iTable of Contents1 ARP Configuration·····································································································································1-1Introduction to ARP ·································································································································1-1ARP Function ··································································································································1-1ARP Message Format ·····················································································································1-1ARP Table ·······································································································································1-3ARP Process ···································································································································1-3Introduction to Gratuitous ARP········································································································1-4Configuring ARP ·····································································································································1-5Configuring Gratuitous ARP····················································································································1-5Displaying and Debugging ARP··············································································································1-6ARP Configuration Examples ·················································································································1-62 ARP Attack Defense Configuration ·········································································································2-1ARP Attack Defense Configuration·········································································································2-1Introduction to Maximum Number of Dynamic ARP Entries a VLAN Interface Can Learn·············2-1Introduction to ARP Source MAC Address Consistency Check······················································2-1Introduction to ARP Attack Detection ······························································································2-1Introduction to ARP Packet Rate Limit ····························································································2-3Introduction to ARP Packet Filtering Based on Gateway's Address ···············································2-3Configuring ARP Attack Defense············································································································2-4ARP Attack Defense Configuration Task List··················································································2-4Configuring the Maximum Number of Dynamic ARP Entries that a VLAN Interface Can Learn ····2-5Configuring ARP Source MAC Address Consistency Check ··························································2-5ARP Packet Filtering Based on Gateway’s Address·······································································2-5Configuring ARP Attack Detection ··································································································2-6Configuring the ARP Packet Rate Limit Function ···········································································2-7ARP Attack Defense Configuration Example··························································································2-8ARP Attack Defense Configuration Example I ················································································2-8ARP Attack Defense Configuration Example II ·············································································2-10ARP Attack Defense Configuration Example III ············································································2-11ARP Attack Defense Configuration Example IV············································································2-113 Proxy ARP Configuration ·························································································································3-1Proxy ARP Overview·······························································································································3-1Introduction to Proxy ARP ···············································································································3-1Work Mechanism of Common Proxy ARP ······················································································3-1Local Proxy ARP ·····························································································································3-2Configuring Proxy ARP ···························································································································3-2Proxy ARP Configuration Examples ·······································································································3-3Common Proxy ARP Configuration Example··················································································3-3Local Proxy ARP Configuration in Port Isolation Application ··························································3-44 Resilient ARP Configuration ····················································································································4-1Introduction to Resilient ARP ··················································································································4-1Configuring Resilient ARP ······················································································································4-1