Web Management Guide-R01
Table Of Contents
- How to Use This Guide
- Contents
- Figures
- Tables
- Getting Started
- Web Configuration
- Using the Web Interface
- Basic Management Tasks
- Displaying System Information
- Displaying Hardware/Software Versions
- Configuring Support for Jumbo Frames
- Displaying Bridge Extension Capabilities
- Managing System Files
- Setting the System Clock
- Configuring the Console Port
- Configuring Telnet Settings
- Displaying CPU Utilization
- Configuring CPU Guard
- Displaying Memory Utilization
- Resetting the System
- Interface Configuration
- VLAN Configuration
- Address Table Settings
- Spanning Tree Algorithm
- Congestion Control
- Class of Service
- Quality of Service
- VoIP Traffic Configuration
- Security Measures
- AAA (Authentication, Authorization and Accounting)
- Configuring User Accounts
- Web Authentication
- Network Access (MAC Address Authentication)
- Configuring HTTPS
- Configuring the Secure Shell
- Access Control Lists
- Filtering IP Addresses for Management Access
- Configuring Port Security
- Configuring 802.1X Port Authentication
- DoS Protection
- DHCP Snooping
- DHCPv6 Snooping
- ND Snooping
- IPv4 Source Guard
- IPv6 Source Guard
- ARP Inspection
- Application Filter
- Basic Administration Protocols
- Configuring Event Logging
- Link Layer Discovery Protocol
- Simple Network Management Protocol
- Configuring Global Settings for SNMP
- Setting Community Access Strings
- Setting the Local Engine ID
- Specifying a Remote Engine ID
- Setting SNMPv3 Views
- Configuring SNMPv3 Groups
- Configuring Local SNMPv3 Users
- Configuring Remote SNMPv3 Users
- Specifying Trap Managers
- Creating SNMP Notification Logs
- Showing SNMP Statistics
- Remote Monitoring
- Switch Clustering
- Setting a Time Range
- Ethernet Ring Protection Switching
- OAM Configuration
- UDLD Configuration
- LBD Configuration
- Multicast Filtering
- Overview
- Layer 2 IGMP (Snooping and Query for IPv4)
- Configuring IGMP Snooping and Query Parameters
- Specifying Static Interfaces for a Multicast Router
- Assigning Interfaces to Multicast Services
- Setting IGMP Snooping Status per Interface
- Filtering IGMP Packets on an Interface
- Displaying Multicast Groups Discovered by IGMP Snooping
- Displaying IGMP Snooping Statistics
- Filtering and Throttling IGMP Groups
- MLD Snooping (Snooping and Query for IPv6)
- Configuring MLD Snooping and Query Parameters
- Setting Immediate Leave Status for MLD Snooping per Interface
- Specifying Static Interfaces for an IPv6 Multicast Router
- Assigning Interfaces to IPv6 Multicast Services
- Filtering MLD Query Packets on an Interface
- Showing MLD Snooping Groups and Source List
- Displaying MLD Snooping Statistics
- Filtering and Throttling MLD Groups
- Multicast VLAN Registration for IPv4
- IP Tools
- IP Configuration
- General IP Routing
- IP Services
- Appendices
Chapter 12
| Security Measures
ARP Inspection
– 386 –
◆ By default, ARP Inspection is disabled both globally and on all VLANs.
■
If ARP Inspection is globally enabled, then it becomes active only on the
VLANs where it has been enabled.
■
When ARP Inspection is enabled globally, all ARP request and reply packets
on inspection-enabled VLANs are redirected to the CPU and their switching
behavior handled by the ARP Inspection engine.
■
If ARP Inspection is disabled globally, then it becomes inactive for all
VLANs, including those where inspection is enabled.
■
When ARP Inspection is disabled, all ARP request and reply packets will
bypass the ARP Inspection engine and their switching behavior will match
that of all other packets.
■
Disabling and then re-enabling global ARP Inspection will not affect the
ARP Inspection configuration of any VLANs.
■
When ARP Inspection is disabled globally, it is still possible to configure
ARP Inspection for individual VLANs. These configuration changes will only
become active after ARP Inspection is enabled globally again.
◆ The ARP Inspection engine in the current firmware version does not support
ARP Inspection on trunk ports.
Configuring
Global Settings for
ARP Inspection
Use the Security > ARP Inspection (Configure General) page to enable ARP
inspection globally for the switch, to validate address information in each packet,
and configure logging.
Command Usage
ARP Inspection Validation
◆ By default, ARP Inspection Validation is disabled.
◆ Specifying at least one of the following validations enables ARP Inspection
Validation globally. Any combination of the following checks can be active
concurrently.
■
Destination MAC – Checks the destination MAC address in the Ethernet
header against the target MAC address in the ARP body. This check is
performed for ARP responses. When enabled, packets with different MAC
addresses are classified as invalid and are dropped.
■
IP – Checks the ARP body for invalid and unexpected IP addresses. These
addresses include 0.0.0.0, 255.255.255.255, and all IP multicast addresses.
Sender IP addresses are checked in all ARP requests and responses, while
target IP addresses are checked only in ARP responses.