1.\" $KAME: ndp.8,v 1.28 2002/07/17 08:46:33 itojun Exp $ 2.\" 3.\" Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. 4.\" All rights reserved. 5.\" 6.\" Redistribution and use in source and binary forms, with or without 7.\" modification, are permitted provided that the following conditions 8.\" are met: 9.\" 1. Redistributions of source code must retain the above copyright 10.\" notice, this list of conditions and the following disclaimer. 11.\" 2. Redistributions in binary form must reproduce the above copyright 12.\" notice, this list of conditions and the following disclaimer in the 13.\" documentation and/or other materials provided with the distribution. 14.\" 3. Neither the name of the project nor the names of its contributors 15.\" may be used to endorse or promote products derived from this software 16.\" without specific prior written permission. 17.\" 18.\" THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND 19.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 20.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 21.\" ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE 22.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 23.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 24.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 25.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 26.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 27.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 28.\" SUCH DAMAGE. 29.\" 30.\" $FreeBSD$ 31.\" 32.Dd May 17, 1998 33.Dt NDP 8 34.Os 35.\" 36.Sh NAME 37.Nm ndp 38.Nd control/diagnose IPv6 neighbor discovery protocol 39.\" 40.Sh SYNOPSIS 41.Nm 42.Op Fl nt 43.Ar hostname 44.Nm 45.Op Fl nt 46.Fl a | c | p 47.Nm 48.Op Fl nt 49.Fl r 50.Nm 51.Op Fl nt 52.Fl H | P | R 53.Nm 54.Op Fl nt 55.Fl A Ar wait 56.Nm 57.Op Fl nt 58.Fl d Ar hostname 59.Nm 60.Op Fl nt 61.Fl f Ar filename 62.Nm 63.Op Fl nt 64.Fl i 65.Ar interface 66.Op Ar expressions ... 67.Nm 68.Op Fl nt 69.Fl I Op Ar interface | Li delete 70.Nm 71.Op Fl nt 72.Fl s Ar nodename etheraddr 73.Op Li temp 74.Op Li proxy 75.\" 76.Sh DESCRIPTION 77The 78.Nm 79utility manipulates the address mapping table 80used by the Neighbor Discovery Protocol (NDP). 81.Bl -tag -width indent 82.It Fl a 83Dump the currently existing NDP entries. 84The following information will be printed: 85.Bl -tag -width "Neighbor" 86.It Neighbor 87IPv6 address of the neighbor. 88.It Linklayer Address 89Linklayer address of the neighbor. 90It could be 91.Dq Li (incomplete) 92when the address is not available. 93.It Netif 94Network interface associated with the neighbor cache entry. 95.It Expire 96The time until expiry of the entry. 97The entry could become 98.Dq Li permanent , 99in which case it will never expire. 100.It S 101State of the neighbor cache entry, as a single letter: 102.Pp 103.Bl -tag -width indent -compact 104.It N 105Nostate 106.It W 107Waitdelete 108.It I 109Incomplete 110.It R 111Reachable 112.It S 113Stale 114.It D 115Delay 116.It P 117Probe 118.It ?\& 119Unknown state (should never happen). 120.El 121.It Flags 122Flags on the neighbor cache entry, in a single letter. 123They are: Router, proxy neighbor advertisement 124.Pq Dq p . 125The field could be followed by a decimal number, 126which means the number of NS probes the node has sent during the current state. 127.El 128.It Fl A Ar wait 129Repeat 130.Fl a 131(dump NDP entries) 132every 133.Ar wait 134seconds. 135.It Fl c 136Erase all the NDP entries. 137.It Fl d 138Delete specified NDP entry. 139.It Fl f 140Parse the file specified by 141.Ar filename . 142.It Fl H 143Harmonize consistency between the routing table and the default router 144list; install the top entry of the list into the kernel routing table. 145.It Fl I 146Shows the default interface used as the default route when 147there is no default router. 148.It Fl I Ar interface 149Specifies the default interface used as the default route when 150there is no default router. 151The 152.Ar interface 153will be used as the default. 154.It Fl I Li delete 155The current default interface will be deleted from the kernel. 156.It Fl i Ar interface Op Ar expressions ... 157View ND information for the specified interface. 158If additional arguments 159.Ar expressions 160are given, 161.Nm 162sets or clears the flags or variables for the interface as specified in 163the expression. 164Each expression should be separated by white spaces or tab characters. 165Possible expressions are as follows. 166Some of the expressions can begin with the 167special character 168.Ql - , 169which means the flag specified in the expression should be cleared. 170Note that you need 171.Fl - 172before 173.Fl foo 174in this case. 175.\" 176.Bl -tag -width indent 177.It Ic nud 178Turn on or off NUD (Neighbor Unreachability Detection) on the 179interface. 180NUD is usually turned on by default. 181.It Ic accept_rtadv 182Specify whether or not to accept Router Advertisement messages 183received on the 184.Ar interface . 185Note that the kernel does not accept Router Advertisement messages 186unless the 187.Li net.inet6.ip6.accept_rtadv 188variable is non-0, even if the flag is on. 189This flag is set to 1 by default. 190.It Ic prefer_source 191Prefer addresses on the 192.Ar interface 193as candidates of the source address for outgoing packets. 194The default value of this flag is off. 195For more details about the entire algorithm of source address 196selection, see the 197.Pa IMPLEMENTATION 198file supplied with the KAME kit. 199.It Ic disabled 200Disable IPv6 operation on the interface. 201When disabled, the interface discards any IPv6 packets 202received on or being sent to the interface. 203In the sending case, an error of ENETDOWN will be returned to the 204application. 205This flag is typically set automatically in the kernel as a result of 206a certain failure of Duplicate Address Detection. 207While the flag can be set or cleared by hand with the 208.Nm 209command, it is not generally advisable to modify this flag manually. 210.It Ic basereachable Ns Li = Ns Pq Ar number 211Specify the BaseReachbleTimer on the interface in millisecond. 212.It Ic retrans Ns Li = Ns Pq Ar number 213Specify the RetransTimer on the interface in millisecond. 214.It Ic curhlim Ns Li = Ns Pq Ar number 215Specify the Cur Hop Limit on the interface. 216.El 217.It Fl n 218Do not try to resolve numeric addresses to hostnames. 219.It Fl p 220Show prefix list. 221.It Fl P 222Flush all the entries in the prefix list. 223.It Fl r 224Show default router list. 225.It Fl R 226Flush all the entries in the default router list. 227.It Fl s 228Register an NDP entry for a node. 229The entry will be permanent unless the word 230.Li temp 231is given in the command. 232If the word 233.Li proxy 234is given, this system will act as a proxy NDP server, 235responding to requests for 236.Ar hostname 237even though the host address is not its own. 238.It Fl t 239Print timestamp on each entry, 240making it possible to merge output with 241.Xr tcpdump 1 . 242Most useful when used with 243.Fl A . 244.El 245.\" 246.Sh EXIT STATUS 247.Ex -std 248.\" 249.Sh SEE ALSO 250.Xr arp 8 251.\" 252.Sh HISTORY 253The 254.Nm 255utility first appeared in the WIDE Hydrangea IPv6 protocol stack kit. 256.\" 257.\" .Sh BUGS 258.\" (to be written) 259