Address Resolution Protocol (ARP) is used to resolve an IP address into the MAC address of the destination. This operates at layer 2 of the OSI model. It uses a look up table (ARP cache) to store the IP address to MAC address mapping. ARP inspection is used to prevent ARP cache poisoning. ARP cache poisoning can lead to unauthorized users to control and intercept the network traffic.
This article explains how to configure ARP inspection configuration on ESW2-350G switches.
• ESW2-350G
• ESW2-350G-DC
• v1.2.6.28
Step 1. Log in to the web configuration utility and choose Security > ARP Inspection > Properties. The Properties page opens:
Step 2. At the ARP Inspection Status field, check Enable to enable the ARP inspection feature. This feature is disabled by default.
Note: The ARP inspection is performed only on untrusted interfaces. Packets from trusted interfaces are forwarded.
Step 3. At the ARP Packet Validation field, check Enable to enable the packet validation in ARP. This feature is disabled by default. If this field is checked, the following values are compared with the existing databases to prevent outsider attacks:
• Source MAC — The source MAC address of the packet in the Ethernet header is compared against the MAC address of the sender in the ARP request. This check is performed on both ARP requests and responses.
• Destination MAC — The destination MAC address of the packet in the Ethernet header is compared against the MAC address of the destination interface. This check is performed for ARP responses only.
• IP Addresses — This compares the ARP data content for invalid and unexpected IP addresses. IP addresses include 0.0.0.0, 255.255.255.255 and all IP Multicast addresses.
Note: ARP inspection also uses a DHCP snooping binding database (if DHCP snooping is enabled) to counter-check the IP address of the packet in addition to its access control rules. Refer the article titled DHCP Snooping Binding Database Configuration on ESW2-350G Switches for more information.
Step 4. At the Log Buffer Interval field, click one of the radio buttons:
• Retry Frequency — Enables SYSLOG messages to be sent for dropped packets. Enter the frequency with which the messages are sent. The default frequency is 5 seconds. The range is from 0 to 86400 seconds.
• Never — Disables SYSLOG dropped packet messages.
Step 5. Click Apply to make the changes. The settings are defined and the running configuration file is updated.