iTable of Contents1 ARP and IP Attack Defense Configuration ································································································ 1ARP Packet Filtering Based on Gateway’s Address ················································································· 1Introduction········································································································································· 1Configuring ARP Packet Filtering······································································································· 1Configuring the Maximum Number of Dynamic ARP Entries a VLAN Interface Can Learn······················ 2Introduction········································································································································· 2Configuring the Maximum Number of Dynamic ARP Entries that a VLAN Interface Can Learn ······· 2ARP/IP Attack Defense Based on 802.1x·································································································· 3Overview············································································································································· 3Configuring 802.1x-Based ARP/IP Attack Defense ··········································································· 4Configuring ARP Source MAC Address Consistency Check····································································· 4Introduction········································································································································· 4Enabling ARP Source MAC Address Consistency Check ································································· 5ARP Attack Defense Configuration Example I··························································································· 5Network Requirements ······················································································································· 5Network Diagram································································································································ 5Configuration Procedures··················································································································· 5ARP Attack Defense Configuration Example II·························································································· 6Network Requirements ······················································································································· 6Network Diagram································································································································ 6Configuration Procedures··················································································································· 6ARP/IP Attack Defense Configuration Example III ···················································································· 7Network Requirements ······················································································································· 7Network Diagram································································································································ 7Configuration Procedures··················································································································· 7