Arp Spoofing Prevention Settings - D-Link xStack Reference Manual

Des-3200 series layer 2 managed fast ethernet switch web ui reference guide
Hide thumbs Also See for xStack:
Table of Contents

Advertisement

xStack® DES-3200 Series Layer 2 Ethernet Managed Switch WEB UI Reference Guide

ARP Spoofing Prevention Settings

ARP spoofing, also known as ARP poisoning, is a method to attack an Ethernet network which may allow an attacker
to sniff data frames on a LAN, modify the traffic, or stop the traffic altogether (known as a Denial of Service - DoS
attack). The principle of ARP spoofing is to send the fake or spoofed ARP messages to an Ethernet network.
Generally, the aim is to associate the attacker's or random MAC address with the IP address of another node (such as
the default gateway). Any traffic meant for that IP address would be mistakenly re-directed to the node specified by
the attacker.
To prevent ARP spoofing attack, the switch uses Packet Content ACL to block the invalid ARP packets which contain
faked gateway's MAC and IP binding.
To view this window, click Configuration > ARP Spoofing Prevention Settings as shown below:
The following fields can be set or viewed:
Parameter
Gateway IP Address
Gateway MAC
Address
Ports (e.g.: 1, 7-10)
Click Apply to implement changes made.
Figure 2 - 61. ARP Spoofing Prevention Settings window
Description
Enter the IP address of the gateway.
Enter the MAC address of the gateway.
Specify the switch ports for which to configure the ARP Spoofing Prevention settings. Tick
the All Ports check box to configure this entry for all ports on the Switch.
58

Advertisement

Table of Contents
loading

This manual is also suitable for:

Xstack des-3200 seriesXstack des-3200-2bf

Table of Contents