1.\" $FreeBSD$ 2.\" $KAME: ndp.8,v 1.28 2002/07/17 08:46:33 itojun Exp $ 3.\" 4.\" Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. 5.\" All rights reserved. 6.\" 7.\" Redistribution and use in source and binary forms, with or without 8.\" modification, are permitted provided that the following conditions 9.\" are met: 10.\" 1. Redistributions of source code must retain the above copyright 11.\" notice, this list of conditions and the following disclaimer. 12.\" 2. Redistributions in binary form must reproduce the above copyright 13.\" notice, this list of conditions and the following disclaimer in the 14.\" documentation and/or other materials provided with the distribution. 15.\" 3. Neither the name of the project nor the names of its contributors 16.\" may be used to endorse or promote products derived from this software 17.\" without specific prior written permission. 18.\" 19.\" THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND 20.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 21.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 22.\" ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE 23.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 24.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 25.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 26.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 27.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 28.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 29.\" SUCH DAMAGE. 30.\" 31.Dd May 17, 1998 32.Dt NDP 8 33.Os 34.\" 35.Sh NAME 36.Nm ndp 37.Nd control/diagnose IPv6 neighbor discovery protocol 38.\" 39.Sh SYNOPSIS 40.Nm ndp 41.Op Fl nt 42.Ar hostname 43.Nm ndp 44.Op Fl nt 45.Fl a | Fl c | Fl p 46.Nm ndp 47.Op Fl nt 48.Fl r 49.Nm ndp 50.Op Fl nt 51.Fl H | Fl P | Fl R 52.Nm ndp 53.Op Fl nt 54.Fl A Ar wait 55.Nm ndp 56.Op Fl nt 57.Fl d Ar hostname 58.Nm ndp 59.Op Fl nt 60.Fl f Ar filename 61.Nm ndp 62.Op Fl nt 63.Fl i 64.Ar interface 65.Op Ar flags ... 66.Nm ndp 67.Op Fl nt 68.Fl I Op Ar interface | Li delete 69.Nm ndp 70.Op Fl nt 71.Fl s Ar nodename etheraddr 72.Op Li temp 73.Op Li proxy 74.\" 75.Sh DESCRIPTION 76The 77.Nm 78command manipulates the address mapping table 79used by the Neighbor Discovery Protocol (NDP). 80.Bl -tag -width Ds 81.It Fl a 82Dump the currently existing NDP entries. 83The following information will be printed: 84.Bl -tag -width NeighborXX 85.It Neighbor 86IPv6 address of the neighbor. 87.It Linklayer Address 88Linklayer address of the neighbor. 89It could be 90.Dq Li (incomplete) 91when the address is not available. 92.It Netif 93Network interface associated with the neighbor cache entry. 94.It Expire 95The time until expiry of the entry. 96The entry could become 97.Dq Li permanent , 98in which case it will never expire. 99.It S 100State of the neighbor cache entry, as a single letter: 101.Pp 102.Bl -tag -width indent -compact 103.It N 104Nostate 105.It W 106Waitdelete 107.It I 108Incomplete 109.It R 110Reachable 111.It S 112Stale 113.It D 114Delay 115.It P 116Probe 117.It ? 118Unknown state (should never happen). 119.El 120.It Flags 121Flags on the neighbor cache entry, in a single letter. 122They are: Router, proxy neighbor advertisement 123.Pq Dq p . 124The field could be followed by a decimal number, 125which means the number of NS probes the node has sent during the current state. 126.El 127.It Fl A Ar wait 128Repeat 129.Fl a 130.Pq dump NDP entries 131every 132.Ar wait 133seconds. 134.It Fl c 135Erase all the NDP entries. 136.It Fl d 137Delete specified NDP entry. 138.It Fl f 139Parse the file specified by 140.Ar filename . 141.It Fl H 142Harmonize consistency between the routing table and the default router 143list; install the top entry of the list into the kernel routing table. 144.It Fl I 145Shows the default interface used as the default route when 146there is no default router. 147.It Fl I Ar interface 148Specifies the default interface used as the default route when 149there is no default router. 150The 151.Ar interface 152will be used as the default. 153.It Fl I Li delete 154The current default interface will be deleted from the kernel. 155.It Fl i Ar interface Op Ar flags ... 156View ND information for the specified interface. 157If additional arguments 158.Ar flags 159are given, 160.Nm 161sets or clears the specified flags for the interface. 162Each flag should be separated by white spaces or tab characters. 163Possible flags are as follows. 164All of the flags can begin with the 165special character 166.Ql - , 167which means the flag should be cleared. 168Note that you need 169.Fl - 170before 171.Fl foo 172in this case. 173.\" 174.Pp 175.Bl -tag -width Ds -compact 176.It Xo 177.Ic nud 178.Xc 179Turn on or off NUD (Neighbor Unreachability Detection) on the 180interface. 181NUD is usually turned on by default. 182.It Xo 183.Ic accept_rtadv 184.Xc 185Specify whether or not to accept Router Advertisement messages 186received on the 187.Ar interface . 188Note that the kernel does not accept Router Advertisement messages 189unless the 190.Li net.inet6.ip6.accept_rtadv 191variable is non-0, even if the flag is on. 192This flag is set to 1 by default. 193.It Xo 194.Ic prefer_source 195.Xc 196Prefer addresses on the 197.Ar interface 198as candidates of the source address for outgoing packets. 199The default value of this flag is off. 200For more details about the entire algorithm of source address 201selection, see the 202.Pa IMPLEMENTATION 203file supplied with the KAME kit. 204.El 205.It Fl n 206Do not try to resolve numeric addresses to hostnames. 207.It Fl p 208Show prefix list. 209.It Fl P 210Flush all the entries in the prefix list. 211.It Fl r 212Show default router list. 213.It Fl R 214Flush all the entries in the default router list. 215.It Fl s 216Register a NDP entry for a node. 217The entry will be permanent unless the word 218.Li temp 219is given in the command. 220If the word 221.Li proxy 222is given, this system will act as an proxy NDP server, 223responding to requests for 224.Ar hostname 225even though the host address is not its own. 226.It Fl t 227Print timestamp on each entry, 228making it possible to merge output with 229.Xr tcpdump 8 . 230Most useful when used with 231.Fl A . 232.El 233.\" 234.Sh RETURN VALUES 235The 236.Nm 237command will exit with 0 on success, and non-zero on errors. 238.\" 239.Sh SEE ALSO 240.Xr arp 8 241.\" 242.Sh HISTORY 243The 244.Nm 245command first appeared in the WIDE Hydrangea IPv6 protocol stack kit. 246.\" 247.\" .Sh BUGS 248.\" (to be written) 249