- Table of Contents
-
- 03-Layer 3 Configuration Guide
- 00-Preface
- 01-ARP Configuration
- 02-IP Addressing Configuration
- 03-DHCP Configuration
- 04-DNS Configuration
- 05-IP Performance Optimization Configuration
- 06-UDP Helper Configuration
- 07-IPv6 Basics Configuration
- 08-IP Routing Basics Configuration
- 09-Static Routing Configuration
- 10-IPv6 Static Routing Configuration
- 11-RIP Configuration
- 12-RIPng Configuration
- Related Documents
-
Title | Size | Download |
---|---|---|
07-IPv6 Basics Configuration | 332.17 KB |
IPv6 neighbor discovery protocol
IPv6 basics configuration task list
Configuring basic IPv6 functions
Configuring an IPv6 global unicast address
Configuring an IPv6 link-local address
Configure an IPv6 anycast address
Configuring a static neighbor entry
Configuring the maximum number of neighbors dynamically learned
Configuring parameters related to RA messages
Configuring the maximum number of attempts to send an NS message for DAD
Configuring a static PMTU for a specified IPv6 address
Configuring the aging time for dynamic PMTUs
Configuring IPv6 TCP properties
Configuring IPv6 FIB load sharing
Configuring ICMPv6 packet sending
Configuring the maximum ICMPv6 error packets sent in an interval
Enabling replying to multicast echo requests
Enabling sending of ICMPv6 time exceeded messages
Enabling sending of ICMPv6 destination unreachable messages
Displaying and maintaining IPv6 basics configuration
IPv6 basics configuration example
Troubleshooting IPv6 basics configuration
This chapter includes these sections:
· IPv6 basics configuration task list
· Displaying and maintaining IPv6 basics configuration
· IPv6 basics configuration example
· Troubleshooting IPv6 basics configuration
|
NOTE: · The term "switch" or "device" in this chapter refers to the switching engine on a WX3000E wireless switch. · The WX3000E series comprises WX3024E and WX3010E wireless switches. · The port numbers in this chapter are for illustration only. |
IPv6 overview
Internet Protocol Version 6 (IPv6), also called IP next generation (IPng), was designed by the Internet Engineering Task Force (IETF) as the successor to Internet Protocol version 4 (IPv4). The significant difference between IPv6 and IPv4 is that IPv6 increases the IP address size from 32 bits to 128 bits.
IPv6 features
Header format simplification
IPv6 removes several IPv4 header fields or moves them to the IPv6 extension headers to reduce the length of the basic IPv6 packet header. The basic IPv6 packet header has a fixed length of 40 bytes to simplify IPv6 packet handling and to improve the forwarding efficiency. Although an IPv6 address size is four times larger than an IPv4 address, the basic IPv6 packet header size is only twice the size of the option-less IPv4 packet header.
Figure 1 IPv4 packet header format and basic IPv6 packet header format
Larger address space
The source and destination IPv6 addresses are 128 bits (or 16 bytes) long. IPv6 can provide 3.4 x 1038 addresses to meet the requirements of hierarchical address division and the allocation of public and private addresses.
Hierarchical address structure
IPv6 uses the hierarchical address structure to speed up route lookups and reduce the IPv6 routing table size through route aggregation.
Address autoconfiguration
To simplify host configuration, IPv6 supports stateful and stateless address autoconfiguration.
· Stateful address autoconfiguration enables a host to acquire an IPv6 address and other configuration information from a server (for example, a DHCP server).
· Stateless address autoconfiguration enables a host to automatically generate an IPv6 address and other configuration information by using its link-layer address and the prefix information advertised by a router.
To communicate with other hosts on the same link, a host automatically generates a link-local address based on its link-layer address and the link-local address prefix (FE80::/10).
Built-in security
IPv6 defines extension headers to support IPsec. IPsec provides end-to-end security for network security solutions and enhances interoperability among different IPv6 applications.
QoS support
The Flow Label field in the IPv6 header allows the device to label the packets and facilitates the special handling of a flow.
Enhanced neighbor discovery mechanism
The IPv6 neighbor discovery protocol is implemented through a group of Internet Control Message Protocol version 6 (ICMPv6) messages to manage the information exchange among neighboring nodes on the same link. The group of ICMPv6 messages replaces Address Resolution Protocol (ARP) messages, Internet Control Message Protocol version 4 (ICMPv4) Router Discovery messages, and ICMPv4 Redirect messages and provides a series of other functions.
Flexible extension headers
IPv6 eliminates the Options field in the header and introduces optional extension headers to provide scalability and improve efficiency. The Options field in the IPv4 packet header contains 40 bytes at most, whereas the IPv6 extension headers are restricted to the maximum size of IPv6 packets only.
IPv6 addresses
IPv6 address format
An IPv6 address is represented as a set of 16-bit hexadecimals separated by colons. An IPv6 address is divided into eight groups, and each 16-bit group is represented by four hexadecimal numbers, for example, 2001:0000:130F:0000:0000:09C0:876A:130B.
To simplify the representation of IPv6 addresses, you can handle zeros in IPv6 addresses by using the following methods.
· The leading zeros in each group can be removed. For example, the above address can be represented in a shorter format as 2001:0:130F:0:0:9C0:876A:130B.
· If an IPv6 address contains two or more consecutive groups of zeros, they can be replaced by a double colon (::). For example, the above address can be represented in the shortest format as 2001:0:130F::9C0:876A:130B.
|
CAUTION: A double colon may appear once or not at all in an IPv6 address. This limit allows the device to determine how many zeros the double colon represents, and correctly convert it to zeros to restore a 128-bit IPv6 address. |
An IPv6 address consists of an address prefix and an interface ID, which are equivalent to the network ID and the host ID of an IPv4 address respectively.
An IPv6 address prefix is written in IPv6-address/prefix-length notation where the IPv6-address is represented in any of the formats above and the prefix-length is a decimal number indicating how many leftmost bits of the IPv6 address comprises the address prefix.
IPv6 address types
IPv6 addresses fall into three types, unicast address, multicast address, and anycast address.
· Unicast address: An identifier for a single interface, similar to an IPv4 unicast address. A packet sent to a unicast address is delivered to the interface identified by that address.
· Multicast address: An identifier for a set of interfaces (typically belonging to different nodes), similar to an IPv4 multicast address. A packet sent to a multicast address is delivered to all interfaces identified by that address.
· Anycast address: An identifier for a set of interfaces (typically belonging to different nodes). A packet sent to an anycast address is delivered to the nearest one of the interfaces identified by that address. The nearest interface is chosen according to the routing protocols' measure of distance.
|
NOTE: There are no broadcast addresses in IPv6. Their function is replaced by multicast addresses. |
The type of an IPv6 address is designated by the first several bits, the format prefix. Table 1 lists the mappings between address types and format prefixes.
