TP-Link TL-ER6020 TL-ER6020 v1 User Guide - Page 147

WAN ARP Defense

Page 147 highlights

Choose the menu Firewall→Anti ARP Spoofing→IP-MAC Binding to load the configuration page. To add the host with IP address of 192.168.1.20 and MAC address of 00-11-22-33-44-aa to the list, you can follow the settings below: Settings: IP Address: MAC Address: Status: 192.168.0.20 00-11-22-33-44-aa Activate Click the button to apply. The other entries can be added in the same way. 3) Set Attack Defense Choose the menu Firewall→Anti ARP Spoofing→IP-MAC Binding to load the configuration page. Select all the items for General and set the GARP packets sending interval to be 1ms as the following figure shows. Then click the button to apply. Figure 4-19 IP-MAC Binding 4.3.4.2 WAN ARP Defense To prevent the WAN ARP attack, you can bind the default gateway and IP address of WAN port. Obtain the MAC address of WAN port by ARP Scanning first. Choose the menu Firewall→Anti ARP Spoofing→ARP Scanning to load the configuration page. Enter the default gateway of the WAN port such as 58.51.128.254 in the Scanning Range field and click the button, the MAC address of the WAN port will display in the Scanning Result table. After obtaining the MAC address of WAN port from Scanning Result table, select this entry, then click the button to finish the binding operation. -142-

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168

-142-
Choose the menu
Firewall
Anti
ARP Spoofing
IP-MAC Binding
to load the configuration page.
To add the host with IP address of 192.168.1.20 and MAC address of 00-11-22-33-44-aa to the list,
you can follow the settings below:
Settings:
IP Address:
192.168.0.20
MAC Address:
00-11-22-33-44-aa
Status:
Activate
Click the <Add> button to apply. The other entries can be added in the same way.
3)
Set Attack Defense
Choose the menu
Firewall
Anti ARP Spoofing
IP-MAC Binding
to load the configuration page.
Select all the items for
General
and set the GARP packets sending interval to be 1ms as the following
figure shows. Then click the <Save> button to apply.
Figure 4-19 IP-MAC Binding
4.3.4.2
WAN ARP Defense
To prevent the WAN ARP attack, you can bind the default gateway and IP address of WAN port.
Obtain the MAC address of WAN port by ARP Scanning first.
Choose the menu
Firewall
Anti
ARP Spoofing
ARP Scanning
to load the configuration page.
Enter the default gateway of the WAN port such as 58.51.128.254 in the Scanning Range field and
click the <Scan> button, the MAC address of the WAN port will display in the Scanning Result table.
After obtaining the MAC address of WAN port from Scanning Result table, select this entry, then click
the <Import> button to finish the binding operation.