Commande tcpdump pour voir si vous avez des "router advertisement" sur vos serveurs : tcpdump -n -i eth0 icmp6 and ip6[40] == 134
# tcpdump -n -i enp1s0f0 icmp6 and ip6[40] == 134
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on enp1s0f0, link-type EN10MB (Ethernet), capture size 262144 bytes
22:21:30.795827 IP6 fe80::2a52:61ff:fed7:84c2 > ff02::1: ICMP6, router advertisement, length 96
^C
1 packet captured
1 packet received by filter
0 packets dropped by kernel
avec l'option -v :
# tcpdump -v -n -i enp1s0f0 icmp6 and ip6[40] == 134
tcpdump: listening on enp1s0f0, link-type EN10MB (Ethernet), capture size 262144 bytes
22:34:16.754662 IP6 (class 0xe0, hlim 255, next-header ICMPv6 (58) payload length: 96) fe80::2a52:61ff:fed7:84c2 > ff02::1: [icmp6 sum ok] ICMP6, router advertisement, length 96
hop limit 64, Flags [none], pref medium, router lifetime 1800s, reachable time 0s, retrans time 0s
source link-address option (1), length 8 (1): 28:52:61:d7:84:c2
prefix info option (3), length 32 (4): 2001:860:de01:1101::/64, Flags [onlink, auto], valid time 2592000s, pref. time 604800s
prefix info option (3), length 32 (4): 2001:860:deff:1001::/64, Flags [onlink, auto], valid time 2592000s, pref. time 604800s
mtu option (5), length 8 (1): 1500