Configuring ARP detection ·········································································································································· 273
Introduction ·························································································································································· 273
Enabling ARP detection based on static IP source guard binding entries/DHCP snooping entries/802.1x
Configuring ND attack defense ····························································································································· 282
Overview ······································································································································································· 282
Introduction to ND detection ······························································································································ 283
Configuration guidelines ···································································································································· 284
Configuration procedure ···································································································································· 284
Network requirements ········································································································································· 285
Configuration procedure ···································································································································· 286
Configuring URPF ···················································································································································· 288
Overview ······································································································································································· 288
URPF check modes ·············································································································································· 288
URPF link layer check ·········································································································································· 288
How URPF works ················································································································································· 288
Configuring URPF ························································································································································· 289
URPF configuration example ······································································································································· 289
Configuring PKI ······················································································································································· 291
Overview ······································································································································································· 291
PKI terms ······························································································································································· 291
PKI architecture ···················································································································································· 292
PKI operation ······················································································································································· 293
PKI applications ··················································································································································· 293
PKI configuration task list ············································································································································ 293
Configuring an entity DN ············································································································································ 294
Configuring a PKI domain ··········································································································································· 295
Retrieving a certificate manually ································································································································ 298
Configuration guidelines ···································································································································· 298
Configuration procedure ···································································································································· 298
Deleting a certificate ···················································································································································· 300
Displaying and maintaining PKI ································································································································· 301
PKI configuration examples ········································································································································· 302
vii