574
C
HAPTER
54: ARP C
ONFIGURATION
With gratuitous ARP learning enabled on a device, each time the device receives a
gratuitous ARP packet, the device updates the ARP entry matching the packet in
the cache (if exists) by using the hardware address of the sender carried in the
gratuitous ARP packet.
Overview of gratuitous ARP update interval
When ARP aging timer expires, some hosts in the network directly delete the ARP
entries learned dynamically, incapable of updating ARP entries actively. These hosts
have to trigger a new ARP request packet with a new IP packet received to request
for the gateway address. As a host can buffer only one packet, when a ping is sent
with a long packet, multiple fragments will be lost, which interrupts the ping.
When network load or the CPU occupancy of the receiving host is high, ARP
packets may be lost or the host may be unable to process the ARP received timely.
In such a case, after the dynamic ARP entries on the host age out, the traffic
between the host and the sending device will remain interrupted before the host
learns the ARP entries on the sending device again.
To address this issue, you can configure the gratuitous ARP update interval on the
Switch 7750 Ethernet switches. With gratuitous ARP packets sent periodically, the
receiving host can update the ARP entry for the gateway in its ARP table timely. In
this way, the ARP entry for the gateway has been updated before the host ages
out the entry; therefore, this entry will not be deleted. This prevents traffic
interruption as mentioned above.
How gratuitous ARP update interval works
A switch periodically sends gratuitous ARP packets that carry the master IP address
and secondary IP address of VLAN interfaces and the IP addresses of all the VRRP
virtual routers to update the ARP entries on the device that is connected to the
switch and incapable of updating ARP entries actively.
If a small number of VLAN interfaces and VRRP backup groups are configured, it
takes a very time for the device to traverse all the VLAN interfaces and their IP
addresses. If the traffic loops without being limited, gratuitous ARP packets are
sent to the same IP address at an interval too short. This increases switch work
load and network traffic. To solve this problem, the device allows you to configure
the gratuitous ARP update interval.
Introduction to ARP
Attack Detection
If an attacker sends an ARP message with a fake source IP address to a gateway,
the gateway adds the IP-to-MAC mapping into its ARP mapping table. The
attacker may send ARP messages with all the IP addresses of the network segment
as the source IP addresses to the gateway, causing other devices unable to access
the network.
To guard against such attacks, Switch 7750 Ethernet switches support the ARP
attack detection feature. With this feature, you can limit the number of IP
addresses to be bound to a MAC address in a VLAN. If a MAC address is bound to
more than the specified number of IP addresses, it is considered an attacking MAC
address. Consequently, all the ARP messages containing the attacking MAC
address as the source MAC address will be discarded unless the ARP request is
sent from the local device.
Summary of Contents for Switch 7754
Page 32: ...32 CHAPTER 1 CLI OVERVIEW ...
Page 70: ...70 CHAPTER 5 LOGGING IN USING MODEM ...
Page 76: ...76 CHAPTER 7 LOGGING IN THROUGH NMS ...
Page 86: ...86 CHAPTER 9 CONFIGURATION FILE MANAGEMENT ...
Page 120: ...120 CHAPTER 13 ISOLATE USER VLAN CONFIGURATION ...
Page 126: ...126 CHAPTER 14 SUPER VLAN ...
Page 136: ...136 CHAPTER 16 IP PERFORMANCE CONFIGURATION ...
Page 152: ...152 CHAPTER 17 IPX CONFIGURATION ...
Page 164: ...164 CHAPTER 19 QINQ CONFIGURATION ...
Page 172: ...172 CHAPTER 21 SHARED VLAN CONFIGURATION ...
Page 182: ...182 CHAPTER 22 PORT BASIC CONFIGURATION ...
Page 198: ...198 CHAPTER 24 PORT ISOLATION CONFIGURATION ...
Page 208: ...208 CHAPTER 25 PORT SECURITY CONFIGURATION ...
Page 224: ...224 CHAPTER 27 DLDP CONFIGURATION ...
Page 232: ...232 CHAPTER 28 MAC ADDRESS TABLE MANAGEMENT ...
Page 240: ...240 CHAPTER 29 CENTRALIZED MAC ADDRESS AUTHENTICATION CONFIGURATION ...
Page 280: ...280 CHAPTER 30 MSTP CONFIGURATION ...
Page 348: ...348 CHAPTER 35 IS IS CONFIGURATION ...
Page 408: ...408 CHAPTER 39 802 1X CONFIGURATION ...
Page 412: ...412 CHAPTER 40 HABP CONFIGURATION ...
Page 422: ...422 CHAPTER 41 MULTICAST OVERVIEW ...
Page 426: ...426 CHAPTER 42 GMRP CONFIGURATION ...
Page 480: ...480 CHAPTER 47 PIM CONFIGURATION ...
Page 506: ...506 CHAPTER 48 MSDP CONFIGURATION ...
Page 552: ...552 CHAPTER 51 TRAFFIC ACCOUNTING CONFIGURATION ...
Page 570: ...570 CHAPTER 53 HA CONFIGURATION ...
Page 582: ...582 CHAPTER 54 ARP CONFIGURATION SwitchA arp protective down recover interval 200 ...
Page 622: ...622 CHAPTER 58 DHCP RELAY AGENT CONFIGURATION ...
Page 684: ...684 CHAPTER 61 QOS CONFIGURATION ...
Page 718: ...718 CHAPTER 63 CLUSTER ...
Page 738: ...738 CHAPTER 67 UDP HELPER CONFIGURATION ...
Page 752: ...752 CHAPTER 69 RMON CONFIGURATION ...
Page 772: ...772 CHAPTER 70 NTP CONFIGURATION ...
Page 796: ...796 CHAPTER 72 FILE SYSTEM MANAGEMENT ...
Page 802: ...802 CHAPTER 73 BIMS CONFIGURATION ...
Page 814: ...814 CHAPTER 74 FTP AND TFTP CONFIGURATION ...
Page 830: ...830 CHAPTER 75 INFORMATION CENTER ...
Page 836: ...836 CHAPTER 76 DNS CONFIGURATION ...
Page 852: ...852 CHAPTER 77 BOOTROM AND HOST SOFTWARE LOADING ...
Page 858: ...858 CHAPTER 78 BASIC SYSTEM CONFIGURATION DEBUGGING ...