08-25-2022 01:14 AM
hi together,
how does one completely disable all ipv6 functionality of a switch? we do not use ipv6, we do not want to use ipv6 at the moment. the switches flood the network with neighbor solicitation messages for 10% of the total traffic. i really need to suppress this.
thanks in advance
08-25-2022 01:25 AM
Depends on code running on each device - here is global command :
use the no ipv6 unicast-routing
check the below guide :
08-25-2022 01:38 AM
thank you for your reply. ipv6 unicast routing is already disabled on all devices, but still they insist on using ns
08-25-2022 02:37 AM
then i would check what SDM configured dual stack ?
show run | in ipv6 give you any configuration done per interface level ? or any routing process ?
08-25-2022 04:47 AM
there is nothing configured, and the only sdm templates i can choose are access and nat. system runs on access
08-25-2022 04:58 AM
but still they insist on using ns
if nothing found, then what you seeing, can you show us also ?
08-25-2022 05:03 AM - edited 08-25-2022 05:04 AM
and these are originated by the switch. the white snap was a 10s recording
08-25-2022 11:25 AM
i would be more interested to find out that ipv6 MAC address. since we do not know your environment, we suggest to look below document :
https://blog.apnic.net/2019/10/18/how-to-ipv6-neighbor-discovery/
and find out where this ipv6 multicast for fe80XXXXXXXXXXXXXXXXXXXX673c
08-25-2022 12:04 PM
the mac is the mac of the switch, like i already stated.
again, i do have multiple types of switches, which do send a lot of ns messages. in one network three switches amount for 10% of the total traffic in ns (look at my snips). i am sure that i used all the commands to disable ipv6, and i am sure that the switches are doing this without the interaction of any connected devices. i do have 3850s 9300s and 4500xs that show this behavior, but i also do have a lot of these who dont. i couldn't make out any significant differences when comparing sh run all outputs. i do have all kinds of software versions, this doesnt seem to make any difference.
08-25-2022 12:23 PM
these are neighbor solicitation messages, they are sent when a host joins the network to perform Duplicate Address Detection (DAD) for its link-local address, try configuring a suppression policy, you can apply the policy at device level or interface level.
08-25-2022 11:25 PM
i tried this before and it didn't change anything. i tried it again with the same result.
08-25-2022 08:04 AM
When you say that "the switches flood the network with these messages", do you mean that the source-mac address of these frames is from the switches, or just that the switches are forwarding these frames which are sourced from other devices connected to the switchports ?? The commands above will only disable the generation of IPv6 packets by the switches themselves, it will not stop them forwarding these frames within the same layer2 VLAN, because IPv6 ND are regular Ethernet multicast frames as far as the L2switch is concerned.
If you see that many pps of what appears to be very similar frames, that would usually suggest you try to look and see if you have any topology-loop or misbehaving connected devices by tracing that stream of frames back to their source ("show mac-address dynamic").
08-25-2022 11:31 AM
no i mean the switch itself. to make sure that it is not a reaction to some external requests i put an access-list with icmp any any deny on all ports as in policy. sure i could block it with the same policy as out policy on the uplink, but i'd rather have the switch not doing this at all.
12-16-2022 03:09 PM
Here too. I have exactly the same issue. Switches send all the time NS Messages with Source Address ::
How to deactivate ipv6 completely??? There is so much ipv6 traffic, and we don´t use ipv6.
05-30-2024 05:55 AM
it could be device-tracking. If you need it try these policies
Policy for trunks:
device-tracking policy DISABLE-IP-TRACKING
tracking disable
trusted-port
device-role switch
Policy for access ports:
device-tracking policy IP-TRACKING
limit address-count 2
security-level glean
no protocol ndp
no protocol dhcp6
tracking enable reachable-lifetime 30
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide