TP-Link T1500G-10MPS T1500G-10MPSUN V1 User Guide - Page 163

ARP Inspection

Page 163 highlights

Select: Port: Option 82 Support: Operation Strategy: Circuit ID Customization: Circuit ID: Remote ID Customization: Remote ID: LAG: Select your desired port for configuration. It is multi-optional. Displays the port number. Enable/Disable the Option 82 feature. Select the operation for the existed Option 82 field of the DHCP request packets from the Host. The option 82 field in DHCP reply packets will be remove when the option 82 feature is enable,no matter which operation is configured for the existed option 82 filed. • Keep: Indicates to keep the Option 82 field of the packets. • Replace: Indicates to replace the Option 82 field of the packets with the switch defined one. • Drop: Indicates to discard the packets including the Option 82 field. Enable or disable the switch to define the Option 82 sub-option Circuit ID field. With Disable selected, configure VLAN ID and port number from which the packet is received as the circuit ID default value. Enter the sub-option Circuit ID for the customized Option 82 field. Enable or disable the switch to define the Option 82 sub-option Remote ID field. With Disable selected, configure the switch system MAC address as the remote ID default value. Enter the sub-option Remote ID for the customized Option 82. Displays the LAG to which the port belongs. 12.3 ARP Inspection According to the ARP Implementation Procedure stated in 12.1.3 ARP Scanning, it can be found that ARP protocol can facilitate the Hosts in the same network segment to communicate with one another or access to external network via Gateway. However, since ARP protocol is implemented with the premise that all the Hosts and Gateways are trusted, there are high security risks during ARP Implementation Procedure in the actual complex network. Thus, the cheating attacks against ARP, such as imitating Gateway, cheating Gateway, cheating terminal Hosts and ARP Flooding Attack, frequently occur to the network, especially to the large network such as campus network. The following part will simply introduce these ARP attacks.  Imitating Gateway The attacker sends the MAC address of a forged Gateway to Host, and then the Host will automatically update the ARP table after receiving the ARP response packets, which causes that the Host cannot access the network normally. The ARP Attack implemented by imitating Gateway is illustrated in the following figure. 154

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234

154
Select:
Select your desired port for configuration. It is multi-optional.
Port:
Displays the port number.
Option 82 Support:
Enable/Disable the Option 82 feature.
Operation Strategy:
Select the operation for the existed Option 82 field of the
DHCP request packets from the Host. The option 82 field in
DHCP reply packets will be remove when the option 82
feature is enable
no matter which operation is configured for
the existed option 82 filed.
Keep:
Indicates to keep the Option 82 field of the packets.
Replace:
Indicates to replace the Option 82 field of the
packets with the switch defined one.
Drop:
Indicates to discard the packets including the Option
82 field.
Circuit ID
Customization:
Enable or disable the switch to define the Option 82
sub-option Circuit ID field. With Disable selected, configure
VLAN ID and port number from which the packet is received
as the circuit ID default value.
Circuit ID:
Enter the sub-option Circuit ID for the customized Option 82
field.
Remote ID
Customization:
Enable or disable the switch to define the Option 82
sub-option Remote ID field. With Disable selected, configure
the switch system MAC address as the remote ID default
value.
Remote ID:
Enter the sub-option Remote ID for the customized Option 82.
LAG:
Displays the LAG to which the port belongs.
12.3
ARP Inspection
According to the ARP Implementation Procedure stated in
12.1.3 ARP Scanning
, it can be found
that ARP protocol can facilitate the Hosts in the same network segment to communicate with one
another or access to external network via Gateway. However, since ARP protocol is implemented
with the premise that all the Hosts and Gateways are trusted, there are high security risks during
ARP Implementation Procedure in the actual complex network. Thus, the cheating attacks against
ARP, such as imitating Gateway, cheating Gateway, cheating terminal Hosts and ARP Flooding
Attack, frequently occur to the network, especially to the large network such as campus network.
The following part will simply introduce these ARP attacks.
Imitating Gateway
The attacker sends the MAC address of a forged Gateway to Host, and then the Host will
automatically update the ARP table after receiving the ARP response packets, which causes that
the Host cannot access the network normally. The ARP Attack implemented by imitating Gateway
is illustrated in the following figure.