ND/4/ND_RCV_RATELIMIT

Message

ND/4/ND_RCV_RATELIMIT: Packet speed exceeded the configured speed-limit value. (PacketType=[PktType], SuppressValue=[SupVal], CurrentValue=[CurVal], SuppressType=[SupType], InterfaceName=[IfName], WorkIfName=[WorkIfName], SourceMacAddress=[SrcMac], DestinationMacAddress=[DstMac], SourceAddress=[SrcIp], DestinationAddress=[DstIp], TargetAddress=[TgtIp], PE-VLAN=[PeVlan], CE-VLAN=[CeVlan])

In VS mode, this log is supported only by the admin VS.

Description

The received rate of ND packets or ND miss messages exceeded the configured rate limit.

Parameters

Parameter Name Parameter Meaning

PktType

Type of packets that are suppressed.

SupVal

Rate limit of ND packets or ND miss messages.

CurVal

Current rate of ND packets or ND miss messages.

SupType

Suppress type

IfName

Interface name.

WorkIfName

Work interface name.

SrcMac

Source MAC address.

DstMac

Destination MAC address.

SrcIp

Source IP address.

DstIp

Destination IP address.

TgtIp

Target IP address.

PeVlan

Outer VLAN ID.

CeVlan

Inner VLAN ID.

Possible Causes

Cause 1: The rate of receiving ND packets based on the source MAC address exceeded the configured rate limit.

Cause 2: The rate of receiving ND packets based on the source IP address exceeded the configured rate limit.

Cause 3: The rate of receiving ND packets based on the destination IP address exceeded the configured rate limit.

Cause 4: The rate at which ND packets are received based on the destination IP address exceeds the configured rate limit.

Cause 5: The rate of receiving VR-based ND packets exceeds the configured rate limit.

Cause 6: The rate at which ND Miss messages are received based on VR exceeds the configured rate limit.

Cause 7: The rate at which ND packets are received based on the source IP address of the interface exceeds the configured rate limit.

Cause 8: The rate at which interface-based ND packets are received exceeded the configured rate limit.

Cause 9: The rate at which ND Miss messages are received on an interface exceeded the configured rate limit.

Cause 10: The rate at which ND packets are received based on LR exceeds the configured rate limit.

Cause 11: The rate at which ND Miss messages are received based on LR exceeds the configured rate limit.

Procedure

1. Check the value of SuppressType.

2. Run the display ipv6 nd anti-attack rate-limit configuration command to check the rate limit for ND packets or ND Miss messages.

3. Adjust the value of the corresponding command according to the prompt in Step 1.

  • If Suppress Type is SRCIP, run the ipv6 nd {ns |na | rs | ra | miss} anti-attack rate-limit source-ip maximum command in the system view or the ipv6 nd {ns |na | rs | ra} anti-attack rate-limit source-ip all maximum command in the system view.
  • If Suppress Type is SRCMAC, run the ipv6 nd {ns |na | rs | ra} anti-attack rate-limit source-mac maximum command in the system view or run the ipv6 nd {ns |na | rs | ra} anti-attack rate-limit source-mac all maximum command in the system view.
  • When Suppress Type is set to INTERFACE(Interface), run the ipv6 nd {ns | na | rs | ra} anti-attack rate-limit command in the interface view or run the ipv6 nd miss anti-attack rate-limit command in the interface view.
  • If Suppress Type is INTERFACESRCIP, run the ipv6 nd {ns | na | rs | ra | miss} anti-attack rate-limit source-ip maximum command in the interface view.
  • If Suppress Type is set to VSGLOBAL, run the ipv6 nd {ns | na | rs | ra} anti-attack rate-limit or ipv6 nd miss anti-attack rate-limit command in the system view.
  • If SuppressType is set to LSGLOBAL, the overall rate limit does not need to be adjusted.
  • If Suppress Type is set to DSTIP, run the ipv6 nd {ns | na | rs | ra} anti-attack rate-limit destination-ip maximum command in the system view or run the ipv6 nd {ns |na | rs | ra} anti-attack rate-limit destination-ip all maximum command in the system view.
  • If Suppress Type is set to TGTIP, run the ipv6 nd {ns | na} anti-attack rate-limit target-ip maximum command in the system view or run the ipv6 nd {ns |na} anti-attack rate-limit target-ip all maximum command in the system view.

4. Reconfigure the rate limit for ND packets or ND Miss packets (the value must be greater than the value queried in step 2) and check whether logs are reported.

  • If so, go to Step 5.
  • If not, go to Step 6.

5. Collect log and configuration information, and contact Huawei technical support personnel.

6. End.

Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
< Previous topic Next topic >