iTable of Contents1 ARP Configuration·····································································································································1-1ARP Overview·········································································································································1-1ARP Function ··································································································································1-1ARP Message Format ·····················································································································1-1ARP Address Resolution Process···································································································1-2ARP Table ·······································································································································1-3Configuring ARP ·····································································································································1-3Configuring a Static ARP Entry ·······································································································1-3Configuring the Maximum Number of ARP Entries for an Interface ···············································1-4Setting the Aging Time for Dynamic ARP Entries ···········································································1-4Enabling the ARP Entry Check ·······································································································1-5ARP Configuration Example············································································································1-5Configuring Gratuitous ARP····················································································································1-6Introduction to Gratuitous ARP········································································································1-6Configuring Gratuitous ARP ············································································································1-6Displaying and Maintaining ARP·············································································································1-72 ARP Attack Defense Configuration ·········································································································2-1ARP Attack Defense Configuration Task List ·························································································2-1Configuring ARP Source Suppression····································································································2-2Introduction to ARP Source Suppression························································································2-2Configuring ARP Source Suppression ····························································································2-2Displaying and Maintaining ARP Source Suppression ···································································2-2Configuring ARP Active Acknowledgement ····························································································2-2Introduction to ARP Active Acknowledgement················································································2-2Configuring ARP Active Acknowledgement ····················································································2-2Configuring Source MAC Address Based ARP Attack Detection···························································2-3Introduction to Source MAC Address Based ARP Attack Detection···············································2-3Configuring Source MAC Address Based ARP Attack Detection ···················································2-3Displaying and Maintaining Source MAC Address Based ARP Attack Detection···························2-3Configuring ARP Packet Source MAC Address Consistency Check ·····················································2-4Introduction to ARP Packet Source MAC Address Consistency Check ·········································2-4Configuring ARP Packet Source MAC Address Consistency Check··············································2-4Configuring ARP Packet Rate Limit ········································································································2-4Introduction to ARP Packet Rate Limit ····························································································2-4Configuring the ARP Packet Rate Limit Function ···········································································2-4Configuring ARP Detection ·····················································································································2-5Introduction to ARP Detection ·········································································································2-5Enabling ARP Detection Based on DHCP Snooping Entries/Static IP-to-MAC Bindings···············2-6Configuring ARP Detection Based on Specified Objects ································································2-7Displaying and Maintaining ARP Detection·····················································································2-8ARP Detection Configuration Example ···························································································2-8