Enhancements
Release M.10.35 Enhancements
An example of the ip source binding command is shown here:
ProCurve(config)# ip source binding
N o t e
Note that the ip source binding command is the same command used by the Dynamic IP Lockdown feature to configure static bindings. The Dynamic ARP Protection and Dynamic IP Lockdown features share a common list of source
Configuring Additional Validation Checks on ARP Packets
Dynamic ARP protection can be configured to perform additional validation checks on ARP packets. By default, no additional checks are performed. To configure additional validation checks, enter the arp protect validate command at the global configuration level.
Syntax: [no] arp protect validate
| in which the destination MAC address in the |
| Ethernet header does not mach the target MAC |
| address in the body of the ARP packet. |
ip | (Optional) Drops any ARP packet in which the |
| sender IP address is invalid. Drops any ARP |
| response packet in which the target IP address is |
| invalid. Invalid IP addresses include: 0.0.0.0, |
| 255.255.255.255, all IP multicast addresses, and |
| all Class E IP addresses. |
You can configure one or more of the validation checks. The following example of the arp protect validate command shows how to configure the validation checks for source MAC address and destination AMC address:
ProCurve(config)# arp protect validate
113