D-Link DGS-3426P Product Manual - Page 290

Strict and Loose State, DHCP Snooping Option, ARP Inspection, DHCP Snooping Example

Page 290 highlights

xStack® DGS-3400 Series Layer 2 Gigabit Ethernet Managed Switch Strict and Loose State Other than ACL and ARP mode, users can also configure the state on a port for granular control. There are two states: Strict and Loose, and only one state can be selected per port. If a port is set to Strict state, all packets entering the port are denied (dropped) by default. The switch will continuously compare all IP and ARP packets it receives on that port with its IMPB entries. If the IPMAC pair in the packet matches the IMPB entry, the MAC address will be unblocked and subsequent packets sent from this client will be forwarded. On the other hand, if a port is set to Loose state, all packets entering the port are permitted (forwarded) by default. The switch will continuously compare all ARP packets it receives on that port with its IMPB entries. If the IP-MAC pair in the ARP packet does not match the IMPB white list, the MAC address will be blocked and subsequent packets sent from this client will be dropped. DHCP Snooping Option If DHCP snooping is enabled, the switch learns IP-MAC pairs by snooping DHCP packets automatically and then saves them to the IP-MAC-Port Binding white list. This enables a hassle-free configuration because the administrator does not need to manually enter each IMPB entry. A prerequisite for this is that the valid DHCP server's IP-MAC pair must be configured on the switch's IMPB while list first; otherwise the DHCP server packets will be dropped. DHCP snooping is generally considered to be more secure because it enforces all clients to acquire IP through the DHCP server. Additionally, it makes IP Information auditable because clients cannot manually configure their own IP address. An example of DHCP snooping in which PC-A and PC-B get their IP addresses from a DHCP server is depicted below. The switch snoops the DHCP conversation between PC-A, PC-B, and the DHCP server. The IP address, MAC address, and connecting ports of both PC-A and PC-B are learned and stored in the switch's IMPB white list. Therefore, these PCs will be able to connect to the network. Then there is PC-C, whose IP address is manually configured by the user. Since this PC's IP-MAC pair does not match the one on Switch's IMPB white list, traffic from PC-C will be blocked. Doesn't match the White list, block PC-C IMP Binding Enabled DHCP Server Address Learning White List PC-A PC-B 192.168.1.1 00E0-0211-1111 192.168.1.2 00E0-0211-2222 (IP assigned by DHCP for PC-A and PC-B) PC-C 192.168.1.1 00E0-0211-3333 (IP manually configured by user) 192.168.1.1 00E0-0211-111 Port 1 192.168.1.2 00E0-0211-222 Port 2 ARP Inspection Figure 6 - 6 DHCP Snooping Example ARP spoofing can attack hosts, switches, and routers connected to a Layer 2 network by "poisoning" their ARP caches. As the figure below shows, Host C can "poison" the ARP caches of Host B by broadcasting forged ARP responses with bindings (IP B, MAC C). As a result, Host C intercepts the traffic sent to Host B. IMPB v3.8 was developed to prevent this kind of ARP spoofing (including Netcut and Netcut restore attacks). 281

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424

xStack
®
DGS-3400 Series Layer 2 Gigabit Ethernet Managed Switch
281
Strict and Loose State
Other than ACL and ARP mode, users can also configure the state on a port for granular control. There are two states: Strict and
Loose, and only one state can be selected per port.
If a port is set to Strict state, all packets entering the port are denied (dropped)
by default. The switch will continuously compare all IP and ARP packets it receives on that port with its IMPB entries. If the IP-
MAC pair in the packet matches the IMPB entry, the MAC address will be unblocked and subsequent packets sent from this client
will be forwarded. On the other hand, if a port is set to Loose state, all packets entering the port are permitted (forwarded) by
default. The switch will continuously compare all ARP packets it receives on that port with its IMPB entries. If the IP-MAC pair
in the ARP packet does not match the IMPB white list, the MAC address will be blocked and subsequent packets sent from this
client will be dropped.
DHCP Snooping Option
If DHCP snooping is enabled, the switch learns IP-MAC pairs by snooping DHCP packets automatically and then saves them to
the IP-MAC-Port Binding white list. This enables a hassle-free configuration because the administrator does not need to manually
enter each IMPB entry. A prerequisite for this is that the valid DHCP server’s IP-MAC pair must be configured on the switch’s
IMPB while list first; otherwise the DHCP server packets will be dropped. DHCP snooping is generally considered to be more
secure because it enforces all clients to acquire IP through the DHCP server. Additionally, it makes IP Information auditable
because clients cannot manually configure their own IP address.
An example of DHCP snooping in which PC-A and PC-B get their IP addresses from a DHCP server is depicted below. The
switch snoops the DHCP conversation between PC-A, PC-B, and the DHCP server. The IP address, MAC address, and connecting
ports of both PC-A and PC-B are learned and stored in the switch’s IMPB white list. Therefore, these PCs will be able to connect
to the network. Then there is PC-C, whose IP address is manually configured by the user. Since this PC’s IP-MAC pair does not
match the one on Switch’s IMPB white list, traffic from PC-C will be blocked.
192.168.1.1
00E0-0211-111
Port 1
192.168.1.2
00E0-0211-222
Port 2
Figure 6 - 6 DHCP Snooping Example
ARP Inspection
ARP spoofing can attack hosts, switches, and routers connected to a Layer 2 network by “poisoning” their ARP caches. As the
figure below shows, Host C can “poison” the ARP caches of Host B by broadcasting forged ARP responses with bindings (IP B,
MAC C). As a result, Host C intercepts the traffic sent to Host B. IMPB v3.8 was developed to prevent this kind of ARP spoofing
(including Netcut and Netcut restore attacks).
IMP Binding Enabled
Address Learning
192.168.1.2
00E0-0211-2222
192.168.1.1
00E0-0211-3333
(IP manually configured by user)
DHCP Server
PC-B
PC-C
Doesn’t
match
the
White list, block PC-C
White List
PC-A
192.168.1.1
00E0-0211-1111
(IP assigned by DHCP for
PC-A and PC-B)