Hi,

when doing slaacctl send solicitation vio0, tcpdump says:

mx-00# tcpdump -ni vio0 icmp6 tcpdump: listening on vio0, link-type EN10MB

16:06:54.725229 fe80::2de:361a:24aa:d7a6 > ff02::2: icmp6: router
solicitation

16:06:55.803125 fe80::22d8:b00:86fa:424c > ff02::1:ff96:189a: icmp6:
neighbor sol: who has 2a03:4000:21:18a:84e:27ff:fe96:189a [class 0xc0]

16:06:55.807067 fe80::b438:86ff:fe34:b14d > ff02::1:ff00:0: icmp6:
neighbor sol: who has ::

16:06:57.152589 fe80::22d8:b00:86ee:ff4 > ff02::1:ff96:189a: icmp6:
neighbor sol: who has 2a03:4000:21:18a:84e:27ff:fe96:189a [class 0xc0]

16:06:58.815291 fe80::22d8:b00:86fa:424c > ff02::1:ff00:0: icmp6:
neighbor sol: who has 2a03:4000:21:6db:: [class 0xc0]

16:06:59.815941 fe80::22d8:b00:86fa:424c > ff02::1:ff00:0: icmp6:
neighbor sol: who has 2a03:4000:21:6db:: [class 0xc0]

16:07:00.822213 fe80::22d8:b00:86fa:424c > ff02::1:ff00:0: icmp6:
neighbor sol: who has 2a03:4000:21:6db:: [class 0xc0]

16:07:00.823550 fe80::7452:47ff:fe16:9b9 > ff02::1:ff00:0: icmp6:
neighbor sol: who has ::

16:07:00.825485 fe80::22d8:b00:86fa:424c > ff02::1:ff96:189a: icmp6:
neighbor sol: who has 2a03:4000:21:18a:84e:27ff:fe96:189a [class 0xc0]
16:07:02.150665 fe80::22d8:b00:86ee:ff4 > ff02::1:ff96:189a: icmp6:
neighbor sol: who has 2a03:4000:21:18a:84e:27ff:fe96:189a [class 0xc0]
^C 2558 packets received by filter


Any clearance ?


Regards,

Stephan

On 8/23/19 1:13 PM, Bastien Durel wrote:
> Le jeudi 22 août 2019 à 20:11 +0200, list a écrit :
>> Hi,
>>
>> I might be missing something right here....
>>
>> I have the output of "route show" attached, because I cannot paste it
>> in
>> here in a formatted form.
>>
>>
>> This is super annoying.
>>
>> Just wanna get the damn thing running.
>>
> ff02::2 is a multicast address, it's not intended to be used as a route
> gateway.
> It's only a way to discover routers.
>
> for example:
>
> fremen# ping6  ff02::2%em1
> PING ff02::2%em1 (ff02::2%em1): 56 data bytes
> 64 bytes from fe80::6366:1356:e19:f361%em1: icmp_seq=0 hlim=64 time=0.114 ms
> 64 bytes from fe80::225:22ff:fe1e:bb7%em1: icmp_seq=0 hlim=64 time=0.320 ms 
> (DUP!)
> 64 bytes from fe80::6366:1356:e19:f361%em1: icmp_seq=1 hlim=64 time=0.082 ms
> 64 bytes from fe80::225:22ff:fe1e:bb7%em1: icmp_seq=1 hlim=64 time=0.293 ms 
> (DUP!)
>
> Here fe80::6366:1356:e19:f361 is the LL address of em1, so
> fe80::225:22ff:fe1e:bb7%em1 is the router on the other side of link.
>

Reply via email to