- Table of Contents
-
- 09 Security Command Reference
- 00-Preface
- 01-AAA commands
- 02-802.1X commands
- 03-MAC authentication commands
- 04-Portal commands
- 05-Port security commands
- 06-Password control commands
- 07-Public key management commands
- 08-PKI commands
- 09-IPsec commands
- 10-SSH commands
- 11-SSL commands
- 12-IP source guard commands
- 13-ARP attack protection commands
- 14-MFF commands
- 15-uRPF commands
- 16-Crypto engine commands
- 17-FIPS commands
- 18-Attack detection and prevention commands
- 19-ND attack defense commands
- Related Documents
-
Title | Size | Download |
---|---|---|
19-ND attack defense commands | 50.3 KB |
ipv6 nd check log enable
Use ipv6 nd check log enable to enable the ND logging feature.
Use undo ipv6 nd check log enable to restore the default.
Syntax
ipv6 nd check log enable
undo ipv6 nd check log enable
Default
The ND logging feature is disabled.
Views
System view
Predefined user roles
network-admin
Usage guidelines
The ND logging feature logs source MAC inconsistency events, and sends the log messages to the information center. You can configure the information center module to set the log output rules. For more information about the information center, see Network Management and Monitoring Configuration Guide.
H3C recommends that you disable the ND logging feature to avoid excessive ND logs.
Examples
# Enable the ND logging feature.
<Sysname> system-view
[Sysname] ipv6 nd check log enable
Related commands
ipv6 nd mac-check enable
ipv6 nd mac-check enable
Use ipv6 nd mac-check enable to enable source MAC consistency check for ND packets.
Use undo ipv6 nd mac-check enable to restore the default.
Syntax
ipv6 nd mac-check enable
undo ipv6 nd mac-check enable
Default
Source MAC consistency check for ND packets is disabled.
Views
System view
Predefined user roles
network-admin
Usage guidelines
This feature is typically configured on a gateway. The gateway checks the source MAC address and the source link-layer address for consistency for each ND packet. If an inconsistency is found, the gateway drops the ND packet. If the ND logging feature is enabled, the gateway also logs the packet dropping event.
Examples
# Enable source MAC consistency check for ND packets.
<Sysname> system-view
[Sysname] ipv6 nd mac-check enable