RFC 7527

Enhanced Duplicate Address Detection, April 2015

File formats:
icon for text file icon for PDF icon for HTML
RFC 4429, RFC 4861, RFC 4862
R. Asati
H. Singh
W. Beebee
C. Pignataro
E. Dart
W. George
6man (int)

Cite this RFC: TXT  |  XML  |   BibTeX

DOI:  https://doi.org/10.17487/RFC7527

Discuss this RFC: Send questions or comments to the mailing list ipv6@ietf.org

Other actions: Submit Errata  |  Find IPR Disclosures from the IETF  |  View History of RFC 7527


IPv6 Loopback Suppression and Duplicate Address Detection (DAD) are discussed in Appendix A of RFC 4862. That specification mentions a hardware-assisted mechanism to detect looped back DAD messages. If hardware cannot suppress looped back DAD messages, a software solution is required. Several service provider communities have expressed a need for automated detection of looped back Neighbor Discovery (ND) messages used by DAD. This document includes mitigation techniques and outlines the Enhanced DAD algorithm to automate the detection of looped back IPv6 ND messages used by DAD. For network loopback tests, the Enhanced DAD algorithm allows IPv6 to self-heal after a loopback is placed and removed. Further, for certain access networks, this document automates resolving a specific duplicate address conflict. This document updates RFCs 4429, 4861, and 4862.

For the definition of Status, see RFC 2026.

For the definition of Stream, see RFC 8729.

Advanced Search