Dai Configuration; Dai Overview - Zte ZXR10 5900 Series User Manual

All gigabit-port intelligent routing switch
Hide thumbs Also See for ZXR10 5900 Series:
Table of Contents

Advertisement

DAI Configuration

DAI Overview

The attack based on ARP often happens in network. DHCP SNOOP-
ING module on the switch implements DAI (Dynamic ARP Inspec-
tion) function, but this function is limited.
Currently DAI function only checks binding table in DHCP SNOOP-
ING for switch learning ARP packet, that is, only can check layer
3 user.
If users of the switch are in the same VLAN, the communication
between users requires switch to forward not on layer 3 but layer
2. Switch need not to learn ARP packets of these users. Therefore
there isn't relevant security check. It is a big security bug, which
causes man-in-the-middle attack, as shown in
F
39 M
-
-
IGURE
AN
IN
THE
A/B/C are in the same broadcast domain, that is, the same net-
work segment. When A and B communicates with each other,
ARP packet is sent first, which can be learned by C. If C acts as
man-in-the-middle to do malicious scanning, only sends free ARP
to A to inform that IP corresponding MAC address of B has been
updated to that of C, the flow from A to B is directly forwarded
to C; Based on the same principle the flow from B to A can be
forwarded to C. After doing malicious scanning on packet, C mod-
ifies the destination address as the real MAC address of B or A
and return the packet to switch. The flow between A and B can
be forwarded normally and not be perceived. So that C completes
man-in-the-middle attack.
To avoid this bug, all ARP packets should be checked. Those that
conform to the qualification are forwared by software. The ARP
packets that fail in check will be discarded.
Based on this requirement, the following methods that prevents
usual ARP attack are added.
1. As for untrusted interface, DAI blocks all ARP packets and send
them to upper layer software for check.
2. The speed that ARP packet sent to CPU is configurable.
3. When DHCP SNOOPING is enabled, laye 2 IP ,MAC and port
corresponding relationship are checked. Illegal user will be
discarded.
Confidential and Proprietary Information of ZTE CORPORATION
Chapter 17 Security Configuration
-
A
MIDDLE
TTACK
Figure
39.
177

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents