When a user is connected to an EVPN MPLS network through a BD, IPv6 host neighbors are discovered in NS multicast mode. When a device receives an NS message for IPv6 address resolution, the device forwards the NS message in multicast mode in its BD. If a large number of NS messages are received within a specified period, forwarding all these NS messages on the EVPN occupies excessive network resources, which affects service running.
NS multicast suppression is introduced to solve this problem. With NS multicast suppression enabled, upon receipt of an NS message, a device checks whether the NS message contains information about the end user. If such information is contained in the request message, the device simply implements proxy ND or converts multicast streams to unicast streams, thereby reducing or suppressing NS message flooding.
On an EVPN MPLS network accessed through a BD, NS multicast suppression can be deployed to reduce or suppress NS message flooding, which alleviates network pressure and ensures normal service running.
NS Multicast Suppression
The basic principle of NS multicast suppression is that the local device collects the local IPv6 host information and generates an ND table (with the outbound interface information contained) or a proxy ND table. Then, the local device uses EVPN routes to flood ND entries or proxy ND entries. Upon receipt of the flooded entries, the remote device generates a proxy ND table. In this manner, when the device receives NS messages again, it searches the local proxy ND table first. If the matching IPv6 host information exists, the local device simply implements proxy ND or converts multicast streams to unicast streams.
For Layer 2 devices, the function to generate a proxy ND table needs to be enabled in a BD so that the entries of a proxy ND table generated on the host can be flooded to a remote device through EVPN routes. For Layer 3 devices, the function to generate an ND table needs to be enabled on a VBDIF interface so that the entries of an ND table generated on the host can be flooded to a remote device through EVPN routes.
The implementation procedure for Layer 2 devices is similar to that for Layer 3 devices. The following example describes the implementation procedure for Layer 2 devices.
Upon receipt of the NS unicast message converted from an NS multicast message, Host1 replies with an NA unicast message. Upon receipt of the NA unicast message, Host2 can obtain the MAC address of Host1.
Defense Against ND Spoofing Attacks
The enabling of NS multicast suppression can prevent against ND spoofing attacks. An ND spoofing attack means that an attacker associates its MAC address with the IPv6 address of a host so that any traffic destined for the IPv6 address can be sent to the attacker. With NS multicast suppression enabled, if such an attack is launched, the proxy ND table conflict detection mechanism triggers an IPv6 address conflict alarm, reminding users of the potential ND spoofing attack.
As shown in Figure 2, the following describes the implementation procedure of defense against ND spoofing attacks.
For Layer 2 devices, the function to generate a proxy ND table needs to be enabled in a BD so that the entries of a proxy ND table generated on the host can be flooded to a remote device through EVPN routes. For Layer 3 devices, the function to generate an ND table needs to be enabled on a VBDIF interface so that the entries of an ND table generated on the host can be flooded to a remote device through EVPN routes.
The implementation procedure for Layer 2 devices is similar to that for Layer 3 devices. The following example describes the implementation procedure for Layer 2 devices.
Host Migration
After NS multicast suppression is enabled, host migration is supported. As shown in Figure 3, the following describes the implementation procedure of host migration.
For Layer 2 devices, the function to generate a proxy ND table needs to be enabled in a BD so that the entries of a proxy ND table generated on the host can be flooded to a remote device through EVPN routes. For Layer 3 devices, the function to generate an ND table needs to be enabled on a VBDIF interface so that the entries of an ND table generated on the host can be flooded to a remote device through EVPN routes.
The implementation procedure for Layer 2 devices is similar to that for Layer 3 devices. The following example describes the implementation procedure for Layer 2 devices.