Re: Pitfalls of IPv6
It's not meant to. But also, you're going to have trouble in general if you have an internal host on the same IP as the router, and we're talking about packets where the dst is the LAN so why ask about ones where it's the router? Indeed, none of that makes any sense.
Packets addressed to the router are uninteresting here; they'll just get delivered to the router itself, and I'd like to hope that I don't need to convince anyone that NAT won't protect them from that. It's just the LAN case that really confuses people.
"in 2025, most NAT systems are on a stateful firewall, lets say you are right & the NAT/firewall is in the path to a public ip range, then yes ok if no NAT entry it then checks its stateful firewall & if no rule then the traffic is dropped by the default drop."
The packet still goes through the firewall whether or not a NAT entry matched, and also it doesn't matter what the IP range on the LAN is, but otherwise yes, exactly. But you're describing the firewall dropping the packet, not NAT. Firewalls do provide a security benefit, which is why most NATing routers still have them, but we weren't talking about firewalls.
"typically though NAT devices are used on routers/firewalls that bridge public ip's to private IP's & in this overwhelmingly used use case the original dst IP is the router/firewall so can't be routed internally & ends up null routed & dropped."
This is indeed the overwhelming use case, but nothing about it will restrict inbound packets to only having a dst IP of the router, so you still need to consider what would happen to packets addressed to machines on the LAN behind the router. If NAT doesn't touch them, then it's not providing a security benefit.