Introduction ·························································································································································· 334
Configuring ARP packet rate limit ····················································································································· 334
Introduction ·························································································································································· 335
Configuration procedure ···································································································································· 335
Introduction ·························································································································································· 337
Configuration procedure ···································································································································· 337
Introduction ·························································································································································· 337
Configuration procedure ···································································································································· 338
Configuring ARP detection ·········································································································································· 338
Introduction ·························································································································································· 338
Enabling ARP detection based on static IP source guard binding entries/DHCP snooping entries/802.1x
Introduction ·························································································································································· 345
Configuration procedure ···································································································································· 345
Introduction ·························································································································································· 346
Configuration procedure ···································································································································· 346
Configuring ARP filtering ············································································································································· 348
Introduction ·························································································································································· 348
Configuration procedure ···································································································································· 348
ND attack defense configuration ··························································································································· 350
Introduction to ND detection ······························································································································ 351
Configuring ND detection ·································································································································· 352
URPF configuration ·················································································································································· 355
URPF overview ······························································································································································ 355
What is URPF ······················································································································································· 355
URPF check modes ·············································································································································· 355
How URPF works ················································································································································· 356
Network application ··········································································································································· 359
Configuring URPF ························································································································································· 359
URPF configuration example ······································································································································· 359
viii