Chapter 12
| Security Measures
ARP Inspection
Configuring
Global Settings for
ARP Inspection
Command Usage
Enabling & Disabling ARP Inspection
◆
ARP Inspection is controlled on a global and VLAN basis.
◆
By default, ARP Inspection is disabled both globally and on all VLANs.
If ARP Inspection is globally enabled, then it becomes active only on the
■
VLANs where it has been enabled.
When ARP Inspection is enabled globally, all ARP request and reply packets
■
on inspection-enabled VLANs are redirected to the CPU and their switching
behavior handled by the ARP Inspection engine.
If ARP Inspection is disabled globally, then it becomes inactive for all
■
VLANs, including those where inspection is enabled.
When ARP Inspection is disabled, all ARP request and reply packets will
■
bypass the ARP Inspection engine and their switching behavior will match
that of all other packets.
Disabling and then re-enabling global ARP Inspection will not affect the
■
ARP Inspection configuration of any VLANs.
When ARP Inspection is disabled globally, it is still possible to configure
■
ARP Inspection for individual VLANs. These configuration changes will only
become active after ARP Inspection is enabled globally again.
◆
The ARP Inspection engine in the current firmware version does not support
ARP Inspection on trunk ports.
Use the Security > ARP Inspection (Configure General) page to enable ARP
inspection globally for the switch, to validate address information in each packet,
and configure logging.
Command Usage
ARP Inspection Validation
◆
By default, ARP Inspection Validation is disabled.
◆
Specifying at least one of the following validations enables ARP Inspection
Validation globally. Any combination of the following checks can be active
concurrently.
■
Destination MAC – Checks the destination MAC address in the Ethernet
header against the target MAC address in the ARP body. This check is
performed for ARP responses. When enabled, packets with different MAC
addresses are classified as invalid and are dropped.
– 280 –