Arp Inspection - Cisco 500 Series Administration Manual

Stackable managed
Hide thumbs Also See for 500 Series:
Table of Contents

Advertisement

Security

ARP Inspection

ARP Inspection
Cisco 500 Series Stackable Managed Switch Administration Guide
-
No Snoop VLAN—DHCP Snooping is not enabled on the VLAN.
-
Trusted Port—Port has become trusted.
-
Resource Problem—TCAM resources are exhausted.
To see a subset of these entries, enter the relevant search criteria and click Go.
ARP enables IP communication within a Layer 2 Broadcast domain by mapping IP
addresses to a MAC addresses.
A malicious user can attack hosts, switches, and routers connected to a Layer 2
network by poisoning the ARP caches of systems connected to the subnet and by
intercepting traffic intended for other hosts on the subnet. This can happen
because ARP allows a gratuitous reply from a host even if an ARP request was not
received. After the attack, all traffic from the device under attack flows through the
attacker's computer and then to the router, switch, or host.
The following shows an example of ARP cache poisoning.
ARP Cache Poisoning
21
474

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents