2-2Figure 2-1 Man-in-the-middle attackSwitchHost AHost BIP_ AMAC_ AIP_BMAC_BIP_CMAC_CHost CForgedARP replyForgedARP replyARP detection mechanismWith ARP detection enabled for a specific VLAN, ARP messages arrived on any interface in the VLANare redirected to the CPU to have their MAC and IP addresses checked. ARP messages that pass thecheck are forwarded, and other ARP messages are discarded.1) ARP detection based on DHCP snooping entries/802.1X security entries/static IP-to-MAC bindingsWith this feature enabled, the device compares the source IP and MAC addresses of an ARP packetreceived from the VLAN against the DHCP snooping entries, 802.1X security entries, or staticIP-to-MAC binding entries. You can specify a detection type or types as needed.After you enable ARP detection based on DHCP snooping entries for a VLAN,z Upon receiving an ARP packet from an ARP untrusted port, the device compares the ARP packetagainst the DHCP snooping entries. If a match is found, that is, the parameters (such as IP address,MAC addresses, port index, and VLAN ID) are consistent, the ARP packet passes the check; if not,the ARP packet cannot pass the check.z Upon receiving an ARP packet from an ARP trusted port, the device does not check the ARPpacket.z If ARP detection is not enabled for the VLAN, the ARP packet is not checked even if it is receivedfrom an ARP untrusted port.After you enable ARP detection based on 802.1X security entries, the device, upon receiving an ARPpacket from an ARP untrusted port, compares the ARP packet against the 802.1X security entries.z If an entry with identical source IP and MAC addresses, port index, and VLAN ID is found, the ARPpacket is considered valid.z If an entry with no matching IP address but with a matching OUI MAC address is found, the ARPpacket is considered valid.Otherwise, the packet is considered invalid and discarded.