{"id":3628,"date":"2014-06-16T21:23:32","date_gmt":"2014-06-16T21:23:32","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=3628"},"modified":"2025-04-02T11:56:59","modified_gmt":"2025-04-02T18:56:59","slug":"why-you-must-use-icmpv6-router-advertisements-ras","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/why-you-must-use-icmpv6-router-advertisements-ras\/","title":{"rendered":"Why You Must Use ICMPv6 Router Advertisements (RAs)"},"content":{"rendered":"<p>When a dual-protocol host joins a network it sends an ICMPv6 (type 133) Router Solicitation (RS) message to inquire about the local IPv6-capable router on the network.\u00a0 The local router is tuned into the ff02::2 (all-router\u2019s multicast group address) and will receive the RS message.\u00a0 In response to the RS, the router immediately sends an ICMPv6 (type 134) Routing Advertisement (RA) message to the all nodes on the network (ff02::1, the all nodes multicast group address).\u00a0 The router also sends the RA messages periodically (typically every 200 seconds) to keep the nodes informed of any changes to the addressing information for the LAN.\u00a0 The RA message contains important information for nodes as well as which method they should use to obtain their <a href=\"https:\/\/www.infoblox.com\/glossary\/ipv6\/\" target=\"_blank\"><strong>IPv6<\/strong><\/a> address.\u00a0 The RA contains several flags that are set that the nodes watch for and use.<\/p>\n<ul>\n<li>A-bit \u2013 Autonomous Address Autoconfiguration Flag tells the node it should perform stateless address assignment (SLAAC\u00a0<a href=\"http:\/\/tools.ietf.org\/html\/rfc4862\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RFC 4862<\/a>)<\/li>\n<li>L-bit \u2013 On-Link Flag tells the node that the prefix listed in the RA is the local IPv6 address<\/li>\n<li>M-bit \u2013 Managed Address Config Flag tells the host if it should use stateful DHCPv6 (<a href=\"http:\/\/tools.ietf.org\/html\/rfc3315\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RFC 3315<\/a>) to acquire its address and other DHCPv6 options<\/li>\n<li>O-bit \u2013 Other Config Flag tells the host that there is other information the router can provide (such as DNS information defined in Stateless DHCPv6 (<a href=\"http:\/\/tools.ietf.org\/html\/rfc3736\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RFC 3736<\/a>))<\/li>\n<\/ul>\n<p>ICMPv6 RAs are intended to help facilitate bootstrapping the connectivity of an IPv6 node on a network.\u00a0 They tell the hosts on the LAN how they should go about acquiring their global unicast IPv6 address and become productive members of the network.\u00a0 The RA also provides the end-node information about the local router and its ability to be the default gateway, offering critical <a href=\"https:\/\/www.infoblox.com\/products\/network-insight\/\" target=\"_blank\"><strong>Network Insight<\/strong><\/a> for efficient LAN operation. This process is well documented in Section 4 of the IETF\u00a0<a href=\"http:\/\/tools.ietf.org\/html\/rfc4861\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RFC 4861<\/a>\u00a0\u201cNeighbor Discovery for IP version 6 (IPv6)\u201d.<\/p>\n<p>Unfortunately, there are some security risks related to ICMPv6 RA messages.\u00a0On networks that do not yet use IPv6, the dual-stack hosts sit dormant waiting for an eventual RA message to awaken their IPv6 connectivity.\u00a0 An attacker can craft a \u201crogue RA\u201d message on these networks, get the dual-protocol nodes on the network to configure their IPv6 addresses and utilize the attacker\u2019s system as their default gateway.\u00a0 The attacker can then easily perform a Man-In-The-Middle (MITM) attack without the user\u2019s knowledge using this technique.\u00a0 This issue is documented in\u00a0<a href=\"http:\/\/tools.ietf.org\/html\/rfc6104\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RFC 6104<\/a>\u00a0\u201cRogue IPv6 Router Advertisement Problem Statement\u201d.\u00a0 On networks that already have IPv6 running, rogue RAs can destabilize the network (and still perform a MITM attack).\u00a0 Rogue RA messages can be easily generated with\u00a0<a href=\"https:\/\/www.thc.org\/download.php?t=r&amp;f=thc-ipv6-2.5.tar.gz\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">The Hacker\u2019s Choice IPv6 Attack Toolkit<\/a>,\u00a0<a href=\"http:\/\/www.secdev.org\/projects\/scapy\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Scapy<\/a>,\u00a0<a href=\"http:\/\/www.si6networks.com\/tools\/ipv6toolkit\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">SI6 Networks IPv6 Toolkit<\/a>,\u00a0<a href=\"http:\/\/nmap.org\/nsedoc\/scripts\/targets-ipv6-multicast-slaac.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Nmap<\/a>, and\u00a0<a href=\"http:\/\/www.informatica64.com\/evilfoca\/download.aspx\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Evil FOCA<\/a>, among other tools and methods.