D-Link DGS-3426P Product Manual - Page 320

ARP Spoofing Prevention Settings, ARP Spoofing Prevention Settings window

Page 320 highlights

xStack® DGS-3400 Series Layer 2 Gigabit Ethernet Managed Switch The following parameters can be configured: Parameter Description Global State Enable or disable the BPDU attack protection global state. Trap State Enable or disable the BPDU attack trap state. Log State Enable or disable the BPDU attack log state. Recover Time (60-1000000) Enter the BPDU protection Auto-Recovery recovery timer. The default value is 60. If Infinite is ticked, the port will not be auto recovered. Unit Select the unit to be configured. From/To State Mode Select the port or range of ports to be configured. Enable or disable BPDU attack protection for the specified individual ports. Select the BPDU attack protection mode: Drop, Block, or Shutdown. Drop - Drop all received BPDU packets when the port enters under_attack state. Block - Drop all packets (include BPDU and normal packets) when the port enters the under attack state. Shutdown - Shut down the port when the port enters the under attack state. Click Apply to implement the changes. ARP Spoofing Prevention Settings ARP spoofing, also known as ARP poisoning, is a method to attack an Ethernet network which may allow an attacker to sniff data frames on a LAN, modify the traffic, or stop the traffic altogether (known as a Denial of Service - DoS attack). The principle of ARP spoofing is to send fake or spoofed ARP messages to an Ethernet network. Generally, the aim is to associate the attacker's or a random MAC address with the IP address of another node (such as the default gateway). Any traffic meant for that IP address would be mistakenly re-directed to the node specified by the attacker. To prevent an ARP spoofing attack, Packet Content ACL is used to block the invalid ARP packets which contain a faked gateway's MAC and IP binding. Packet Content ACL can inspect any specified content in the first 48 bytes of a packet. It utilizes offsets to match individual fields in the Ethernet frame. An offset contains 16 bytes and each offset is divided into four 4-byte values in HEX format. The configuration logic is as follows: • The traffic can only pass through the Switch if the ARP entry matches a source MAC address in the Ethernet frame, the sender MAC address, or the sender IP address in the ARP protocol. • The Switch will deny all other ARP packets which claim they are from the gateway's IP. To view this window, click Security > ARP Spoofing Prevention Settings, as shown below. Figure 6 - 41 ARP Spoofing Prevention Settings window The following parameters can be configured: 311

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424

xStack
®
DGS-3400 Series Layer 2 Gigabit Ethernet Managed Switch
311
The following parameters can be configured:
Parameter
Description
Global State
Enable or disable the BPDU attack protection global state.
Trap State
Enable or disable the BPDU attack trap state.
Log State
Enable or disable the BPDU attack log state.
Recover Time
(60-1000000)
Enter the BPDU protection Auto-Recovery recovery timer. The default value is
60
. If
Infinite
is
ticked, the port will not be auto recovered.
Unit
Select the unit to be configured.
From/To
Select the port or range of ports to be configured.
State
Enable or disable BPDU attack protection for the specified individual ports.
Mode
Select the BPDU attack protection mode:
Drop
,
Block
, or
Shutdown
.
Drop
- Drop all received BPDU packets when the port enters under_attack state.
Block
- Drop all packets (include BPDU and normal packets) when the port enters the under
attack state.
Shutdown -
Shut down the port when the port enters the under attack state.
Click
Apply
to implement the changes.
ARP Spoofing Prevention Settings
ARP spoofing, also known as ARP poisoning, is a method to attack an Ethernet network which may allow an attacker to sniff data
frames on a LAN, modify the traffic, or stop the traffic altogether (known as a Denial of Service - DoS attack). The principle of
ARP spoofing is to send fake or spoofed ARP messages to an Ethernet network. Generally, the aim is to associate the attacker's or
a random MAC address with the IP address of another node (such as the default gateway). Any traffic meant for that IP address
would be mistakenly re-directed to the node specified by the attacker.
To prevent an ARP spoofing attack, Packet Content ACL is used to block the invalid ARP packets which contain a faked
gateway’s MAC and IP binding. Packet Content ACL can inspect any specified content in the first 48 bytes of a packet. It utilizes
offsets to match individual fields in the Ethernet frame. An offset contains 16 bytes and each offset is divided into four 4-byte
values in HEX format.
The configuration logic is as follows:
The traffic can only pass through the Switch if the ARP entry matches a source MAC address in the Ethernet frame, the
sender MAC address, or the sender IP address in the ARP protocol.
The Switch will deny all other ARP packets which claim they are from the gateway’s IP.
To view this window, click
Security > ARP Spoofing Prevention Settings
, as shown below.
Figure 6 - 41 ARP Spoofing Prevention Settings window
The following parameters can be configured: