The rpki-limit command configures the maximum number of Route Origination Authorization (ROA) entries that the device is allowed to receive from an RPKI session.
The undo rpki-limit command restores the default configuration.
By default, no such limit is configured on the Router.
Parameter | Description | Value |
---|---|---|
limit |
Specifies the maximum number of ROA entries that the device is allowed to receive from an RPKI session. If the number of received ROA entries exceeds the configured limit, the system terminates the connection, starts a timer, and automatically attempts to re-establish the connection in 30s. |
The value is an integer ranging from 1 to 4294967295. |
alert-only |
Indicates that only a trap is generated and the device no longer receives ROA entries after the number of ROA entries that the device receives from an RPKI session exceeds the configured limit. |
- |
idle-forever |
Indicates that the system does not automatically attempt to re-establish the connection after the connection is terminated because the number of received ROA entries exceeds the configured limit. To enable the system to automatically attempt to re-establish the connection, run the reset rpki session command. |
- |
idle-timeout times |
Specifies the timer for the system to automatically attempt to re-establish the connection after the connection is terminated because the number of received ROA entries exceeds the configured limit. Before the timer expires, you can run the reset rpki session command to enable the system to automatically attempt to re-establish the connection immediately. |
The value is an integer ranging from 1 to 1200, in minutes. |
Usage Scenario
In most cases, a large number of ROA entries are saved on an RPKI server. If the device receives a large number of ROA entries from the RPKI server, excessive system resources will be consumed. In this situation, run the rpki-limit command to configure the maximum number of ROA entries that the device is allowed to receive from an RPKI session.
Configuration Impact
If the rpki-limit command is run on the Router that has established a BGP peer relationship with another device, the configuration impact is as follows:
<HUAWEI> system-view [~HUAWEI] rpki [*HUAWEI-rpki] session 10.1.1.1 [*HUAWEI-rpki-session] rpki-limit 2 alert-only