On a vlan facing IX we are getting a ton of log spam about “radvd invalid mtu 9000” etc, obviously it’s a peer on the IX with a invalid mtu (IX only 1500), is there anyway to suppress or filter this without disabling ipv6?
You should contact IXP support and register a ticket. It’s against IXP rules to flood RAs. Someone recently posted about it here.
Example from hAP ax3 core router deployment:
/ipv6 firewall raw
add action=drop chain=prerouting icmp-options=134:0-255 in-interface=vlanIX protocol=icmpv6
Neighbor Discovery packets received from upstream router are dropped.
This doesn’t solve the issue at scale, the RAs still flood the wire, still hits your port, still consumes CPU for which your firewall is using to drop it. Learn proper IXP rules and etiquettes.
I’m using
/system logging
set 2 topics=warning,!radvd
to tame /log print.