Overview ······································································································································································· 352
Enabling the SYN Cookie feature ······························································································································ 352
Configuring IP source guard ·································································································································· 354
Overview ······································································································································································· 354
Configuration task list ·················································································································································· 355
Troubleshooting IP source guard ································································································································ 371
Overview ······································································································································································· 372
Enabling ARP black hole routing ······················································································································· 374
Configuration example ······································································································································· 374
Introduction ·························································································································································· 376
Configuration procedure ···································································································································· 376
Configuration procedure ···································································································································· 377
Configuration example ······································································································································· 378
Introduction ·························································································································································· 379
Configuration procedure ···································································································································· 379
Introduction ·························································································································································· 379
Configuration procedure ···································································································································· 380
Configuring ARP detection ·········································································································································· 380
Introduction ·························································································································································· 380
Configuring user validity check ························································································································· 380
ix