mac
Content
15
21.2.29 show ipv6 neighbors ............................................................................ 280
21.2.30 show ipv6 traffic ................................................................................... 281
21.2.31 show ipv6 redirect ................................................................................ 282
21.3 COMMANDS FOR ARP CONFIGURATION .............................................. 282
21.3.1 arp .......................................................................................................... 282
21.3.2 clear arp-cache ...................................................................................... 282
21.3.3 clear arp traffic........................................................................................ 282
21.3.4 debug arp ............................................................................................... 283
21.3.5 ip proxy-arp ............................................................................................ 283
21.3.6 l3 hashselect .......................................................................................... 283
21.3.7 show arp ................................................................................................. 283
21.3.8 show arp traffic ....................................................................................... 285
CHAPTER 22 COMMANDS FOR ARP SCANNING
PREVENTION……………………………………………………….286
22.1 ANTI-ARPSCAN ENABLE ...................................................................... 286
22.2 ANTI-ARPSCAN PORT-BASED THRESHOLD ............................................ 286
22.3 ANTI-ARPSCAN IP-BASED THRESHOLD ................................................. 287
22.4 ANTI-ARPSCAN TRUST ....................................................................... 287
22.5 ANTI-ARPSCAN TRUST IP .................................................................... 288
22.6 ANTI-ARPSCAN RECOVERY ENABLE ..................................................... 288
22.7 ANTI-ARPSCAN RECOVERY TIME .......................................................... 289
22.8 ANTI-ARPSCAN LOG ENABLE ............................................................... 289
22.9 ANTI-ARPSCAN TRAP ENABLE ............................................................. 289
22.10 SHOW ANTI-ARPSCAN ...................................................................... 290
22.11 DEBUG ANTI-ARPSCAN ..................................................................... 291
CHAPTER 23 COMMANDS FOR PREVENTING ARP
SPOOFING…………………………………………………………..293
23.1 IP ARP-SECURITY UPDATEPROTECT ..................................................... 293
23.2 IPV6 ND-SECURITY UPDATEPROTECT .................................................. 293
23.3 IP ARP-SECURITY LEARNPROTECT ....................................................... 293
23.4 IPV6 ND-SECURITY LEARNPROTECT .................................................... 294
23.5 IP ARP-SECURITY CONVERT ................................................................ 294
23.6 IPV6 ND-SECURITY CONVERT ............................................................. 294
23.7 CLEAR IP ARP DYNAMIC ...................................................................... 294










