Configuration Guide NFPP Configuration
It prompts the following message when the NS-NA DoS attack was detected on
a port:
%NFPP_ND_GUARD-4-PORT_ATTACKED: NS-NA DoS attack was detected
on port Gi4/1. (2009-07-01 13:00:00)
The following is additional information of the sent TRAP packet :
NS-NA DoS attack was detected on port Gi4/1.
It prompts the following message when the RS DoS attack was detected on a
port:
%NFPP_ND_GUARD-4-PORT_ATTACKED: RS DoS attack was detected on
port Gi4/1. (2009-07-01 13:00:00)
The following is additional information of the sent TRAP packet :
RS DoS attack was detected on port Gi4/1.
It prompts the following message when the RA-REDIRECT DoS attack was
detected on a port:
%NFPP_ND_GUARD-4-PORT_ATTACKED: RA-REDIRECT DoS attack was
detected on port Gi4/1. (2009-07-01 13:00:00)
The following is additional information of the sent TRAP packet :
RA-REDIRECT DoS attack was detected on port Gi4/1.
This section shows the administrator how to configure the port-based rate-limit
and attack detection in the nfpp configuration mode and in the interface
configuration mode:
Configure the rate-limit of the ND packets
on the port, ranging from 1 to 9999, 15 by
default.
Configure the attack threshold, ranging
from 1 to 9999, 30 by default.
When the ND packet number on a port
exceeds the attack threshold, the CLI
prompts and the TRAP packets are sent.