xStack
®
DGS-3400 Series Layer 2 Gigabit Ethernet Managed Sw itch
394
A common DoS attack today can be done by associating a nonexistent or any specified MAC address to the IP address of the
network’s default gateway. The malicious attacker only needs to broadcast one Gratuitous ARP to the network claiming it is the
gateway so that the whole network operation will be turned down as all packets to the Internet will be directed to the wrong node.
Likewise, the attacker can either choose to forward the traffic to the actual default gateway (passive sniffing) or modify the data
before forwarding it (man-in-the-middle attack). The hacker cheats the victim PC that it is a router and cheats the router that it is
the victim. As can be seen in Figure 5 all traffic will be then sniffed by the hacker but the users will not discover.
Figure 5
Prevent ARP Spoofing via Packet Content ACL
D-Link managed switches can effectively mitigate common DoS attacks caused by ARP spoofing via a unique Package Content
ACL.
For the reason that basic ACL can only filter ARP packets based on packet type, VLAN ID, Source, and Destination MAC
information, there is a need for further inspections of ARP packets. To prevent ARP spoofing attack, we will demonstrate here via
using Packet Content ACL on the Switch to block the invalid ARP packets which contain faked gateway’s MAC and IP binding.
Содержание xStack DGS-3427
Страница 134: ...xStack DGS 3400 Series Layer 2 Gigabit Ethernet Managed Switch 125 Figure 2 148 Port Speed Utilizing the Tool Tip ...
Страница 215: ...xStack DGS 3400 Series Layer 2 Gigabit Ethernet Managed Switch 206 Figure 3 68 LLDP Local Port Brief Table window ...
Страница 354: ...xStack DGS 3400 Series Layer 2 Gigabit Ethernet Managed Switch 345 Figure 6 81 JWAC Global State Configuration window ...
Страница 404: ...xStack DGS 3400 Series Layer 2 Gigabit Ethernet Managed Switch 395 Example topology ...
Страница 406: ...xStack DGS 3400 Series Layer 2 Gigabit Ethernet Managed Switch 397 ...