<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Thread border router 1.0.0</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/35305/thread-border-router-1-0-0</link><description>I am following the Thread Border Router example and have successfully loaded RaspPi_OT_Border_Router_Demo_v1.0.0-1.alpha.img onto the RaspberryPi 3B+. 
 I have loaded the NCP example onto a Nordic Semi nRF52840 development board, and connected it the</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Tue, 03 Jul 2018 16:14:49 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/35305/thread-border-router-1-0-0" /><item><title>RE: Thread border router 1.0.0</title><link>https://devzone.nordicsemi.com/thread/138811?ContentTypeID=1</link><pubDate>Tue, 03 Jul 2018 16:14:49 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:d0264b57-241e-4cb6-b8ac-8c62e59e4131</guid><dc:creator>Mary</dc:creator><description>&lt;p&gt;I tried adjusting some of my AT&amp;amp;T router settings.&lt;/p&gt;
&lt;p&gt;I disabled Prefix Delegation on the Settings-&amp;gt;LAN-&amp;gt;DHCP page.&lt;/p&gt;
&lt;p&gt;The CLI no longer has a global IPv6 address.&lt;/p&gt;
&lt;p&gt;I can now ping 64:ff9b::808:808 successfully from the CLI:&lt;/p&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="text"&gt;&amp;gt; ipaddr
fdde:ad00:beef:0:0:ff:fe00:c800
fd11:22:0:0:98:1110:acd3:5d04
fe80:0:0:0:9464:973f:8efc:f086
fdde:ad00:beef:0:4d70:1c94:f588:cb08
Done
&amp;gt; ping 64:ff9b::808:808
&amp;gt; 8 bytes from 64:ff9b:0:0:0:0:808:808: icmp_seq=17 hlim=55 time=58ms
ping 64:ff9b::808:808
&amp;gt; 8 bytes from 64:ff9b:0:0:0:0:808:808: icmp_seq=18 hlim=55 time=56ms
ping 64:ff9b::808:808
&amp;gt; 8 bytes from 64:ff9b:0:0:0:0:808:808: icmp_seq=19 hlim=55 time=56ms

&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;RaspPi&lt;pre class="ui-code" data-mode="text"&gt;pi@raspberrypi:~ $ sudo tcpdump -i wpan0 -nv icmp6
tcpdump: listening on wpan0, link-type RAW (Raw IP), capture size 262144 bytes
16:02:39.887719 IP6 (hlim 64, next-header ICMPv6 (58) payload length: 16) fd11:22::98:1110:acd3:5d04 &amp;gt; 64:ff9b::808:808: [icmp6 sum ok] ICMP6, echo request, seq 17
16:02:39.919365 IP6 (class 0x40, hlim 55, next-header ICMPv6 (58) payload length: 16) 64:ff9b::808:808 &amp;gt; fd11:22::98:1110:acd3:5d04: [icmp6 sum ok] ICMP6, echo reply, seq 17
^C
2 packets captured
2 packets received by filter
0 packets dropped by kernel
pi@raspberrypi:~ $ sudo tcpdump -i nat64 -nv icmp6
tcpdump: listening on nat64, link-type RAW (Raw IP), capture size 262144 bytes
16:03:33.559037 IP6 (hlim 63, next-header ICMPv6 (58) payload length: 16) fd11:22::98:1110:acd3:5d04 &amp;gt; 64:ff9b::808:808: [icmp6 sum ok] ICMP6, echo request, seq 18
16:03:33.590472 IP6 (class 0x40, hlim 56, next-header ICMPv6 (58) payload length: 16) 64:ff9b::808:808 &amp;gt; fd11:22::98:1110:acd3:5d04: [icmp6 sum ok] ICMP6, echo reply, seq 18
^C
2 packets captured
2 packets received by filter
0 packets dropped by kernel
pi@raspberrypi:~ $ sudo tcpdump -i eth0 -nv icmp6
tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes
16:04:16.363805 IP6 (hlim 255, next-header ICMPv6 (58) payload length: 32) fe80::18cb:c36e:34de:7939 &amp;gt; ff02::1:ff91:86b9: [icmp6 sum ok] ICMP6, neighbor solicitation, length 32, who has fe80::e222:4ff:fe91:86b9
          source link-address option (1), length 8 (1): 00:50:b6:64:09:c3
16:04:33.365166 IP6 (hlim 255, next-header ICMPv6 (58) payload length: 32) fe80::18cb:c36e:34de:7939 &amp;gt; ff02::1:ff91:86b9: [icmp6 sum ok] ICMP6, neighbor solicitation, length 32, who has fe80::e222:4ff:fe91:86b9
          source link-address option (1), length 8 (1): 00:50:b6:64:09:c3
16:04:49.177597 IP6 (hlim 255, next-header ICMPv6 (58) payload length: 112) fe80::e222:4ff:fe91:86b9 &amp;gt; ff02::1: [icmp6 sum ok] ICMP6, router advertisement, length 112
        hop limit 64, Flags [none], pref medium, router lifetime 1800s, reachable time 0s, retrans time 0s
          prefix info option (3), length 32 (4): 2600:xxxxxxxx:96c0::/64, Flags [onlink, auto], valid time 1209600s, pref. time 1209600s
          route info option (24), length 24 (3):  2600:xxxx:xxxx:96c0::/60, pref=high, lifetime=1209600s
          rdnss option (25), length 24 (3):  lifetime 1200s, addr: 2600:1702:1d70:96c0::1
          mtu option (5), length 8 (1):  1500
          source link-address option (1), length 8 (1): e0:22:04:91:86:b9
^C
3 packets captured
3 packets received by filter
0 packets dropped by kernel
pi@raspberrypi:~ $
&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;I&amp;#39;ll try some other examples and see how it goes.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Thread border router 1.0.0</title><link>https://devzone.nordicsemi.com/thread/138574?ContentTypeID=1</link><pubDate>Mon, 02 Jul 2018 15:53:23 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:1fd9eda3-3221-4c86-8bf0-8664fb150598</guid><dc:creator>Mary</dc:creator><description>&lt;p&gt;Ran it all again:&lt;/p&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="text"&gt;&amp;gt; factoryreset

&amp;gt; panid
ffff
Done
&amp;gt; panid 0xabcd
Done
&amp;gt; ifconfig up
Done
&amp;gt; thread start
Done
&amp;gt; state
child
Done
&amp;gt; ipaddr
2600:xxxx:xxxx:96c8:5c49:1be7:e5c3:dc3d
fd11:22:0:0:fa16:b585:bb63:7219
fdde:ad00:beef:0:0:ff:fe00:5801
fdde:ad00:beef:0:4d70:1c94:f588:cb08
fe80:0:0:0:9464:973f:8efc:f086
Done
&amp;gt; dns resolve ipv4.google.com fdaa:bb:1::1
&amp;gt; DNS response for ipv4.google.com - [64:ff9b:0:0:0:0:acd9:c4e] TTL: 300
ping 64:ff9b:0:0:0:0:acd9:c4e
&amp;gt;
&lt;/pre&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Thread border router 1.0.0</title><link>https://devzone.nordicsemi.com/thread/137217?ContentTypeID=1</link><pubDate>Fri, 22 Jun 2018 08:45:11 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:9e97fd70-01c8-4aed-949b-57f6de9ccab2</guid><dc:creator>Piotr Szkotak</dc:creator><description>&lt;p&gt;It seems you used:&lt;/p&gt;
&lt;p&gt;&lt;span&gt;ip4.google.com instead of&amp;nbsp;ip&lt;strong&gt;v&lt;/strong&gt;4.google.com&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Thread border router 1.0.0</title><link>https://devzone.nordicsemi.com/thread/137142?ContentTypeID=1</link><pubDate>Thu, 21 Jun 2018 15:05:25 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:fbce44e0-b280-495d-9216-0dd84e7e25b5</guid><dc:creator>Rob C</dc:creator><description>&lt;p&gt;Mary,&lt;/p&gt;
&lt;p&gt;FWIW, I have had much better luck with DNS/Ping on my rPi Nordic OT Border Router (from SDK v1.0.0) by following the steps detailed under the &amp;quot;Enable forwarding&amp;quot; section of the page at&amp;nbsp;&lt;span&gt;&lt;a href="https://openthread.io/guides/border-router/access-point"&gt;https://openthread.io/guides/border-router/access-point&lt;/a&gt;.&amp;nbsp; I wonder whether the forwarding settings were really fully saved to persistent memory in the version provided by Nordic.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Note:&amp;nbsp; I am on an IPv4 connection, so this may not explain your problem, but I thought I&amp;#39;d share just in case.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Best, Rob&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Thread border router 1.0.0</title><link>https://devzone.nordicsemi.com/thread/137135?ContentTypeID=1</link><pubDate>Thu, 21 Jun 2018 14:38:50 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:4cf6eb8a-2fb8-4a88-b441-739c6be36ed0</guid><dc:creator>Mary</dc:creator><description>&lt;p&gt;Please obfuscate the global ipv6 address in the above post, as I have done elsewhere.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Thread border router 1.0.0</title><link>https://devzone.nordicsemi.com/thread/136935?ContentTypeID=1</link><pubDate>Wed, 20 Jun 2018 14:17:08 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:7b4bd741-f3a3-49e3-8429-9a241a19c563</guid><dc:creator>Mary</dc:creator><description>&lt;p&gt;I was not able to connect the RaspPi to our wifi network.&lt;/p&gt;
&lt;p&gt;I tried this method first, as described &lt;a title="Border Router 1.0.0" href="http://infocenter.nordicsemi.com/index.jsp?topic=%2Fcom.nordic.infocenter.threadsdk.v0.11.0%2Fthread_intro.html"&gt;here&lt;/a&gt;. Our network is hidden and does not appear in the list returned by iwlist wlan0 scan. I know the SSID and password and used that.&lt;/p&gt;
&lt;p&gt;wifi_connect mynetwork mypassword&lt;/p&gt;
&lt;p&gt;The network settings remain unchanged and the BorderRouter-AP was still present, and even after rebooting the RaspPi.&lt;/p&gt;
&lt;p&gt;pi@raspberrypi:~ $ ifconfig wlan0&lt;br /&gt;wlan0: flags=4163&amp;lt;UP,BROADCAST,RUNNING,MULTICAST&amp;gt; mtu 1500&lt;br /&gt;inet 10.42.0.1 netmask 255.255.255.0 broadcast 10.42.0.255&lt;br /&gt;inet6 fe80::ba27:ebff:fec1:2c66 prefixlen 64 scopeid 0x20&amp;lt;link&amp;gt;&lt;br /&gt;ether b8:27:eb:c1:2c:66 txqueuelen 1000 (Ethernet)&lt;br /&gt;RX packets 0 bytes 0 (0.0 B)&lt;br /&gt;RX errors 0 dropped 3 overruns 0 frame 0&lt;br /&gt;TX packets 2893 bytes 738594 (721.2 KiB)&lt;br /&gt;TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0&lt;/p&gt;
&lt;p&gt;I also tried the method described &lt;a title="Raspberry Pi command line wifi" href="https://www.raspberrypi.org/documentation/configuration/wireless/wireless-cli.md"&gt;here&lt;/a&gt;. I modified /etc/wpa_supplicant/wpa_supplicant.conf as described in the &amp;quot;Hidden Networks&amp;quot; section.&lt;/p&gt;
&lt;p&gt;Again, the network setting remain unchanged and the BorderRouter-AP was still present, and even after rebooting the RaspPi.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;That was yesterday.&lt;/p&gt;
&lt;p&gt;Today I ran the steps you suggested:&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;On the RPi:&lt;/p&gt;
&lt;p&gt;sudo wpanctl dataset erase &amp;amp;&amp;amp; sudo reboot&lt;/p&gt;
&lt;p&gt;after it booted,&amp;nbsp; connected to the wifi with:&lt;/p&gt;
&lt;p&gt;wifi_connect WIFI_SSID WIFI_PASSWORD&lt;/p&gt;
&lt;p&gt;pi@raspberrypi:~ $ ifconfig wlan0&lt;br /&gt;wlan0: flags=4163&amp;lt;UP,BROADCAST,RUNNING,MULTICAST&amp;gt; mtu 1500&lt;br /&gt; inet 10.42.0.1 netmask 255.255.255.0 broadcast 10.42.0.255&lt;br /&gt; inet6 fe80::ba27:ebff:fec1:2c66 prefixlen 64 scopeid 0x20&amp;lt;link&amp;gt;&lt;br /&gt; ether b8:27:eb:c1:2c:66 txqueuelen 1000 (Ethernet)&lt;br /&gt; RX packets 0 bytes 0 (0.0 B)&lt;br /&gt; RX errors 0 dropped 4 overruns 0 frame 0&lt;br /&gt; TX packets 222 bytes 51710 (50.4 KiB)&lt;br /&gt; TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0&lt;/p&gt;
&lt;p&gt;Still no wifi on the RaspPi&lt;/p&gt;
&lt;p&gt;On the CLI:&lt;/p&gt;
&lt;p&gt;&amp;gt; factoryreset&lt;/p&gt;
&lt;p&gt;&amp;gt; panid&lt;br /&gt;ffff&lt;br /&gt;Done&lt;br /&gt;&amp;gt; panid 0xabcd&lt;br /&gt;Done&lt;br /&gt;&amp;gt; ifconfig up&lt;br /&gt;Done&lt;br /&gt;&amp;gt; thread start&lt;br /&gt;Done&lt;br /&gt;&amp;gt; state&lt;br /&gt;child&lt;br /&gt;Done&lt;br /&gt;&amp;gt; ipaddr&lt;br /&gt;2600:xxxx:xxxx:96c9:749c:c6c0:3335:2885&lt;br /&gt;fd11:22:0:0:a6f:3b1f:9593:a6db&lt;br /&gt;fdde:ad00:beef:0:0:ff:fe00:5802&lt;br /&gt;fdde:ad00:beef:0:3480:6ccc:eb32:87f3&lt;br /&gt;fe80:0:0:0:707e:253d:f2ed:a6f8&lt;br /&gt;Done&lt;br /&gt;&amp;gt; dns resolve ip4.google.com fdaa:bb:1::1&lt;br /&gt;&amp;gt; DNS response for ip4.google.com - Error 1: Failed&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;The board rev is 1.0.0 (as printed on the sticker).&lt;/p&gt;
&lt;p&gt;Mary&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Thread border router 1.0.0</title><link>https://devzone.nordicsemi.com/thread/136869?ContentTypeID=1</link><pubDate>Wed, 20 Jun 2018 09:06:09 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:18984c7e-a326-40bc-9962-40f81e9543ce</guid><dc:creator>Piotr Szkotak</dc:creator><description>&lt;p&gt;Unfortunately these are not ICMP echo request / echo response packets we hoped to see.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Let&amp;#39;s perform one more test related to the persistent storage that may cause some issues.&lt;/p&gt;
&lt;p&gt;On the CLI:&lt;/p&gt;
&lt;p&gt;&amp;gt;factoryreset&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;On the RPi:&lt;/p&gt;
&lt;p&gt;sudo wpanctl dataset erase &amp;amp;&amp;amp; sudo reboot&lt;/p&gt;
&lt;p&gt;after it boots you can connect to the wifi with:&lt;/p&gt;
&lt;p&gt;wifi_connect WIFI_SSID WIFI_PASSWORD&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;then on the CLI:&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&amp;gt; panid 0xabcd &lt;br /&gt;Done &lt;br /&gt;&amp;gt; ifconfig up &lt;br /&gt;Done &lt;br /&gt;&amp;gt; thread start &lt;br /&gt;Done &lt;br /&gt;&amp;gt; state &lt;br /&gt;child &lt;br /&gt;Done &lt;br /&gt;&amp;gt; ipaddr &lt;br /&gt;fdde:ad00:beef:0:0:ff:fe00:6403 &lt;br /&gt;fdde:ad00:beef:0:eb88:663:f303:3605 &lt;br /&gt;fe80:0:0:0:840f:5266:381:6e2f &lt;br /&gt;Done &lt;br /&gt;&amp;gt; dns resolve ipv4.google.com fdaa:bb:1::1 &lt;br /&gt;&amp;gt; DNS response for ipv4.google.com - [64:ff9b:0:0:0:0:d83a:d5ee] TTL: 300 &lt;br /&gt;ping 64:ff9b:0:0:0:0:d83a:d5ee &lt;br /&gt;&amp;gt; 8 bytes from 64:ff9b:0:0:0:0:d83a:d5ee: icmp_seq=1 hlim=51 time=61ms&lt;br /&gt; &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Please let me know if your results are different than mine.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Which board revision is being used (0.9.0/0.9.2/0.10.0/0.11.0)?&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;If different than 0.9.2 we highly recommend using usb/hex with the native USB port instead of communicationg over the Segger USB port.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Kind regards,&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Piotr&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Thread border router 1.0.0</title><link>https://devzone.nordicsemi.com/thread/136810?ContentTypeID=1</link><pubDate>Tue, 19 Jun 2018 16:01:32 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:bca98924-69bf-46ff-a9e5-11b87f68e3b2</guid><dc:creator>Mary</dc:creator><description>&lt;p&gt;I re-ran the tcpdum/ping tests and waited a bit.&amp;nbsp; I only got a response (and yes, delayed) for the eth0 test.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="text"&gt;pi@raspberrypi:/etc $ sudo tcpdump -i eth0 -nv icmp6
tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes
15:39:00.763050 IP6 (hlim 255, next-header ICMPv6 (58) payload length: 112) fe80::e222:4ff:fe91:86b9 &amp;gt; ff02::1: [icmp6 sum ok] ICMP6, router advertisement, length 112
