H3C Low-End Ethernet Switches Configuration Examples
ARP Attack Prevention
Chapter 1 ARP Attack Prevention Overview
1-2
Gateway
Switch
Attacker
Host A
Gateway
s MAC
address has changed
Figure 1-1
Gateway spoofing attack
2)
Spoofing gateway attack
In the following figure, an attacker sends an ARP packet with a client’s (Host A) IP
address on the same network and a fake MAC address to the gateway which then
updates the IP-to-MAC binding of the client. After that, traffic from the gateway to the
client is sent to the fake MAC address, and the client cannot access the external
network.
Gateway
Switch
Attacker
Host A
Host A
s MAC
address has changed
Figure 1-2
Spoofing gateway attack
3)
Spoofing terminal user attack
In the following figure, an attacker sends an ARP packet with Host A’s IP address and a
fake MAC address to Host C which then updates the IP-to-MAC binding of Host A. After
that, traffic from Host C to Host A is sent to the fake MAC address, and thus unable to
reach Host A.