HP 635n Practical IPsec Deployment for Printing and Imaging Devices - Page 21

Ping Communication

Page 21 highlights

PING B Device-1 Cache (IP:MAC) B:[empty] IP Address: A Ethernet Address: 1 Device-1 Will the Device with IP Address B tell me what their Ethernet Address is? Device-2 Cache (IP:MAC) A:[empty] IP Address: B Ethernet Address: 2 All Devices on the network receive this packet Device-2 "Device-1 is asking for my Ethernet Address. I better respond. They may have something important to send me!" Device-1 Packet is sent directly to the requesting Device "Here is my Ethernet Address" Device-2 "When Device-1 asked for my Ethernet address, they were kind enough to tell me their IP address and Ethernet address. That saves me time!" Device-1 Cache B:2 IP Address: A Ethernet Address: 1 PING PROTOCOL Device-2 Cache A:1 From Device-1 to Device-2 Ethernet: TO: 2 Ethernet: FROM: 1 IP: TO: B IP: FROM: A Figure 19 - Ping Communication IP Address: B Ethernet Address: 2 Figure 19 goes through an example of what would happen if a "Ping" command was executed on a device. The top diagram shows the breakdown of IP/Ethernet addressing and also shows an empty cache on both Device-1 and Device2. When Device-1 is trying to send a ping packet to Device-2, the cache is referenced. However, the cache is empty. Device-1 sends out an Ethernet frame asking for Device-2's Ethernet address as shown in the second diagram. Device-2 receives the frame and responds as shown in the third and fourth diagrams. Once the cache is filled, communication can proceed normally. Although we've used "Ping" as an example, this process is not exclusive to "Ping" but is used in almost all types of IP communication. A MITM attack against Device-1 and Device-2 is going to target the cache and manipulate the values. Refer to Figure 20 - MITM. 21

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193

21
Device-1
Cache (IP:MAC)
B:[empty]
IP Address: A
Ethernet Address: 1
Device-2
Cache (IP:MAC)
A:[empty]
IP Address: B
Ethernet Address: 2
Device-1
Device-2
“Device-1 is asking for my
Ethernet Address.
I better
respond.
They may have
something important to
send me!”
Will the Device with IP
Address B tell me what
their Ethernet Address is?
All Devices on the network
receive this packet
Device-1
Device-2
“When Device-1 asked for my
Ethernet address, they were
kind enough to tell me their IP
address and Ethernet
address.
That saves me
time!”
“Here is my Ethernet
Address”
Packet is sent directly to
the requesting Device
Device-1
Cache
B:2
IP Address: A
Ethernet Address: 1
Device-2
Cache
A:1
IP Address: B
PING
PROTOCOL
Ethernet Address: 2
From Device-1 to Device-2
Ethernet: TO: 2
Ethernet: FROM: 1
IP: TO: B
IP: FROM: A
PING B
Figure 19 – Ping Communication
Figure 19 goes through an example of what would happen if a “Ping” command was executed on a
device.
The top diagram shows the breakdown of IP/Ethernet addressing and also shows an empty
cache on both Device-1 and Device2.
When Device-1 is trying to send a ping packet to Device-2,
the cache is referenced.
However, the cache is empty.
Device-1 sends out an Ethernet frame asking
for Device-2’s Ethernet address as shown in the second diagram.
Device-2 receives the frame and
responds as shown in the third and fourth diagrams.
Once the cache is filled, communication can
proceed normally.
Although we’ve used “Ping” as an example, this process is not exclusive to
“Ping” but is used in almost all types of IP communication.
A MITM attack against Device-1 and Device-2 is going to target the cache and manipulate the values.
Refer to Figure 20 – MITM.