Table 1 Mappings between address types and format prefixes
Type |
Format prefix (binary) |
IPv6 prefix ID |
|
Unicast address |
Unspecified address |
00...0 (128 bits) |
::/128 |
Loopback address |
00...1 (128 bits) |
::1/128 |
|
Link-local address |
1111111010 |
FE80::/10 |
|
Site-local address |
1111111011 |
FEC0::/10 |
|
Global unicast address |
Other forms |
— |
|
Multicast address |
11111111 |
FF00::/8 |
|
Anycast address |
Anycast addresses use the unicast address space and have the identical structure of unicast addresses. |
Unicast addresses
Unicast addresses comprise global unicast addresses, link-local unicast addresses, site-local unicast addresses, the loopback address, and the unspecified address.
· Global unicast addresses, equivalent to public IPv4 addresses, are provided for network service providers. This type of address allows efficient prefix aggregation to restrict the number of global routing entries.
· Link-local addresses are used for communication among link-local nodes for neighbor discovery and stateless autoconfiguration. Packets with link-local source or destination addresses are not forwarded to other links.
· Site-local unicast addresses are similar to private IPv4 addresses. Packets with site-local source or destination addresses are not forwarded out of the local site (or a private network).
· A loopback address is 0:0:0:0:0:0:0:1 (or ::1). It may never be assigned to any physical interface and can be used by a node to send an IPv6 packet to itself in the same way as the loopback address in IPv4.
· An unspecified address is 0:0:0:0:0:0:0:0 (or ::). It cannot be assigned to any node. Before acquiring a valid IPv6 address, a node fills this address in the source address field of IPv6 packets. The unspecified address cannot be used as a destination IPv6 address.
Multicast addresses
IPv6 multicast addresses listed in Table 2 are reserved for special purposes.
Table 2 Reserved IPv6 multicast addresses
Address |
Application |
FF01::1 |
Node-local scope all-nodes multicast address |
FF02::1 |
Link-local scope all-nodes multicast address |
FF01::2 |
Node-local scope all-routers multicast address |
FF02::2 |
Link-local scope all-routers multicast address |
FF05::2 |
Site-local scope all-routers multicast address |
Multicast addresses also include solicited-node addresses. A node uses a solicited-node multicast address to acquire the link-layer address of a neighboring node on the same link and to detect duplicate addresses. Each IPv6 unicast or anycast address has a corresponding solicited-node address. The format of a solicited-node multicast address is:
FF02:0:0:0:0:1:FFXX:XXXX
Where FF02:0:0:0:0:1:FF is fixed and consists of 104 bits, and XX:XXXX is the last 24 bits of an IPv6 unicast address or anycast address.
EUI-64 address-based interface identifiers
An interface identifier is 64 bits and uniquely identifies an interface on a link.
Interfaces generate EUI-64 address-based interface identifiers differently.
· On an IEEE 802 interface (such as an Ethernet interface and a VLAN interface)
The interface identifier is derived from the link-layer address (typically a MAC address) of the interface. To expand the 48-bit MAC address to a 64-bit interface identifier, the hexadecimal number FFFE (that is, 16 bits of 1111111111111110) is inserted into the MAC address (behind the 24th high-order bit). To ensure that the obtained interface identifier is globally unique, the universal/local (U/L) bit (which is the seventh high-order bit) is set to 1. Thus, an EUI-64 address-based interface identifier is obtained.
Figure 2 shows how an EUI-64 address-based interface identifier is generated from a MAC address.
Figure 2 Convert a MAC address into an EUI-64 address-based interface identifier
· On an interface of another type
The EUI-64 address-based interface identifier is generated randomly by the device.
IPv6 neighbor discovery protocol
The IPv6 Neighbor Discovery (ND) protocol uses five types of ICMPv6 messages to implement the following functions:
· Neighbor reachability detection
· Router/prefix discovery and address autoconfiguration
Table 3 lists the types and functions of ICMPv6 messages used by the ND protocol.
Table 3 ICMPv6 messages used by ND
ICMPv6 message |
Type |
Function |
Neighbor Solicitation (NS) message |
135 |
Acquires the link-layer address of a neighbor. |
Verifies whether a neighbor is reachable. |
||
Detects duplicate addresses. |
||
Neighbor Advertisement (NA) message |
136 |
Responds to an NS message. |
Notifies the neighboring nodes of link layer changes. |
||
Router Solicitation (RS) message |
133 |
Requests for an address prefix and other configuration information for autoconfiguration after startup. |
Router Advertisement (RA) message |
134 |
Responds to an RS message. |
Advertises information such as the Prefix Information options and flag bits. |
||
Redirect message |
137 |
Informs the source host of a better next hop on the path to a particular destination when certain conditions are satisfied. |
Address resolution
This function is similar to the ARP function in IPv4. An IPv6 node acquires the link-layer addresses of neighboring nodes on the same link through NS and NA message exchanges. Figure 3 shows how Host A acquires the link-layer address of Host B on a single link.
The address resolution operates in the following steps.
1. Host A multicasts an NS message. The source address of the NS message is the IPv6 address of the sending interface of Host A and the destination address is the solicited-node multicast address of Host B. The NS message contains the link-layer address of Host A.
2. After receiving the NS message, Host B judges whether the destination address of the packet is its solicited-node multicast address. If yes, Host B learns the link-layer address of Host A, and then unicasts an NA message containing its link-layer address.
3. Host A acquires the link-layer address of Host B from the NA message.
Neighbor reachability detection
After Host A acquires the link-layer address of its neighbor Host B, Host A can use NS and NA messages to check whether Host B is reachable.
1. Host A sends an NS message whose destination address is the IPv6 address of Host B.
2. If Host A receives an NA message from Host B, Host A decides that Host B is reachable. Otherwise, Host B is unreachable.
Duplicate address detection
After Host A acquires an IPv6 address, it performs Duplicate Address Detection (DAD) to check whether the address is being used by any other node (similar to the gratuitous ARP function in IPv4). DAD is accomplished through NS and NA message exchanges. Figure 4 shows the DAD process.
Figure 4 Duplicate address detection
1. Host A sends an NS message whose source address is the unspecified address and whose destination address is the corresponding solicited-node multicast address of the IPv6 address to be detected. The NS message contains the IPv6 address.
2. If Host B uses this IPv6 address, Host B returns an NA message. The NA message contains the IPv6 address of Host B.
3. Host A learns that the IPv6 address is being used by Host B after receiving the NA message from Host B. If receiving no NA message, Host A decides that the IPv6 address is not in use and uses this address.
Router/prefix discovery and address autoconfiguration
Router/prefix discovery enables a node to locate the neighboring routers and to learn from the received RA message configuration parameters such as the prefix of the network where the node is located.
Stateless address autoconfiguration enables a node to generate an IPv6 address automatically according to the information obtained through router/prefix discovery.
Router/prefix discovery is implemented through RS and RA messages in the following steps.
1. At startup, a node sends an RS message to request the address prefix and other configuration information for autoconfiguration.
2. A router returns an RA message containing information such as Prefix Information options. (The router also periodically sends an RA message.)
Redirection
A newly started host may contain only a default route to the gateway in its routing table. When certain conditions are satisfied, the gateway sends an ICMPv6 Redirect message to the source host so that the host can select a better next hop to forward packets (similar to the ICMP redirection function in IPv4).
The gateway sends an ICMPv6 Redirect message when the following conditions are satisfied.
· The receiving interface is the forwarding interface.
· The selected route itself is not created or modified by an ICMPv6 Redirect message.
· The selected route is not the default route.
· The IPv6 packet to be forwarded does not contain any routing header.
IPv6 PMTU discovery
The links that a packet passes from a source to a destination may have different MTUs. In IPv6, when the packet size exceeds the path MTU of a link, the packet is fragmented at the source end of the link to reduce the processing pressure on intermediate devices and use network resources effectively.
The path MTU (PMTU) discovery mechanism is designed to find the minimum MTU of all links in the path between a source and a destination. Figure 5 shows how a source host discovers the PMTU to a destination host.
Figure 5 PMTU discovery process
1. The source host compares its MTU with the packet to be sent, performs necessary fragmentation, and sends the resulting packet to the destination host.
2. If the MTU supported by a forwarding interface is smaller than the packet, the device discards the packet and returns an ICMPv6 error packet containing the interface MTU to the source host.
3. After receiving the ICMPv6 error packet, the source host uses the returned MTU to limit the packet size, performs fragmentation, and sends the resulting packet to the destination host.
4. Step 2 and step 3 are repeated until the destination host receives the packet. In this way, the source host decides the minimum MTU of all links in the path to the destination host.
IPv6 transition technologies
Before IPv6 dominates the Internet, high-efficient, seamless IPv6 transition technologies are needed to enable communication between IPv4 and IPv6 networks. Several IPv6 transition technologies can be used in different environments and periods, such as dual stack (RFC 2893), tunneling (RFC 2893), and NAT-PT (RFC 2766).
Dual stack
Dual stack is the most direct transition approach. A network node that supports both IPv4 and IPv6 is a dual stack node. A dual stack node configured with an IPv4 address and an IPv6 address can forward both IPv4 and IPv6 packets. For an upper layer application that supports both IPv4 and IPv6, either TCP or UDP can be selected at the transport layer, whereas the IPv6 stack is preferred at the network layer. Dual stack is suitable for communication between IPv4 nodes or between IPv6 nodes. It is the basis of all transition technologies. However, it does not solve the IPv4 address depletion issue because each dual stack node must have a globally unique IP address.
Tunneling
Tunneling is an encapsulation technology that utilizes one network protocol to encapsulate packets of another network protocol and transfer them over the network.
NAT-PT
Network Address Translation – Protocol Translation (NAT-PT) is usually applied on a device between IPv4 and IPv6 networks to translate between IPv4 and IPv6 packets, allowing communication between IPv4 and IPv6 nodes. It performs IP address translation, and according to different protocols, performs semantic translation for packets. This technology is only suitable for communication between a pure IPv4 node and a pure IPv6 node.
|
NOTE: The switching engine on the WX3000E wireless switch does not support tunneling and NAT-PT. |
Protocols and standards
Protocols and standards related to IPv6 include:
· RFC 1881, IPv6 Address Allocation Management
· RFC 1887, An Architecture for IPv6 Unicast Address Allocation
· RFC 1981, Path MTU Discovery for IP version 6
· RFC 2375, IPv6 Multicast Address Assignments
· RFC 2460, Internet Protocol, Version 6 (IPv6) Specification
· RFC 2464, Neighbor Discovery for IP Version 6 (IPv6)
· RFC 2462, IPv6 Stateless Address Autoconfiguration
· RFC 4443, Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification
· RFC 2464, Transmission of IPv6 Packets over Ethernet Networks
· RFC 2526, Reserved IPv6 Subnet Anycast Addresses
· RFC 3307, Allocation Guidelines for IPv6 Multicast Addresses
· RFC 3513, Internet Protocol Version 6 (IPv6) Addressing Architecture
IPv6 basics configuration task list
Complete the following tasks to perform IPv6 basics configuration:
Task |
Remarks |
|
Required |
||
Required to configure one |
||
Optional |
||
Configuring the maximum number of neighbors dynamically learned |
Optional |
|
Optional |
||
Configuring the maximum number of attempts to send an NS message for DAD |
Optional |
|
Optional |
||
Optional |
||
Optional |
||
Optional |
||
Optional |
||
Configuring the maximum ICMPv6 error packets sent in an interval |
Optional |
|
Optional |
||
Optional |
||
Optional |
Configuring basic IPv6 functions
Enabling IPv6
Enable IPv6 before you perform any IPv6-related configuration. Without IPv6 enabled, an interface cannot forward IPv6 packets even if it has an IPv6 address configured.
Follow these steps to enable IPv6:
To do... |
Use the command... |
Remarks |
Enter system view |
system-view |
— |
Enable IPv6 |
ipv6 |
Required Disabled by default. |
Configuring an IPv6 global unicast address
Configure an IPv6 global unicast address by using the following ways:
· EUI-64 IPv6 addressing: The IPv6 address prefix of an interface is manually configured, and the interface identifier is generated automatically by the interface.
· Manual configuration: The IPv6 global unicast address is configured manually.
· Stateless address autoconfiguration: The IPv6 global unicast address is generated automatically based on the address prefix information contained in the RA message.
|
NOTE: · You can configure multiple IPv6 global unicast addresses with different prefixes on an interface. · A manually configured global unicast address takes precedence over an automatically generated one. If a global unicast address has been automatically generated on an interface when you manually configure another one with the same address prefix, the latter overwrites the previous. The overwritten automatic global unicast address will not be restored even if the manual one is removed. Instead, a new global unicast address will be automatically generated based on the address prefix information in the RA message that the interface receives at the next time. |
EUI-64 IPv6 addressing
Follow these steps to configure an interface to generate an EUI-64 IPv6 address:
To do… |
Use the command… |
Remarks |
Enter system view |
system-view |
— |
Enter interface view |
interface interface-type interface-number |
— |
Configure the interface to generate an EUI-64 IPv6 address |
ipv6 address ipv6-address/prefix-length eui-64 |
Required By default, no IPv6 global unicast address is configured on an interface. |
Manual configuration
Follow these steps to specify an IPv6 address manually for an interface:
To do... |
Use the command... |
Remarks |
Enter system view |
system-view |
— |
Enter interface view |
interface interface-type interface-number |
— |
Configure an IPv6 address manually |
ipv6 address { ipv6-address prefix-length | ipv6-address/prefix-length } |
Required By default, no IPv6 global unicast address is configured on an interface. |
Stateless address autoconfiguration
Follow these steps to configure an interface to generate an IPv6 address by using stateless address autoconfiguration:
To do... |
Use the command... |
Remarks |
Enter system view |
system-view |
— |
Enter interface view |
interface interface-type interface-number |
— |
Configure an IPv6 address to be generated through stateless address autoconfiguration |
ipv6 address auto |
Required By default, no IPv6 global unicast address is configured on an interface. |
|
NOTE: Using the undo ipv6 address auto command on an interface removes all IPv6 global unicast addresses automatically generated on the interface. |
Configuring an IPv6 link-local address
IPv6 link-local addresses can be configured in either of the following ways:
· Automatic generation: The device automatically generates a link-local address for an interface according to the link-local address prefix (FE80::/10) and the link-layer address of the interface.
