Configuring Nd Attack Defense; Overview; Configuring Source Mac Consistency Check For Nd Packets - HPE Moonshot 45Gc Security Configuration Manual

Switch module
Table of Contents

Advertisement

Configuring ND attack defense

Overview

Neighbor Discovery (ND) attack defense is able to identify forged ND packets to prevent ND attacks.
The IPv6 ND protocol does not provide any security mechanisms and is vulnerable to network
attacks. An attacker can send the forged ICMPv6 messages to perform ND attacks:
Forged NS/NA/RS messages with an IPv6 address of a victim host. The gateway and other
hosts update the ND entry for the victim with incorrect address information. As a result, all
packets intended for the victim are sent to the attacking host.
Forged RA packets with the IPv6 address of a victim gateway. As a result, all hosts attached to
the victim gateway maintain incorrect IPv6 configuration parameters and ND entries.
For information about the IPv6 ND protocol, see Layer 3–IP Services Configuration Guide.
Configuring source MAC consistency check for
ND packets
The source MAC consistency check feature is typically configured on gateways to prevent ND
attacks.
This feature checks the source MAC address and the source link-layer address for consistency for
each arriving ND packet.
If source MAC address and the source link-layer address are not the same, the device drops
the packet.
If the addresses are the same, the device continues learning ND entries.
The ND logging feature logs source MAC inconsistency events, and it sends the log messages to the
information center. The information center can then send log messages from different source
modules to different destinations. For more information about the information center, see Network
Management and Monitoring Configuration Guide.
To configure source MAC consistency check for ND packets:
Step
1.
Enter system view.
2.
Enable source MAC
consistency check for ND
packets.
3.
(Optional.) Enable the ND
logging feature.
Command
system-view
ipv6 nd mac-check enable
ipv6 nd check log enable
469
Remarks
N/A
By default, source MAC consistency
check is disabled for ND packets.
By default, the ND logging feature is
disabled.
As a best practice, HPE recommends
that you disable the ND logging
feature to avoid excessive ND logs.

Advertisement

Table of Contents
loading

Table of Contents