12-13
User
Guide

for

the

Cisco

Application

Networking

Manager

5.2
OL-26572-01
Chapter
12






Configuring

Network

Access
Configuring
Virtual

Context

VLAN

Interfaces
ARP
Inspection

Type
Type
of

ARP

inspection,

which

prevents

malicious

users

from

impersonating

other

hosts

or
routers,
known

as

ARP

spoofing.

ARP

spoofing

can

enable

a

“man-in-the-middle”

attack.

For
example,
a

host

sends

an

ARP

request

to

the

gateway

router.

The

gateway

router

responds

with
the
gateway

router

MAC

address.
By
default,

ARP

inspection

is

disabled

on

all

interfaces,

allowing

all

ARP

packets

through

the
ACE.
When

you

enable

ARP

inspection,

the

ACE

appliance

uses

the

IP

address

and

interface

ID
(ifID)
of

an

incoming

ARP

packet

as

an

index

into

the

ARP

table.

ARP

inspection

operates

only
on
ingress

br

idged

interfaces.
Note
If
ARP
inspection
fails,
then

the

ACE

does

not

perform

source

MAC

validation.
Choices
are

as

follows:


N/A—ARP
inspection
is
disabled.


Flood—Enables
ARP
forwarding

of
nonmatching

ARP

packets.

The

ACE

appliance
forwards
all

ARP

packets

to

all

interfaces

in

the

bridge

group.

This

setting

is

the

default.

In
the
absence

of

a

static

ARP

entry,

this

option

bridges

all

packets.


No
Flood—Disables

ARP

forwarding

for

the

interface
and

drops

nonmatching

ARP

packets.
In
the

absence

of

a

static

ARP

entry,

this

option

does

not

bridge

any

packets.
UDP
Config

Commands
UDP
boost

command

options:


N/A—Not
applicable.


IP
Destination

Hash—Performs

destination

IP

hash

dur

ing

connection.


IP
Source

Hash—Performs

source

IP

ha

sh

dur

ing

connection

lookup.
Table
12-1
VLAN
Interface

Attributes

(continued)
Field
Description