        hop limit 64, Flags [none], pref medium, router lifetime 1800s, reachable time 0s, retrans time 0s
          prefix info option (3), length 32 (4): 2600:xxxx:xxxx:96c0::/64, Flags [onlink, auto], valid time 1209600s, pref. time 1209600s
          route info option (24), length 24 (3):  2600:xxxx:xxxx:96c0::/60, pref=high, lifetime=1209600s
          rdnss option (25), length 24 (3):  lifetime 1200s, addr: 2600:1702:1d70:96c0::1
          mtu option (5), length 8 (1):  1500
          source link-address option (1), length 8 (1): e0:22:04:91:86:b9
15:39:01.489607 IP6 (hlim 255, next-header ICMPv6 (58) payload length: 32) 2600:xxxx:xxxx:96c0:91d1:7b34:f74a:4e1 &amp;gt; ff02::1:ffbb:bcae: [icmp6 sum ok] ICMP6, neighbor solicitation, length 32, who has 2600:xxxx:xxxx:96c0:c895:87f1:1ebb:bcae
          source link-address option (1), length 8 (1): 9c:eb:e8:19:c2:b1
15:39:01.489610 IP6 (hlim 255, next-header ICMPv6 (58) payload length: 32) 2600:xxxx:xxxx:96c0:91d1:7b34:f74a:4e1 &amp;gt; ff02::1:ffe0:ea4: [icmp6 sum ok] ICMP6, neighbor solicitation, length 32, who has 2600:xxxx:xxxx:96c0:ec1d:637f:b8e0:ea4
          source link-address option (1), length 8 (1): 9c:eb:e8:19:c2:b1
15:39:01.489612 IP6 (hlim 255, next-header ICMPv6 (58) payload length: 32) 2600:xxxx:xxxx:96c0:91d1:7b34:f74a:4e1 &amp;gt; ff02::1:ff4d:341b: [icmp6 sum ok] ICMP6, neighbor solicitation, length 32, who has 2600:xxxx:xxxx:96c0:95a6:eefe:9f4d:341b
          source link-address option (1), length 8 (1): 9c:eb:e8:19:c2:b1
15:39:01.489614 IP6 (hlim 255, next-header ICMPv6 (58) payload length: 32) 2600:xxxx:xxxx:96c0:91d1:7b34:f74a:4e1 &amp;gt; ff02::1:ff83:1906: [icmp6 sum ok] ICMP6, neighbor solicitation, length 32, who has 2600:xxxx:xxxx:06c0:d987:6590:fb83:1906
          source link-address option (1), length 8 (1): 9c:eb:e8:19:c2:b1
15:39:01.489616 IP6 (hlim 255, next-header ICMPv6 (58) payload length: 32) 2600:xxxx:xxxx:96c0:91d1:7b34:f74a:4e1 &amp;gt; ff02::1:ff29:3c7c: [icmp6 sum ok] ICMP6, neighbor solicitation, length 32, who has 2600:xxxx:xxxx:96c0:3ddd:7acd:5029:3c7c
          source link-address option (1), length 8 (1): 9c:eb:e8:19:c2:b1
15:39:01.489618 IP6 (hlim 255, next-header ICMPv6 (58) payload length: 32) 2600:xxxx:xxxx:96c0:91d1:7b34:f74a:4e1 &amp;gt; ff02::1:ff09:de88: [icmp6 sum ok] ICMP6, neighbor solicitation, length 32, who has 2600:xxxx:xxxx:96c0:7487:e816:d409:de88
          source link-address option (1), length 8 (1): 9c:eb:e8:19:c2:b1
15:39:01.491090 IP6 (hlim 255, next-header ICMPv6 (58) payload length: 32) 2600:xxxx:xxxx:96c0:91d1:7b34:f74a:4e1 &amp;gt; ff02::1:ff63:8caa: [icmp6 sum ok] ICMP6, neighbor solicitation, length 32, who has 2600:xxxx:xxxx:96c0:79a8:d89e:2e63:8caa
          source link-address option (1), length 8 (1): 9c:eb:e8:19:c2:b1
15:39:02.489602 IP6 (hlim 255, next-header ICMPv6 (58) payload length: 32) 2600:xxxx:xxxx:96c0:91d1:7b34:f74a:4e1 &amp;gt; ff02::1:ffbb:bcae: [icmp6 sum ok] ICMP6, neighbor solicitation, length 32, who has 2600:xxxx:xxxx:96c0:c895:87f1:1ebb:bcae
          source link-address option (1), length 8 (1): 9c:eb:e8:19:c2:b1
15:39:02.489603 IP6 (hlim 255, next-header ICMPv6 (58) payload length: 32) 2600:xxxx:xxxx:96c0:91d1:7b34:f74a:4e1 &amp;gt; ff02::1:ffe0:ea4: [icmp6 sum ok] ICMP6, neighbor solicitation, length 32, who has 2600:xxxx:xxxx:96c0:ec1d:637f:b8e0:ea4
          source link-address option (1), length 8 (1): 9c:eb:e8:19:c2:b1
15:39:02.490234 IP6 (hlim 255, next-header ICMPv6 (58) payload length: 32) 2600:xxxx:xxxx:96c0:91d1:7b34:f74a:4e1 &amp;gt; ff02::1:ff4d:341b: [icmp6 sum ok] ICMP6, neighbor solicitation, length 32, who has 2600:xxxx:xxxx:96c0:95a6:eefe:9f4d:341b
          source link-address option (1), length 8 (1): 9c:eb:e8:19:c2:b1
15:39:02.490237 IP6 (hlim 255, next-header ICMPv6 (58) payload length: 32) 2600:xxxx:xxxx:96c0:91d1:7b34:f74a:4e1 &amp;gt; ff02::1:ff83:1906: [icmp6 sum ok] ICMP6, neighbor solicitation, length 32, who has 2600:xxxx:xxxx:96c0:d987:6590:fb83:1906
          source link-address option (1), length 8 (1): 9c:eb:e8:19:c2:b1
15:39:02.490239 IP6 (hlim 255, next-header ICMPv6 (58) payload length: 32) 2600:xxxx:xxxx:96c0:91d1:7b34:f74a:4e1 &amp;gt; ff02::1:ff29:3c7c: [icmp6 sum ok] ICMP6, neighbor solicitation, length 32, who has 2600:xxxx:xxxx:96c0:3ddd:7acd:5029:3c7c
          source link-address option (1), length 8 (1): 9c:eb:e8:19:c2:b1
15:39:02.490241 IP6 (hlim 255, next-header ICMPv6 (58) payload length: 32) 2600:xxxx:xxxx:96c0:91d1:7b34:f74a:4e1 &amp;gt; ff02::1:ff09:de88: [icmp6 sum ok] ICMP6, neighbor solicitation, length 32, who has 2600:xxxx:xxxx:96c0:7487:e816:d409:de88
          source link-address option (1), length 8 (1): 9c:eb:e8:19:c2:b1
