No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

CLI-based Configuration Guide - Security

AR500, AR510, and AR530 V200R007

This document describes the configurations of Security, including AAA, DAA,NAC, BRAS Access, ACL, Firewall, Deep Security Defense, Local Attack Defense;Attack Defense, Traffic Suppression, ARP Security, Port Security, DHCP Snooping, IPSG, URPF, PKI, SSL, HTTPS, Keychain, separating the management plane from the service plane, security risks.
Rate and give feedback :
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Rate Limiting on ARP Miss Messages

Rate Limiting on ARP Miss Messages

When a user host sends a large number of IP packets with unresolvable destination IP addresses to attack a network device (the device has a route to the destination IP address of a packet but has no ARP entry matching the next hop of the route), the device generates a large number of ARP Miss messages. IP packets (ARP Miss packets), which trigger ARP Miss messages, are sent to the control board for processing. The device generates and delivers many temporary ARP entries according to the ARP Miss messages, and sends a large number of ARP Request packets to the destination network. This increases CPU usage of the device and consumes considerable network bandwidth. As shown in Figure 10-1, the attacker sends IP packets with the unresolvable destination IP address 10.2.1.5/24 to the gateway.

Figure 10-1  ARP Miss

To avoid the preceding problems, the device takes measures to limit the rate of ARP Miss messages.

  • Limiting the rate of ARP Miss messages based on source IP addresses

    If the number of ARP Miss messages triggered by IP packets and sent from a source IP address per second exceeds the limit, the device considers that an attack has been initiated by this source IP address.

    If a source IP address is specified, the rate of ARP Miss messages triggered by IP packets from this source IP address is limited. If no source IP address is specified, the rate of ARP Miss messages triggered by IP packets from any source IP address is limited.

  • Limiting the rate of ARP Miss messages globally

    The device limits the number of all ARP Miss messages.

  • Limiting the rate of ARP Miss messages by setting the aging time of temporary ARP entries

    When IP packets trigger ARP Miss messages, the device generates temporary ARP entries and sends ARP Request packets to the destination network.
    • In the aging time of temporary ARP entries:
      • Before receiving an ARP reply packet, the device discards the IP packets matching the temporary ARP entry and does not generate ARP Miss messages.
      • After receiving an ARP Reply packet, the device generates a correct ARP entry to replace the temporary entry.
    • When temporary ARP entries age out, the device clears them. If no ARP entry matches the IP packets forwarded by the device, ARP Miss messages and temporary ARP entries are repeatedly generated.

    When a device undergoes an ARP Miss attack, you can extend the aging time of temporary ARP entries and reduce the frequency of triggering ARP Miss messages to mitigate the impact on the device.

Translation
Download
Updated: 2019-05-25

Document ID: EDOC1000097287

Views: 13468

Downloads: 40

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next