3com WX3000 Manuel D’Utilisation

Page de 715
 
1-8 
Displaying and Maintaining ARP 
To do… 
Use the command… 
Remarks 
Display specific ARP mapping table 
entries 
display arp [ static | dynamic | 
ip-address ] 
Display the ARP mapping entries 
related to a specified string in a 
specified way 
display arp [ dynamic | static ] | 
begin | include | exclude } text 
Display the number of the ARP 
entries of a specified type 
display arp count [ [ dynamic | 
static 
] [ | { begin | include | 
exclude 
} text ] | ip-address ] 
Display the statistics about the 
untrusted ARP packets dropped by 
the specified port 
display arp detection statistics 
interface
 interface-type 
interface-number
 
Display the setting of the ARP aging 
timer 
display arp timer aging 
Available in any view
Clear specific ARP entries 
reset arp [ dynamic | static | 
interface 
interface-type 
interface-number 
] 
Available in user view
 
ARP Configuration Example 
ARP Basic Configuration Example 
Network requirement 
Disable ARP entry check on the device. 
Set the aging time for dynamic ARP entries to 10 minutes. 
Add a static ARP entry, with the IP address being 192.168.1.1, the MAC address being 
000f-e201-0000, and the outbound port being GigabitEthernet 1/0/10 of VLAN 1. 
Configuration procedure 
<device> system-view 
[device] undo arp check enable 
[device] arp timer aging 10 
[device] arp static 192.168.1.1 000f-e201-0000 1 gigabitethernet 1/0/10 
ARP Attack Detection Configuration Example 
Network requirements 
As shown in 
, GigabitEthernet 1/0/1 of Switch A connects to DHCP Server; GigabitEthernet 
1/0/2 connects to Client A, GigabitEthernet 1/0/3 connects to Client B. GigabitEthernet 1/0/1, 
GigabitEthernet 1/0/2 and GigabitEthernet 1/0/3 belong to VLAN 1.  
Enable DHCP snooping on Switch A and specify GigabitEthernet 1/0/1 as the DHCP snooping 
trusted port. 
Enable ARP attack detection in VLAN 1 to prevent ARP man-in-the-middle attacks, and specify 
GigabitEthernet 1/0/1 as the ARP trusted port.