15:39:02.490242 IP6 (hlim 255, next-header ICMPv6 (58) payload length: 32) 2600:xxxx:xxxx:96c0:91d1:7b34:f74a:4e1 &amp;gt; ff02::1:ff63:8caa: [icmp6 sum ok] ICMP6, neighbor solicitation, length 32, who has 2600:xxxx:xxxx:96c0:79a8:d89e:2e63:8caa
          source link-address option (1), length 8 (1): 9c:eb:e8:19:c2:b1

&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;Similar messages appeared periodically after these.&lt;/p&gt;
&lt;p&gt;No, I have not modified the RaspPi at all, except to install tcpdump.&lt;/p&gt;
&lt;p&gt;I will try WiFi on the Pi.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Thread border router 1.0.0</title><link>https://devzone.nordicsemi.com/thread/136806?ContentTypeID=1</link><pubDate>Tue, 19 Jun 2018 15:18:38 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:fac452cc-f7cf-4a83-b11d-b06ed93a1e2d</guid><dc:creator>Piotr Szkotak</dc:creator><description>&lt;p&gt;The requirement is that /64 bit prefix needs to be passed to the Thread Network so the SLAAC mechanism is used for the address generation.&lt;/p&gt;
&lt;p&gt;I am not aware of any exceptions in that matter.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In theory it should be possible to create additional local IPv6 network for Thread only and perform IPv6 to IPv6 translation (NAT66) to addresses from the global pool. It looks like a huge workaround and the fact that Thread nodes generate randomly their addresses with SLAAC which will not make things easier.&lt;/p&gt;
&lt;p&gt;Please note that this is just a theoretical consideration, I am not aware of any attempts taken.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Typical solutions are sticking with NAT64 (with its limitation that the Thread node cannot be reached from the outside world as it does not have a globally reachable address) or contacting Internet Service Provider to provide shorter IPv6 prefix.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Your attempts with do not look good, did you wait after executing ping on the CLI? It can take some time to see any output on the Raspberrys terminal in case of tcpdump.&lt;/p&gt;
&lt;p&gt;Is your configuration or image modified anyhow compared to the released versions?&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Edit. Regarding your post that appeared when I was writing mine:&lt;/p&gt;
&lt;p&gt;Image is configured correctly, paragraph you mentioned is about network equipment used at home or office.&lt;/p&gt;
&lt;p&gt;Even if your ISP delegates you prefix that is good enough, lets say /56 the router you connect Raspberry to sometimes delegates /64 to the Raspberry even if it could delegate shorter one.&lt;/p&gt;
&lt;p&gt;There are two ways of passing prefix to the next router/device, DHCPv6 is very configurable and can share specified address lengh and SLAAC which operates on fixed /64.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Usually this can be configured in the router panel. Bad news is that many devices provide limited configuration or even do not lack of proper support of these features. From our experience OpenWRT custom firmware provides good support in this regard.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;To be honest issues with NAT64 bother me more as this is the configuration that works out of the box in all cases.&lt;/p&gt;
&lt;p&gt;I&amp;#39;m wondering if this can be related to your ISP or the AT&amp;amp;T router.&lt;/p&gt;
&lt;p&gt;Could you check setup with the different connection? Wi-Fi hotspot shared from the smartphone should be sufficient to check the NAT64.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;When all fails also the previous release (0.11.0) can be checked as that border router is completely different since it is based on OpenWRT not the Raspbian.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Kind Regards,&lt;/p&gt;
&lt;p&gt;Piotr&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Thread border router 1.0.0</title><link>https://devzone.nordicsemi.com/thread/136804?ContentTypeID=1</link><pubDate>Tue, 19 Jun 2018 15:14:25 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:6f4f65c8-e0b5-4b76-bb7d-257882956ab0</guid><dc:creator>Mary</dc:creator><description>&lt;p&gt;From &lt;a href="http://infocenter.nordicsemi.com/index.jsp?topic=%2Fcom.nordic.infocenter.threadsdk.v0.11.0%2Fthread_intro.html"&gt;this &lt;/a&gt;page&lt;/p&gt;
&lt;p&gt;NoteWhen dealing with native IPv6 connectivity, make sure you use the DHCPv6 service, and not the popular Stateless Address Autoconfiguration (SLAAC) tool. This autoconfig tool will only provide a 64-bit long prefix that is not sufficient to delegate a new 64-bit long prefix for the Thread network.&lt;/p&gt;
