Through logs and traps for potential attacks, administrators can obtain ND running in real time, taking measures on the attacks.
After a rate limit is configured for ND or ND Miss messages, the device counts the number of received ND or ND Miss messages. If the number of ND or ND Miss messages received in a specified period exceeds the configured limit, the device discards excess ND or ND Miss messages. The device considers this is a potential attack, and records ND logs for the potential attack and sends the corresponding ND traps to the NMS.
If potential attacks frequently occur, the device generates a large number of logs and traps. To resolve this issue, configure a large interval for recording ND logs and sending ND traps.
The system view is displayed.
An interval for recording ND logs and sending ND traps is configured.
The configuration is committed.