No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

Configuration Guide - Security

CloudEngine 8800, 7800, 6800, and 5800 V200R005C10

This document describes the configurations of Security, including ACL, local attack defense, MFF, attack defense, traffic suppression and storm control, ARP security, Port security, DHCP snooping, ND snooping, PPPoE+, IPSG, SAVI, separating the management plane from the service plane, security risks.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Configuring Rate Limiting on ARP Miss Messages Globally, in a VLAN, or on an Interface

Configuring Rate Limiting on ARP Miss Messages Globally, in a VLAN, or on an Interface

Context

If a user host sends a large number of IP packets with unresolvable destination IP addresses to a network device (the device has a route to the destination IP address of a packet but has no ARP entry matching the next hop of the route), the device generates a large number of ARP Miss messages. IP packets triggering ARP Miss messages are sent to the device for processing. The device generates a large number of temporary ARP entries and sends many ARP Request packets to the network, consuming a large number of CPU and bandwidth resources.

To avoid the preceding problems, it is recommended that you configure rate limit on ARP Miss messages on the gateway.

  • Limiting the rate of ARP Miss messages globally: limits the number of ARP Miss messages processed on the entire device.

  • Limiting the rate of ARP Miss messages in a VLAN: limits the number of ARP Miss messages processed on all interfaces in a VLAN. The configuration in a VLAN does not affect IP packet forwarding on interfaces in other VLANs.

  • Limiting the rate of ARP Miss messages on an interface: limits the number of ARP Miss messages processed on an interface. The configuration on an interface does not affect IP packet forwarding on other interfaces.

If rate limit on ARP Miss messages is configured in the system view, VLAN view, and interface view, the device uses the configurations in the interface view, VLAN view, and system view in order.

Procedure

  1. Run system-view

    The system view is displayed.

  2. (Optional) Run the interface interface-type interface-number command to enter the Layer 2 interface view, and then the undo portswitch command to enter the Layer 3 interface view. Alternatively, run the vlan vlan-id command to enter the VLAN view.

    NOTE:

    This step is not required when you configure ARP Miss rate limit in the system view.

  3. Run arp miss anti-attack rate-limit limit

    The maximum rate of ARP Miss messages is set.

    By default, the global rate limit on ARP Miss messages is 3000 packets per second, and the rate limit for ARP Miss messages in a VLAN or interface is disabled.

  4. Run commit

    The configuration is committed.

Translation
Download
Updated: 2019-04-20

Document ID: EDOC1100074765

Views: 18677

Downloads: 64

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next