Cisco: Prevent ARP attacks between VLANs solution _ Server

Source: Internet
Author: User
Nowadays many switches are able to prevent ARP attack core Layer gateway, but can not be very effective to prevent the attacks between VLANs, to prevent the attack between VLANs, I think using the VLAN vacl to prevent better, security can be improved.

Because the company exchange equipment is used omni But the security aspect should also have the related setup to make the simple demonstration, does not go into the 3/12 default inactive to use the useless port demo:
Copy Code code as follows:

6602-sha-15f> port-security 3/12 Enable
6602-sha-15f> port-security 3/12 Maximum 10
6602-sha-15f> port-security 3/12 violation?
^
SHUTDOWN RESTRICT


Cisco Specific scenarios:
In all Cisco switched networks, the IP and MAC addresses of each device can be fixed. But this is more troublesome, can be solved with Cisco Dynamic ARP inspection mechanism. (* Note: With port-security, must be access port)

Precautionary method:

Cisco Dynamic ARP Inspection (DAI) provides a binding of IP address and MAC address on the switch and dynamically establishes a binding relationship. DAI is based on the DHCP snooping binding table and can be implemented statically by adding ARP access-list to individual machines that do not use DHCP. DAI is configured for VLANs and can be turned off for interfaces within the same VLAN. With Dai, you can control the number of ARP request messages for a port. So, I think, through such configuration, can solve the arp attack problem, better improve network security and stability.

Configuration:

IOS Global Command:

Copy Code code as follows:

IP DHCP snooping VLAN 100,200, 300,400
No ip DHCP snooping information option
IP DHCP snooping
ip arp inspection vlan 100,200, 300,400
ip arp inspection log-buffer entries 1024
ip arp inspection log-buffer logs 1024 interval 10


IOS interface Command:
Copy Code code as follows:

IP DHCP snooping Trust
ip arp inspection trust
ip arp inspection limit rate 15

You can use the following methods for not using a DHCP device:
Copy Code code as follows:

ARP access-list static-arp
Permit IP host 202.65.3.42 mac host 0012.3f82.1b22
ip arp inspection filter static-arp VLAN 201


To configure the effect after Dai:

Because Dai checks the IP and Mac correspondence in the DHCP snooping binding table, the Man-in-the-middle attack cannot be implemented and the attack tool fails. The following table provides a switch warning for implementing a man-in-the-middle attack:

Copy Code code as follows:

3w0d:%sw_dai-4-dhcp_snooping_deny:1 Invalid ARPs (Req) on FA5/16, VLAN 1.
([000b.db1d.6ccd/192.168.1.200/0000.0000.0000/192.168.1.2



Because of the speed limit of the ARP request message, the client cannot carry out the IP scanning and detection of the virus, if these behaviors occur, the switch will immediately alarm or cut off the scanning machine directly. As shown in the following table:



Copy Code code as follows:

3W0D:%sw_dai-4-packet_rate_exceeded:16 packets received in 184 milliseconds
On Fa5/30. Alarm
3W0D:%pm-4-err_disable:arp-inspection error detected on FA5/30,
Putting FA5/30 in err-disable the state to cut off the port
4500-1#sh int F 5/30
FASTETHERNET5/30 is down, line protocol are down (err-disabled)
Hardware is Fast Ethernet Port, the address is 0002.b90e 3f 4d
(BIA 0002.b90e 3f 4d)
MTU 1500 bytes, BW 100000 kbit, DLY-usec,
Reliability 255/255, Txload 1/255, Rxload 1/255
4500-1#



After the user obtains the IP address, the user cannot modify the IP or the Mac, if the user modifies simultaneously the IP and the Mac must be the network internal legitimate IP and the Mac only then, for this kind of modification may use the IP Source Guard technology which is mentioned below to guard against. The following table provides an alert for manually assigning IP:

Copy Code code as follows:

3w0d:%sw_dai-4-dhcp_snooping_deny:1 Invalid ARPs (Req) on FA5/30, VLAN 1.
([000d.6078.2d95/192.168.1.100/0000.0000.0000/192.168.1.100/01:52:28 UTC Fri
DEC 29 2000])



Dai support Platform is more than 3560 bar, IP Source Guard only more than 4500 to perform seemingly.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.