84
Egress Max
(kbps)
Specify the maximum egress bandwidth for the desired entry.
Click 
Save
 and click 
Apply
, then click 
Save
.
4.9  &RQILJXUH,30$&%LQGLQJ
We can effectively prevent ARP attack and IP embezzlement by enabling the IP&MAC 
binding. Within the local network, the device transmits IP packets to the certain target 
identified by the MAC address. Therefore, the IP and MAC address should be one-to-
one correspondence and their corresponding relations are maintained by the ARP 
table. ARP attack can use forged information to renewal the ARP table, and destroy 
the corresponding relations between IP and MAC addresses, which would prevent the 
communication between the device and the corresponding host. When the IP&MAC 
Binding function is enabled, the IP and MAC relations in the ARP table won’t be expired and 
renewed automatically, which effectively prevents the ARP attack.
Some functions such as access control and bandwidth control, are based on the IP 
addresses to identify the access clients. The network administrator can allocate every 
client a static IP, according to which he makes the access and bandwidth rules to control 
the clients’ online behavior and the bandwidth they’ve used. Some illegal users may 
change the IP address in order to get higher internet access. Enabling IP & MAC binding 
function can effectively prevent the IP embezzlement.
Note:
After IP & MAC binding function is enabled, the IP bound to the MAC cannot be used by other MACs. 
However this MAC can use other IPs within the same segment, which are not bounded by other 
MACs, to access the network.
Go to the 1HWZRUN page. In the ,30$&%LQGLQJ section, click 
Add
 and specify the IP 
address and MAC address.
Tips:
Click 
Import
 to quick import the entries in ARP table to IP & MAC Binding table. The imported 
entries are disabled by default. Select the desired entries and click 
Edit
 to enable it.