Establishing a VLAN for management functionality is a good practice. Using VLAN 1 for it is a bad practice. Essentially it is recommended to get everything you can off of vlan 1 (the default untagged vlan, in most cases). You cannot eliminate all traffic, but if you cut it to a minimum, you can easily discern any big jump in traffic which might be a vlan hopping attack by a hacker. This will also allow you to isolate your management traffic where prying eyes will have a harder time finding it.
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...