
Security Measures
168
Instruction Manual - NXA-ENET8-POE+
The following table lists the options on this page:
Perform these steps to configure global settings for ARP Inspection:
1.
Click
Security
>
ARP Inspection
.
2.
Select
Configure General
from the Step list.
3.
Enable ARP inspection globally, enable any of the address validation options, and adjust any of the logging parameters if
required.
4.
Click
Apply
.
Configuring VLAN Settings for ARP Inspection
Use the Security > ARP Inspection (Configure VLAN) page to enable ARP inspection for any VLAN and to specify the ARP ACL to
use.
Command Usage
ARP Inspection VLAN Filters (ACLs)
By default, no ARP Inspection ACLs are configured and the feature is disabled.
ARP Inspection ACLs are configured within the ARP ACL configuration page (see page 164).
ARP Inspection ACLs can be applied to any configured VLAN.
ARP Inspection uses the DHCP snooping bindings database for the list of valid IP-to-MAC address bindings. ARP ACLs take
precedence over entries in the DHCP snooping bindings database. The switch first compares ARP packets to any specified
ARP ACLs.
If Static is specified, ARP packets are only validated against the selected ACL - packets are filtered according to any
matching rules, packets not matching any rules are dropped, and the DHCP snooping bindings database check is bypassed.
If Static is not specified, ARP packets are first validated against the selected ACL; if no ACL rules match the packets, then
the DHCP snooping bindings database determines their validity.
The following table lists the options on this page:
Security - ARP Inspection Options
ARP Inspection Status
Enables ARP Inspection globally. (Default: Disabled)
ARP Inspection Validation
Enables extended ARP Inspection Validation if any of the following options are enabled. (Default:
Disabled)
• Dst-MAC - Validates the destination MAC address in the Ethernet header against the target MAC
address in the body of ARP responses.
• IP - Checks the ARP body for invalid and unexpected IP addresses. Sender IP addresses are
checked in all ARP requests and responses, while target IP addresses are checked only in ARP
responses.
• Allow Zeros - Allows sender IP address to be 0.0.0.0.
• Src-MAC - Validates the source MAC address in the Ethernet header against the sender MAC
address in the ARP body. This check is performed on both ARP requests and responses.
Log Message Number
The maximum number of entries saved in a log message. (Range: 0-256; Default: 5)
Log Interval
The interval at which log messages are sent. (Range: 0-86400 seconds; Default: 1 second)
FIG. 196
Configuring Global Settings for ARP Inspection
Security - ARP Inspection Options
VLAN
Identifier for configured VLANs
DAI Status
Enables Dynamic ARP Inspection for the selected VLAN. (Default: Disabled)
ACL Name
Allows selection of any configured ARP ACLs. (Default: None)
Static
When an ARP ACL is selected, and static mode also selected, the switch only performs ARP
Inspection and bypasses validation against the DHCP Snooping Bindings database. When an ARP
ACL is selected, but static mode is not selected, the switch first performs ARP Inspection and then
validation against the DHCP Snooping Bindings database. (Default: Disabled)