Solved

IPv6 question : what are these addresses used for?

Posted on 2013-05-14
3
622 Views
Last Modified: 2013-11-29
According to our network specialists, IPv6 has been deactivated, however I am seeing all types of IPv6 addresses.

These addresses include:

ff02::fb
ff02::c
ff02::1:3
ff02::1:2

any idea what these do?  I found others also, however I am assuming those are particular computers.

Thanks.
0
Comment
Question by:NYGiantsFan
  • 2
3 Comments
 
LVL 14

Accepted Solution

by:
JAN PAKULA earned 334 total points
ID: 39166261
0
 
LVL 14

Assisted Solution

by:JAN PAKULA
JAN PAKULA earned 334 total points
ID: 39166268
ff02::fb is same as FF02:0:0:0:0:0:0:FB - just shorten      mDNSv6      [RFC6762]      2005-10-05
FF02:0:0:0:0:0:0:C      SSDP      [UPnP_Forum]      2006-09-21
FF02:0:0:0:0:0:1:3      Link-local Multicast Name Resolution      [RFC4795]
FF02:0:0:0:0:0:1:2      All-dhcp-agents      [RFC3315]
0
 
LVL 19

Assisted Solution

by:bevhost
bevhost earned 166 total points
ID: 39166465
0

Featured Post

NFR key for Veeam Backup for Microsoft Office 365

Veeam is happy to provide a free NFR license (for 1 year, up to 10 users). This license allows for the non‑production use of Veeam Backup for Microsoft Office 365 in your home lab without any feature limitations.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

As cyber crime continues to grow in both numbers and sophistication, a troubling trend of optimization has emerged over the last year.
This article demonstrates probably the easiest way to configure domain-wide tier isolation within Active Directory. If you do not know tier isolation read https://technet.microsoft.com/en-us/windows-server-docs/security/securing-privileged-access/s…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

685 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question