Configuring Nd Attack Detection; About Nd Attack Detection; Configuration Guidelines - HPE FlexNetwork 10500 Series Security Configuration Manual

Hide thumbs Also See for FlexNetwork 10500 Series:
Table of Contents

Advertisement

The ND logging feature logs source MAC inconsistency events, and it sends the log messages to the
information center. The information center can then output log messages from different source
modules to different destinations. For more information about the information center, see Network
Management and Monitoring Configuration Guide.
To enable source MAC consistency check for ND messages:
Step
1.
Enter system view.
2.
Enable source MAC
consistency check for ND
messages.
3.
(Optional.) Enable the ND
logging feature.

Configuring ND attack detection

About ND attack detection

ND attack detection checks incoming ND messages for user validity to prevent spoofing attacks. It is
typically configured on access devices.
ND attack detection defines the following types of interfaces:
ND trusted interface—The device directly forwards ND messages or data packets received by
ND trusted interfaces. It does not perform user validity check.
ND untrusted interface—The device discards RA and redirect messages received by ND
untrusted interfaces. For other types of ND messages received by the ND untrusted interfaces,
the device checks the user validity.
ND attack detection compares the source IPv6 address and the source MAC address in an incoming
ND message against security entries from other modules.
If a match is found, the device verifies the user as legal in the receiving VLAN, and it forwards
the packet.
If no match is found, the device verifies the user as illegal, and it discards the ND message.
ND attack detection uses the following security entries for user validity check:
Static IPv6 source guard binding entries, which are created by using the ipv6 source binding
command. For information about IPv6 source guard, see
ND snooping entries. For information about ND snooping, see Layer 3–IP Services
Configuration Guide.
DHCPv6 snooping entries. For information about DHCPv6 snooping, see Layer 3–IP Services
Configuration Guide.

Configuration guidelines

Make sure one or more of the following features are configured to prevent ND untrusted interfaces
from dropping all received ND messages:
IPv6 source guard static bindings.
Command
system-view
ipv6 nd mac-check enable
ipv6 nd check log enable
532
Remarks
N/A
By default, source MAC consistency
check is disabled for ND messages.
By default, the ND logging feature is
disabled.
As a best practice, disable the ND
logging feature to avoid excessive ND
logs.
"Configuring IP source
guard."

Advertisement

Table of Contents
loading

Table of Contents