i 
Table of Contents 
1 ARP and IP Attack Defense Configuration ································································································1 
ARP Packet Filtering Based on Gateway’s Address ·················································································1 
Introduction·········································································································································1 
Configuring ARP Packet Filtering·······································································································1 
Configuring the Maximum Number of Dynamic ARP Entries a VLAN Interface Can Learn······················2 
Introduction·········································································································································2 
Configuring the Maximum Number of Dynamic ARP Entries that a VLAN Interface Can Learn ·······2 
ARP/IP Attack Defense Based on 802.1x··································································································3 
Overview·············································································································································3 
Configuring 802.1x-Based ARP/IP Attack Defense ···········································································4 
Configuring ARP Source MAC Address Consistency Check·····································································4 
Introduction·········································································································································4 
Enabling ARP Source MAC Address Consistency Check ·································································5 
ARP Attack Defense Configuration Example I···························································································5 
Network Requirements·······················································································································5 
Network Diagram································································································································5 
Configuration Procedures···················································································································5 
ARP Attack Defense Configuration Example II··························································································6 
Network Requirements·······················································································································6 
Network Diagram································································································································6 
Configuration Procedures···················································································································6 
ARP/IP Attack Defense Configuration Example III ····················································································7 
Network Requirements·······················································································································7 
Network Diagram································································································································7 
Configuration Procedures···················································································································7