i
Table of Contents
1 ARP and IP Attack Defense Configuration ································································································1
ARP Packet Filtering Based on Gateway’s Address ·················································································1
Introduction·········································································································································1
Configuring ARP Packet Filtering·······································································································1
Configuring the Maximum Number of Dynamic ARP Entries a VLAN Interface Can Learn······················2
Introduction·········································································································································2
Configuring the Maximum Number of Dynamic ARP Entries that a VLAN Interface Can Learn ·······2
ARP/IP Attack Defense Based on 802.1x··································································································3
Overview·············································································································································3
Configuring 802.1x-Based ARP/IP Attack Defense ···········································································3
Configuring ARP Source MAC Address Consistency Check·····································································4
Introduction·········································································································································4
Enabling ARP Source MAC Address Consistency Check ·································································5
ARP Attack Defense Configuration Example I···························································································5
Network Requirements·······················································································································5
Network Diagram································································································································5
Configuration Procedures···················································································································5
ARP Attack Defense Configuration Example II··························································································6
Network Requirements·······················································································································6
Network Diagram································································································································6
Configuration Procedures···················································································································6
ARP/IP Attack Defense Configuration Example III ····················································································7
Network Requirements·······················································································································7
Network Diagram································································································································7
Configuration Procedures···················································································································7