i
Table of Contents
1 ARP Configuration·····································································································································1-1
Introduction to ARP·································································································································1-1
ARP Function ··································································································································1-1
ARP Message Format ·····················································································································1-1
ARP Table ·······································································································································1-3
ARP Process ···································································································································1-3
Introduction to Gratuitous ARP········································································································1-4
Configuring ARP ·····································································································································1-5
Configuring Gratuitous ARP····················································································································1-5
Displaying and Debugging ARP··············································································································1-6
ARP Configuration Examples ·················································································································1-6
2 ARP Attack Defense Configuration ·········································································································2-1
ARP Attack Defense Configuration·········································································································2-1
Introduction to Maximum Number of Dynamic ARP Entries a VLAN Interface Can Learn·············2-1
Introduction to ARP Source MAC Address Consistency Check······················································2-1
Introduction to ARP Attack Detection······························································································2-1
Introduction to ARP Packet Rate Limit····························································································2-3
Introduction to ARP Packet Filtering Based on Gateway's Address···············································2-3
Configuring ARP Attack Defense············································································································2-4
ARP Attack Defense Configuration Task List··················································································2-4
Configuring the Maximum Number of Dynamic ARP Entries that a VLAN Interface Can Learn ····2-5
Configuring ARP Source MAC Address Consistency Check··························································2-5
ARP Packet Filtering Based on Gateway’s Address·······································································2-5
Configuring ARP Attack Detection ··································································································2-6
Configuring the ARP Packet Rate Limit Function ···········································································2-7
ARP Attack Defense Configuration Example··························································································2-8
ARP Attack Defense Configuration Example I················································································2-8
ARP Attack Defense Configuration Example II·············································································2-10
ARP Attack Defense Configuration Example III············································································2-11
ARP Attack Defense Configuration Example IV············································································2-11
3 Proxy ARP Configuration ·························································································································3-1
Proxy ARP Overview·······························································································································3-1
Introduction to Proxy ARP···············································································································3-1
Work Mechanism of Common Proxy ARP ······················································································3-1
Local Proxy ARP ·····························································································································3-2
Configuring Proxy ARP···························································································································3-2
Proxy ARP Configuration Examples ·······································································································3-3
Common Proxy ARP Configuration Example··················································································3-3
Local Proxy ARP Configuration in Port Isolation Application ··························································3-4
4 Resilient ARP Configuration ····················································································································4-1
Introduction to Resilient ARP··················································································································4-1
Configuring Resilient ARP ······················································································································4-1