< Home

Configuring Defense Against Bogus ND Server Attacks

Context

If a bogus ND server is deployed at the user side, STAs may obtain incorrect IPv6 addresses and network configuration parameters, and cannot communicate properly. After the ND trusted port is disabled on an AP, the AP considers that a bogus ND server is deployed at the user side when receiving ND OFFER, ACK, and NAK packets. The AP discards the packets and reports the IPv6 address of the bogus ND server to the connected AC.

In most cases, you need to enable the ND trusted port in an AP wired port profile. When receiving ND OFFER, ACK, and NAK packets sent by authorized ND servers, the AP forwards the packets to STAs so that the STAs can obtain valid IPv6 addresses and go online. For the detailed configuration, see Managing an AP's Wired Interface.

Procedure

  1. Run system-view

    The system view is displayed.

  2. Run wlan

    The WLAN view is displayed.

  3. Run vap-profile name profile-name

    The VAP profile view is displayed.

  4. Run undo nd trust port

    The ND trusted port is disabled on the AP.

    By default, the ND trusted interface is disabled on an AP

Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
< Previous topic Next topic >