· Manual assignment: IPv6 link-local addresses can be assigned manually.
|
NOTE: · An interface can have only one link-local address. To avoid link-local address conflicts, use the automatic generation method. · Manual assignment takes precedence over automatic generation. If you first use automatic generation and then manual assignment, the manually assigned link-local address overwrites the automatically generated one. If you first use manual assignment and then automatic generation, the automatically generated link-local address does not take effect and the link-local address is still the manually assigned one. If you delete the manually assigned address, the automatically generated link-local address is validated. |
Follow these steps to configure automatic generation of an IPv6 link-local address for an interface:
To do... |
Use the command... |
Remarks |
Enter system view |
system-view |
— |
Enter interface view |
interface interface-type interface-number |
— |
Configure the interface to automatically generate an IPv6 link-local address |
ipv6 address auto link-local |
Optional By default, no link-local address is configured on an interface. After an IPv6 global unicast address is configured on the interface, a link-local address is generated automatically. |
Follow these steps to configure an IPv6 link-local address manually:
To do... |
Use the command... |
Remarks |
Enter system view |
system-view |
— |
Enter interface view |
interface interface-type interface-number |
— |
Configure an IPv6 link-local address manually |
ipv6 address ipv6-address link-local |
Optional By default, no link-local address is configured on an interface. After an IPv6 global unicast address is configured on the interface, a link-local address is generated automatically. |
|
NOTE: · After an IPv6 global unicast address is configured for an interface, a link-local address is generated automatically. The automatically generated link-local address is the same as the one generated by using the ipv6 address auto link-local command. If a link-local address is manually assigned to an interface, this manual link-local address takes effect. If the manually assigned link-local address is removed, the automatically generated link-local address takes effect. · The undo ipv6 address auto link-local command can only remove the link-local addresses generated through the ipv6 address auto link-local command. However, if an IPv6 global unicast address is already configured for an interface, the interface still has a link-local address because the system automatically generates one for the interface. If no IPv6 global unicast address is configured, the interface has no link-local address. |
Configure an IPv6 anycast address
Follow these steps to configure an IPv6 anycast address for an interface:
To do... |
Use the command... |
Remarks |
Enter system view |
system-view |
— |
Enter interface view |
interface interface-type interface-number |
— |
Configure an IPv6 anycast address |
ipv6 address ipv6-address/prefix-length anycast |
Optional By default, no IPv6 anycast address is configured on an interface. |
Configuring IPv6 ND
Configuring a static neighbor entry
The IPv6 address of a neighboring node can be resolved into a link-layer address dynamically through NS and NA messages or through a manually configured static neighbor entry.
The device uniquely identifies a static neighbor entry by the neighbor's IPv6 address and the local Layer 3 interface number. You can configure a static neighbor entry by using either of the following methods.
· Associate a neighbor IPv6 address and link-layer address with the Layer 3 interface of the local node.
· Associate a neighbor IPv6 address and link-layer address with a port in a VLAN containing the local node.
Follow these steps to configure a static neighbor entry:
To do... |
Use the command... |
Remarks |
Enter system view |
system-view |
— |
Configure a static neighbor entry |
ipv6 neighbor ipv6-address mac-address { vlan-id port-type port-number | interface interface-type interface-number } |
Required |
|
CAUTION: You can use either of the previous configuration methods to configure a static neighbor entry for a VLAN interface. · After a static neighbor entry is configured by using the first method, the device must resolve the corresponding Layer 2 port information of the VLAN interface. · If you use the second method, ensure that the corresponding VLAN interface exists and that the Layer 2 port specified by port-type port-number belongs to the VLAN specified by vlan-id. After a static neighbor entry is configured, the device associates the VLAN interface with the IPv6 address to identify the static neighbor entry uniquely. |
Configuring the maximum number of neighbors dynamically learned
The device can dynamically acquire the link-layer address of a neighboring node through NS and NA messages and add it into the neighbor table. A large table may reduce the forwarding performance of the device. You can restrict the size of the neighbor table by setting the maximum number of neighbors that an interface can dynamically learn. When the number of dynamically learned neighbors reaches the threshold, the interface stops learning neighbor information.
Follow these steps to configure the maximum number of neighbors dynamically learned:
To do… |
Use the command… |
Remarks |
Enter system view |
system-view |
— |
Enter interface view |
interface interface-type interface-number |
— |
Configure the maximum number of neighbors dynamically learned by an interface |
ipv6 neighbors max-learning-num number |
Optional By default, an interface can learn up to 256 neighbors dynamically. |
Configuring parameters related to RA messages
You can enable an interface to send RA messages, and configure the interval for sending RA messages and parameters in RA messages. After receiving an RA message, a host can use these parameters to perform corresponding operations. Table 4 lists and describes the configurable parameters in an RA message.
Table 4 Parameters in an RA message and their descriptions
Parameters |
Description |
Cur Hop Limit |
When sending an IPv6 packet, a host uses the value to fill the Hop Limit field in IPv6 headers. The value is also filled into the Hop Limit field in the response packet of a device. |
Prefix Information options |
After receiving the prefix information, the hosts on the same link can perform stateless autoconfiguration. |
MTU |
Ensure that all nodes on a link use the same MTU value. |
M flag |
Determines whether hosts use the stateful autoconfiguration to acquire IPv6 addresses. If the M flag is set to 1, hosts use the stateful autoconfiguration (for example, through a DHCP server) to acquire IPv6 addresses. Otherwise, hosts use the stateless autoconfiguration to acquire IPv6 addresses and generate IPv6 addresses according to their own link-layer addresses and the obtained prefix information. |
O flag |
Determines whether hosts use stateful autoconfiguration to acquire other configuration information. If the O flag is set to 1, hosts use stateful autoconfiguration (for example, through a DHCP server) to acquire other configuration information. Otherwise, hosts use stateless autoconfiguration to acquire other configuration information. |
Router Lifetime |
This field tells the receiving hosts how long the advertising device can live |
Retrans Timer |
If the device fails to receive a response message within the specified time after sending an NS message, it retransmits the NS message. |
Reachable Time |
If the neighbor reachability detection shows that a neighbor is reachable, the device considers the neighbor reachable within the specified reachable time. If the device needs to send a packet to the neighbor after the specified reachable time expires, the device reconfirms whether the neighbor is reachable. |
Follow these steps to allow sending of RA messages:
To do… |
Use the command… |
Remarks |
Enter system view |
system-view |
— |
Enter interface view |
interface interface-type interface-number |
— |
Disable RA message suppression |
undo ipv6 nd ra halt |
Required By default, RA messages are suppressed. |
Configure the maximum and minimum intervals for sending RA messages |
ipv6 nd ra interval max-interval-value min-interval-value |
Optional By default, the maximum interval for sending RA messages is 600 seconds, and the minimum interval is 200 seconds. The device sends RA messages at random intervals between the maximum interval and the minimum interval. The minimum interval should be less than or equal to 0.75 times the maximum interval. |
Follow these steps to configure parameters related to RA messages:
To do… |
Use the command… |
Remarks |
Enter system view |
system-view |
— |
Configure the hop limit |
ipv6 nd hop-limit value |
Optional 64 by default. |
Enter interface view |
interface interface-type interface-number |
— |
Configure the prefix information in RA messages |
ipv6 nd ra prefix { ipv6-address prefix-length | ipv6-address/prefix-length } valid-lifetime preferred-lifetime [ no-autoconfig | off-link ] * |
Optional By default, no prefix information is configured for RA messages, and the IPv6 address of the interface sending RA messages is used as the prefix information with valid lifetime 2592000 seconds (that is, 30 days) and preferred lifetime 604800 seconds (that is, 7 days). |
Turn off the MTU option in RA messages |
ipv6 nd ra no-advlinkmtu |
Optional By default, RA messages contain the MTU option. |
Set the M flag bit to 1 |
ipv6 nd autoconfig managed-address-flag |
Optional By default, the M flag bit is set to 0 and hosts acquire IPv6 addresses through stateless autoconfiguration. |
Set the O flag bit to 1 |
ipv6 nd autoconfig other-flag |
Optional By default, the O flag bit is set to 0 and hosts acquire other configuration information through stateless autoconfiguration. |
Configure the router lifetime in RA messages |
ipv6 nd ra router-lifetime value |
Optional 1800 seconds by default. |
Set the NS retransmission timer |
ipv6 nd ns retrans-timer value |
Optional By default, the local interface sends NS messages at 1000 millisecond intervals, and the value of the Retrans Timer field in RA messages sent by the local interface is 0. The interval for retransmitting an NS message is determined by the receiving device. |
Set the reachable time |
ipv6 nd nud reachable-time value |
Optional By default, the neighbor reachable time on the local interface is 30000 milliseconds, and the value of the Reachable Time field in the RA messages sent by the local interface is 0. The neighbor reachable time is determined by the receiving device. |
|
NOTE: · The maximum interval for sending RA messages should be less than or equal to the router lifetime in RA messages, so that the router can be updated through an RA message before expiration. · The values of the NS retransmission timer and the reachable time configured for an interface are sent to hosts via RA messages. Furthermore, this interface sends NS messages at the interval of the NS retransmission timer and considers a neighbor reachable within the reachable time. |
Configuring the maximum number of attempts to send an NS message for DAD
An interface sends an NS message for DAD after acquiring an IPv6 address. If the interface does not receive a response within a specified time (determined by the ipv6 nd ns retrans-timer command), it continues to send an NS message. If it still does not receive a response after the number of sent attempts reaches the threshold (specified with the ipv6 nd dad attempts command), the acquired address is considered usable.
Follow these steps to configure the attempts to send an NS message for DAD:
To do… |
Use the command… |
Remarks |
Enter system view |
system-view |
— |
Enter interface view |
interface interface-type interface-number |
— |
Configure the number of attempts to send an NS message for DAD |
ipv6 nd dad attempts value |
Optional 1 by default. When the value argument is set to 0, DAD is disabled. |
Configuring ND snooping
Introduction
The ND snooping feature is used in Layer 2 switching networks. It creates ND snooping entries using DAD NS messages.
ND snooping entries are used to:
· Cooperate with the ND detection function. For more information about ND detection, see the Security Configuration Guide.
· Cooperate with the IP Source Guard function. For more information about IP source guard, see the Security Configuration Guide.
· Work in all SAVI scenarios. For more information about SAVI, see the Security Configuration Guide.
After you enable ND snooping on a VLAN of a device, ND packets received by the interfaces of the VLAN are redirected to the CPU. When ND snooping is enabled globally, the CPU uses the ND packets to create or update ND snooping entries comprising source IPv6 address, source MAC address, receiving VLAN, and receiving port information.
The following items describe how an ND snooping entry is created, updated, and aged out.
1. Creating an ND snooping entry
The device only uses received DAD NS messages to create ND snooping entries.
2. Updating an ND snooping entry
Upon receiving an ND packet, the device searches the ND snooping table for an entry containing the source IPv6 address of the packet. If the entry was refreshed within one second, the device does not update the entry. If the entry is not refreshed for more than one second, the device matches the MAC address of the ND packet and the receiving port against that in the entry.
· If both of them match those in the entry, the device updates the aging time of the ND snooping entry.
· If neither of them matches the entry and the received packet is a DAD NS message, the message is ignored.
· If neither of them matches the entry and the received packet is not a DAD NS message, the device performs active acknowledgement.
The active acknowledgement is performed in the following steps.
· The device checks the validity of the existing ND snooping entry. The device sends out a DAD NS message including the IPv6 address of the ND snooping entry. If a corresponding NA message (whose source IPv6 address, source MAC address, receiving port, and source VLAN are consistent with those of the existing entry) is received, the device updates the aging time of the existing entry. If no corresponding NA message is received within five seconds after the DAD NS message is sent, the device starts to check the validity of the received ND packet.
· To check the validity of the received ND packet (packet A for example), the device sends out a DAD NS message including the source IPv6 address of packet A. If a corresponding NA message (whose source IPv6 address, source MAC address, receiving port, and source VLAN are consistent with those of packet A) is received, the device updates the aging time of the entry. If no corresponding NA message is received within one second after the DAD NS message is sent, the device does not update the entry.
3. Aging out an ND snooping entry
An ND snooping entry is aged out after 25 minutes. If an ND snooping entry is not updated within 15 minutes, the device performs active acknowledgement.
The device sends out a DAD NS message including the IPv6 address of the ND snooping every one second.
· If a corresponding NA message is received (the source IPv6 address, source MAC address, receiving port, and source VLAN are consistent with those of the existing entry), the device updates the aging time of the existing entry.
· If no corresponding NA message is received within one second after the DAD NS message is sent out, the device removes the entry when the timer expires.