&lt;p&gt;Do they mean on the RaspPi?&amp;nbsp; Is the image I downloaded not already set up properly? How can I check?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Thread border router 1.0.0</title><link>https://devzone.nordicsemi.com/thread/136780?ContentTypeID=1</link><pubDate>Tue, 19 Jun 2018 14:03:51 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:14d2c09c-3ce7-41e3-a950-68a7eda4458a</guid><dc:creator>Mary</dc:creator><description>&lt;p&gt;We have an AT&amp;amp;T router that assigned 64 bit prefixes.&amp;nbsp; We don&amp;#39;t seem to be able to change that.&amp;nbsp; Is Thread configurable in this regard?&amp;nbsp; Is it possible to set it to use a longer prefix?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Thread border router 1.0.0</title><link>https://devzone.nordicsemi.com/thread/136767?ContentTypeID=1</link><pubDate>Tue, 19 Jun 2018 13:22:17 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:a8eb8fdd-fc32-4a73-a568-630197be0c30</guid><dc:creator>Mary</dc:creator><description>&lt;p&gt;1. RaspPi&lt;/p&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="text"&gt;pi@raspberrypi:~ $ ip -6 route
64:ff9b::/96 dev nat64 metric 1024  pref medium
2600:xxxx:xxxx:96c0::/64 dev eth0 proto kernel metric 256  expires 1209485sec pref medium
2600:xxxx:xxxx:96c9:1000::/68 dev wpan0 proto kernel metric 204  pref medium
unreachable 2600:xxxx:xxxx:96c9::/64 dev lo metric 201  error -113 pref medium
fd11:22::/64 dev wpan0 proto kernel metric 256  pref medium
fdaa:bb:1::1 dev nat64 proto kernel metric 256  pref medium
fdde:ad00:beef::/64 dev wpan0 proto kernel metric 256  pref medium
fe80::/64 dev wlan0 proto kernel metric 256  pref medium
fe80::/64 dev eth0 proto kernel metric 256  pref medium
fe80::/64 dev wpan0 proto kernel metric 256  pref medium
fe80::/64 dev nat64 proto kernel metric 256  pref medium
default via fe80::e222:4ff:fe91:86b9 dev eth0 proto ra metric 1024  expires 1685sec hoplimit 64 pref medium
&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&amp;#39;tcpdump -i&amp;nbsp;wpan0 -nv icmp6 or icmp&amp;#39; and&amp;nbsp;ping 64:ff9b::808:808 from CLI.&lt;/span&gt;&lt;/p&gt;
&lt;p style="padding-left:30px;"&gt;&lt;span&gt;&amp;lt;Nothing on RaspPi&amp;gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&amp;nbsp;tcpdump -i&amp;nbsp;nat64 -nv icmp6 or icmp and ping again&lt;/span&gt;&lt;/p&gt;
&lt;p style="padding-left:30px;"&gt;&lt;span&gt;&amp;lt;Nothing on RaspPi&amp;gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;tcpdump -i&amp;nbsp;eth0&amp;nbsp;-nv icmp6 or icmp and ping&lt;/span&gt;&lt;/p&gt;
&lt;p style="padding-left:30px;"&gt;&lt;span&gt;&amp;lt;Nothing on RaspPi&amp;gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;We will look into adjusting the prefix length at the router.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Mary&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Thread border router 1.0.0</title><link>https://devzone.nordicsemi.com/thread/136608?ContentTypeID=1</link><pubDate>Mon, 18 Jun 2018 16:28:26 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:2c7fdda5-ff35-4b52-8ed2-185af31352b5</guid><dc:creator>Piotr Szkotak</dc:creator><description>&lt;p&gt;These examples are precommissioned. The communication between CLI and NCP is fine.&lt;/p&gt;
&lt;p&gt;In such case there is no need to perform commissioning.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;I think that we need to split the communication issue into two parts:&lt;/p&gt;
&lt;p&gt;1. Native IPv6 not working. (2600 prefix).&lt;/p&gt;
&lt;p&gt;2. NAT64 communication not working (64:ff9b prefix).&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Regarding the 1. I see that router assigned prefix /64 to the raspberry. If this is really true the Thread should not even obtain this prefix as it is too long. The Thread itself needs /64, meaning that the raspberry should get shorter one, e.g. /62 to bo able to exclusively give /64 to Thread.&lt;/p&gt;
&lt;p&gt;We can confirm length of obtained prefix by checking the routing table on the raspberry with &amp;#39;ip -6 route&amp;#39;.&lt;/p&gt;
&lt;p&gt;There you will see 26xx prefix on eth0 with its length in a form:&lt;/p&gt;
&lt;p&gt;2600:aaaa:bbbb:cccc::/&lt;span style="text-decoration:underline;"&gt;&lt;em&gt;&lt;strong&gt;64&lt;/strong&gt;&lt;/em&gt;&lt;/span&gt; dev&amp;nbsp;eth0 proto ra metric 100 pref medium&lt;/p&gt;
&lt;p&gt;/64 means we are out of luck.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In case of NAT64 the traffic on the raspberry is handled differently. There is additional nat64 interface involved. In this case the IPv6 packets go from wpan0 interface to nat64 where translation to IPv4 takes place and IPv4 packets go to the eth0 or wlan0 depending if wired or wireless connection is used.&lt;/p&gt;
