No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

Configuration Guide - Security

S7700 and S9700 V200R011C10

This document describes the configurations of Security, including ACL, reflective ACL, local attack defense, MFF, attack defense, traffic suppression and storm control, ARP security, port security, DHCP snooping, ND snooping, PPPoE+, IPSG, SAVI, URPF, keychain, separating the management plane from the service plane, security risks.
Rate and give feedback :
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Configuring Rate Limiting on ARP Packets based on Source IP Addresses

Configuring Rate Limiting on ARP Packets based on Source IP Addresses

Context

When processing a large number of ARP packets with fixed IP addresses (for example, MAC addresses or outbound interfaces that match a source IP address frequently change), the CPU is overloaded and cannot process other services.

To prevent this problem, configure the gateway to limit the rate of ARP packets based on source IP addresses. The gateway collects statistics on ARP packets from a specified source IP address. If the number of ARP packets received in one second from the specified IP address exceeds the threshold, the device discards the excess ARP packets.

NOTE:

If the rate of ARP packets from a source IP address exceeds 30 pps, excess ARP packets are discarded. You can set the maximum rate to a large value when the gateway requests MAC addresses of multiple users in the same network segment. To prevent ARP-based scanning attacks, set the maximum rate to a small value.

Procedure

  1. Run system-view

    The system view is displayed.

  2. Configure rate limit on ARP packets based on source IP addresses.

    • Run arp speed-limit source-ip maximum maximum

      The maximum rate of ARP packets from any source IP address is set.

    • Run arp speed-limit source-ip ip-address maximum maximum

      The maximum rate of ARP packets from the specified source IP address is set.

    When both the preceding commands are executed, the maximum rate set using the arp speed-limit source-ip ip-address maximum maximum command takes effect on ARP packets from the specified source IP address, and the maximum rate set using the arp speed-limit source-ip maximum maximum command takes effect on ARP packets from other source IP addresses.

    By default, the device allows a maximum of 30 ARP packets from the same source IP address to pass through per second.

    After the optimized ARP reply function (disabled by default) is enabled using the undo arp optimized-reply disable command, rate limiting on ARP packets based on the source IP address does not take effect.

Translation
Download
Updated: 2019-04-01

Document ID: EDOC1000178319

Views: 135931

Downloads: 78

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next