xref: /freebsd/usr.sbin/ndp/ndp.8 (revision ea906c4152774dff300bb26fbfc1e4188351c89a)
1.\"	$KAME: ndp.8,v 1.28 2002/07/17 08:46:33 itojun Exp $
2.\"
3.\" Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
4.\" All rights reserved.
5.\"
6.\" Redistribution and use in source and binary forms, with or without
7.\" modification, are permitted provided that the following conditions
8.\" are met:
9.\" 1. Redistributions of source code must retain the above copyright
10.\"    notice, this list of conditions and the following disclaimer.
11.\" 2. Redistributions in binary form must reproduce the above copyright
12.\"    notice, this list of conditions and the following disclaimer in the
13.\"    documentation and/or other materials provided with the distribution.
14.\" 3. Neither the name of the project nor the names of its contributors
15.\"    may be used to endorse or promote products derived from this software
16.\"    without specific prior written permission.
17.\"
18.\" THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
19.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21.\" ARE DISCLAIMED.  IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
22.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
23.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
24.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
25.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
26.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
27.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
28.\" SUCH DAMAGE.
29.\"
30.\" $FreeBSD$
31.\"
32.Dd May 17, 1998
33.Dt NDP 8
34.Os
35.\"
36.Sh NAME
37.Nm ndp
38.Nd control/diagnose IPv6 neighbor discovery protocol
39.\"
40.Sh SYNOPSIS
41.Nm
42.Op Fl nt
43.Ar hostname
44.Nm
45.Op Fl nt
46.Fl a | c | p
47.Nm
48.Op Fl nt
49.Fl r
50.Nm
51.Op Fl nt
52.Fl H | P | R
53.Nm
54.Op Fl nt
55.Fl A Ar wait
56.Nm
57.Op Fl nt
58.Fl d Ar hostname
59.Nm
60.Op Fl nt
61.Fl f Ar filename
62.Nm
63.Op Fl nt
64.Fl i
65.Ar interface
66.Op Ar expressions ...
67.Nm
68.Op Fl nt
69.Fl I Op Ar interface | Li delete
70.Nm
71.Op Fl nt
72.Fl s Ar nodename etheraddr
73.Op Li temp
74.Op Li proxy
75.\"
76.Sh DESCRIPTION
77The
78.Nm
79utility manipulates the address mapping table
80used by the Neighbor Discovery Protocol (NDP).
81.Bl -tag -width indent
82.It Fl a
83Dump the currently existing NDP entries.
84The following information will be printed:
85.Bl -tag -width "Neighbor"
86.It Neighbor
87IPv6 address of the neighbor.
88.It Linklayer Address
89Linklayer address of the neighbor.
90It could be
91.Dq Li (incomplete)
92when the address is not available.
93.It Netif
94Network interface associated with the neighbor cache entry.
95.It Expire
96The time until expiry of the entry.
97The entry could become
98.Dq Li permanent ,
99in which case it will never expire.
100.It S
101State of the neighbor cache entry, as a single letter:
102.Pp
103.Bl -tag -width indent -compact
104.It N
105Nostate
106.It W
107Waitdelete
108.It I
109Incomplete
110.It R
111Reachable
112.It S
113Stale
114.It D
115Delay
116.It P
117Probe
118.It ?\&
119Unknown state (should never happen).
120.El
121.It Flags
122Flags on the neighbor cache entry, in a single letter.
123They are: Router, proxy neighbor advertisement
124.Pq Dq p .
125The field could be followed by a decimal number,
126which means the number of NS probes the node has sent during the current state.
127.El
128.It Fl A Ar wait
129Repeat
130.Fl a
131(dump NDP entries)
132every
133.Ar wait
134seconds.
135.It Fl c
136Erase all the NDP entries.
137.It Fl d
138Delete specified NDP entry.
139.It Fl f
140Parse the file specified by
141.Ar filename .
142.It Fl H
143Harmonize consistency between the routing table and the default router
144list; install the top entry of the list into the kernel routing table.
145.It Fl I
146Shows the default interface used as the default route when
147there is no default router.
148.It Fl I Ar interface
149Specifies the default interface used as the default route when
150there is no default router.
151The
152.Ar interface
153will be used as the default.
154.It Fl I Li delete
155The current default interface will be deleted from the kernel.
156.It Fl i Ar interface Op Ar expressions ...
157View ND information for the specified interface.
158If additional arguments
159.Ar expressions
160are given,
161.Nm
162sets or clears the flags or variables for the interface as specified in
163the expression.
164Each expression should be separated by white spaces or tab characters.
165Possible expressions are as follows.
166Some of the expressions can begin with the
167special character
168.Ql - ,
169which means the flag specified in the expression should be cleared.
170Note that you need
171.Fl -
172before
173.Fl foo
174in this case.
175.\"
176.Bl -tag -width indent
177.It Ic nud
178Turn on or off NUD (Neighbor Unreachability Detection) on the
179interface.
180NUD is usually turned on by default.
181.It Ic accept_rtadv
182Specify whether or not to accept Router Advertisement messages
183received on the
184.Ar interface .
185Note that the kernel does not accept Router Advertisement messages
186unless the
187.Li net.inet6.ip6.accept_rtadv
188variable is non-0, even if the flag is on.
189This flag is set to 1 by default.
190.It Ic prefer_source
191Prefer addresses on the
192.Ar interface
193as candidates of the source address for outgoing packets.
194The default value of this flag is off.
195For more details about the entire algorithm of source address
196selection, see the
197.Pa IMPLEMENTATION
198file supplied with the KAME kit.
199.It Ic disabled
200Disable IPv6 operation on the interface.
201When disabled, the interface discards any IPv6 packets
202received on or being sent to the interface.
203In the sending case, an error of ENETDOWN will be returned to the
204application.
205This flag is typically set automatically in the kernel as a result of
206a certain failure of Duplicate Address Detection.
207While the flag can be set or cleared by hand with the
208.Nm
209command, it is not generally advisable to modify this flag manually.
210.It Ic basereachable Ns Li = Ns Pq Ar number
211Specify the BaseReachbleTimer on the interface in millisecond.
212.It Ic retrans Ns Li = Ns Pq Ar number
213Specify the RetransTimer on the interface in millisecond.
214.It Ic curhlim Ns Li = Ns Pq Ar number
215Specify the Cur Hop Limit on the interface.
216.El
217.It Fl n
218Do not try to resolve numeric addresses to hostnames.
219.It Fl p
220Show prefix list.
221.It Fl P
222Flush all the entries in the prefix list.
223.It Fl r
224Show default router list.
225.It Fl R
226Flush all the entries in the default router list.
227.It Fl s
228Register an NDP entry for a node.
229The entry will be permanent unless the word
230.Li temp
231is given in the command.
232If the word
233.Li proxy
234is given, this system will act as a proxy NDP server,
235responding to requests for
236.Ar hostname
237even though the host address is not its own.
238.It Fl t
239Print timestamp on each entry,
240making it possible to merge output with
241.Xr tcpdump 1 .
242Most useful when used with
243.Fl A .
244.El
245.\"
246.Sh EXIT STATUS
247.Ex -std
248.\"
249.Sh SEE ALSO
250.Xr arp 8
251.\"
252.Sh HISTORY
253The
254.Nm
255utility first appeared in the WIDE Hydrangea IPv6 protocol stack kit.
256.\"
257.\" .Sh BUGS
258.\" (to be written)
259