i
Table of Contents
1 ARP and IP Attack Defense Configuration ································································································ 1
ARP Packet Filtering Based on Gateway’s Address ················································································· 1
Introduction········································································································································· 1
Configuring ARP Packet Filtering······································································································· 1
Configuring the Maximum Number of Dynamic ARP Entries a VLAN Interface Can Learn······················ 2
Introduction········································································································································· 2
Configuring the Maximum Number of Dynamic ARP Entries that a VLAN Interface Can Learn ······· 2
ARP/IP Attack Defense Based on 802.1x·································································································· 3
Overview············································································································································· 3
Configuring 802.1x-Based ARP/IP Attack Defense ··········································································· 4
Configuring ARP Source MAC Address Consistency Check····································································· 4
Introduction········································································································································· 4
Enabling ARP Source MAC Address Consistency Check ································································· 5
ARP Attack Defense Configuration Example I··························································································· 5
Network Requirements ······················································································································· 5
Network Diagram································································································································ 5
Configuration Procedures··················································································································· 5
ARP Attack Defense Configuration Example II·························································································· 6
Network Requirements ······················································································································· 6
Network Diagram································································································································ 6
Configuration Procedures··················································································································· 6
ARP/IP Attack Defense Configuration Example III ···················································································· 7
Network Requirements ······················································································································· 7
Network Diagram································································································································ 7
Configuration Procedures··················································································································· 7