Cite this RFC:TXT | XML | BibTeX
DOI: https://doi.org/10.17487/RFC6104
Discuss this RFC: Send questions or comments to the mailing listv6ops@ietf.org
Other actions:Submit Errata | Find IPR Disclosures from the IETF | View History of RFC 6104
When deploying IPv6, whether IPv6-only or dual-stack, routers areconfigured to send IPv6 Router Advertisements (RAs) to conveyinformation to nodes that enable them to autoconfigure on thenetwork. This information includes the implied default routeraddress taken from the observed source address of the RA message, aswell as on-link prefix information. However, unintendedmisconfigurations by users or administrators, or possibly maliciousattacks on the network, may lead to bogus RAs being present, which inturn can cause operational problems for hosts on the network. Inthis document, we summarise the scenarios in which rogue RAs may beobserved and present a list of possible solutions to the problem. Wefocus on the unintended causes of rogue RAs in the text. The goal ofthis text is to be Informational, and as such to present a frameworkaround which solutions can be proposed and discussed. This document is not an Internet Standards Track specification; it ispublished for informational purposes.
For the definition ofStatus,seeRFC 2026.
For the definition ofStream, seeRFC 8729.