
Industrial Managed
Ethernet Switch
User Manual
錯誤
!
使用
[
常用
]
索
引標籤將
Heading
1,Product Manual
套用到您想要在此處
顯示的文字。
Page
121
of
191
Figure 2.135 ARP Spoof Prevention Setting Webpage
To enable the ARP Spoof Prevention, select
ARP Spoof Prevention Setting
submenu under the
Security
menu
as shown in Figure 2.135. To fill in a prevention entry, scroll down to the
ARP Spoof Prevention Table
part in
Figure 2.135. Then, enter an IP address in the first textbox under
IPv4 Address
column and a MAC address in the
second textbox under the
MAC Address
column. Then select one or multiple port number from the list of the ports
under the
Port(s)
column. Note that if you did not select any port from the list, the default setting will be all ports.
Then, click
Add
button to insert the entry into the table. Finally, check the
Enabled
box behind the
ARP Spoof
Prevention
and click
Update
button inside the ARP Spoof Prevention Enable part. The new entry should be
updated on the table and activate the security mechanism. To remove one of the entries from the table, please click
on the
Remove
button for the corresponding entry in the table. To remove all of the entries from the table, please
click on the
Remove all
button under the ARP Spoof Prevention Table.
2.14.5 DHCP Snooping
A rogue DHCP (Dynamic Host Control Protocol) server may be set up by an attacker in the network to provide
falsify network configuration to a DHCP client such as wrong IP address, in-correct subnetmask, malicious gateway,
and malicous DNS server. The purpose of DHCP spoofing attack may be to redirect the traffic of the DHCP client
to a malicous domain and try to eavesdrop the traffic or simply try to prevent a successful network connection
establishment. To protect againt a network security attack of rogue DHCP server or DHCP spoofing attack, Atop’s
EH75XX provide
DHCP Snooping
feature. When this feature is enabled on specific port(s) of EH75XX managed
swicth, the EH75XX will allow the DHCP messages from trusted ports to pass through while it will discard or filter
the DHCP messages from untrusted ports.
To enable the DHCP Snooping feature, check the
Enabled
box behind the
DHCP Snooping
option under the
DHCP Snooping
webpage as shown in Figure 2.136. By default, all interfaces of EH75XX are untrusted for DHCP