37-2kFigure 37-1 Network diagram for ARP man-in-the-middle attacHost AIP_AMAC_AHost BIP_BMAC_BHost CIP_ CMAC_ CSwitchInvalidARP replyInvalidARP replyARP attack detectionTo guard against the man-in-the-middle attacks launched by hackers or attackers, S4500 seriesEthernet switches support the ARP attack detection function.After you enable ARP attack detection for a VLAN,z When receiving an ARP request or response packet from an ARP untrusted port, the devicedelivers the ARP packet to the CPU to check the validity of the packet. If the packet is considered tobe valid, it is forwarded; otherwise, it is discarded.z ARP packets received from a trusted port of the VLAN are forwarded without validity check.After validity check, users are determined to be valid or invalid on the ports of the VLAN. Validity checkcan be based on DHCP-snooping entries, IP static binding entries, or IP-to-MAC mappings ofauthenticated 802.1x users, according to different network environments.z If all the clients connected to the switch use IP addresses obtained through DHCP, you arerecommended to enable DHCP snooping on the switch. The switch then checks validity of packetsbased on DHCP-snooping entries.z If the clients connected to the switch use IP addresses configured manually and are few in number,you are recommended to configure IP static binding entries on the switch. The switch then checksvalidity of packets based on IP static binding entries.z If a large number of 802.1x clients connected to the switch use IP addresses configured manually,you are recommended to enable ARP attack detection based on authenticated 802.1x clients onthe switch. The switch then records mappings between IP addresses (both static and dynamic IPaddresses) and MAC addresses of authenticated 802.1x clients and uses the mappings for ARPattack detection together with DHCP-snooping entries and IP static binding entries.