Project Home
Project Home
Wiki
Wiki
Discussion Forums
Discussions
Project Information
Project Info
Forum Topic - How to disable neighbor discovery: (4 Items)
   
How to disable neighbor discovery  
I am using QNX Neutrino 6.6.0 on the Freescale i.mx6.I want to establish an ipv6 communication(ping6).As soon as i start
 ping6(ping6 -I tap0 destination address) command i see neighbor discovery happening,I want to skip neighbor discovery, 
since i have the layer2(mac)address of destination. Anyone please suggest an idea to disable neighbor discovery in qnx 
and send icmpv6 echo request using destination layer2(mac)address?
Re: How to disable neighbor discovery  
Use "ndp -s ..." to set the ndp entry first.
Re: How to disable neighbor discovery  
Thank you for your reply.
I am trying to use ndp -s hostname ether_addr
but it is giving error as below,
ndp -s someaddr%tap0 macaddr
ndp: someaddr%tap0: No address associated with hostname
V2X# ndp -s some addr mac addr     
ndp: writing to routing socket: No such process
Re: How to disable neighbor discovery  
# ifconfig vt0
vt0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500
	capabilities rx=1f<IP4CSUM,TCP4CSUM,UDP4CSUM,TCP6CSUM,UDP6CSUM>
	capabilities tx=7e<TCP4CSUM,UDP4CSUM,TCP6CSUM,UDP6CSUM,TSO4,TSO6>
	enabled rx=1f<IP4CSUM,TCP4CSUM,UDP4CSUM,TCP6CSUM,UDP6CSUM>
	enabled tx=0
	address: 52:54:00:20:64:23
	media: Ethernet autoselect
	status: active
	inet 192.168.122.102 netmask 0xffffff00 broadcast 192.168.122.255
	inet6 fe80::5054:ff:fe20:6423%vt0 prefixlen 64 scopeid 0x11
	inet6 2001::1 prefixlen 64
# ndp -na
Neighbor                             Linklayer Address  Netif Expire    S Flags
2001::1                              52:54:00:20:64:23    vt0 permanent R 
fe80::1%lo0                          (incomplete)         lo0 permanent R 
fe80::5054:ff:fe20:6423%vt0          52:54:00:20:64:23    vt0 permanent R 
# ndp -sn 2001::2 00:01:02:03:04:05
# ndp -na
Neighbor                             Linklayer Address  Netif Expire    S Flags
2001::1                              52:54:00:20:64:23    vt0 permanent R 
2001::2                              00:01:02:03:04:05    vt0 permanent R 
fe80::1%lo0                          (incomplete)         lo0 permanent R 
fe80::5054:ff:fe20:6423%vt0          52:54:00:20:64:23    vt0 permanent R 
# tcpdump -enlpi vt0 &
[1] 344075
# tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on vt0, link-type EN10MB (Ethernet), capture size 262144 bytes
ping6 -nc3 2001::2
PING6(56=40+8+8 bytes) 2001::1 --> 2001::2
09:59:10.090490 52:54:00:20:64:23 > 00:01:02:03:04:05, ethertype IPv6 (0x86dd), length 70: 2001::1 > 2001::2: ICMP6, 
echo request, seq 0, length 16
09:59:11.090614 52:54:00:20:64:23 > 00:01:02:03:04:05, ethertype IPv6 (0x86dd), length 70: 2001::1 > 2001::2: ICMP6, 
echo request, seq 1, length 16
09:59:12.091746 52:54:00:20:64:23 > 00:01:02:03:04:05, ethertype IPv6 (0x86dd), length 70: 2001::1 > 2001::2: ICMP6, 
echo request, seq 2, length 16

--- 2001::2 ping6 statistics ---
3 packets transmitted, 0 packets received, 100.0% packet loss

# fg
tcpdump -enlpi vt0 

3 packets captured
3 packets received by filter
0 packets dropped by kernel
#