EasyManuals Logo
Home>Cisco>Switch>Catalyst 2960-X

Cisco Catalyst 2960-X User Manual

Cisco Catalyst 2960-X
498 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #271 background imageLoading...
Page #271 background image
between Switch A and Switch B is untrusted, the ARP packets from Host 1 are dropped by Switch B.
Connectivity between Host 1 and Host 2 is lost.
Figure 17: ARP Packet Validation on a VLAN Enabled for Dynamic ARP Inspection
Configuring interfaces to be trusted when they are actually untrusted leaves a security hole in the network. If
Switch A is not running dynamic ARP inspection, Host 1 can easily poison the ARP cache of Switch B (and
Host 2, if the link between the switches is configured as trusted). This condition can occur even though Switch
B is running dynamic ARP inspection.
Dynamic ARP inspection ensures that hosts (on untrusted interfaces) connected to a switch running dynamic
ARP inspection do not poison the ARP caches of other hosts in the network. However, dynamic ARP inspection
does not prevent hosts in other portions of the network from poisoning the caches of the hosts that are connected
to a switch running dynamic ARP inspection.
In cases in which some switches in a VLAN run dynamic ARP inspection and other switches do not, configure
the interfaces connecting such switches as untrusted. However, to validate the bindings of packets from
nondynamic ARP inspection switches, configure the switch running dynamic ARP inspection with ARP
ACLs. When you cannot determine such bindings, at Layer 3, isolate switches running dynamic ARP inspection
from switches not running dynamic ARP inspection switches.
Depending on the setup of the DHCP server and the network, it might not be possible to validate a given
ARP packet on all switches in the VLAN.
Note
Rate Limiting of ARP Packets
The switch CPU performs dynamic ARP inspection validation checks; therefore, the number of incoming
ARP packets is rate-limited to prevent a denial-of-service attack. By default, the rate for untrusted interfaces
is 15 packets per second (pps). Trusted interfaces are not rate-limited. You can change this setting by using
the ip arp inspection limit interface configuration command.
When the rate of incoming ARP packets exceeds the configured limit, the switch places the port in the
error-disabled state. The port remains in that state until you intervene. You can use the errdisable recovery
global configuration command to enable error disable recovery so that ports automatically emerge from this
state after a specified timeout period.
Catalyst 2960-X Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX
OL-29048-01 247
Configuring Dynamic ARP Inspection
Rate Limiting of ARP Packets

Table of Contents

Other manuals for Cisco Catalyst 2960-X

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Catalyst 2960-X and is the answer not in the manual?

Cisco Catalyst 2960-X Specifications

General IconGeneral
Console portRJ-45
USB 2.0 ports quantity2
SFP module slots quantity4
Installed SFP modules quantity-
Gigabit Ethernet (copper) ports quantity48
Basic switching RJ-45 Ethernet ports typeGigabit Ethernet (10/100/1000)
Power sourceAC
Input current5 A
AC input voltage100 - 240 V
Power consumption (typical)60.9 W
Number of power supply units1
Redundant power supply (RPS) supportYes
Operating altitude0 - 3000 m
Non-operating altitude0 - 4000 m
Storage temperature (T-T)-25 - 70 °C
Operating temperature (T-T)-5 - 40 °C
Operating relative humidity (H-H)10 - 95 %
Switching protocolsUDP, TCP, RADIUS/TACACS+
Number of VLANs1023
Networking standardsIEEE 802.1ab, IEEE 802.1D, IEEE 802.1p, IEEE 802.1Q, IEEE 802.1s, IEEE 802.1w, IEEE 802.1x, IEEE 802.3, IEEE 802.3ab, IEEE 802.3ad, IEEE 802.3ae, IEEE 802.3af, IEEE 802.3ah, IEEE 802.3at, IEEE 802.3az, IEEE 802.3u, IEEE 802.3x, IEEE 802.3z
Throughput107.1 Mpps
Jumbo frames9216
Number of queues8
MAC address table16000 entries
Number of static routes1000
DHCP featuresDHCP server
AuthenticationMAC-based authentication, Port-based authentication
Security algorithms802.1x RADIUS, SNMP, SSH
Access Control List (ACL) rules3
Switch typeManaged
Switch layerL2/L3
SafetyUL 60950-1, CAN/CSA-C22.2 No. 60950-1, EN 60950-1, IEC 60950-1, AS/NZS 60950-1
Form factor1U
Product colorBlack
Total Power over Ethernet (PoE) budget370 W
Power over Ethernet (PoE) ports quantity24
Power over Ethernet plus (PoE+) ports quantity12
Memory typeDRAM
Noise level39 dB
Flash memory128 MB
Internal memory512 MB
Processor frequency600 MHz
Mean time between failures (MTBF)276870 h
Weight and Dimensions IconWeight and Dimensions
Depth368 mm
Width445 mm
Height45 mm
Weight5800 g

Related product manuals