22-5
Cisco IE 3010 Switch Software Configuration Guide
OL-23145-01
Chapter 22 Configuring Dynamic ARP Inspection
Configuring Dynamic ARP Inspection
Configuring Dynamic ARP Inspection
These sections contain this configuration information:
Default Dynamic ARP Inspection Configuration, page 22-5
Dynamic ARP Inspection Configuration Guidelines, page 22-5
Configuring Dynamic ARP Inspection in DHCP Environments, page 22-7 (required in DHCP
environments)
Configuring ARP ACLs for Non-DHCP Environments, page 22-8 (required in non-DHCP
environments)
Limiting the Rate of Incoming ARP Packets, page 22-10 (optional)
Performing Validation Checks, page 22-11 (optional)
Configuring the Log Buffer, page 22-12 (optional)

Default Dynamic ARP Inspection Configuration

Table 22-1 shows the default dynamic ARP inspection configuration.

Dynamic ARP Inspection Configuration Guidelines

These are the dynamic ARP inspection configuration guidelines:
Dynamic ARP inspection is an ingress security feature; it does not perform any egress checking.
Tab l e 22-1 Default Dynamic ARP Inspection Configuration
Feature Default Setting
Dynamic ARP inspection Disabled on all VLANs.
Interface trust state All interfaces are untrusted.
Rate limit of incoming ARP packets The rate is 15 pps on untrusted interfaces, assuming that
the network is a switched network with a host
connecting to as many as 15 new hosts per second.
The rate is unlimited on all trusted interfaces.
The burst interval is 1 second.
ARP ACLs for non-DHCP environments No ARP ACLs are defined.
Validation checks No checks are performed.
Log buffer When dynamic ARP inspection is enabled, all denied or
dropped ARP packets are logged.
The number of entries in the log is 32.
The number of system messages is limited to 5 per
second.
The logging-rate interval is 1 second.
Per-VLAN logging All denied or dropped ARP packets are logged.