Introduction to ARP ·································································································································1-1
ARP Function ··································································································································1-1
ARP Message Format ·····················································································································1-1
ARP Table ·······································································································································1-3
ARP Process ···································································································································1-3
Configuring ARP ·····································································································································1-5
Configuring Gratuitous ARP····················································································································1-5
Displaying and Debugging ARP··············································································································1-6
ARP Configuration Examples ·················································································································1-6
ARP Attack Defense Configuration·········································································································2-1
Introduction to ARP Source MAC Address Consistency Check······················································2-1
>
3 Proxy ARP Configuration ·························································································································3-1
Proxy ARP Overview·······························································································································3-1
Introduction to Proxy ARP ···············································································································3-1
Local Proxy ARP ·····························································································································3-2
Configuring Proxy ARP ···························································································································3-2
4 Resilient ARP Configuration ····················································································································4-1
Introduction to Resilient ARP ··················································································································4-1
Configuring Resilient ARP ······················································································································4-1
Table of Contents
i