iTable of Contents1 ARP Attack Protection Configuration······································································································1-1ARP Attack Protection Overview ············································································································1-1ARP Attack Protection Configuration Task List ······················································································1-1Configuring ARP Defense Against IP Packet Attacks ············································································1-2Introduction······································································································································1-2Configuring ARP Source Suppression ····························································································1-2Enabling ARP Black Hole Routing ··································································································1-3Displaying and Maintaining ARP Source Suppression ···································································1-3Configuring ARP Packet Rate Limit ········································································································1-3Introduction······································································································································1-3Configuration Procedure··················································································································1-3Configuring Source MAC Address Based ARP Attack Detection···························································1-4Introduction······································································································································1-4Configuration Procedure··················································································································1-4Displaying and Maintaining Source MAC Address Based ARP Attack Detection···························1-5Configuring ARP Packet Source MAC Address Consistency Check ·····················································1-5Introduction······································································································································1-5Configuration Procedure··················································································································1-5Configuring ARP Active Acknowledgement ····························································································1-5Introduction······································································································································1-5Configuring the ARP Active Acknowledgement Function ·······························································1-5Configuring ARP Detection ·····················································································································1-6Introduction to ARP Detection ·········································································································1-6Enabling ARP Detection Based on DHCP Snooping Entries/802.1x Security Entries/Static IP-to-MACBindings···········································································································································1-6Configuring ARP Detection Based on Specified Objects ································································1-9Displaying and Maintaining ARP Detection·····················································································1-9ARP Detection Configuration Example I ·······················································································1-10ARP Detection Configuration Example II ······················································································1-11