On 11 Oct 2021 at 08:37a, MeaTLoTioN pondered and said...
 
Have you verified that traffic isn't already getting to the system it needs to, just there's another firewall on that system? with IPv6 if I'm not mistaken it has a more direct path to the system rather than a standard kind of NAT through the router/firewall? 
OK with UFW disabled the website checker port test shows still shows closed for IPv6 on 24554
I can however ping (as I could before I disabled UFW) the Debian box from the outside world.
I ran tcpdump ip6 on my Debian box and could see that traffic coming into the box and the box replying. Other than that there's little traffic lots of UDP stuff...
[snip]
14:48:46.915613 IP6 fe80::a450:12f1:b06d:393c.61701 > ff02::c.1900: UDP, length 146
14:48:49.916885 IP6 fe80::a450:12f1:b06d:393c.61701 > ff02::c.1900: UDP, length 146
14:48:53.915547 IP6 fe80::a450:12f1:b06d:393c.61701 > ff02::c.1900: UDP, length 146
14:48:56.913660 IP6 fe80::a450:12f1:b06d:393c.61701 > ff02::c.1900: UDP, length 146
14:48:59.913333 IP6 fe80::a450:12f1:b06d:393c.61701 > ff02::c.1900: UDP, length 146
14:49:02.447762 IP6 fe80::ba27:ebff:fe60:17b > ip6-allnodes: ICMP6, router advertisement, length 56
14:49:03.915586 IP6 fe80::a450:12f1:b06d:393c.61701 > ff02::c.1900: UDP, length 146
14:49:06.931934 IP6 fe80::a450:12f1:b06d:393c.61701 > ff02::c.1900: UDP, length 146
14:49:09.913305 IP6 fe80::a450:12f1:b06d:393c.61701 > ff02::c.1900: UDP, length 146
14:49:11.943849 IP6 hexillion.com > orac: ICMP6, echo request, seq 44746, length 40
14:49:11.943885 IP6 orac > hexillion.com: ICMP6, echo reply, seq 44746, length 40
14:49:12.158220 IP6 hexillion.com > orac: ICMP6, echo request, seq 44747, length 40
14:49:12.158244 IP6 orac > hexillion.com: ICMP6, echo reply, seq 44747, length 40
14:49:12.372275 IP6 hexillion.com > orac: ICMP6, echo request, seq 44748, length 40
14:49:12.372304 IP6 orac > hexillion.com: ICMP6, echo reply, seq 44748, length 40
14:49:12.586854 IP6 hexillion.com > orac: ICMP6, echo request, seq 44749, length 40
14:49:12.586883 IP6 orac > hexillion.com: ICMP6, echo reply, seq 44749, length 40
14:49:12.802225 IP6 hexillion.com > orac: ICMP6, echo request, seq 44750, length 40
14:49:12.802250 IP6 orac > hexillion.com: ICMP6, echo reply, seq 44750, length 40
14:49:13.913335 IP6 fe80::a450:12f1:b06d:393c.61701 > ff02::c.1900: UDP, length 146
14:49:16.650707 IP6 fe80::2c02:d338:8ebb:bc11.64485 > ff02::1:3.hostmon: UDP, length 22
14:49:16.749773 IP6 fe80::2c02:d338:8ebb:bc11.64485 > ff02::1:3.hostmon: UDP, length 22
 and later when I did a test IPv6 BinkD poll from 1/10 (in my LAN) to
the 1/100 Debian box I could see that traffic to.
[snip]
14:49:59.909080 IP6 fe80::a450:12f1:b06d:393c.61701 > ff02::c.1900: UDP, length 146
14:50:03.908188 IP6 fe80::a450:12f1:b06d:393c.61701 > ff02::c.1900: UDP, length 146
14:50:04.447784 IP6 2001:470:d:123:918b:abed:6187:cc92 > ff02::1:ff00:200: ICMP6, neighbor solicitation, who has orac, length 32
14:50:04.447815 IP6 orac > 2001:470:d:123:918b:abed:6187:cc92: ICMP6, neighbor advertisement, tgt is orac, length 32
14:50:04.448153 IP6 2001:470:d:123:918b:abed:6187:cc92.62435 > orac.binkp: Flags [S], seq 1514083003, win 8192, options [mss 1440,nop,wscale 2,nop,nop,sackOK], length 0
14:50:04.448183 IP6 orac.binkp > 2001:470:d:123:918b:abed:6187:cc92.62435: Flags [S.], seq 3182582046, ack 1514083004, win 64800, options [mss 1440,nop,nop,sackOK,nop,wscale 7], length 0
14:50:04.448467 IP6 2001:470:d:123:918b:abed:6187:cc92.62435 > orac.binkp: Flags [.], ack 1, win 16560, length 0
14:50:04.451925 IP6 orac.binkp > 2001:470:d:123:918b:abed:6187:cc92.62435: Flags [P.], seq 1:422, ack 1, win 507, length 421
14:50:04.513969 IP6 2001:470:d:123:918b:abed:6187:cc92.62435 > orac.binkp: Flags [P.], seq 1:227, ack 422, win 16454, length 226
14:50:04.514002 IP6 orac.binkp > 2001:470:d:123:918b:abed:6187:cc92.62435: Flags [.], ack 227, win 506, length 0
14:50:04.657826 IP6 2001:470:d:123:918b:abed:6187:cc92.62435 > orac.binkp: Flags [P.], seq 227:281, ack 422, win 16454, length 54
14:50:04.657846 IP6 orac.binkp > 2001:470:d:123:918b:abed:6187:cc92.62435: Flags [.], ack 281, win 506, length 0
14:50:04.659142 IP6 orac.binkp > 2001:470:d:123:918b:abed:6187:cc92.62435: Flags [P.], seq 422:470, ack 281, win 506, length 48
14:50:04.717952 IP6 2001:470:d:123:918b:abed:6187:cc92.62435 > orac.binkp: Flags [P.], seq 281:284, ack 470, win 16442, length 3
14:50:04.718264 IP6 orac.binkp > 2001:470:d:123:918b:abed:6187:cc92.62435: Flags [F.], seq 470, ack 284, win 506, length 0
14:50:04.718672 IP6 2001:470:d:123:918b:abed:6187:cc92.62435 > orac.binkp: Flags [.], ack 471, win 16442, length 0
14:50:04.769365 IP6 2001:470:d:123:918b:abed:6187:cc92.62435 > orac.binkp: Flags [F.], seq 284, ack 471, win 16442, length 0
14:50:04.769390 IP6 orac.binkp > 2001:470:d:123:918b:abed:6187:cc92.62435: Flags [.], ack 285, win 506, length 0
14:50:06.930026 IP6 fe80::a450:12f1:b06d:393c.61701 > ff02::c.1900: UDP, length 146
[snip]
So I'm left wondering is there something else on the debian box blocking IPv6 stuff if UFW is not running but it seems the tunnel is working to the box given it replies to IPv6 pings?
Where to look and adjust?
--- Mystic BBS v1.12 A47 2021/09/29 (Linux/64)
 * Origin: Agency BBS | Dunedin, New Zealand | agency.bbs.nz (21:1/101)