RFC 7527

Enhanced Duplicate Address Detection, April 2015

Canonical URL:
File formats:
Plain TextPDF
RFC 4429, RFC 4861, RFC 4862
R. Asati
H. Singh
W. Beebee
C. Pignataro
E. Dart
W. George
6man (int)

Cite this RFC: TXT  |  XML

DOI:  http://dx.doi.org/10.17487/RFC7527

Discuss this RFC: Send questions or comments to ipv6@ietf.org

Other actions: Find Errata (if any)  |  Submit Errata  |  Find IPR Disclosures from the IETF


IPv6 Loopback Suppression and Duplicate Address Detection (DAD) are discussed in Appendix A of RFC 4862. That specification mentions a hardware-assisted mechanism to detect looped back DAD messages. If hardware cannot suppress looped back DAD messages, a software solution is required. Several service provider communities have expressed a need for automated detection of looped back Neighbor Discovery (ND) messages used by DAD. This document includes mitigation techniques and outlines the Enhanced DAD algorithm to automate the detection of looped back IPv6 ND messages used by DAD. For network loopback tests, the Enhanced DAD algorithm allows IPv6 to self-heal after a loopback is placed and removed. Further, for certain access networks, this document automates resolving a specific duplicate address conflict. This document updates RFCs 4429, 4861, and 4862.

For the definition of Status, see RFC 2026.

For the definition of Stream, see RFC 4844.

Download PDF Reader

Search RFCs
Advanced Search