Allied Telesis Layer 3 Switches manual Rejecting Gratuitous ARP Garp, Dhcp snooping

Models: Layer 3 Switches

1 31
Download 31 pages 47.42 Kb
Page 15
Image 15
2.7.6 and later

Rejecting Gratuitous ARP (GARP)

Hosts can use GARP to announce their presence on a subnet. It is a helpful mechanism, particularly when there is a chance of duplicate addresses. However, attackers can use GARP to penetrate the network by adding themselves to the switch’s ARP table.

Identifying the user

Products

All switches listed on page 2

Software Versions

2.5.1 and later

You can configure Allied Telesis switches and routers to ignore GARP packets. Ignoring GARPs does not completely prevent IP spoofing, but it does shut down one easy avenue for an attacker.

Example To ignore GARPs on VLAN 1:

set ip interface=vlan1 gratuitousarp=off

Note: We do not recommend disabling GARP reception if a server with teamed network cards is attached to the switch. In a teamed-NIC redundancy set-up, another card takes over if a card fails. In many implementations, the NIC that takes over sends a GARP to inform the switch of the port and MAC address change.

DHCP snooping

The AlliedWare DHCP snooping feature is a series of layer 2

Products

AT-8600 Series

techniques. It works with information from a DHCP server

to:

AT-8700XL Series

z track the physical location of hosts

Rapier i Series

z ensure that hosts only use the IP addresses assigned to

Rapier Series

AT-8800 Series

them

AT-8948

z ensure that only authorised DHCP servers are accessible.

x900-48 Series

 

In short, DHCP snooping ensures IP integrity on an L2-

AT-9900 Series

switched domain.

Software Versions

 

With DHCP snooping, only a whitelist of IP addresses may access the network. You configure this whitelist at the switch

port level, and the DHCP server manages the access control. Only specific IP addresses with specific MAC addresses on specific ports may access the IP network.

DHCP snooping also stops attackers from adding their own DHCP servers to the network. An attacker could set up a server to wreak havoc in the network or even control it.

There are a number of options for DHCP snooping. You can:

zlet the switch snoop DHCP packets and decide who is authorised to access the IP network. See “Setting up DHCP snooping” on page 16.

zstatically bind IP address and MAC combinations to switch ports. See “Using static binding for rigid control” on page 16.

zuse option 82 to track users. See “Using DHCP snooping to track clients” on page 17.

zuse ARP security to reject ARP messages unless they come from an IP address in the DHCP snooping database. See “Using ARP security” on page 17.

Create A Secure Network With Allied Telesis Managed Layer 3 Switches

15

Page 15
Image 15
Allied Telesis Layer 3 Switches manual Rejecting Gratuitous ARP Garp, Dhcp snooping