A switch has DHCP snooping enabled and Dynamic ARP Inspection enabled on VLAN 30. A printer with a static IP on VLAN 30 cannot communicate because its ARP packets are being dropped.
What is the best fix?
A switch has DHCP snooping enabled and Dynamic ARP Inspection enabled on VLAN 30. A printer with a static IP on VLAN 30 cannot communicate because its ARP packets are being dropped.
What is the best fix?
Answer choices
Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.
Disable DAI on all VLANs globally.
That is broader than necessary and weakens security unnecessarily.
Configure a static ARP inspection entry or ARP ACL for the printer.
Correct. Static devices need a trusted binding source.
Trust the user-facing printer access port for DHCP snooping and DAI.
Trusting an access port is usually too permissive.
Change the printer to use a larger MTU.
MTU has nothing to do with DAI dropping ARP packets.
Common exam trap
A common exam trap is to disable Dynamic ARP Inspection entirely or trust the user-facing access port to fix ARP packet drops from static IP devices. Disabling DAI weakens the network’s ARP spoofing protection, which is against best practices and exam expectations. Trusting access ports is too broad and can allow malicious ARP traffic, defeating the purpose of DAI. The trap is that these options seem easier but compromise security, whereas the correct approach is to configure static ARP inspection entries or ARP ACLs for static IP devices to maintain security and functionality.
Technical deep dive
Dynamic ARP Inspection (DAI) is a security feature that validates ARP packets in a network to prevent ARP spoofing attacks. It works by intercepting all ARP requests and responses on untrusted ports and verifying them against a trusted database of IP-to-MAC bindings, typically learned via DHCP snooping. If an ARP packet does not match the trusted binding, DAI drops the packet to protect the network from malicious ARP traffic. In environments where devices use static IP addresses, such as printers or servers, DHCP snooping does not learn their IP-to-MAC bindings. Because DAI relies on this trusted binding database, ARP packets from static IP devices are often dropped unless a static ARP inspection entry or ARP ACL is configured. This configuration explicitly tells the switch to trust ARP packets from those static devices, allowing them to communicate normally without compromising security. A common exam trap is to disable DAI globally or trust user-facing ports to fix communication issues with static IP devices. Disabling DAI weakens network security, and trusting access ports is too permissive, potentially allowing spoofed ARP packets. The practical approach is to configure static ARP entries or ARP ACLs for static IP devices, maintaining security while ensuring proper communication. This method aligns with Cisco best practices and the CCNA exam focus on secure network design.
Related practice questions
Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.
Practise IPv4 subnetting, CIDR, masks, host ranges and subnet selection.
Practise OSPF neighbours, router IDs, metrics, areas and routing-table interpretation.
Practise VLANs, access ports, trunks, allowed VLANs and switching scenarios.
Practise spanning tree, root bridge election, port roles and STP troubleshooting.
Practise LACP, PAgP, port-channel behaviour and bundle requirements.
Practise standard and extended ACLs, permit/deny logic and traffic filtering.
Practise static NAT, dynamic NAT, PAT and inside/outside address translation.
Practise DHCP scopes, relay, leases and troubleshooting.
Practise routing-table output, longest-prefix match, AD and route selection.
Practise trunk verification and VLAN forwarding across switches.
Practise WLAN security, authentication and wireless architecture concepts.
Practise IPv6 addressing, routes, neighbour discovery and common IPv6 exam traps.
Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.
Question 1
Question 2
Question 3
Question 4
Question 5
Question 6
FAQ
Dynamic ARP Inspection (DAI) validates ARP packets by comparing them against trusted IP-to-MAC bindings to prevent ARP spoofing attacks.
The correct answer is: Configure a static ARP inspection entry or ARP ACL for the printer. — DAI relies on trusted bindings. Static-IP devices that are not learned through DHCP often require a static ARP ACL or equivalent trusted binding mechanism.
Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.
Sign in to join the discussion.