IPv6 Overview
529
Where, FF02:0:0:0:0:1:FF is permanent and consists of 104 bits, and XX:XXXX is
the last 24 bits of an IPv6 address.
Interface identifier in IEEE EUI-64 format
Interface identifiers in IPv6 unicast addresses are used to identify interfaces on a
link and they are required to be unique on that link. Interface identifiers in IPv6
unicast addresses are currently required to be 64 bits long. An interface identifier is
derived from the link-layer address of that interface. Interface identifiers in IPv6
addresses are 64 bits long, while MAC addresses are 48 bits long. Therefore, the
hexadecimal number FFFE needs to be inserted in the middle of MAC addresses
(behind the 24 high-order bits).To ensure the interface identifier obtained from a
MAC address is unique, it is necessary to set the universal/local (U/L) bit (the
seventh high-order bit) to "1". Thus, an interface identifier in EUI-64 format is
obtained.
Figure 190
Convert a MAC address into an EUI-64 address
Introduction to IPv6
Neighbor Discovery
Protocol
The IPv6 neighbor discovery protocol (NDP) uses five types of ICMPv6 messages to
implement the following functions:
■
Address resolution
■
Neighbor unreachability detection
■
Duplicate address detection
■
Router/prefix discovery
■
Address autoconfiguration
■
Redirection
Table 385 lists the types and functions of ICMPv6 messages used by the NDP.
00000000 00010010 00110100 00000000 10101011 11001101
00000000 00010010 00110100 11111111 11111110 00000000 10101011 11001101
0012-3400-ABCD
00000010 00010010 00110100 11111111 11111110 00000000 10101011 11001101
0212:34FF:FE00:ABCD
MAC address:
Represented in binary:
Insert FFFE
Set U/L bit:
EUI-64 address:
Table 385
Types and functions of ICMPv6 messages
ICMPv6 message
Function
Neighbor solicitation (NS)
message
Used to acquire the link-layer address of a neighbor
Used to verify whether the neighbor is reachable
Used to perform a duplicate address detection
Содержание Switch 4210 9-Port
Страница 10: ...Password Control Configuration 556 Displaying Password Control 563 Password Control Configuration Example 564 ...
Страница 22: ...20 CHAPTER 1 CLI CONFIGURATION ...
Страница 74: ...72 CHAPTER 3 CONFIGURATION FILE MANAGEMENT ...
Страница 84: ...82 CHAPTER 5 VLAN CONFIGURATION ...
Страница 96: ...94 CHAPTER 8 IP PERFORMANCE CONFIGURATION ...
Страница 108: ...106 CHAPTER 9 PORT BASIC CONFIGURATION ...
Страница 122: ...120 CHAPTER 11 PORT ISOLATION CONFIGURATION ...
Страница 140: ...138 CHAPTER 13 MAC ADDRESS TABLE MANAGEMENT ...
Страница 234: ...232 CHAPTER 17 802 1X CONFIGURATION ...
Страница 246: ...244 CHAPTER 20 AAA OVERVIEW ...
Страница 270: ...268 CHAPTER 21 AAA CONFIGURATION ...
Страница 292: ...290 CHAPTER 26 DHCP BOOTP CLIENT CONFIGURATION ...
Страница 318: ...316 CHAPTER 29 MIRRORING CONFIGURATION ...
Страница 340: ...338 CHAPTER 30 CLUSTER ...
Страница 362: ...360 CHAPTER 33 SNMP CONFIGURATION ...
Страница 368: ...366 CHAPTER 34 RMON CONFIGURATION ...
Страница 450: ...448 CHAPTER 39 TFTP CONFIGURATION ...
Страница 451: ......
Страница 452: ...450 CHAPTER 39 TFTP CONFIGURATION ...
Страница 470: ...468 CHAPTER 40 INFORMATION CENTER ...
Страница 496: ...494 CHAPTER 44 DEVICE MANAGEMENT ...