ARP Packet Validation
Validates ARP packets to avoid traffic interruption or loss.
To avoid traffic interruption or loss, ARP Packet Validation allows the user to detect and drop ARP packets that do not pass the ARP
validation process. ARP Packet Validation is disabled by default and can be enabled at the global configuration level. This functionality
can be configured for the destination MAC address, the IP address and the source MAC address or with a combination of these
parameters. The Ethernet header contains the destination MAC address and source MAC address, while the ARP packet contains the
sender hardware address and target hardware address.
Follow these steps to perform checks on the incoming ARP packets.
1. Enter the global configuration mode.
2. Run the
ip arp inspection validate [dst-mac | ip | src-mac]
command to perform a check on any incoming ARP packets. Use
one of the following parameters to run the validation check:
•
dst-mac
The destination MAC address in the Ethernet header must be the same as the target hardware address in the ARP body.
This validation is performed for the ARP response packet. When the destination MAC address validation is enabled, the
packets with different MAC addresses are classified as invalid and are dropped.
•
src-mac
The source MAC address in the Ethernet header and the sender hardware address in the ARP body must be the same. This
validation is performed for the ARP request and response packets. When the source MAC validation is enabled, the packets
with different MAC addresses are classified as invalid and are dropped.
•
ip
Each ARP packet has a sender IP address and target IP address. The target IP address cannot be invalid or an unexpected
IP address in the ARP response packet. The sender IP address cannot be an invalid or an unexpected IP address in the
ARP request and response packets. Addresses include 0.0.0.0, 255.255.255.255, and all IP multicast addresses. When
the IP address validation is enabled, the packets with invalid and unexpected IP addresses are classified as invalid and are
dropped.
The following example shows ARP packets being validated for the destination MAC address.
device(config)# configuration terminal
device(config)#ip arp inspection validate dst-mac
Ingress ARP packet priority
You can configure the priority of the ingress ARP packets to an optimum value that depends on your network configuration and traffic
volume. Ingress ARP packets have a default priority value of 4. At the default priority value, ingress ARP packets may get dropped
because of high traffic volume or non-ARP packets with higher priority values. This can cause devices to become unreachable. If the
ingress ARP packets have higher priority values than the default priority value, a high volume of ARP traffic may lead to drops in control
traffic. This may cause traffic loops in the network.
NOTE
You cannot change the priority of the ingress ARP packets on the management port.
Configuring the priority of ingress ARP packets
To configure the priority of ingress ARP packets, use the
arp-internal-priority
priority-value
command in global configuration
mode.
Configuring IP parameters - Layer 3 switches
FastIron Ethernet Switch Layer 3 Routing
58
53-1003627-04
Summary of Contents for FastIron SX 1600
Page 2: ...FastIron Ethernet Switch Layer 3 Routing 2 53 1003627 04 ...
Page 16: ...FastIron Ethernet Switch Layer 3 Routing 16 53 1003627 04 ...
Page 20: ...FastIron Ethernet Switch Layer 3 Routing 20 53 1003627 04 ...
Page 142: ...FastIron Ethernet Switch Layer 3 Routing 142 53 1003627 04 ...
Page 150: ...FastIron Ethernet Switch Layer 3 Routing 150 53 1003627 04 ...
Page 200: ...FastIron Ethernet Switch Layer 3 Routing 200 53 1003627 04 ...
Page 214: ...FastIron Ethernet Switch Layer 3 Routing 214 53 1003627 04 ...
Page 350: ...FastIron Ethernet Switch Layer 3 Routing 350 53 1003627 04 ...
Page 476: ...FastIron Ethernet Switch Layer 3 Routing 476 53 1003627 04 ...
Page 588: ...FastIron Ethernet Switch Layer 3 Routing 588 53 1003627 04 ...