ICMPv6 type 1 is destination unreachable.
ff02::1:ff00:1 is a solicited-node multicast address.Which IPv6 device has the fe80::10 local address? Can you login to opnsense cli and check ndp -a output against the arp -a output for your ISP IPv4 router mac address?
See if the fe80::10 is coming from your ISP?
Ok, seems I may have misunderstood something important... the `icmp,1` in the log is not ICMP type 1 but rather protocol 1 (which just means ICMP again).
I also blocked all outbound ipv6 traffic and reset the state table, and still saw these packets inbound. So as far as I can tell this is "normal" traffic from my ISP, but opnsense is blocking it.
I am interested to take a closely look at the matching sample pcap and filter log, if possible. What version of opnsense are you running? the filter log you posted before looks different than the one on my firewall.I found this in my filter log.1 2023-04-07T20:16:46-07:00 opn.home.net filterlog 16947 - [meta sequenceId="151715"] 131,,,b8350fa47ada7fe6c07ace7650fc4dcc,vlan01,match,pass,in,6,0x00,0x00000,1,icmp,1,36,fe80::<redux>,ff02::16,truncated-ip6=36I wonder if it is because truncated-ipv6 , the filter log just print out the protocol name incorrectly..
See if you can find the rule matched under Firewall: Log files: Live View and apply filter like interface contains igb0 and action is block?Just need to make sure those automatically generated rules are logged. (system > settings > Logging > Log packets matched from the default pass rules put in the ruleset is checked. )