H3C Low-End Ethernet Switches Configuration ExamplesARP Attack Prevention Table of ContentsiTable of ContentsChapter 1 ARP Attack Prevention Overview .............................................................................. 1-11.1 Introduction to ARP Attacks............................................................................................... 1-11.2 ARP Attack Prevention ...................................................................................................... 1-41.2.1 DHCP Snooping Function ....................................................................................... 1-41.2.2 IP Static Binding ...................................................................................................... 1-51.2.3 ARP Attack Detection.............................................................................................. 1-51.2.4 ARP Packet Rate Limit............................................................................................ 1-61.2.5 Attack Prevention with the Support of a CAMS Server........................................... 1-61.3 Configuring ARP Attack Prevention................................................................................... 1-71.4 Device Models that Supports ARP Attack Prevention ....................................................... 1-8Chapter 2 Configuration Examples ............................................................................................. 2-12.1 Configuration Example for ARP Attack Prevention in DHCP Snooping Mode.................. 2-12.1.1 Network Requirements............................................................................................ 2-12.1.2 Network Diagram..................................................................................................... 2-22.1.3 Configuration Considerations.................................................................................. 2-22.1.4 Configuration Procedures ....................................................................................... 2-22.1.5 Configuration Guidelines......................................................................................... 2-62.2 Configuration Example for ARP Attack Prevention in Authentication Mode ..................... 2-72.2.1 Network Requirements............................................................................................ 2-72.2.2 Network Diagram..................................................................................................... 2-82.2.3 Configuration Considerations.................................................................................. 2-82.2.4 Configuration Procedures ....................................................................................... 2-82.2.5 Configuration Guidelines....................................................................................... 2-20