518
Enabling the RA guard logging feature
This feature allows a device to generate logs when it detects forged RA messages. Each log records
the following information:
•
Name of the interface that received the forged RA message.
•
Source IP address of the forged RA message.
•
Number of RA messages dropped on the interface.
To avoid excessive log output, the device output logs every two seconds.
To enable the RA guard logging feature:
Step Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Enable the RA guard logging
feature.
ipv6 nd raguard log enable
By default, the RA guard logging
feature is disabled.
Displaying and maintaining RA guard
Execute
display
commands in any view and
reset
commands in user view.
Task Command
Display the RA guard policy
configuration.
display ipv6 nd raguard policy
[
policy-name
]
Display RA guard statistics.
display ipv6 nd raguard statistics
[
interface
interface-type
interface-number
]
Clear RA guard statistics.
reset ipv6 nd raguard statistics
[
interface
interface-type
interface-number
]
RA guard configuration example
Network requirements
As shown in
, GigabitEthernet 1/0/1, GigabitEthernet 1/0/2, and GigabitEthernet 1/0/3 of
the switch are in VLAN 10.
Configure RA guard on the switch to filter forged and unwanted RA messages.
•
Configure an RA policy in VLAN 10 for GigabitEthernet 1/0/2 to filter all RA messages received
from the unknown device.
•
Specify
host
as the role of the host. All RA messages received on GigabitEthernet 1/0/1 are
dropped.
•
Specify
router
as the role of the router. All RA messages received on GigabitEthernet 1/0/2 are
forwarded.
Summary of Contents for 10500 series
Page 326: ...312 No duration limit for this SA ...