background image

Layer 3 Forward and ARP Configuration                               
Chapter 3 Prevent ARP Spoofing Configuration 

http://www.level1.com

                                                                                                                    3-1 

Chapter 3 Prevent ARP Spoofing 

Configuration 

3.1 Overview 

3.1.1 ARP (Address Resolution Protocol) 

Generally  speaking,  ARP  (RFC-826)  protocol  is  mainly  responsible  of  mapping  IP 

address to relevant 48-bit physical address, that is MAC address, for instance, IP address 

is  192.168.0.1,  network  card  Mac  address  is  00-03-0F-FD-1D-2B.  What  the  whole 

mapping process is that a host computer send broadcast data packet involving IP address 

information  of  destination  host  computer,  ARP  request,  and  then  the  destination  host 

computer send a data packet involving its IP address and Mac address to the host, so two 

host computers can exchange data by MAC address. 

3.1.2 ARP Spoofing 

In terms of ARP Protocol design, to reduce redundant ARP data communication on 

networks, even though a host computer receives an ARP reply which is not requested by 

itself, it will also insert an entry to its ARP cache table, so it creates a possibility 

of “ARP 

spoofing”. If the hacker wants to snoop the communication between two host computers in 

the same network (even if are connected by the switches), it sends an ARP reply packet to 

two hosts separately, and make them misunderstand MAC address of the other side as 

the  hacker  host  MAC  address.  In  this  way,  the  direct  communication  is  actually 

communicated  indirectly  among  the  hacker  host  computer.  The  hackers  not  only  obtain 

communication information they need, but also only need to modify some information in 

data packet and forward successfully. In this sniff way, the hacker host computer doesn’t 

need to configure intermix mode of network card, that is because the data packet between 

two communication sides are sent to hacker host computer on physical layer, which works 

as a relay. 

3.1.3 How to prevent void ARP Spoofing 

There  are  many  sniff,  monitor  and  attack  behaviors  based  on  ARP  protocol  in 

networks, and most of attack behaviors are based on ARP spoofing, so it is very important 

to  prevent  ARP  spoofing.  ARP  spoofing  accesses  normal  network  environment  by 

Содержание GTL-2890

Страница 1: ...Layer 3 Forward and ARP Configuration Content http www level1 com 1 GTL 2890 GTL 5260 Layer 3 Forward and ARP Configuration...

Страница 2: ...2 Introduction to Default Route 1 6 1 3 3 Static Route Configuration Task List 1 7 1 3 4 Static Route Configuration Examples 1 7 1 4 ARP 1 8 1 4 1 Introduction to ARP 1 8 1 4 2 ARP Configuration Task...

Страница 3: ...P GUARD CONFIGURATION TASK LIST 4 2 CHAPTER 5 GRATUITOUS ARP CONFIGURATION 5 1 5 1 INTRODUCTION TO GRATUITOUS ARP 5 1 5 2 GRATUITOUS ARP CONFIGURATION TASK LIST 5 1 5 3 GRATUITOUS ARP CONFIGURATION EX...

Страница 4: ...or contain no layer 2 ports At least one of the Layer 2 ports contained in Layer 3 interface should be in UP state for Layer 3 interface in UP state otherwise Layer 3 interface will be in DOWN state T...

Страница 5: ...With the greatly and continuously boosting of Internet services and application devices Home and Small Office Network IP phone and Wireless Service Information Terminal which make use of Internet whi...

Страница 6: ...Automatic address configuration function also makes the readdressing of existing network easier and more convenient and it is more convenient for network operators to manage the transformation from o...

Страница 7: ...only saves network bandwidth but enhances network efficiency as well 1 2 2 IP Configuration Layer 3 interface can be configured as IPv4 interface IPv6 interface 1 2 2 1 IPv4 Address Configuration IPv4...

Страница 8: ...ace Configuration Mode ipv6 nd dad attempts value no ipv6 nd dad attempts Set the neighbor query message number sent in sequence when the interface makes duplicate address detection The no command res...

Страница 9: ...ic route is mainly used in the following two conditions 1 in stable networks to reduce load of route selection and routing data streams For example static route can be used in route to STUB network 2...

