i
Table of Contents
1 ARP Configuration·····································································································································1-1
Introduction to ARP·································································································································1-1
ARP Function ··································································································································1-1
ARP Message Format ·····················································································································1-1
ARP Table ·······································································································································1-3
ARP Process ···································································································································1-3
Introduction to ARP Attack Detection······························································································1-4
Introduction to Gratuitous ARP········································································································1-5
Configuring ARP ·····································································································································1-5
Configuring ARP Basic Functions ···································································································1-5
Configuring ARP Attack Detection ··································································································1-6
Configuring Gratuitous ARP····················································································································1-7
Displaying and Maintaining ARP·············································································································1-8
ARP Configuration Example ···················································································································1-8
ARP Basic Configuration Example··································································································1-8
ARP Attack Detection Configuration Example ················································································1-8