Could someone please give me an advice how to trace those incoming packets further, after I see them on ovpnc interface? Like I said they are clearly either not NPT'ed properly or reject by some new firewall rules.
$ netstat -rInternet6:Destination Gateway Flags Netif Expire::1 link#5 UH lo02000::/3 ovpnc2 US ovpnc2XXXX:YYY:ZZZ::/64 link#2 U igb1XXXX:YYY:ZZZ::8001 link#2 UHS lo0fd9d:a224:acef::/1 link#9 U ovpnc2fe80::%igb0/64 link#1 U igb0fe80::20d:b9ff:fe4 link#1 UHS lo0fe80::%igb1/64 link#2 U igb1fe80::20d:b9ff:fe4 link#2 UHS lo0fe80::%lo0/64 link#5 U lo0fe80::1%lo0 link#5 UHS lo0fe80::%ovpnc1/64 link#8 U ovpnc1fe80::20d:b9ff:fe4 link#8 UHS lo0fe80::20d:b9ff:fe4 link#9 UHS lo0fe80::%pppoe0/64 link#11 U pppoe0fe80::20d:b9ff:fe4 link#11 UHS lo0feed::/112 link#9 U ovpnc2feed::1002 link#9 UHS lo0
opnsense@OPNsense:~ % curl -6 http://google.com/curl: (7) Failed to connect to google.com port 80: Operation timed out
root@OPNsense:~ # curl -6 http://google.com/curl: (7) Failed to connect to google.com port 80: Operation timed out
Direct LAN IPV6 to Firewall (LAN net -> This Firewall)
Well, to be honest I do not remember why Direct LAN IPV6 to Firewall (LAN net -> This Firewall) rule is there. Perhaps some experiments I've done long time ago. It shouldn't do harm, though. Am I wrong?