- Community Home
- >
- Networking
- >
- Switching and Routing
- >
- Web and Unmanaged
- >
- Re: HP 1920 and IP v6
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-08-2016 04:57 AM
11-08-2016 04:57 AM
HP 1920 and IP v6
I am guessing the answer is going to be no, but is it possible to bin all IPv6 traffic at the point of ingress (i.e. on the interface).
The reason I ask is because I beleive there may be some intel NICs on new laptops that are having a massive IPv6 neighbour discovery storm when they are supposed to be asleep. Given that we dont run IPv6 and the clients do not come under my remit, I need to bin this traffic before it gets onto the LAN if at all possible?
- Tags:
- IPv6
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-09-2016 04:51 AM
11-09-2016 04:51 AM
Re: HP 1920 and IP v6
I guess it would be possible by using IPv6 ACL Access Control List VLAN related (sort of packet filtering) to deny such type of ingress undesired traffic (QoS menu -> ACL IPv6 sub-menu)...try to see if the Configuring ACLs chapter of HPE OfficeConnect 1920 Switch Series User Guide is the right place to start with.
I'm not an HPE Employee

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-09-2016 04:57 AM
11-09-2016 04:57 AM
Re: HP 1920 and IP v6
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-12-2016 03:28 PM - edited 11-13-2016 08:22 AM
11-12-2016 03:28 PM - edited 11-13-2016 08:22 AM
Re: HP 1920 and IP v6
Probably related to your request: it looks like HPE already knows who is potentially causing massive IPv6 multicast traffic which floods...impacting globally on switch performances (read here).
I'm not an HPE Employee

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-15-2016 01:50 AM - edited 11-15-2016 05:02 AM
11-15-2016 01:50 AM - edited 11-15-2016 05:02 AM
Re: HP 1920 and IP v6
Many thanks parnassus, that looks really useful.
Now if only there was a way of seeing the peak %utilization of an interface on a 1920!!
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-15-2016 05:05 AM
11-15-2016 05:05 AM
Re: HP 1920 and IP v6
Does anyone know how to stop all IPv6 traffic on an interface?
Will this do it...
interface GigabitEthernet1/0/n
packet-filter ipv6 3010 inbound