D-Link DGS-1250 Emulator - Page 178

ip arp inspection limit

Page 178 highlights

DGS-1250 Series Gigabit Ethernet Smart Managed Switch CLI Reference Guide Parameters ARP-ACL-NAME vlan VLAN-ID , - static Specifies the access control list name with a maximum of 32 characters. Specifies the VLAN associated with the ARP access list. (Optional) Specifies a series of VLANs or separates a range of VLANs from a previous range. No space is allowed before or after the comma. (Optional) Specifies a range of VLANs. No space is allowed before or after the hyphen. (Optional) Specifies to drop the packet if the IP-to-Ethernet MAC binding pair is not permitted by the ARP ACL. Default None. Command Mode Global Configuration Mode. Usage Guideline Use this command to specify an ARP access list to be used for ARP inspection checks for the VLAN. Up to one access list can be specified for a VLAN. The dynamic ARP inspection checks the ARP packets received on the VLAN to verify that the binding pair of the source IP and source MAC address of the packet is valid. The validation process will match the address binging against the entries of the DHCP snooping database. If the command is configured, the validation process will match the address binging against the access list entries and the DHCP snooping database. ARP ACLs take precedence over entries in the DHCP snooping binding database. If the packet is explicitly denied by the access control list, the packet is dropped. If the packet is denied due to the implicit deny and the static parameter is not specified, the packet will be further matched against the DHCP snooping binding entries. If the packet is denied due to the implicit deny and the static parameter is specified, the packet will be dropped. Example This example shows how to apply the ARP ACL static ARP list to VLAN 10 for DAI. Switch# configure terminal Switch(config)# ip arp inspection filter static-arp-list vlan 10 Switch(config)# 23-5 ip arp inspection limit This command is used to limit the rate of incoming ARP requests and responses on an interface. Use the no form of this command to revert to the default settings. ip arp inspection limit {rate VALUE [burst interval SECONDS] | none} no ip arp inspection limit Parameters rate VALUE burst interval SECONDS Specifies the maximum number of the ARP packets that can be processed. The valid range is from 1 to 150 seconds. (Optional) Specifies the length of the burst duration of the ARP packets that is allowed. The valid range is from 1 to 15. If not specified, the default setting is one second. 175

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492
  • 493
  • 494
  • 495
  • 496
  • 497
  • 498
  • 499
  • 500
  • 501
  • 502
  • 503
  • 504
  • 505
  • 506
  • 507
  • 508
  • 509
  • 510
  • 511
  • 512
  • 513
  • 514
  • 515
  • 516
  • 517
  • 518
  • 519
  • 520
  • 521
  • 522
  • 523
  • 524
  • 525
  • 526
  • 527
  • 528
  • 529
  • 530
  • 531
  • 532
  • 533
  • 534
  • 535
  • 536
  • 537
  • 538
  • 539
  • 540
  • 541
  • 542
  • 543
  • 544
  • 545
  • 546
  • 547
  • 548
  • 549
  • 550
  • 551
  • 552
  • 553
  • 554
  • 555
  • 556
  • 557
  • 558
  • 559

DGS-1250 Series Gigabit Ethernet Smart Managed Switch CLI Reference Guide
175
Parameters
ARP-ACL-NAME
Specifies the access control list name with a maximum of 32 characters.
vlan
VLAN-ID
Specifies the VLAN associated with the ARP access list.
,
(Optional) Specifies a series of VLANs or separates a range of VLANs from a
previous range. No space is allowed before or after the comma.
-
(Optional) Specifies a range of VLANs. No space is allowed before or after the
hyphen.
static
(Optional) Specifies to drop the packet if the IP-to-Ethernet MAC binding pair is
not permitted by the ARP ACL.
Default
None.
Command Mode
Global Configuration Mode.
Usage Guideline
Use this command to specify an ARP access list to be used for ARP inspection checks for the VLAN. Up to one
access list can be specified for a VLAN.
The dynamic ARP inspection checks the ARP packets received on the VLAN to verify that the binding pair of the
source IP and source MAC address of the packet is valid. The validation process will match the address binging
against the entries of the DHCP snooping database. If the command is configured, the validation process will
match the address binging against the access list entries and the DHCP snooping database.
ARP ACLs take precedence over entries in the DHCP snooping binding database. If the packet is explicitly denied
by the access control list, the packet is dropped. If the packet is denied due to the implicit deny and the
static
parameter is not specified, the packet will be further matched against the DHCP snooping binding entries. If the
packet is denied due to the implicit deny and the
static
parameter is specified, the packet will be dropped.
Example
This example shows how to apply the ARP ACL static ARP list to VLAN 10 for DAI.
Switch# configure terminal
Switch(config)# ip arp inspection filter static-arp-list vlan 10
Switch(config)#
23-5
ip arp inspection limit
This command is used to limit the rate of incoming ARP requests and responses on an interface. Use the
no
form
of this command to revert to the default settings.
ip arp inspection limit {rate
VALUE
[burst interval
SECONDS
] | none}
no ip arp inspection limit
Parameters
rate
VALUE
Specifies the maximum number of the ARP packets that can be processed. The
valid range is from 1 to 150 seconds.
burst interval
SECONDS
(Optional) Specifies the length of the burst duration of the ARP packets that is
allowed. The valid range is from 1 to 15. If not specified, the default setting is one
second.