10
15.3 COMMANDS FOR ARP CONFIGURATION ............................................. 184
15.3.1 arp .......................................................................................................... 184
15.3.2 clear arp-cache ..................................................................................... 185
15.3.3 debug arp .............................................................................................. 185
15.3.4 show arp................................................................................................ 186
15.3.5 show arp traffic .................................................................................... 187
CHAPTER 16 COMMANDS FOR ARP SCANNING PREVENTION
.................................................................................................. 188
16.1 ANTI-ARPSCAN ENABLE ..................................................................... 188
16.2 ANTI-ARPSCAN PORT-BASED THRESHOLD ........................................... 188
16.3 ANTI-ARPSCAN IP-BASED THRESHOLD ................................................ 189
16.4 ANTI-ARPSCAN TRUST ....................................................................... 189
16.5 ANTI-ARPSCAN TRUST IP ................................................................... 190
16.6 ANTI-ARPSCAN RECOVERY ENABLE .................................................... 190
16.7 ANTI-ARPSCAN RECOVERY TIME ......................................................... 191
16.8 ANTI-ARPSCAN LOG ENABLE .............................................................. 191
16.9 ANTI-ARPSCAN TRAP ENABLE ............................................................ 191
16.10 SHOW ANTI-ARPSCAN ..................................................................... 192
16.11 DEBUG ANTI-ARPSCAN .................................................................... 194
CHAPTER 17 COMMANDS FOR PREVENTING ARP SPOOFING
.................................................................................................. 195
17.1 IP ARP-SECURITY UPDATEPROTECT .................................................... 195
17.2 IP ARP-SECURITY LEARNPROTECT ...................................................... 195
17.3 IP ARP-SECURITY CONVERT ............................................................... 196
17.4 CLEAR IP ARP DYNAMIC ..................................................................... 196
CHAPTER 18 COMMAND FOR ARP GUARD ......................... 197
18.1 ARP-GUARD IP .................................................................................. 197
CHAPTER 19 COMMANDS FOR GRATUITOUS ARP
CONFIGURATION .................................................................... 198
19.1 IP GRATUITOUS-ARP .......................................................................... 198