ipv6 nd anti-attack rate-limit source-mac all maximum

Function

The ipv6 nd anti-attack rate-limit source-mac all maximum command configures a rate limit for sending ND messages to the CPU based on any source MAC address, that is, the number of ND messages that can be processed per second based on any source MAC address.

The undo ipv6 nd anti-attack rate-limit source-mac all maximum command restores the default configuration.

The default rate limit for sending ND messages to the CPU based on any source MAC address is 0.45 times the rate limit for sending ND messages to the CPU that is configured in the system view.

Format

ipv6 nd { ns | na | rs | ra } anti-attack rate-limit source-mac all maximum max-value

undo ipv6 nd { ns | na | rs | ra } anti-attack rate-limit source-mac all maximum max-value

Parameters

Parameter Description Value
ns

Indicates the rate at which NS messages are sent.

-

na

Indicates the rate at which NA messages are sent.

-

rs

Indicates the rate at which RS messages are sent.

-

ra

Indicates the rate at which RA messages are sent.

-

maximum max-value

Specifies a rate limit for sending ND messages to the CPU based on any source MAC address.

The value is an integer ranging from 0 to 5000, in pps.

Views

System view

Default Level

2: Configuration level

Task Name and Operations

Task Name Operations
nd write

Usage Guidelines

Usage Scenario

If a device is attacked, it receives a large number of ND messages within a short period. As a result, the device consumes many CPU resources to learn and respond to peer entries, affecting processing of other services. To resolve this issue, configure a rate limit for sending ND messages to the CPU based on any source MAC address. After the configuration is complete, the device counts the number of ND messages received per period based on any source MAC address. If the number of ND messages exceeds the configured limit, the device does not process excess ND messages.

Configuration Impact

After a rate limit for sending ND messages to the CPU based on any source MAC address is configured, the device counts the number of ND messages received per period based on any source MAC address. If the number of ND messages exceeds the configured limit, the device does not process excess ND messages. As a result, the device may fail to process valid ND messages, causing user service interruptions.

Precautions

If a low rate limit is configured and the login through Telnet fails because the device receives a large number of attack packets, you can log in to the device through the console port to increase the rate limit.

Example

# Set a rate limit for sending RA messages to the CPU based on any source MAC address to 550 pps.
<HUAWEI> system-view
[~HUAWEI] ipv6 nd ra anti-attack rate-limit source-mac all maximum 550
# Set a rate limit for sending RS messages to the CPU based on any source MAC address to 550 pps.
<HUAWEI> system-view
[~HUAWEI] ipv6 nd rs anti-attack rate-limit source-mac all maximum 550
# Set a rate limit for sending NA messages to the CPU based on any source MAC address to 550 pps.
<HUAWEI> system-view
[~HUAWEI] ipv6 nd na anti-attack rate-limit source-mac all maximum 550
# Set a rate limit for sending NS messages to the CPU based on any source MAC address to 550 pps.
<HUAWEI> system-view
[~HUAWEI] ipv6 nd ns anti-attack rate-limit source-mac all maximum 550
Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
< Previous topic Next topic >