479
Configuration guidelines
Make sure one or more of the following features are configured to prevent ND untrusted interfaces
from dropping all received ND messages:
•
IPv6 source guard static bindings.
To make the bindings effective for ND attack detection, you must specify the
vlan
vlan
-
id
option
in the
ipv6 source binding
command, and enable ND attack detection for the same VLAN.
•
DHCPv6 snooping.
•
ND snooping.
Configuration procedure
To configure ND attack detection:
Step Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Enter VLAN view.
vlan vlan-id
N/A
3.
Enable ND attack detection.
ipv6 nd detection enable
By default, ND attack detection is
disabled.
4.
Return to system view.
quit
N/A
5.
Enter Layer 2 Ethernet or
aggregate interface view.
interface
interface-type
interface-number
N/A
6.
(Optional.) Configure the
interface as ND trusted
interface.
ipv6 nd detection trust
By default, all interfaces are ND
untrusted interfaces.
Displaying and maintaining ND attack detection
Execute
display
commands in any view and
reset
commands in user view.
Task Command
Display statistics for ND messages
dropped by ND attack detection.
display ipv6 nd detection statistics
[
interface
interface-type
interface-number
]
Clear ND attack detection statistics.
reset ipv6 nd detection statistics
[
interface
interface-type
interface-number
]
ND attack detection configuration example
Network requirements
As shown in
, configure ND attack detection on Device B to check user validity for ND
messages from Host A and Host B.
Содержание FlexFabric 5940 SERIES
Страница 251: ...238 ...