Configuration procedure
Follow these steps to configure ND snooping:
To do… |
Use the command… |
Remarks |
Enter system view |
system-view |
— |
Enter VLAN view |
vlan vlan-id |
— |
Enable ND snooping |
ipv6 nd snooping enable |
Required Disabled by default. |
Return to system view |
quit |
— |
Enter Ethernet interface view/aggregate interface view |
interface interface-type interface-number |
— |
Configure the maximum number of ND snooping entries the interface can learn |
ipv6 nd snooping max-learning-num number |
Optional By default, the number of ND snooping entries an interface can learn is unlimited. |
Configuring PMTU discovery
Configuring a static PMTU for a specified IPv6 address
You can configure a static PMTU for a specified destination IPv6 address. When a source host sends a packet through an interface, it compares the interface MTU with the static PMTU of the specified destination IPv6 address. If the packet size is larger than the smaller one of the two values, the host fragments the packet according to the smaller value.
Follow these steps to configure a static PMTU for a specified IPv6 address:
To do… |
Use the command… |
Remarks |
Enter system view |
system-view |
— |
Configure a static PMTU for a specified IPv6 address |
ipv6 pathmtu ipv6-address [ value ] |
Required Not configured by default. |
Configuring the aging time for dynamic PMTUs
After the path MTU from a source host to a destination host is dynamically determined (see “IPv6 PMTU discovery”), the source host sends subsequent packets to the destination host based on this MTU. After the aging time expires, the dynamic PMTU is removed and the source host re-determines a dynamic path MTU through the PMTU mechanism.
The aging time is invalid for a static PMTU.
Follow these steps to configure the aging time for dynamic PMTUs:
To do… |
Use the command… |
Remarks |
Enter system view |
system-view |
— |
Configure the aging time for dynamic PMTUs |
ipv6 pathmtu age age-time |
Optional 10 minutes by default. |
Configuring IPv6 TCP properties
You can configure the following IPv6 TCP properties.
· synwait timer: When a SYN packet is sent, the synwait timer is triggered. If no response packet is received before the synwait timer expires, the IPv6 TCP connection establishment fails.
· finwait timer: When the IPv6 TCP connection status is FIN_WAIT_2, the finwait timer is triggered. If no packet is received before the finwait timer expires, the IPv6 TCP connection is terminated. If a FIN packet is received, the IPv6 TCP connection status becomes TIME_WAIT. If non-FIN packets are received, the finwait timer is reset upon receipt of the last non-FIN packet and the connection is terminated after the finwait timer expires.
· Size of the IPv6 TCP sending/receiving buffer.
Follow these steps to configure IPv6 TCP properties:
To do… |
Use the command… |
Remarks |
Enter system view |
system-view |
— |
Set the synwait timer |
tcp ipv6 timer syn-timeout wait-time |
Optional 75 seconds by default. |
Set the finwait timer |
tcp ipv6 timer fin-timeout wait-time |
Optional 675 seconds by default. |
Set the size of the IPv6 TCP sending/receiving buffer |
tcp ipv6 window size |
Optional 8 KB by default. |
Configuring IPv6 FIB load sharing
When the IPv6 FIB caching function is enabled, the device searches the FIB cache for forwarding packets to reduce the searching time and improve forwarding efficiency.
In the IPv6 FIB load sharing mode, the device can decide how to select equal cost multi-paths (ECMP) to forward packets. The device supports the following load sharing modes.
· Load sharing based on the HASH algorithm: An algorithm based on the source IPv6 address and destination IPv6 address is adopted to select an ECMP route to forward packets.
· Load sharing based on polling: Each ECMP route is used in turn to forward packets.
Follow these steps to configure the IPv6 FIB load sharing:
To do… |
Use the command… |
Remarks |
|
Enter system view |
system-view |
— |
|
Enable the IPv6 FIB caching function |
ipv6 fibcache { slot-number | all } |
Required Disabled by default. |
|
Configure the IPv6 FIB load sharing mode |
Configure the load sharing based on the hash algorithm |
ipv6 fib-loadbalance-type hash-based |
Optional By default, the load sharing based on polling is adopted and each ECMP route is used in turn to forward packets. |
Configure the load sharing based on polling |
undo ipv6 fib-loadbalance-type hash-based |
Configuring ICMPv6 packet sending
Configuring the maximum ICMPv6 error packets sent in an interval
If too many ICMPv6 error packets are sent within a short time in a network, network congestion may occur. To avoid network congestion, you can control the maximum number of ICMPv6 error packets sent within a specified time by adopting the token bucket algorithm.
You can set the capacity of a token bucket to determine the number of tokens in the bucket. In addition, you can set the update interval of the token bucket, that is, the interval for restoring the configured capacity. One token allows one ICMPv6 error packet to be sent. Each time an ICMPv6 error packet is sent, the number of tokens in a token bucket decreases by one. If the number of ICMPv6 error packets successively sent exceeds the capacity of the token bucket, the additional ICMPv6 error packets cannot be sent out until the capacity of the token bucket is restored.
Follow these steps to configure the capacity and update interval of the token bucket:
To do… |
Use the command… |
Remarks |
Enter system view |
system-view |
— |
Configure the capacity and update interval of the token bucket |
ipv6 icmp-error { bucket bucket-size | ratelimit interval } * |
Optional By default, the capacity of a token bucket is 10 and the update interval is 100 milliseconds. At most 10 ICMPv6 error packets can be sent within 100 milliseconds. The update interval “0” indicates that the number of ICMPv6 error packets sent is not restricted. |
Enabling replying to multicast echo requests
If hosts are configured to answer multicast echo requests, an attacker may use this mechanism to attack a host. For example, if Host A (an attacker) sends an echo request with the source being Host B to a multicast address, all the hosts in the multicast group will send echo replies to Host B. To prevent such an attack, disable a device from answering multicast echo requests by default. In some application scenarios, however, you need to enable the device to answer multicast echo requests.
Follow these steps to enable replying to multicast echo requests:
To do… |
Use the command… |
Remarks |
Enter system view |
system-view |
— |
Enable replying to multicast echo requests |
ipv6 icmpv6 multicast-echo-reply enable |
Required Not enabled by default. |
Enabling sending of ICMPv6 time exceeded messages
A device sends out an ICMPv6 Time Exceeded message in the following cases:
· If a received IPv6 packet’s destination IP address is not a local address and its hop limit is 1, the device sends an ICMPv6 Hop Limit Exceeded message to the source.
· Upon receiving the first fragment of an IPv6 datagram with the destination IP address being the local address, the device starts a timer. If the timer expires before all the fragments arrive, an ICMPv6 Fragment Reassembly Timeout message is sent to the source.
If large amounts of malicious packets are received, the performance of a device degrades greatly because it has to send back ICMP Time Exceeded messages. You can disable sending of ICMPv6 Time Exceeded messages.
