i
Table of Contents
1 ARP Configuration·····································································································································1-1
Introduction to ARP ·································································································································1-1
ARP Function ··································································································································1-1
ARP Message Format ·····················································································································1-1
ARP Table ·······································································································································1-3
ARP Process ···································································································································1-3
Introduction to Gratuitous ARP········································································································1-4
Configuring ARP ·····································································································································1-4
Configuring Gratuitous ARP····················································································································1-5
Displaying and Debugging ARP··············································································································1-6
ARP Configuration Examples ·················································································································1-6
2 ARP Attack Defense Configuration ·········································································································2-1
ARP Attack Defense Configuration·········································································································2-1
Introduction to Maximum Number of Dynamic ARP Entries a VLAN Interface Can Learn·············2-1
Introduction to ARP Source MAC Address Consistency Check······················································2-1
Introduction to ARP Attack Detection ······························································································2-1
Introduction to ARP Packet Rate Limit ····························································································2-3
Introduction to ARP Packet Filtering Based on Gateway's Address ···············································2-3
Configuring ARP Attack Defense············································································································2-4
ARP Attack Defense Configuration Task List··················································································2-4
Configuring the Maximum Number of Dynamic ARP Entries that a VLAN Interface Can Learn ····2-5
Configuring ARP Source MAC Address Consistency Check ··························································2-5
ARP Packet Filtering Based on Gateway’s Address·······································································2-5
Configuring ARP Attack Detection ··································································································2-6
Configuring the ARP Packet Rate Limit Function ···········································································2-7
ARP Attack Defense Configuration Example··························································································2-8
ARP Attack Defense Configuration Example I ················································································2-8
ARP Attack Defense Configuration Example II ·············································································2-10
ARP Attack Defense Configuration Example III ············································································2-11
ARP Attack Defense Configuration Example IV············································································2-11