CHAPTE R
22-1
Cisco IE 3010 Switch Software Configuration Guide
OL-23145-01
22
Configuring Dynamic ARP Inspection
Note This chapter describes how to configure dynamic Address Resolution Protocol inspection (dynami c ARP
inspection) on the IE 3010 switch. This feature helps prevent malicious attacks on the switch by not
relaying invalid ARP requests and responses to other ports in the same VLAN. For complete syntax and
usage information for the commands used in this chapter, see the command reference for this release.
This chapter consists of these sections:
Understanding Dynamic ARP Inspection, page 22-1
Configuring Dynamic ARP Inspection, page 22-5
Displaying Dynamic ARP Inspection Information, page 22-14

Understanding Dynamic ARP Inspection

ARP provides IP communication within a Layer 2 broadcast domain by mapping an IP address t o a MAC
address. For example, Host B wants to send information to Host A but does not have the MAC address
of Host A in its ARP cache. Host B generates a broadcast message for all hosts within the broadcast
domain to obtain the MAC address associated with the IP address of Host A. All hosts within the
broadcast domain receive the ARP request, and Host A responds with its MAC address. However,
because ARP allows a gratuitous reply from a host even if an ARP request was not received, an ARP
spoofing attack and the poisoning of ARP caches can occur. After the attack, all traffic from the device
under attack flows through the attacker’s computer and then to the router, switch, or host.
A malicious user can attack hosts, switches, and routers connected to you r Layer 2 network by poisoning
the ARP caches of systems connected to the subnet and by intercepting traffic intended for other hosts
on the subnet. Figure 22-1 shows an example of ARP cache poisoning.
Figure 22-1 ARP Cache Poisoning
AB
C
Host A
(IA, MA)
Host B
(IB, MB)
Host C (man-in-the-middle)
(IC, MC)
111750