Follow these steps to enable sending of ICMPv6 time exceeded messages:
To do… |
Use the command… |
Remarks |
Enter system view |
system-view |
— |
Enable sending of ICMPv6 Time Exceeded messages |
ipv6 hoplimit-expires enable |
Optional Enabled by default. |
Enabling sending of ICMPv6 destination unreachable messages
If the device fails to forward a received IPv6 packet due to one of the following reasons, it drops the packet and sends a corresponding ICMPv6 Destination Unreachable error message to the source.
· If no route is available for forwarding the packet, the device sends a "no route to destination" ICMPv6 error message to the source.
· If the device fails to forward the packet due to administrative prohibition (such as a firewall filter or an ACL), the device sends the source a "destination network administratively prohibited" ICMPv6 error message.
· If the device fails to deliver the packet because the destination is beyond the scope of the source IPv6 address (for example, the source IPv6 address of the packet is a link-local address whereas the destination IPv6 address of the packet is a global unicast address), the device sends the source a "beyond scope of source address" ICMPv6 error message.
· If the device fails to resolve the corresponding link layer address of the destination IPv6 address, the device sends the source an "address unreachable" ICMPv6 error message.
· If the packet with the destination being local and transport layer protocol being UDP and the packet’s destination port number does not match the running process, the device sends the source a "port unreachable" ICMPv6 error message.
If an attacker sends abnormal traffic that causes the device to generate ICMPv6 destination unreachable messages, end users may be affected. To prevent such attacks, you can disable the device from sending ICMPv6 destination unreachable messages.
Follow these steps to enable sending of ICMPv6 destination unreachable messages:
To do… |
Use the command… |
Remarks |
Enter system view |
system-view |
— |
Enable sending of ICMPv6 destination unreachable messages |
ipv6 unreachables enable |
Required Disabled by default. |
Displaying and maintaining IPv6 basics configuration
To do… |
Use the command… |
Remarks |
Display the IPv6 FIB entries |
display ipv6 fib [ slot slot-number ] [ ipv6-address ] [ | { begin | exclude | include } regular-expression ] |
Available in any view |
Display the total number of routes in the IPv6 FIB cache |
display ipv6 fibcache slot-number [ | { begin | exclude | include } regular-expression ] |
Available in any view |
Display the IPv6 information of the interface |
display ipv6 interface [ interface-type [ interface-number ] ] [ verbose ] [ | { begin | exclude | include } regular-expression ] |
Available in any view |
Display neighbor information |
display ipv6 neighbors { { ipv6-address | all | dynamic | static } [ slot slot-number ] | interface interface-type interface-number | vlan vlan-id } [ verbose ] [ | { begin | exclude | include } regular-expression ] |
Available in any view |
Display the total number of neighbor entries satisfying the specified conditions |
display ipv6 neighbors { { all | dynamic | static } [ slot slot-number ] | interface interface-type interface-number | vlan vlan-id } count [ | { begin | exclude | include } regular-expression ] |
Available in any view |
Display the IPv6 PMTU information |
display ipv6 pathmtu { ipv6-address | all | dynamic | static } [ | { begin | exclude | include } regular-expression ] |
Available in any view |
Display socket information |
display ipv6 socket [ socktype socket-type ] [ task-id socket-id ] [ slot slot-number ] [ | { begin | exclude | include } regular-expression ] |
Available in any view |
Display the statistics of IPv6 packets and ICMPv6 packets |
display ipv6 statistics [ slot slot-number ] [ | { begin | exclude | include } regular-expression ] |
Available in any view |
Display the IPv6 TCP connection statistics |
display tcp ipv6 statistics [ | { begin | exclude | include } regular-expression ] |
Available in any view |
Display the IPv6 TCP connection status information |
display tcp ipv6 status [ | { begin | exclude | include } regular-expression ] |
Available in any view |
Display the IPv6 UDP connection statistics |
display udp ipv6 statistics [ | { begin | exclude | include } regular-expression ] |
Available in any view |
Display ND snooping entries |
display ipv6 nd snooping [ ipv6-address | vlan vlan-id ] [ | { begin | exclude | include } regular-expression ] |
Available in any view |
Clear FIB cache entries |
reset ipv6 fibcache { slot slot-number| all } |
Available in user view |
Clear IPv6 neighbor information |
reset ipv6 neighbors { all | dynamic | interface interface-type interface-number | slot slot-number | static } |
Available in user view |
Clear the PMTU values |
reset ipv6 pathmtu { all | static | dynamic} |
Available in user view |
Clear the statistics of IPv6 and ICMPv6 packets |
reset ipv6 statistics [ slot slot-number ] |
Available in user view |
Clear all IPv6 TCP connection statistics |
reset tcp ipv6 statistics |
Available in user view |
Clear the statistics of all IPv6 UDP packets |
reset udp ipv6 statistics |
Available in user view |
Clear ND snooping entries |
reset ipv6 nd snooping [ ipv6-address | vlan vlan-id ] |
Available in user view |
IPv6 basics configuration example
Network requirements
· As shown in Figure 6, a host, Switch A and Switch B are connected through Ethernet ports. Add the Ethernet ports into corresponding VLANs, configure IPv6 addresses for the VLAN interfaces and verify that they are connected.
· The global unicast addresses of VLAN-interface 1 and VLAN-interface 2 on Switch A are 2001::1/64 and 3001::1/64 respectively.
· The global unicast address of VLAN-interface 2 on Switch B is 3001::2/64, and a route to Host is available.
· IPv6 is enabled for the host to automatically obtain an IPv6 address through IPv6 ND, and a route to Switch B is available.
Figure 6 Network diagram for IPv6 address configuration (on switches)
|
NOTE: The VLAN interfaces have been created on the switch. |
Configuration procedure
1. Configure Switch A
# Enable IPv6.
<SwitchA> system-view
[SwitchA] ipv6
# Specify a global unicast address for VLAN-interface 2.
[SwitchA] interface vlan-interface 2
[SwitchA-Vlan-interface2] ipv6 address 3001::1/64
[SwitchA-Vlan-interface2] quit
# Specify a global unicast address for VLAN-interface 1, and allow it to advertise RA messages (no interface advertises RA messages by default).
