Defense against invalid ND packet attacks controls the invalid ND packets (IPv6 NS/NA/RS/RA/Redirect/CPS) to be sent to the CPU. The forwarding engine supports the function of identifying NS/NA/RS/RA/Redirect/CPS packets, which has fragmented packets and the non-fragmented packets that do not match the local route discarded. However, the function of identifying NS/NA/RS/RA/Redirect/CPS packets is not enabled by default. You can run a specific command to enable this function.
Packet Type |
ICMP Type |
---|---|
RS |
0x85 |
RA |
0x86 |
NS |
0x87 |
NA |
0x88 |
Redirect |
0x89 |
CPS |
0x94 |
After defense against invalid ND packets is enabled on a device, the device discards the preceding packets.
Enable or disable defense against invalid ND packet attacks.
set nd packet filter enable
undo set nd packet filter enable
Check statistics about the function of defense against invalid ND packet attacks on all interface boards or a specified interface board.
display nd packet filter statistics [ slot slot-id ]
Clear statistics about the function of defense against invalid ND packet attacks on all interface boards or a specified interface board.
reset nd packet filter statistics [ slot slot-id ]
N/A