&lt;p&gt;In this case we should track packets when using 64:ff9b destination.&amp;#39;&lt;span&gt;ping 64:ff9b::808:808&amp;#39;&lt;/span&gt;&lt;span&gt;&amp;nbsp;is excellent as the destination is in fact Google&amp;#39;s 8.8.8.8 IPv4 address embedded in IPv6 address. I&amp;nbsp;highly&amp;nbsp;recommend pinigng&amp;nbsp;64:ff9b::0808:0808 from the CLI and checking IPv6 traffic on wpan0 and nat64 interfaces and IPv4 traffic on nat64 and eth0.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;I would execute &amp;#39;tcpdump -i&amp;nbsp;wpan0 -nv icmp6 or icmp&amp;#39; and&amp;nbsp;ping 64:ff9b::808:808 from CLI.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;then&amp;nbsp;tcpdump -i&amp;nbsp;nat64 -nv icmp6 or icmp and ping again,&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;and&amp;nbsp;tcpdump -i&amp;nbsp;eth0&amp;nbsp;-nv icmp6 or icmp and ping the last time.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Kind regards,&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Piotr&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Thread border router 1.0.0</title><link>https://devzone.nordicsemi.com/thread/136606?ContentTypeID=1</link><pubDate>Mon, 18 Jun 2018 16:18:01 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:f4b801a5-5372-4d2f-a19f-93e8e9f7ec44</guid><dc:creator>Mary</dc:creator><description>&lt;p&gt;Is someone working on this? It&amp;#39;s an important feature for our project.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Thread border router 1.0.0</title><link>https://devzone.nordicsemi.com/thread/135989?ContentTypeID=1</link><pubDate>Wed, 13 Jun 2018 15:53:06 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:f8636434-b8de-4187-b33a-0ccfca3e69c7</guid><dc:creator>Mary</dc:creator><description>&lt;p&gt;Several minutes later this appeared on the Rasp Pi:&lt;/p&gt;
&lt;p&gt;15:37:51.000429 IP6 2600:xxxx:xxxx:96c9:1000::1.48378 &amp;gt; ff33:40:fdde:ad00:beef::1.47193: UDP, length 5&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Thread border router 1.0.0</title><link>https://devzone.nordicsemi.com/thread/135986?ContentTypeID=1</link><pubDate>Wed, 13 Jun 2018 15:44:23 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:8644fb6d-c925-4f39-a93c-70e9cb32b77b</guid><dc:creator>Mary</dc:creator><description>&lt;p&gt;Does Commissioning have to be done first?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Thread border router 1.0.0</title><link>https://devzone.nordicsemi.com/thread/135982?ContentTypeID=1</link><pubDate>Wed, 13 Jun 2018 15:34:24 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:d131083d-5900-41e3-8139-073df219eb79</guid><dc:creator>Mary</dc:creator><description>&lt;p&gt;I got tcpdump.&lt;/p&gt;
&lt;p&gt;CLI:&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&amp;gt; ping fdde:ad00:beef:0:a610:e28d:369:454e&lt;/span&gt;&lt;br /&gt;&lt;span&gt;&amp;gt; 8 bytes from fdde:ad00:beef:0:a610:e28d:369:454e: icmp_seq=1 hlim=64 time=33ms&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;RaspPi&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;tcpdump: verbose output suppressed, use -v or -vv for full protocol decode&lt;br /&gt;listening on wpan0, link-type RAW (Raw IP), capture size 262144 bytes&lt;br /&gt;15:31:26.377995 IP6 fdde:ad00:beef:0:3c36:a6bf:1720:da2f &amp;gt; fdde:ad00:beef:0:bf2f:9691:b564:f8cd: ICMP6, echo request, seq 3, length 16&lt;br /&gt;15:31:26.378315 IP6 fdde:ad00:beef:0:bf2f:9691:b564:f8cd &amp;gt; fdde:ad00:beef:0:3c36:a6bf:1720:da2f: ICMP6, echo reply, seq 3, length 16&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;CLI:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&amp;gt; ping 2600:xxxx:xxxx:96c0::5c5&lt;br /&gt;&amp;gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;RaspPi&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&amp;lt;nothing at all&amp;gt;&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Thread border router 1.0.0</title><link>https://devzone.nordicsemi.com/thread/135981?ContentTypeID=1</link><pubDate>Wed, 13 Jun 2018 15:32:40 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:dcd898fe-ac18-438b-a111-87453d79ec71</guid><dc:creator>Piotr Szkotak</dc:creator><description>&lt;p&gt;sudo apt-get update &amp;amp;&amp;amp; sudo apt-get install tcpdump&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;We see that packet does not even reach the eth0 interface, that is interesting.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Thread border router 1.0.0</title><link>https://devzone.nordicsemi.com/thread/135975?ContentTypeID=1</link><pubDate>Wed, 13 Jun 2018 15:20:19 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:1193037b-ed29-4342-9178-cb48a0ca51d8</guid><dc:creator>Mary</dc:creator><description>&lt;p&gt;On the CLI:&lt;/p&gt;
&lt;p&gt;&amp;gt; ping fdde:ad00:beef:0:a610:e28d:369:454e&lt;br /&gt;&amp;gt; 8 bytes from fdde:ad00:beef:0:a610:e28d:369:454e: icmp_seq=1 hlim=64 time=33ms&lt;/p&gt;
&lt;p&gt;&amp;gt; ping 2600:xxxx:xxxx:96c0::5c5&lt;br /&gt;&amp;gt;&lt;/p&gt;
