beautypg.com

Arp attack detection – H3C Technologies H3C S3600 Series Switches User Manual

Page 603

background image

2-2

Figure 2-1 Network diagram for ARP man-in-the-middle attack

ARP attack detection

To guard against the man-in-the-middle attacks launched by hackers or attackers, S3600 series

Ethernet switches support the ARP attack detection function.

After you enable ARP attack detection for a VLAN,

z

When receiving an ARP request or response packet from an ARP untrusted port, the device

delivers the ARP packet to the CPU to check the validity of the packet. If the packet is considered to

be valid, it is forwarded; otherwise, it is discarded.

z

ARP packets received from a trusted port of the VLAN are forwarded without validity check.

After validity check, users are determined to be valid or invalid on the ports of the VLAN. Validity check

can be based on DHCP-snooping entries, IP static binding entries, or IP-to-MAC mappings of

authenticated 802.1x users, according to different network environments.

z

If all the clients connected to the switch use IP addresses obtained through DHCP, you are

recommended to enable DHCP snooping on the switch. The switch then checks validity of packets

based on DHCP-snooping entries.

z

If the clients connected to the switch use IP addresses configured manually and are few in number,

you are recommended to configure IP static binding entries on the switch. The switch then checks

validity of packets based on IP static binding entries.

z

If a large number of 802.1x clients connected to the switch use IP addresses configured manually,

you are recommended to enable ARP attack detection based on authenticated 802.1x clients on

the switch. The switch then records mappings between IP addresses (both static and dynamic IP

addresses) and MAC addresses of authenticated 802.1x clients and uses the mappings for ARP

attack detection together with DHCP-snooping entries and IP static binding entries.

This manual is related to the following products: