Usage Scenario
You can run the display ipv6 nd anti-attack record command to view ND message attack records, thereby obtaining information about the attack source. For example, you can configure a rate at which a device processes ND messages so that the device processes only the specified number of ND messages within a specified period and discards excess ND messages. To view records about discarded ND messages, run the display ipv6 nd anti-attack record command.
The actual command output varies according to the device. The command output here is only an example.
<HUAWEI> display ipv6 nd anti-attack record gigabitethernet 0/1/1 ---------------------------------------------------------------------------------- Packet Type : NA Interface Name : Gigabitethernet0/1/1 Source IP : 2001:db8:1::1 Destination IP : 2001:db8:1::2 Target IP : 2001:db8:1::1 Source MAC : 00-e0-fc-12-34-56 Destination MAC : 00-e0-fc-12-34-78 PE Vlan : - CE Vlan : - Attack Count : 12 Last Attack Time : 2021-02-18 03:42:57 Dropped Reason : VR destination ip attack limit ---------------------------------------------------------------------------------- Total: 1
| Item | Description |
|---|---|
| Packet Type | Message type. |
| Interface Name | Interface name. |
| Source IP | Source IP address. |
| Source MAC | Source MAC address. |
| Destination IP | Destination IP address. |
| Destination MAC | Destination MAC address. |
| Target IP | Target IP address. |
| PE Vlan | Outer VLAN ID. |
| CE Vlan | Inner VLAN ID. |
| Attack Count | Number of attacks. |
| Last Attack Time | Latest attack time. |
| Dropped Reason | Reason for message discarding. |
| Total | Total number. |