&lt;p&gt;pi@raspberrypi:~ $ sudo tcpdump -i wpan0 ip6&lt;br /&gt;sudo: tcpdump: command not found&lt;/p&gt;
&lt;p&gt;I reflashed both the CLI and NCP projects. Same results.&lt;/p&gt;
&lt;p&gt;How do I get tcpdump?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Thread border router 1.0.0</title><link>https://devzone.nordicsemi.com/thread/135972?ContentTypeID=1</link><pubDate>Wed, 13 Jun 2018 14:55:54 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:b8d62738-9a62-4be8-926f-62b67a0e9419</guid><dc:creator>Piotr Szkotak</dc:creator><description>&lt;p&gt;OK, just to confirm.&lt;/p&gt;
&lt;p&gt;You are able to ping from the CLI address returned by &amp;#39;sudo wpanctl getprop IPv6:MeshLocalAddress&amp;#39; on the Raspberry, right?&lt;/p&gt;
&lt;p&gt;Are you able to &amp;#39;ping 2600:xxxx:xxxx:xxxx::5c5&amp;#39; from the CLI?&lt;/p&gt;
&lt;p&gt;While performing these tests it would be good to sniff a bit on wpan0 and eth0 on the Raspberry.&lt;/p&gt;
&lt;p&gt;&amp;#39;sudo tcpdump -i wpan0 ip6&amp;#39; will show you traffic if packets are correctly passed from the NCP to the Raspberry.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;It may be worth to reflash all boards with the --chiperase option to make sure that no persistent data stayed on flash as a last resort.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Piotr&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Thread border router 1.0.0</title><link>https://devzone.nordicsemi.com/thread/135949?ContentTypeID=1</link><pubDate>Wed, 13 Jun 2018 13:42:03 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:829e5fb1-c4e3-4044-9067-18ff59955c35</guid><dc:creator>Mary</dc:creator><description>&lt;p&gt;1.&amp;nbsp; Yes, I can ping 8.8.8.8 from Raspberry Pi&lt;/p&gt;
&lt;p style="padding-left:30px;"&gt;pi@raspberrypi:~ $ ping 8.8.8.8&lt;br /&gt;PING 8.8.8.8 (8.8.8.8) 56(84) bytes of data.&lt;br /&gt;64 bytes from 8.8.8.8: icmp_seq=1 ttl=58 time=31.3 ms&lt;br /&gt;64 bytes from 8.8.8.8: icmp_seq=2 ttl=58 time=32.3 ms&lt;br /&gt;64 bytes from 8.8.8.8: icmp_seq=3 ttl=58 time=36.1 ms&lt;br /&gt;64 bytes from 8.8.8.8: icmp_seq=4 ttl=58 time=30.5 ms&lt;/p&gt;
&lt;p&gt;2. Yes, I can ping6 from Raspberry Pi&lt;/p&gt;
&lt;p style="padding-left:30px;"&gt;pi@raspberrypi:~ $ ping6 2001:4860:4860::8888&lt;br /&gt;PING 2001:4860:4860::8888(2001:4860:4860::8888) 56 data bytes&lt;br /&gt;64 bytes from 2001:4860:4860::8888: icmp_seq=1 ttl=58 time=31.5 ms&lt;br /&gt;64 bytes from 2001:4860:4860::8888: icmp_seq=2 ttl=58 time=32.3 ms&lt;br /&gt;64 bytes from 2001:4860:4860::8888: icmp_seq=3 ttl=58 time=30.5 ms&lt;br /&gt;64 bytes from 2001:4860:4860::8888: icmp_seq=4 ttl=58 time=31.6 ms&lt;/p&gt;
&lt;p&gt;3. ping from CLI returned nothing&lt;/p&gt;
&lt;p style="padding-left:30px;"&gt;&amp;gt; ping 2001:4860:4860::8888&lt;br /&gt;&amp;gt;&lt;/p&gt;
&lt;p&gt;Raspberry Pi is connected to our office network via Ethernet cable, through a switch to our router.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Raspberry Pi network configuration as reported by the router:&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;img alt=" " src="https://devzone.nordicsemi.com/resized-image/__size/320x240/__key/communityserver-discussions-components-files/4/RpI_5F00_IPV6_5F00_Obfuscated.PNG" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;My PC is connected in similar fashion, though the same switch to the same router.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Mary&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Thread border router 1.0.0</title><link>https://devzone.nordicsemi.com/thread/135941?ContentTypeID=1</link><pubDate>Wed, 13 Jun 2018 13:11:41 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:3bff8320-3b0b-4706-bad5-8115accda68d</guid><dc:creator>Piotr Szkotak</dc:creator><description>&lt;p&gt;Hi Mary,&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;At the first glance it looks fine.&lt;/p&gt;
&lt;p&gt;Let&amp;#39;s start from checking connectivity at the RPi.&lt;/p&gt;
&lt;p&gt;1. Can you &amp;#39;ping 8.8.8.8&amp;#39; from the Raspberry?&lt;/p&gt;
&lt;p&gt;I see that you have global IPv6 connectivity.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;2. Can you &amp;#39;ping6&amp;nbsp;2001:4860:4860::8888&amp;#39; from the Raspberry?&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;3. In case of CLI we can also try &amp;#39;ping&amp;nbsp;&lt;span&gt;2001:4860:4860::8888&amp;#39;?&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Please let me know what is output of these three commands.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;What provides network connection to the Raspberry? Is it the same as for your PC?&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Kind Regards,&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Piotr Szkotak&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>