No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

Configuration Guide - Security

CloudEngine 8800, 7800, 6800, and 5800 V200R005C10

This document describes the configurations of Security, including ACL, local attack defense, MFF, attack defense, traffic suppression and storm control, ARP security, Port security, DHCP snooping, ND snooping, PPPoE+, IPSG, SAVI, separating the management plane from the service plane, security risks.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Configuring Rate Limiting on ARP Packets based on Source MAC Addresses

Configuring Rate Limiting on ARP Packets based on Source MAC Addresses

Context

A large number of ARP packets with a fixed source MAC address and variable IP addresses will cause the CPU of a device to be overloaded and exhaust ARP entries.

To prevent this problem, configure the gateway to limit the rate of ARP packets based on MAC addresses. The gateway then collects statistics on ARP packets sent from certain MAC addresses to the CPU. If the number of ARP packets received in one second from the specified MAC address exceeds the threshold, the device discards the excess ARP packets.

Procedure

  1. Run system-view

    The system view is displayed.

  2. Configure rate limit on ARP packets based on source MAC addresses.

    • Run arp anti-attack rate-limit source-mac maximum maximum

      The maximum rate of ARP packets from any source MAC address is set

    • Run arp anti-attack rate-limit source-mac mac-address maximum maximum

      The maximum rate of ARP packets from the specified source MAC address is set.

    When both the preceding commands are executed, the maximum rate set using the arp anti-attack rate-limit source-mac mac-address maximum maximum command takes effect on ARP packets from the specified source MAC address, and the maximum rate set using the arp anti-attack rate-limit source-mac maximum maximum command takes effect on ARP packets from other source MAC addresses.

    By default, the maximum rate of ARP packets from each source MAC address is set to 0, that is, the rate of ARP packets is not limited based on source MAC addresses.

  3. Run commit

    The configuration is committed.

Translation
Download
Updated: 2019-04-20

Document ID: EDOC1100074765

Views: 22912

Downloads: 93

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next