Notes
SingtelYes*End point receives a routed /64 prefix

*Enabled on 5G standalone networks only.

iOS carrier profile enables IPv6 by default (Checked on iPhone 13 iOS 17.5.1, carrier bundle 58.0)

Post #17 by bert64
StarhubYes*End point receives a routed /64 prefix

*Enabled on 5G standalone networks only.

Caveats:
- On 5G SA network only.
- iOS carrier profile only enables IPv4 by default (Checked on iPhone 13 iOS 17.5.1, carrier bundle 58.0). You'd need to enable IPv6 using a custom APN config profile.
- On Android, you'd need to enable IPv6 in APN settings.
M1YesEnd point receives a routed /64 prefix

Supports DNS64/NAT64

Supported NVMO: Circles
SimbaYesEnd point receives a routed /64 prefix

Caveats:
- Unsolicited inbound traffic blocked
- Enabling IPv6 support on iOS requires installing a custom configuration profile with cellular APN configurations

Information collated in this post is non-exhaustive, do comment in this thread if you have new information.

Last edited on 06 September 2025
**************************************
 
Last edited:

xiaofan

High Supremacy Member
Joined
Sep 16, 2018
Messages
31,796
Reaction score
9,100
Good write-up on how to request for SingTel native IPv6 for ONR users.

I have updated Post #1 to include the info.

I went through the IPv6 request process when I signed up the 3Gbps plan in September.
1. Call them at 1688, use the Singtel live chat or WhatsApp them to raise a request for native IPv6 provision to the ONR.

2. They will take about 3 working days to get back to you, their backend will then take a few more days to remote access your ONR to update a configuration with IPv6 settings, the back and forth will take about a week.

3. Once they reply you that the IPv6 settings or dual stack have been provisioned, wait for a maximum of 24 hours before checking you can get IPv6 at your ONR and router. This is important because Singtel IPv6 DHCP servers only respond to 2 requests a day before responding again after the timeout of 24 hours.

More discussions here:
https://forums.hardwarezone.com.sg/threads/singtel-5gbps-ipv6.7053976/
 
Last edited:

xiaofan

High Supremacy Member
Joined
Sep 16, 2018
Messages
31,796
Reaction score
9,100
Now pending information from Eight Home Internet users about the support of native IPv6.

I tend to believe it will be the same as StarHub.
 

xiaofan

High Supremacy Member
Joined
Sep 16, 2018
Messages
31,796
Reaction score
9,100
Somehow I cannot get IPv6 with M1 Maxx S$10 plan even with 5G SA connection. This is very strange.

No issues with Circles.Life with 5G SA connection. It is using M1 network.

******
test-ipv6.com will stay online! see status.test-ipv6.com

Your IPv4 address on the public Internet appears to be 119.56.64.15

Your IPv6 address on the public Internet appears to be 2401:7400:5009:......

Your Internet Service Provider (ISP) appears to be MOBILEONELTD-AS-AP MobileOne Ltd. MobileInternet Service Provider Singapore

Since you have IPv6, we are including a tab that shows how well you can reach other IPv6 sites. [more info]

Your DNS server (possibly run by your ISP) appears to have IPv6 Internet access.
 

xiaofan

High Supremacy Member
Joined
Sep 16, 2018
Messages
31,796
Reaction score
9,100
CMLink HK data eSIM for Singapore, Singtel 5G NSA connection, no IPv6, as expected.

********
test-ipv6.com will stay online! see status.test-ipv6.com

Your IPv4 address on the public Internet appears to be 223.118.51.103

Your Internet Service Provider (ISP) appears to be CMI-INT-HK China Mobile International Limited

No IPv6 address detected [more info]

You appear to be able to browse the IPv4 Internet only. You will not be able to reach IPv6-only sites.

To ensure the best Internet performance and connectivity, ask your ISP about native IPv6. [more info]

Your DNS server (possibly run by your ISP) appears to have IPv6 Internet access.
 
Important Forum Advisory Note
This forum is moderated by volunteer moderators who will react only to members' feedback on posts. Moderators are not employees or representatives of HWZ. Forum members and moderators are responsible for their own posts.

Please refer to our Community Guidelines and Standards, Terms of Service and Member T&Cs for more information.
Top