Страница 10: ...ateway interface distance command deletes a static route entry 1 3 4 Static Route Configuration Examples The figure shown below is a simple network consisting of three layer3 switches the network mask...

Страница 11: ...established between PC A and PC C and PC B and PC C 1 4 ARP 1 4 1 Introduction to ARP ARP Address Resolution Protocol is mainly used to resolve IP address to Ethernet MAC address Switch supports stat...

Страница 12: ...3 Management Configuration http www level1 com 1 9 If ARP has not been learned then enabled ARP debugging information and view the sending receiving condition of ARP packets Defective cable is a comm...

Страница 13: ...o prevent ARP scanning if there is any host or port with ARP scanning features is found in the segment the switch will cut off the attack source to ensure the security of the network There are two met...

Страница 14: ...lly 2 Configure the threshold of the port based and IP based ARP Scanning Prevention Command Explanation Global configuration mode anti arpscan port based threshold threshold value no anti arpscan por...

Страница 15: ...arpscan recovery time Set automatic recovery time 6 Display relative information of debug information and ARP scanning Command Explanation Global configuration mode anti arpscan log enable no anti arp...

Страница 16: ...peration of the system SWITCH A configuration task sequence SwitchA config anti arpscan enable SwitchA config anti arpscan recovery time 3600 SwitchA config anti arpscan trust ip 192 168 1 100 255 255...

Страница 17: ...ntion Function Configuration http www level1 com 2 5 2 4 ARP Scanning Prevention Troubleshooting Help ARP scanning prevention is disabled by default After enabling ARP scanning prevention users can en...

Страница 18: ...it will also insert an entry to its ARP cache table so it creates a possibility of ARP spoofing If the hacker wants to snoop the communication between two host computers in the same network even if ar...

Страница 19: ...etworks is to disable switch automatic update function the cheater can t modify corrected MAC address in order to avoid wrong packets transfer and can t obtain other information At one time it doesn t...

Страница 20: ...to A firstly A sends ARP reply packet to switch format is 192 168 2 3 00 00 00 00 00 01 mapping its MAC address to C s IP so the switch changes IP address when it updates ARP list then data packet of...

Страница 21: ...0 00 00 02 interface ethernet 1 0 2 Switch config if vlan1 arp 192 168 2 3 00 00 00 00 00 03 interface ethernet 1 0 3 Switch Config If Vlan3 exit Switch Config ip arp security learnprotect Switch Conf...

Страница 22: ...PC2 is mapped to an illegal MAC address which will prevent PC2 from receiving the messages to it Particularly if the attacker pretends to be the gateway and do ARP cheating the whole network will be...

Страница 23: ...ttp www uttglobal com 4 2 scheme Please refer to relative documents for details 4 2 ARP GUARD Configuration Task List 1 Configure the protected IP address Command Explanation Port configuration mode a...

Страница 24: ...C address of the gateway If the switch advertises gratuitous ARP requests the host will not have to send these requests This will reduce the frequency the hosts sending ARP requests for the gateway s...

Страница 25: ...re above interface VLAN10 whose IP address is 192 168 15 254 and network address mask is 255 255 255 0 in the switch system Five PCs PC1 PC2 PC3 PC4 PC5 are connected to the interface Gratuitous ARP c...

Страница 26: ...ARP send If gratuitous ARP is enabled in global configuration mode it can be disabled only in global configuration mode If gratuitous ARP is configured in interface configuration mode the configuratio...

Страница 27: ...a packet is received from the trusted port the switch will not inspect it and forward it directly If the ARP data packet is received from the untrusted port the switch will only forward the lawful dat...

Страница 28: ...e DHCP server is 00 24 8c 01 05 90 the IP address of 192 168 10 2 needs to be distributed statically the DHCP server is connected to e 1 0 1 The MAC of the specific server Other Server is 00 24 8c 01...

Страница 29: ...t rate 50 interface Vlan10 ip address 192 168 10 1 255 255 255 0 Explanation In this case there are two method of static and dynamic using of DAI The ARP packets from the untrusted port will all be tr...

Отзывы: