ipv6 nd miss anti-attack rate-limit source-ip all maximum

Function

The ipv6 nd miss anti-attack rate-limit source-ip all maximum command configures a rate limit for receiving ND Miss messages based on any source IPv6 address, that is, the number of ND Miss messages that can be processed per second based on any source IPv6 address.

The undo ipv6 nd miss anti-attack rate-limit source-ip all maximum command restores the default configuration.

By default, the rate limit for receiving ND Miss messages based on any source IPv6 address is 0.45 times the rate limit for receiving ND Miss messages configured in the system view.

Format

ipv6 nd miss anti-attack rate-limit source-ip all maximum max-value

undo ipv6 nd miss anti-attack rate-limit source-ip all maximum max-value

Parameters

Parameter Description Value
miss

Sets a rate limit for receiving ND Miss messages.

-

maximum max-value

Specifies a rate limit for receiving ND Miss messages based on any source IPv6 address.

The value is an integer ranging from 0 to 5000, in messages per second.

Views

System view

Default Level

2: Configuration level

Task Name and Operations

Task Name Operations
nd write

Usage Guidelines

Usage Scenario

If a device is attacked, it receives a large number of ND Miss messages within a short period. As a result, the device consumes many CPU resources to learn and respond to ND entries, affecting the processing of other services. To resolve this issue, configure a rate limit for receiving ND Miss messages based on any source IPv6 address. After the configuration is complete, the device counts the number of ND Miss messages received per period based on any source IPv6 address. If the number exceeds the configured limit, the device does not process excess ND Miss messages.

Configuration Impact

After a rate limit for receiving ND Miss messages based on any source IPv6 address is configured, the device counts the number of ND Miss messages received per period based on any source IPv6 address. If the number of ND Miss messages exceeds the configured limit, the device does not process excess ND Miss messages. As a result, the device may fail to process valid ND Miss messages, causing user service interruptions.

Precautions

If a low rate limit is configured and the login through Telnet fails because the device receives a large number of attack packets, you can log in to the device through the console port to increase the rate limit.

Example

# Set a rate limit for receiving ND Miss messages based on any source IPv6 address to 550 messages per second.
<HUAWEI> system-view
[~HUAWEI] ipv6 nd miss anti-attack rate-limit source-ip all maximum 550
Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
< Previous topic Next topic >