<\/p>\n<p>There are methods to detect and block these rogue RA messages.\u00a0 Utilities like\u00a0<a href=\"http:\/\/ndpmon.sourceforge.net\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">NDPMon<\/a>,\u00a0<a href=\"http:\/\/ramond.sourceforge.net\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Ramond<\/a>,\u00a0<a href=\"https:\/\/6mon.iit.cnr.it\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">6MoN<\/a>, and others can be used to look for suspicious Neighbor Discovery Protocol (NDP) packets and detect invalid RA messages.\u00a0Organizations aiming to establish an <a href=\"https:\/\/www.infoblox.com\/solutions\/ipv6-readiness\/ipv6-center-excellence\/\" target=\"_blank\"><strong>IPv6 Center of Excellence<\/strong><\/a> should incorporate these utilities into their network monitoring strategies to enhance IPv6 security and efficiency. These tools function much like the old\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/Arpwatch\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">ARPWATCH<\/a>\u00a0program did for detecting ARP attacks on an IPv4 LAN.<\/p>\n<p>There is a technique called \u201cRA Guard\u201d that can be implemented in an Ethernet switch to permit legitimate RAs from a valid router and block the malicious rogue RA messages.\u00a0 This technique is documented in IETF\u00a0<a href=\"http:\/\/tools.ietf.org\/html\/rfc6105\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RFC 6105<\/a>\u00a0\u201cIPv6 Router Advertisement Guard\u201d.\u00a0 There is also a very new\u00a0<a href=\"http:\/\/tools.ietf.org\/html\/rfc7113\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RFC 7113<\/a>\u00a0\u201cImplementation Advice for IPv6 Router Advertisement Guard (RA-Guard)\u201d.\u00a0 A good example of improved first hop security (<a href=\"http:\/\/www.cisco.com\/go\/fhs\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">FHS<\/a>) in IPv6 can be implemented in Cisco switches.<\/p>\n<p>Unfortunately, there are also methods to avoid any rogue RA detection accomplished by NDP security methods.\u00a0 Finding the ICMPv6 layer-4 header information could be made difficult by forcing the system to fully parse the IPv6 header structure.\u00a0 An attacker can change the location of the RA in the IPv6 packet by using extension headers to avoid detection especially if security tools do not parse the entire RA message.\u00a0 If an end-node receives an RA with a hop-by-hop extension header or an atomic fragment, the host disregards the header but still processes the RA normally.\u00a0 This rogue RA attack is called \u201c<a href=\"http:\/\/tools.ietf.org\/html\/draft-gont-v6ops-ra-guard-evasion-01\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RA guard evasion<\/a>\u201d.\u00a0 Legitimate RA messages should not include fragmentation or other headers.\u00a0 There is some additional guidance along these lines documented in\u00a0<a href=\"http:\/\/tools.ietf.org\/html\/rfc6980\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RFC 6980<\/a>\u00a0\u201cSecurity Implications of IPv6 Fragmentation with IPv6 Neighbor Discovery\u201d.<\/p>\n<p>There are other beneficial uses of ICMPv6 RA messages on a LAN.\u00a0 Another method of getting DNS information to IPv6 nodes is to leverage options within the RA to send the DNS server and domain search list.\u00a0For organizations prioritizing security, integrating <a href=\"https:\/\/www.infoblox.com\/dns-security-resource-center\/dns-security-solutions\/dns-security-solutions-dns-security-extensions-dnssec\/ (MITM anchor)\" target=\"_blank\"><strong>DNS Security Extensions (DNSSEC)<\/strong><\/a> can further protect DNS queries and responses in IPv6 environments, ensuring data authenticity and integrity. Nodes that receive the RA can simply parse these options and get this DNS information and use it with their SLAAC auto-generated IPv6 addresses.\u00a0 IETF\u00a0<a href=\"http:\/\/tools.ietf.org\/html\/rfc6106\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RFC 6106<\/a>\u00a0&#8220;IPv6 Router Advertisement Options for DNS Configuration&#8221; defines the Recursive DNS Server (<a href=\"http:\/\/rdnssd.linkfanel.net\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RDNSS<\/a>) and DNS Search List (DNSSL) options within Router Advertisement (RA).\u00a0 One of the challenges with RDNSS is getting support for it natively in the host\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/Comparison_of_IPv6_support_in_operating_systems\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">operating systems<\/a>.\u00a0 This link provides some information on which OSs support this option.\u00a0 There is also a RDNSS deamon for Linux (rdnssd).<\/p>\n<p>Even if you intend to use DHCPv6 instead of SLAAC in your environment, you still need RA messages to function on the local LAN.