[SwitchA] interface vlan-interface 1
[SwitchA-Vlan-interface1] ipv6 address 2001::1/64
[SwitchA-Vlan-interface1] undo ipv6 nd ra halt
[SwitchA-Vlan-interface1] quit
2. Configure Switch B
# Enable IPv6.
<SwitchB> system-view
[SwitchB] ipv6
# Configure a global unicast address for VLAN-interface 2.
[SwitchB] interface vlan-interface 2
[SwitchB-Vlan-interface2] ipv6 address 3001::2/64
[SwitchB-Vlan-interface2] quit
# Configure an IPv6 static route with destination IP address 2001::/64 and next hop address 3001::1.
[SwitchB] ipv6 route-static 2001:: 64 3001::1
3. Configure the host
# Enable IPv6 for Host to automatically obtain an IPv6 address through IPv6 ND.
# Display the neighbor information of GigabitEthernet 1/0/2 on Switch A.
[SwitchA] display ipv6 neighbors interface GigabitEthernet 1/0/2
Type: S-Static D-Dynamic
IPv6 Address Link-layer VID Interface State T Age
FE80::215:E9FF:FEA6:7D14 0015-e9a6-7d14 1 GE1/0/2 STALE D 1238
2001::15B:E0EA:3524:E791 0015-e9a6-7d14 1 GE1/0/2 STALE D 1248
The output shows that the IPv6 global unicast address that Host obtained is 2001::15B:E0EA:3524:E791.
Verification
# Display the IPv6 interface settings on Switch A. All the IPv6 global unicast addresses configured on the interface are displayed.
[SwitchA] display ipv6 interface vlan-interface 2 verbose
Vlan-interface2 current state :UP
Line protocol current state :UP
IPv6 is enabled, link-local address is FE80::20F:E2FF:FE00:2
Global unicast address(es):
3001::1, subnet is 3001::/64
Joined group address(es):
FF02::1:FF00:0
FF02::1:FF00:1
FF02::1:FF00:2
FF02::2
FF02::1
MTU is 1500 bytes
ND DAD is enabled, number of DAD attempts: 1
ND reachable time is 30000 milliseconds
ND retransmit interval is 1000 milliseconds
Hosts use stateless autoconfig for addresses
IPv6 Packet statistics:
InReceives: 25829
InTooShorts: 0
InTruncatedPkts: 0
InHopLimitExceeds: 0
InBadHeaders: 0
InBadOptions: 0
ReasmReqds: 0
ReasmOKs: 0
InFragDrops: 0
InFragTimeouts: 0
OutFragFails: 0
InUnknownProtos: 0
InDelivers: 47
OutRequests: 89
OutForwDatagrams: 48
InNoRoutes: 0
InTooBigErrors: 0
OutFragOKs: 0
OutFragCreates: 0
InMcastPkts: 6
InMcastNotMembers: 25747
OutMcastPkts: 48
InAddrErrors: 0
InDiscards: 0
OutDiscards: 0
[SwitchA] display ipv6 interface vlan-interface 1 verbose
Vlan-interface1 current state :UP
Line protocol current state :UP
IPv6 is enabled, link-local address is FE80::20F:E2FF:FE00:1C0
Global unicast address(es):
2001::1, subnet is 2001::/64
Joined group address(es):
FF02::1:FF00:0
FF02::1:FF00:1
FF02::1:FF00:1C0
FF02::2
FF02::1
MTU is 1500 bytes
ND DAD is enabled, number of DAD attempts: 1
ND reachable time is 30000 milliseconds
ND retransmit interval is 1000 milliseconds
ND advertised reachable time is 0 milliseconds
ND advertised retransmit interval is 0 milliseconds
ND router advertisements are sent every 600 seconds
ND router advertisements live for 1800 seconds
Hosts use stateless autoconfig for addresses
IPv6 Packet statistics:
InReceives: 272
InTooShorts: 0
InTruncatedPkts: 0
InHopLimitExceeds: 0
InBadHeaders: 0
InBadOptions: 0
ReasmReqds: 0
ReasmOKs: 0
InFragDrops: 0
InFragTimeouts: 0
OutFragFails: 0
InUnknownProtos: 0
InDelivers: 159
OutRequests: 1012
OutForwDatagrams: 35
InNoRoutes: 0
InTooBigErrors: 0
OutFragOKs: 0
OutFragCreates: 0
InMcastPkts: 79
InMcastNotMembers: 65
OutMcastPkts: 938
InAddrErrors: 0
InDiscards: 0
OutDiscards: 0
# Display the IPv6 interface settings on Switch B. All the IPv6 global unicast addresses configured on the interface are displayed.
[SwitchB] display ipv6 interface vlan-interface 2 verbose
Vlan-interface2 current state :UP
Line protocol current state :UP
IPv6 is enabled, link-local address is FE80::20F:E2FF:FE00:1234
Global unicast address(es):
3001::2, subnet is 3001::/64
Joined group address(es):
FF02::1:FF00:0
FF02::1:FF00:2
FF02::1:FF00:1234
FF02::2
FF02::1
MTU is 1500 bytes
ND DAD is enabled, number of DAD attempts: 1
ND reachable time is 30000 milliseconds
ND retransmit interval is 1000 milliseconds
Hosts use stateless autoconfig for addresses
IPv6 Packet statistics:
InReceives: 117
InTooShorts: 0
InTruncatedPkts: 0
InHopLimitExceeds: 0
InBadHeaders: 0
InBadOptions: 0
ReasmReqds: 0
ReasmOKs: 0
InFragDrops: 0
InFragTimeouts: 0
OutFragFails: 0
InUnknownProtos: 0
InDelivers: 117
OutRequests: 83
OutForwDatagrams: 0
InNoRoutes: 0
InTooBigErrors: 0
OutFragOKs: 0
OutFragCreates: 0
InMcastPkts: 28
InMcastNotMembers: 0
OutMcastPkts: 7
InAddrErrors: 0
InDiscards: 0
OutDiscards: 0
# Ping Switch A and Switch B on the host, and ping Switch A and the host on Switch B to verify that they are connected.
|
CAUTION: When you ping a link-local address, you should use the -i parameter to specify an interface for the link-local address. |
[SwitchB] ping ipv6 -c 1 3001::1
PING 3001::1 : 56 data bytes, press CTRL_C to break
Reply from 3001::1
bytes=56 Sequence=1 hop limit=64 time = 2 ms
--- 3001::1 ping statistics ---
1 packet(s) transmitted
1 packet(s) received
0.00% packet loss
round-trip min/avg/max = 2/2/2 ms
[SwitchB-Vlan-interface2] ping ipv6 -c 1 2001::15B:E0EA:3524:E791
PING 2001::15B:E0EA:3524:E791 : 56 data bytes, press CTRL_C to break
Reply from 2001::15B:E0EA:3524:E791
bytes=56 Sequence=1 hop limit=63 time = 3 ms
--- 2001::15B:E0EA:3524:E791 ping statistics ---
1 packet(s) transmitted
1 packet(s) received
0.00% packet loss
round-trip min/avg/max = 3/3/3 ms
The output shows that Switch B can ping Switch A and the host.
Troubleshooting IPv6 basics configuration
Symptom
The peer IPv6 address cannot be pinged.
Solution
· Use the display current-configuration command in any view or the display this command in system view to verify that IPv6 is enabled.
· Use the display ipv6 interface command in any view to verify that the IPv6 address of the interface is correct and the interface is up.
· Use the debugging ipv6 packet command in user view to enable the debugging for IPv6 packets to help locate the cause.