Purpose
Command or Action
Example:
Enters the global configuration mode.
configure terminal
Example:
Switch#
configure terminal
Step 2
Enable dynamic ARP inspection on a per-VLAN basis. By default, dynamic
ARP inspection is disabled on all VLANs. For vlan-range, specify a single
ip arp inspection vlan vlan-range
Example:
Step 3
VLAN identified by VLAN ID number, a range of VLANs separated by a
hyphen, or a series of VLANs separated by a comma. The range is 1 to
4094. Specify the same VLAN ID for both switches.
Specify the interface connected to the other switch, and enter interface
configuration mode.
Interfaceinterface-id
Example:
Step 4
Configure the connection between the switches as trusted.
ip arp inspection trust
Step 5
Example:
By default, all interfaces are untrusted.
The switch does not check ARP packets that it receives from the other
switch on the trusted interface. It simply forwards the packets.
For untrusted interfaces, the switch intercepts all ARP requests and
responses. It verifies that the intercepted packets have valid IP-to-MAC
address bindings before updating the local cache and before forwarding the
packet to the appropriate destination. The switch drops invalid packets and
logs them in the log buffer according to the logging configuration specified
with the ip arp inspection vlan logging global configuration command. For
more information, see the
“
Configuring the Log Buffer
”
section on page
xxx.
Return to privileged EXEC mode.
end
Example:
Step 6
Verify the dynamic ARP inspection configuration.
show ip arp inspection interfacesshow
ip arp inspection vlan vlan-range
Step 7
Example:
Verify the DHCP bindings.
show ip dhcp snooping binding
Example:
Step 8
Check the dynamic ARP inspection statistics.
show ip arp inspection statistics vlan
vlan-range
Step 9
Example:
Catalyst 2960-XR Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX1
206
OL-29434-01
Configuring Dynamic ARP Inspection
Configuring Dynamic ARP Inspection in DHCP Environments