\u00a0 The RAs provide the default gateway information to an end node and, with the M-bit, inform the nodes that the LAN uses stateful DHCPv6.\u00a0 DHCPv6 does not currently have an option to provide this information to the DHCPv6 client in the same way it is provided with DHCP for IPv4.\u00a0 Providing the default gateway as a DHCPv6 option was\u00a0<a href=\"http:\/\/tools.ietf.org\/html\/draft-droms-dhc-dhcpv6-default-router-00\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">proposed<\/a>, but never made it into the standards.<\/p>\n<p>DHCPv6 may be desirable in the desktop access portions of an enterprise network and DHCPv6 is absolutely essential in the service provider\u2019s subscriber access networks.\u00a0 However, organizations may not need DHCPv6 in a data center environment.\u00a0 Most organizations will prefer to statically configure IPv6 address parameters on specific systems in the network environment.\u00a0 Static address configuration may be preferred for systems that need to have a fixed, non-changing IPv6 address or for nodes that are unable to perform dynamic address assignment.\u00a0 The systems in the networks that will most likely use this static IPv6 addressing technique are servers and systems within data center environments.\u00a0 These servers could be on an internally-accessible networks, private\/hybrid cloud infrastructures, or Internet publically-accessible network.\u00a0 Any system that is going to have its address used in some form of firewall policy or access-control list will need a static address.<\/p>\n<p>Servers within a data center environment would need to be configured with the following information to be able to operate correctly in an IPv6 environment<\/p>\n<ul>\n<li>Static IPv6 address for its network interface<\/li>\n<li>This address would be allocated from the IPAM system and registered within the DNS system with an AAAA resource record and an accompanying PTR record.<\/li>\n<li>Static IPv6 default gateway<\/li>\n<li>This could either be a global unicast address of the first-hop router or the Link-Local address of the first-hop router (e.g. FE80::1).<\/li>\n<li>Static DNS server<\/li>\n<li>This is the caching DNS resolver this system will use when it needs to perform DNS queries (e.g. configured within the \/etc\/resolv.conf)<\/li>\n<li>DNS Domain Name<\/li>\n<li>This is the domain name that the system will use in combination with the server&#8217;s hostname to create its fully-qualified domain name (FQDN) (e.g. the domain suffix search order list)<\/li>\n<\/ul>\n<p>Typically, servers will have a static IPv6 address assigned, But they will still use the information contained in the ICMPv6 (type 134) Router Advertisement (RA) message sent by the first-hop router to learn information about the default gateway.\u00a0 RA messages contain the link-local address and the layer-2 (MAC) address of the first-hop router.\u00a0 Servers can listen to these and use this information to auto-configure their default gateway.<\/p>\n<p>If you want to disable sending of RA messages on a Cisco IOS router, you can use the following commands to accomplish this goal.<\/p>\n<pre>interface GigabitEthernet 0\/12\r\n\r\n  ipv6 address 2001:db8:1234:5678::1\/64\r\n\r\n  ipv6 nd prefix no-autoconfig\r\n\r\n  ipv6 nd suppress-ra\r\n\r\n  ipv6 nd ra suppress all<\/pre>\n<p>It is important to realize how important the ICMPv6 RA message is to the function of an IPv6-enabled LAN.\u00a0 Security risks exist, but the attacker must be on-net or have compromised a node on the network to be able to perform these rogue RA MITM attacks.\u00a0 Most enterprise organizations would prefer DHCPv6 for desktop LANs, but RAs are still needed on these networks.\u00a0 In a data center, an organization may want to statically assign the address details to hosts and not use RA messages.\u00a0 Regardless, people should not fear the RAs and learn to embrace them. By addressing potential risks and leveraging tools like RA Guard, organizations can confidently advance toward <a href=\"https:\/\/www.infoblox.com\/solutions\/ipv6-readiness\/\" target=\"_blank\"><strong>IPV6 Readiness<\/strong><\/a> and secure network operations.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When a dual-protocol host joins a network it sends an ICMPv6 (type 133) Router Solicitation (RS) message to inquire about the local IPv6-capable router on the network.\u00a0 The local router is tuned into the ff02::2 (all-router\u2019s multicast group address) and will receive the RS message.\u00a0 In response to the RS, the router immediately sends an [&hellip;]<\/p>\n","protected":false},"author":321,"featured_media":3187,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[17],"tags":[16,38,15],"class_list":{"0":"post-3628","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ipv6-coe","8":"tag-infoblox","9":"tag-ipv6","10":"tag-security","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Why You Must Use ICMPv6 Router Advertisements (RAs)<\/title>\n<meta name=\"description\" content=\"ICMPv6 RA messages have deeper meanings within the context of the functionality of IPv6-enabled LAN. Read to learn about the way that people view RA messages.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/why-you-must-use-icmpv6-router-advertisements-ras\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why You Must Use ICMPv6 Router Advertisements (RAs)\" \/>\n<meta property=\"og:description\" content=\"ICMPv6 RA messages have deeper meanings within the context of the functionality of IPv6-enabled LAN. Read to learn about the way that people view RA messages.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/why-you-must-use-icmpv6-router-advertisements-ras\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-06-16T21:23:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-02T18:56:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-ARIN.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Scott Hogg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Scott Hogg\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/why-you-must-use-icmpv6-router-advertisements-ras\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/why-you-must-use-icmpv6-router-advertisements-ras\\\/\"},\"author\":{\"name\":\"Scott Hogg\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/ee71ac61fe2ea349f6e991e628d22f4c\"},\"headline\":\"Why You Must Use ICMPv6 Router Advertisements (RAs)\",\"datePublished\":\"2014-06-16T21:23:32+00:00\",\"dateModified\":\"2025-04-02T18:56:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/why-you-must-use-icmpv6-router-advertisements-ras\\\/\"},\"wordCount\":1481,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/why-you-must-use-icmpv6-router-advertisements-ras\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/IPv6-ARIN.jpg\",\"keywords\":[\"Infoblox\",\"IPv6\",\"Security\"],\"articleSection\":[\"IPv6 CoE\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/why-you-must-use-icmpv6-router-advertisements-ras\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/why-you-must-use-icmpv6-router-advertisements-ras\\\/\",\"name\":\"Why You Must Use ICMPv6 Router Advertisements (RAs)\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/why-you-must-use-icmpv6-router-advertisements-ras\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/why-you-must-use-icmpv6-router-advertisements-ras\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/IPv6-ARIN.jpg\",\"datePublished\":\"2014-06-16T21:23:32+00:00\",\"dateModified\":\"2025-04-02T18:56:59+00:00\",\"description\":\"ICMPv6 RA messages have deeper meanings within the context of the functionality of IPv6-enabled LAN. Read to learn about the way that people view RA messages.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/why-you-must-use-icmpv6-router-advertisements-ras\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/why-you-must-use-icmpv6-router-advertisements-ras\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/why-you-must-use-icmpv6-router-advertisements-ras\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/IPv6-ARIN.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/IPv6-ARIN.jpg\",\"width\":660,\"height\":454,\"caption\":\"The IPv6 Tipping Point Effect\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/why-you-must-use-icmpv6-router-advertisements-ras\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IPv6 CoE\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/ipv6-coe\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Why You Must Use ICMPv6 Router Advertisements (RAs)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/ee71ac61fe2ea349f6e991e628d22f4c\",\"name\":\"Scott Hogg\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_321_1574118215-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_321_1574118215-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_321_1574118215-96x96.jpg\",\"caption\":\"Scott Hogg\"},\"description\":\"Scott Hogg has 30 years of network and security experience and is president of Hogg Networking with. Scott Hogg specializes in teaching Internet Protocol version 6 (IPv6) and providing implementation guidance. Scott is CCIE #5133 (Emeritus) and CISSP #4610. Scott is Chair Emeritus of the Rocky Mountain IPv6 Task Force (RMv6TF), a member of the IPv6 Center of Excellence (COE), and co-author of the Cisco Press book on IPv6 Security.\",\"sameAs\":[\"https:\\\/\\\/hexabuild.io\"],\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/scott-hogg\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Why You Must Use ICMPv6 Router Advertisements (RAs)","description":"ICMPv6 RA messages have deeper meanings within the context of the functionality of IPv6-enabled LAN. Read to learn about the way that people view RA messages.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/why-you-must-use-icmpv6-router-advertisements-ras\/","og_locale":"en_US","og_type":"article","og_title":"Why You Must Use ICMPv6 Router Advertisements (RAs)","og_description":"ICMPv6 RA messages have deeper meanings within the context of the functionality of IPv6-enabled LAN. Read to learn about the way that people view RA messages.","og_url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/why-you-must-use-icmpv6-router-advertisements-ras\/","og_site_name":"Infoblox Blog","article_published_time":"2014-06-16T21:23:32+00:00","article_modified_time":"2025-04-02T18:56:59+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-ARIN.jpg","type":"image\/jpeg"}],"author":"Scott Hogg","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Scott Hogg","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/why-you-must-use-icmpv6-router-advertisements-ras\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/why-you-must-use-icmpv6-router-advertisements-ras\/"},"author":{"name":"Scott Hogg","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/ee71ac61fe2ea349f6e991e628d22f4c"},"headline":"Why You Must Use ICMPv6 Router Advertisements (RAs)","datePublished":"2014-06-16T21:23:32+00:00","dateModified":"2025-04-02T18:56:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/why-you-must-use-icmpv6-router-advertisements-ras\/"},"wordCount":1481,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/why-you-must-use-icmpv6-router-advertisements-ras\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-ARIN.jpg","keywords":["Infoblox","IPv6","Security"],"articleSection":["IPv6 CoE"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/why-you-must-use-icmpv6-router-advertisements-ras\/","url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/why-you-must-use-icmpv6-router-advertisements-ras\/","name":"Why You Must Use ICMPv6 Router Advertisements (RAs)","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/why-you-must-use-icmpv6-router-advertisements-ras\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/why-you-must-use-icmpv6-router-advertisements-ras\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-ARIN.jpg","datePublished":"2014-06-16T21:23:32+00:00","dateModified":"2025-04-02T18:56:59+00:00","description":"ICMPv6 RA messages have deeper meanings within the context of the functionality of IPv6-enabled LAN. Read to learn about the way that people view RA messages.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/why-you-must-use-icmpv6-router-advertisements-ras\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/ipv6-coe\/why-you-must-use-icmpv6-router-advertisements-ras\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/why-you-must-use-icmpv6-router-advertisements-ras\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-ARIN.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IPv6-ARIN.jpg","width":660,"height":454,"caption":"The IPv6 Tipping Point Effect"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/why-you-must-use-icmpv6-router-advertisements-ras\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"IPv6 CoE","item":"https:\/\/www.infoblox.com\/blog\/category\/ipv6-coe\/"},{"@type":"ListItem","position":3,"name":"Why You Must Use ICMPv6 Router Advertisements (RAs)"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/ee71ac61fe2ea349f6e991e628d22f4c","name":"Scott Hogg","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_321_1574118215-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_321_1574118215-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_321_1574118215-96x96.jpg","caption":"Scott Hogg"},"description":"Scott Hogg has 30 years of network and security experience and is president of Hogg Networking with. Scott Hogg specializes in teaching Internet Protocol version 6 (IPv6) and providing implementation guidance. Scott is CCIE #5133 (Emeritus) and CISSP #4610. Scott is Chair Emeritus of the Rocky Mountain IPv6 Task Force (RMv6TF), a member of the IPv6 Center of Excellence (COE), and co-author of the Cisco Press book on IPv6 Security.","sameAs":["https:\/\/hexabuild.io"],"url":"https:\/\/www.infoblox.com\/blog\/author\/scott-hogg\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3628","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/321"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=3628"}],"version-history":[{"count":5,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3628\/revisions"}],"predecessor-version":[{"id":11359,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3628\/revisions\/11359"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/3187"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=3628"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=3628"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=3628"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}