![Brocade Communications Systems ICX 7250 series Скачать руководство пользователя страница 154](http://html1.mh-extra.com/html/brocade-communications-systems/icx-7250-series/icx-7250-series_configuration-manual_2817203154.webp)
ND inspection, when enabled on a VLAN, checks all the neighbor discovery messages flowing through the switches between the hosts
that are part of the VLAN and validates the IP-to-MAC address binding of the packets. All the packets are verified against the trusted
binding tables where the preconfigured static ND inspection entries or dynamically learned DHCPv6 snoop entries are stored. DHCPv6
snooping must be enabled for dynamic inspection of ND messages. For more information on dynamically learned DHCPv6 snoop
entries, refer to the DHCPv6 section in the
Brocade FastIron Configuration Guide
.
To inspect a neighbor discovery message, all the neighbor solicitation and neighbor advertisement messages are directed to a CPU, and
the source IP address and source MAC address of each packet are validated against the entries in the trusted tables. Only the valid
packets are forwarded and those with invalid IP-to-MAC address bindings are discarded. ND inspection follows CPU-based packet
forwarding and thus the neighbor discovery messages in the ND inspection-enabled VLAN may get discarded depending on the CPU
load. The neighbor discovery messages are also rate limited to CPU.
The router interface configuration on the ND inspection-enabled VLAN is also subjected to ND inspection. That is, if the interface is a
Layer 3 interface, the neighbor solicitation and neighbor advertisement messages addressed to the router are also validated. If there is a
discrepancy in the IP-to-MAC address binding, the packets are discarded and the IPv6 neighbor tables will not be updated. Unlike the
neighbor solicitation and neighbor advertisement messages, the router solicitation messages are not directed to the CPU, because the
hosts are supposed to reject the router solicitation messages by default.
The following figure illustrates unhindered flow of packets from Host 1 to Host 2, while the messages that are sent by Host 3 with invalid
IP-to-MAC address bindings are discarded.
IPv6 neighbor discovery inspection
Brocade FastIron Layer 3 Routing Configuration Guide
154
53-1003903-04
Содержание ICX 7250 series
Страница 2: ...Brocade FastIron Layer 3 Routing Configuration Guide 2 53 1003903 04...
Страница 16: ...Brocade FastIron Layer 3 Routing Configuration Guide 16 53 1003903 04...
Страница 20: ...Brocade FastIron Layer 3 Routing Configuration Guide 20 53 1003903 04...
Страница 36: ...Brocade FastIron Layer 3 Routing Configuration Guide 36 53 1003903 04...
Страница 124: ...Brocade FastIron Layer 3 Routing Configuration Guide 124 53 1003903 04...
Страница 174: ...Brocade FastIron Layer 3 Routing Configuration Guide 174 53 1003903 04...
Страница 188: ...Brocade FastIron Layer 3 Routing Configuration Guide 188 53 1003903 04...
Страница 202: ...Brocade FastIron Layer 3 Routing Configuration Guide 202 53 1003903 04...
Страница 470: ...Brocade FastIron Layer 3 Routing Configuration Guide 470 53 1003903 04...