TP-Link 10GE T1700G-28TQUN V1 User Guide - Page 215
ARP Inspection
View all TP-Link 10GE manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 215 highlights
Circuit ID: Remote ID Customization: Remote ID: LAG: Enter the sub-option Circuit ID for the customized Option 82 field. Enable or disable the switch to define the Option 82 sub-option Remote ID field. With Disable selected, configure the switch system MAC address as the remote ID default value. Enter the sub-option Remote ID for the customized Option 82. Displays the LAG to which the port belongs. 13.3 ARP Inspection According to the ARP Implementation Procedure stated in 13.1.3 ARP Scanning, it can be found that ARP protocol can facilitate the Hosts in the same network segment to communicate with one another or access to external network via Gateway. However, since ARP protocol is implemented with the premise that all the Hosts and Gateways are trusted, there are high security risks during ARP Implementation Procedure in the actual complex network. Thus, the cheating attacks against ARP, such as imitating Gateway, cheating Gateway, cheating terminal Hosts and ARP Flooding Attack, frequently occur to the network, especially to the large network such as campus network and so on. The following part will simply introduce these ARP attacks. Imitating Gateway The attacker sends the MAC address of a forged Gateway to Host, and then the Host will automatically update the ARP table after receiving the ARP response packets, which causes that the Host cannot access the network normally. The ARP Attack implemented by imitating Gateway is illustrated in the following figure. Figure 13-11 ARP Attack - Imitating Gateway 205