15-39
Catalyst 6500 Series Switch Software Configuration Guide—Release 8.7
OL-8978-04
Chapter 15 Configuring Access Control
Using VACLs in Your Network
Configuring Logging for ARP Traffic Inspection
To configure the logging option to log the ARP traffic-inspection packets that are dropped, perform this
task in privileged mode:
For detailed information on the VACL logging option, see the
“Configuring VACL Logging” section on
page 15-59
. This section also provides information on limiting the number of logged flows using the
set
security acl log maxflow
max_number
command.
To display the logged ARP traffic-inspection packets, perform this task in normal mode:
If you specify the optional
host
IP address
, only the ARP packets that advertise a binding for the
specified host IP address are displayed. If you specify the optional
vlan
vlan
keyword and argument, the
search is restricted to the specified VLAN.
Dynamic ARP Inspection
Note
Dynamic ARP inspection (DAI) is available only with Supervisor Engine 2 with PFC2, Supervisor
Engine 720 with PFC3A/PFC3B/PFC3BXL, and Supervisor Engine 32 with PFC3B/PFC3BXL.
These sections describe DAI:
•
Overview, page 15-39
•
Dynamic ARP Inspection Configuration Procedures, page 15-41
Overview
DAI uses the binding information that is built by DHCP snooping to enforce the advertisement of
bindings to prevent “man-in-the-middle” attacks. These attacks can occur when an attacker intercepts
and selectively modifies communicated data to masquerade as one or more of the entries in a
communication association. DAI adds an extra layer of security to ARP inspection by verifying that the
ARP packet’s MAC address and IP address match an existing DHCP snooping binding in the same
VLAN. The basic functionality and packet flow of ARP inspection remains unchanged except for the
addition of checks to ensure that a DHCP binding exists (see
Figure 15-8
for a logical flow chart).
Task
Command
Log the ARP traffic-inspection packets that are
dropped.
set security acl ip
acl_name
deny
arp-inspection
{
host
ip_address
{
any
|
mac_address
}
|
ip_address ip_mask
any
|
any
any
}
[
log
]
Task
Command
Display the logged ARP traffic-inspection packets.
show security acl log flow arp
[
host
ip_address
[
vlan
vlan
]]