Configuring The Maximum Number Of Attempts To Send An Ns Message For Dad; Configuring Nd Snooping - HP 3600 v2 Series Configuration Manual

Hide thumbs Also See for 3600 v2 Series:
Table of Contents

Advertisement

Configuring the maximum number of attempts to send an NS
message for DAD
An interface sends an NS message for DAD after acquiring an IPv6 address. If the interface does not
receive a response within a specific time (determined by the ipv6 nd ns retrans-timer command), it
continues to send an NS message. If the interface still does not receive a response after the number of
sent attempts reaches the threshold (specified with the ipv6 nd dad attempts command), the acquired
address is considered usable.
To configure the attempts to send an NS message for DAD:
Step
1.
Enter system view.
2.
Enter interface view.
3.
Configure the number of attempts to
send an NS message for DAD.

Configuring ND snooping

Introduction
The ND snooping feature is used in Layer 2 switching networks. It creates ND snooping entries using
DAD NS messages.
ND snooping entries are used to do the following:
Cooperate with the ND detection function. For more information about ND detection, see Security
Configuration Guide.
Cooperate with the IP Source Guard function. For more information about IP source guard, see
Security Configuration Guide.
Work in all SAVI scenarios. For more information about SAVI, see Security Configuration Guide.
After you enable ND snooping on a VLAN of a device, ND packets received by the interfaces of the
VLAN are redirected to the CPU. When ND snooping is enabled globally, the CPU uses the ND packets
to create or update ND snooping entries comprising source IPv6 address, source MAC address,
receiving VLAN, and receiving port information.
The following items describe how an ND snooping entry is created, updated, and aged out.
Create an ND snooping entry.
1.
The device only uses received DAD NS messages to create ND snooping entries.
Update an ND snooping entry.
2.
Upon receiving an ND packet, the device searches the ND snooping table for an entry containing
the source IPv6 address of the packet. If the entry was refreshed within one second, the device
does not update the entry. If the entry is not refreshed for more than one second, the device
matches the MAC address of the ND packet and the receiving port against that in the entry.
If both of them match those in the entry, the device updates the aging time of the ND snooping
entry.
Command
system-view
interface interface-type
interface-number
ipv6 nd dad attempts value
131
Remarks
N/A
N/A
Optional.
1 by default. When the value
argument is set to 0, DAD is
disabled.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents