I've added NAT6 feature and firewall.nat6 script to my router.
Sending/Receiving ICMPv6 packets such as RS/RA, NS/NA, Ping works fine.
the below packets are captured from the opposite interface to which the wan interface is connected.
01:01:54.460626 IP6 2001:2d8:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx > nrt12s47-in-x0e.1e100.net: ICMP6, echo request, seq 137, length 40
01:01:54.531590 IP6 nrt12s47-in-x0e.1e100.net >2001:2d8:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx: ICMP6, echo reply, seq 137, length 40
My labtop's address is fd1e:a3fa:709f:0:xxxx:xxxx:xxxx:xxxx.
As you see, packets's source addresses are masqueraded to wan's address of routers.
But, if tcp packets are sent out through browsing, unmasquerade packets are also captured on the other side of the interface.
00:49:35.045623 IP6 2001:2d8:xxxx:xxxx:xxxx:xxxx:xxxx.53153 > 2001:41d0:701:1100::29c8.https: Flags [.], ack 1, win 64800, length 0
00:49:35.045900 IP6 2001:2d8:xxxx:xxxx:xxxx:xxxx:xxxx.53153 > 2001:41d0:701:1100::29c8.https: Flags [R.], seq 1, ack 1441, win 0, length 0
00:49:35.046094 IP6 2001:2d8:xxxx:xxxx:xxxx:xxxx:xxxx.53153 > 2001:41d0:701:1100::29c8.https: Flags [R], seq 2940622706, win 0, length 0
...
00:49:35.162925 IP6 fd1e:a3fa:709f:0:xxxx:xxxx:xxxx:xxxx.53168 > 2001:41d0:701:1100::29c8.https: Flags [.], ack 2502106129, win 64800, length 0
00:49:35.162931 IP6 fd1e:a3fa:709f:0:xxxx:xxxx:xxxx:xxxx.53168 > 2001:41d0:701:1100::29c8.https: Flags [.], ack 1441, win 64800, length 0
00:49:35.162940 IP6 fd1e:a3fa:709f:0:xxxx:xxxx:xxxx:xxxx.53168 > 2001:41d0:701:1100::29c8.https: Flags [.], ack 4097, win 64800, length 0
...
00:49:35.782561 IP6 fd1e:a3fa:709f:0:xxxx:xxxx:xxxx:xxxx.53168 > 2001:41d0:701:1100::29c8.https: Flags [P.], seq 0:1211, ack 4970, win 63927, length 1211
00:49:36.481563 IP6 fd1e:a3fa:709f:0:xxxx:xxxx:xxxx:xxxx.53168 > 2001:41d0:701:1100::29c8.https: Flags [P.], seq 0:1211, ack 4970, win 63927, length 1211
Why is my labtop's address showing up on the next router even though I'm using nat6?