hit counter script

Limiting The Rate Of Incoming Arp Packets - Cisco Catalyst 2960-X Security Configuration Manual

Cisco ios release 15.0(2)ex
Hide thumbs Also See for Catalyst 2960-X:
Table of Contents

Advertisement

Configuring Dynamic ARP Inspection
Command or Action
Step 13
configure terminal
Example:
Switch# configure terminal

Limiting the Rate of Incoming ARP Packets

The switch CPU performs dynamic ARP inspection validation checks; therefore, the number of incoming
ARP packets is rate-limited to prevent a denial- of-service attack.
When the rate of incoming ARP packets exceeds the configured limit, the switch places the port in the
error-disabled state. The port remains in that state until you enable error-disabled recovery so that ports
automatically emerge from this state after a specified timeout period.
Unless you configure a rate limit on an interface, changing the trust state of the interface also changes its
Note
rate limit to the default value for that trust state. After you configure the rate limit, the interface retains
the rate limit even when its trust state is changed. If you enter the no ip arp inspection limit interface
configuration command, the interface reverts to its default rate limit.
Follow these steps to limit the rate of incoming ARP packets. This procedure is optional.
OL-29048-01
Purpose
Enters the global configuration mode.
Catalyst 2960-X Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX
Limiting the Rate of Incoming ARP Packets
255

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents