Skip to content

Latest commit

 

History

History
104 lines (60 loc) · 4.36 KB

Dynamic_Arp_Inspection.md

File metadata and controls

104 lines (60 loc) · 4.36 KB

51. DYNAMIC ARP INSPECTION

WHAT IS DYNAMIC ARP INSPECTION (DAI) ?

ARP REVIEW

  • ARP is used to learn the MAC ADDRESS of another DEVICE with a known IP ADDRESS
    • For example, a PC will use ARP to learn the MAC ADDRESS of its DEFAULT GATEWAY to communicate with external NETWORKS
  • Typically, it is a TWO MESSAGE EXCHANGE : ARP REQUEST and ARP REPLY

GRATUITOUS ARP

  • A GRATUITOUS ARP MESSAGE is an ARP REPLY that is sent without receiving an ARP REQUEST
  • It is SENT to the BROADCAST MAC ADDRESS
  • It allows other DEVICES to learn the MAC ADDRESS of the sending DEVICE without having to send ARP REQUESTS.
  • Some DEVICES automatically send GARP MESSAGES when an INTERFACE is enabled, IP ADDRESS is changed, MAC address is changed, etc.

DYNAMIC ARP INSPECTION

  • DAI is a SECURITY FEATURE of SWITCHES that is used to filter ARP MESSAGES received on UNTRUSTED PORTS
  • DAI only filters ARP MESSAGES. Non-ARP MESSAGES are NOT affected
  • All PORTS are UNTRUSTED, by DEFAULT
    • Typically, all PORTS connected to other NETWORK DEVICES (SWITCHES, ROUTERS) should be configured as TRUSTED, while INTERFACES connected to END HOSTS should remain UNTRUSTED

image

image

image


ARP POISONING (MAN IN THE MIDDLE)

  • Similar to DHCP POISONING, ARP POISONING involved an ATTACKER manipulating TARGET’S ARP TABLES so TRAFFIC is sent to the ATTACKER
  • To do this, the ATTACKER can send GRATUITOUS ARP MESSAGES using another DEVICE’S IP ADDRESS
  • Other DEVICES in the NETWORK will receive the GARP and update their ARP TABLES, causing them to send TRAFFIC to the ATTACKER instead of the legitimate DESTINATION

image

DYNAMIC ARP INSPECTION OPERATIONS

  • DAI inspects the SENDER MAC and SENDER IP fields of ARP MESSAGES received on UNTRUSTED PORTS and checks that there is a matching entry in the DHCP SNOOPING BINDING TABLE
    • If there is a MATCH, the ARP MESSAGE is FORWARDED
    • If there is NO MATCH, the ARP MESSAGE is DISCARDED

image

  • DAI doesn’t inspect messages received on TRUSTED PORTS. They are FORWARDED as normal.

  • ARP ACLs can be manually configured to map IP ADDRESSES / MAC ADDRESSES for DAI to check

    • Useful for HOSTS that don’t use DHCP
  • DAI can be configured to perform more in-depth checks also - but these are optional

  • Like DHCP SNOOPING, DAI also supports RATE-LIMITING to prevent ATTACKERS from overwhelming the SWITCH with ARP MESSAGES

    • DHCP SNOOPING and DAI both require work from the SWITCH’S CPU
    • Even if the ATTACKER’S messages are BLOCKED, they can OVERLOAD the SWITCH CPU with ARP MESSAGES

DYNAMIC ARP INSPECTION CONFIGURATION

image

image

Command : show ip arp inspection interfaces

image

DAI RATE LIMITING

image

DAI OPTIONAL CHECKS

image

image

image

ARP ACLs (Beyond Scope of CCNA)

CREATE AN ARP ACL FOR SRV1

image

AFTER APPLYING IT TO SWITCH 2, SRV1 is able to send ARP REQUEST to R1

image

Command: show ip arp inspection

Shows a summary of the DAI configuration and statistics

image


COMMAND REVIEW

image