How to persistently disable IPv6 privacy addressing with Windows Server

Here's the solution to the question how to persistently disable Windows Server 2019 / 2016 / 2012 IPv6 privacy addressing.

All you need to do is open Administrative PowerShell and run following commands:

Set-NetIPv6Protocol -RandomizeIdentifiers Disabled

Set-NetIPv6Protocol -UseTemporaryAddresses Disabled

That's it! Now it's done and also remains that way. The old netsh based settings are reset after a system reboot.

If you're using a network where there are router advertisement packets being sent. You'll need to also disable the auto configuration and router discovery to prevent privacy addressing from messing up the IP addresses.

netsh interface ipv6 set interface "your-interface-goes-here" routerdiscovery=disabled

So if you're like me, you've probably tried the commands seen below. Just to find out that these settings remain only active until the system is restarted. I don't know why restart causes the configuration settings to get lost even if there's store=persistent option there.

netsh interface ipv6 set global randomizeidentifiers=disabled store=active

netsh interface ipv6 set global randomizeidentifiers=disabled store=persistent

netsh interface ipv6 set privacy state=disabled store=active

netsh interface ipv6 set privacy state=disabled store=persistent

I know many people suggested using Group Policy editor (gpedit.msc) or editing the Windows registry keys (regedit.exe) but those simply won't work.

This allows auto configure a address which remains the same (except the prefix part) even if it's moved to another network, address will be MAC based. More information is available in RFC4941.

keywords: IPv6, privacy addressing, MAC based IPv6 address, Windows, Server, configuration, registry key, registry, settings, networking, Internet, static, statically, loses, lost, losing, randomized identifiers, use temporary addresses, addressing, netipv6protocol, set-netipv6protocol, net, netsh, interface, randomize, randomizes, config, set, disable, disabled, inactivate, network, stack, configure, setup, install, permanent, permanently, persist, store, stored, key, value, reboot, restart, shutdown, boot, start., support, Microsoft, question, questions, answer, answers, operating system, os, IP6, without DHCPv6, DCHP, SLAAC, RFC4941, disabling Privacy Extensions for Stateless Address Autoconfiguration in IPv6, RFC3041, RFC, 3941, 3041, IPv4, stable address, storage, disable randomized interface identifier, disable usage of temporary addresses, temp, tmp, constant, constants, reference, references, automatic, automatically, protocol, process, standard, standards, IEEE, same node, outgoing sessions, global scope, prefix, suffix, subnet, mask, RA, router advisement, preference, preferences, step by step, easy, instructions, guide, tutorial, commands, IP6, stable, unchanging, Windows Server 2016, Windows Server 2019

Post date: 2015-07-15 - Updated: 2019-10-20