1-9Table 1-8 Display and debug ARPOperation Command RemarksDisplay specific ARP mappingtable entriesdisplay arp [ static | dynamic |ip-address ]Display the ARP mapping entriesrelated to a specified string in aspecified waydisplay arp [ dynamic | static ] | { begin| include | exclude } regular-expressionDisplay the number of the ARPentries of a specified typedisplay arp count [ [ dynamic | static ][ | { begin | include | exclude }regular-expression ] | ip-address ]Display the statistics about theuntrusted ARP packets droppedby the specified portdisplay arp detection statisticsinterface interface-typeinterface-numberDisplay the setting of the ARPaging timer display arp timer agingAvailable in anyview.Clear specific ARP entries reset arp [ dynamic | static | interfaceinterface-type interface-number ]Available in userview.ARP Configuration ExampleARP Basic Configuration ExampleNetwork requirementz Disable ARP entry check on the switch.z Set the aging time for dynamic ARP entries to 10 minutes.z Add a static ARP entry, with the IP address being 192.168.1.1, the MAC address being000f-e201-0000, and the outbound port being Ethernet1/0/10 of VLAN 1.Configuration procedure system-view[Sysname] undo arp check enable[Sysname] arp timer aging 10[Sysname] arp static 192.168.1.1 000f-e201-0000 1 Ethernet1/0/10ARP Attack Detection and Packet Rate Limit Configuration ExampleNetwork requirementsAs shown in Figure 1-4, Ethernet1/0/1 of Switch A connects to DHCP Server; Ethernet1/0/2 connects toClient A, Ethernet1/0/3 connects to Client B. Ethernet1/0/1, Ethernet1/0/2 and Ethernet1/0/3 belong toVLAN 1.z Enable DHCP snooping on Switch A and specify Ethernet1/0/1 as the DHCP snooping trusted port.z Enable ARP attack detection in VLAN 1 to prevent ARP man-in-the-middle attacks, and specifyEthernet1/0/1 as the ARP trusted port.z Enable the ARP packet rate limit function on Ethernet1/0/2 and Ethernet1/0/3 of Switch A, so as toprevent Client A and Client B from attacking Switch A through ARP traffic.