show arpinspection access-list
mac host
sender‐macaddr
vlan vlan‐range
static
Defaults
None.
Mode
Switch command, read‐write.
Usage
ARP ACLs are used to define static mappings for DAI. ARP ACLs are completely independent of
ACLs used for QoS. A maximum of 100 ARP ACLs can be configured. Within an ACL, a
maximum of 20 rules can be configured.
A static mapping associates an IP address to a MAC address on a VLAN. DAI consults its static
mappings before it consults the DHCP snooping bindings database — thus, static mappings have
precedence over DHCP snooping bindings.
Example
This example creates an ACL named staticARP and creates a permit rule for IP address
192.168.1.10. Then, the ACL is assigned to a VLAN as a static mapping.
C2(su)->set arpinspection filter staticARP permit ip host 192.168.1.10 mac host
00:01:22:33:44:55
C2(su)->set arpinspection filter staticARP vlan 10 static
show arpinspection access-list
Use this command to display ARP access list configuration information.
Syntax
show arpinspection access-list [acl-name]
Parameters
acl‐name
Defaults
If a specific ACL is not specified, information about all configured ARP ACLs is displayed.
Mode
Switch command, read‐write.
Example
This example displays information about the ARP ACL named staticARP.
C2(su)->show arpinspection access-list staticARP
17-24 DHCP Snooping and Dynamic ARP Inspection
Specifies the MAC address in the rule being created.
Specifies the VLAN or VLANs to which this ARP ACL is assigned.
(Optional) Specifies that this ARP ACL configures static mappings for
the VLAN or VLANs.
(Optional) Specifies the ARP ACL to display.
Need help?
Do you have a question about the SecureStack C2 C2G170-24 and is the answer not in the manual?
Questions and answers