IPv6 duplicate DAD packets from Android clients?

Phil Mayers p.mayers at imperial.ac.uk
Tue Oct 8 01:22:31 CEST 2013


Since our student body have returned, we've been seeing a trickle of:

%IPV6_ND-6-DUPLICATE_INFO: DAD attempt detected for FE80::5:73FF:FEA0:1 
on VlanNNN

...on our Cisco 6500s. The vlan points to a bunch of Cisco WLC 
controllers running 7.4 and with all the IPv6 FHS turned on.

When I capture the packets (thanks for not logging the source MAC, 
Cisco!) I see it's coming from the MAC address of a couple of Android 

Source IP is :: dest is ff02::1:ffa0:1 (obviously) and the IP is a 
HSRPv2 virtual IP on the router itself.

So, two things:

  1. Should the Cisco WLC IPv6 FHS stuff be blocking these, given the 
target IP is the HSRP VIP and is obviously not on a client? Do I need to 
be worried about them?

  2. Where are they coming from? Is the client buggy and actually 
emitting the packet, or is it relaying these somehow from another network?

More information about the ipv6-ops mailing list