No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

Configuration Guide - Security

S9300, S9300E, and S9300X V200R011C10

This document describes the configurations of Security, including ACL, reflective ACL, local attack defense, MFF, attack defense, traffic suppression and storm control, ARP security, port security, DHCP snooping, ND snooping, PPPoE+, IPSG, SAVI, URPF, keychain, separating the management plane from the service plane, security risks.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Configuring Rate Limiting on ARP Miss Messages Globally, in a VLAN, or on an Interface

Configuring Rate Limiting on ARP Miss Messages Globally, in a VLAN, or on an Interface

Context

If a network device is flooded with IP packets that contain unresolvable destination IP addresses, the device generates a large number of ARP Miss messages. This is because the device has no ARP entry that matches the next hop of the route. IP packets triggering ARP Miss messages are sent to the device for processing. The device generates a large number of temporary ARP entries and sends many ARP Request packets to the network, consuming a large number of CPU and bandwidth resources.

To avoid the preceding problems, it is recommended that you configure rate limit on ARP Miss messages on the gateway.

  • Limiting the rate of ARP Miss messages globally: limits the number of ARP Miss messages processed on the entire device.

  • Limiting the rate of ARP Miss messages in a VLAN: limits the number of ARP Miss messages processed on all interfaces in a VLAN. The configuration in a VLAN does not affect IP packet forwarding on interfaces in other VLANs.

  • Limiting the rate of ARP Miss messages on an interface: limits the number of ARP Miss messages processed on an interface. The configuration on an interface does not affect IP packet forwarding on other interfaces.

If rate limit on ARP Miss messages is configured in the system view, VLAN view, and interface view, the device uses the configurations in the interface view, VLAN view, and system view in order.

If you want that the device can generate alarms to notify the network administrator of a large number of discarded ARP Miss packets, enable the alarm function. When the number of discarded ARP Miss packets exceeds the alarm threshold, the device generates an alarm.

Procedure

  1. Run system-view

    The system view is displayed.

  2. (Optional) Run interface interface-type interface-number or vlan vlan-id

    The interface view or VLAN view is displayed.

    NOTE:

    If you configure rate limiting on ARP Miss messages in the system view, skip the preceding step.

  3. (Optional) On an Ethernet interface, run undo portswitch

    The interface is switched to Layer 3 mode.

    By default, an Ethernet interface works in Layer 2 mode.

  4. Run arp-miss anti-attack rate-limit enable

    Rate limiting on ARP Miss messages is enabled.

    By default, rate limiting on ARP Miss messages is disabled.

  5. Run arp-miss anti-attack rate-limit packet packet-number [ interval interval-value ]

    The maximum rate and rate limiting duration of ARP Miss messages are set.

    By default, the device can process a maximum of 100 ARP Miss messages per second.

  6. (Optional) Run arp-miss anti-attack rate-limit alarm enable

    The alarm function for ARP Miss packets discarded when the rate of ARP Miss packets exceeds the limit is enabled.

    By default, the alarm function is disabled.

  7. (Optional) Run arp-miss anti-attack rate-limit alarm threshold threshold

    The alarm threshold for ARP Miss packets discarded when the rate of ARP Miss packets exceeds the limit is set.

    By default, the alarm threshold is 100.

Translation
Download
Updated: 2019-04-01

Document ID: EDOC1000178410

Views: 126732

Downloads: 25

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next