
14. Anti-ARP-Spoofing
14.1.
Summary
According to the design of the ARP protocol, in order to reduce the excessive ARP data
communication in the network, a host, even if received ARP reply is not requested itself, it also can
insert it into the ARP cache table, but the ARP protocol itself does not check the validity of ARP
message it received. It will cause attackers using leaky agreement and forged IP address and MAC
address for ARP spoofing attacks.
In addition to cause the user privacy disclosure, ARP spoofing can also cause a network failure,
network impassability,etc.
Anti-ARP spoofing function will filter the possible ARP spoofing attacks by the establishment of anti
spoofing sheet, record suspicious attack source.
14.2.
Anti-ARP-Spoofing Configuration
14.2.1. Enable Anti-ARP-Spoofing
Please use the following command to configure Anti-ARP-Spoofing in interface configuration mode:
Command
Function
Switch(config-if-GigabitEthernet-0/1)
#
arp-inspection
Enable Anti-ARP-Spoofing function of the
port
Switch(config-link-aggregation1)#
arp
-inspection
Enable Anti-ARP-Spoofing function of the
link aggregation group.
The following example is to enable Anti-ARP-Spoofing function:
Switch#configure terminal
Enter configuration commands, one per line. End with CTRL+Z.
Switch(config)#interface gigabitEthernet 0/1
Switch(config-if-GigabitEthernet-0/1)#
arp-inspection
Switch#configure terminal
Enter configuration commands, one per line. End with CTRL+Z.
Switch(config)#link-aggregation 1
Switch(config-link-aggregation1)#
arp-inspection
14.2.2. Disable Anti-ARP-Spoofing
Please use the following command to configure Anti-ARP-Spoofing in interface configuration mode: