| 0 comments ]

Understanding and Protecting Against Spoofing Attacks

Add a note here Spoofing attacks can occur because several protocols allow a reply from a host even if a request was not received. By spoofing, or pretending to be another machine, the attacker can redirect part or all the traffic coming from, or going to, a predefined target. After the attack, all traffic from the device under attack flows through the attacker’s computer and then to the router, switch, or host.

Add a note hereA spoofing attack can affect hosts, switches, and routers connected to your Layer 2 network by sending false information to the devices connected to the subnet. Spoofing attacks can also intercept traffic intended for other hosts on the subnet. This section describes how to mitigate these attacks and how to configure switches to guard against Dynamic Host Control Protocol (DHCP), MAC, and Address Resolution Protocol (ARP) threats.

Add a note here Catalyst Integrated Security Features

Add a note hereThe Cisco Catalyst Integrated Security capabilities provide campus security on the Cisco Catalyst switches using integrated tools, as shown in Figure 6-11.

Image from book
Add a note hereFigure 6-11: Cisco Integrated Security Features
  • Add a note herePort security prevents MAC flooding attacks.

  • Add a note here DHCP snooping prevents client attacks on the DHCP server and switch.

  • Add a note hereDynamic Address Resolution Protocol (ARP) inspection adds security to ARP using the DHCP snooping table to minimize the impact of ARP poisoning and spoofing attacks.

  • Add a note hereIP Source Guard (IPSG) prevents IP spoofing addresses using the DHCP snooping table.

Add a note herePort Security is covered in the MAC-based attack section of this chapter. DHCP snooping, DAI, and IP source guard can be used to prevent spoof attacks and are covered in depth in this section.

Add a note here DHCP Spoofing Attack

Add a note hereDHCP is a protocol used to dynamically assign an IP address and default gateway among other configurations to a client in a network. DHCP is achieved through an exchange of protocol packets between the client and the DHCP server, as shown in Figure 6-12.

Click to collapse
Add a note hereFigure 6-12: DCHP

Add a note hereDHCP uses four messages to provide an IP address to a client:

  • Add a note hereDHCP discover broadcast from client

  • Add a note hereDHCP offer broadcast to client

  • Add a note hereDHCP unicast request from client

  • Add a note hereDHCP unicast acknowledge to client

Add a note hereOne of the ways that an attacker can gain access to network traffic is to spoof responses that would be sent by a valid DHCP server. The DHCP spoofing device replies to client DHCP requests. The legitimate server can reply also, but if the spoofing device is on the same segment as the client, its reply to the client might arrive first.

Add a note here The intruder’s DHCP reply offers an IP address and supporting information that designates the intruder as the default gateway or Domain Name System (DNS) server. For a gateway, the clients then forward packets to the attacking device, which in turn sends them to the desired destination. This is referred to as a man-in-the-middle attack, and it can go entirely undetected as the intruder intercepts the data flow through the network.

Add a note hereThe following describes the DHCP spoof attack sequence:

  1. Add a note hereAttacker hosts a rogue DHCP server off a switch port.

  2. Add a note hereClient broadcasts a request for DHCP configuration information.

  3. Add a note hereThe rogue DHCP server responds before the legitimate DHCP server, assigning attacker-defined IP configuration information.

  4. Add a note hereHost packets are redirected to the attacker’s address as it emulates a default gateway for the erroneous DHCP address provided to the client.

Add a note hereA couple of scenarios can occur in a DHCP-enabled network. Attacker can cause a DoS attack by sending thousands of DHCP requests, as shown in Figure 6-13. The DHCP server does not have the capability to determine whether the request is genuine and therefore might end up exhausting all the available IP addresses. This results in a legitimate client not getting a IP address via DHCP.

Click to collapse
Add a note hereFigure 6-13: DHCP Spoofing Attacks

Add a note hereA second scenario can happen when the attacker attaches a DCHP server to the network and has it assume the role of the DHCP server for that segment. This enables the intruder to give out false DHCP information for the default gateway and domain name servers, which points clients to the hacker’s machine. This misdirection enables the hacker to become a man-in-the-middle and to gain access to confidential information, such as username and password pairs, while the end user is unaware of the attack.

Add a note here The following describes the DHCP spoof attack sequence, as shown in Figure 6-13:

  1. Add a note hereAttacker hosts a rogue DHCP server off a switch port.

  2. Add a note hereClient broadcasts a request for DHCP configuration information.

  3. Add a note hereThe rogue DHCP server responds before the legitimate DHCP server, assigning attacker-defined IP configuration information.

  4. Add a note hereHost packets are redirected to the attacker’s address as it emulates a default gateway for the erroneous DHCP address provided to the client.

Add a note hereDHCP snooping can prevent these two types of attacks. DHCP snooping is a per-port security mechanism used to differentiate an untrusted switch port connected to an end user from a trusted switch port connected to a DHCP server or another switch. It can be enabled on a per-VLAN basis. DHCP snooping enables only authorized DHCP servers to respond to DHCP requests and to distribute network information to clients.

Add a note here DHCP Snooping

Add a note hereDHCP snooping is a Cisco Catalyst feature that determines which switch ports can respond to DHCP requests. Ports are identified as trusted and untrusted. Trusted ports can source all DHCP messages, whereas untrusted ports can source requests only. Trusted ports host a DHCP server or can be an uplink toward the DHCP server, as shown in Figure 6-14. If a rogue device on an untrusted port attempts to send a DHCP response packet into the network, the port is shut down. This feature can be coupled with DHCP Option 82, in which switch information, such as the port ID of the DHCP request, can be inserted into the DHCP request packet.

Image from book
Add a note hereFigure 6-14: DHCP Snooping Configuration

Add a note hereUntrusted ports are those not explicitly configured as trusted. A DHCP binding table is built for untrusted ports. Each entry contains the client MAC address, IP address, lease time, binding type, VLAN number, and port ID recorded as clients make DHCP requests. The table is then used to filter subsequent DHCP traffic. From a DHCP snooping perspective, untrusted access ports should not send any DHCP server responses, such as DHCPOFFER, DHCPACK, or DHCPNAK.

Add a note hereTo enable DHCP snooping, use the commands listed in Table 6-3.

Add a note here Table 6-3: Steps for Enabling DHCP Snooping
Open table as spreadsheet

Add a note hereStep

Add a note hereComments

Add a note here1. Enable DHCP snooping globally:

Add a note hereSwitch(config)#ip dhcp snooping

Add a note hereBy default, the feature is not enabled.

Add a note here2. Enable DHCP Option 82:

Add a note hereSwitch(config)#ip dhcp snooping
information option

Add a note hereThis is optional for the forwarded DHCP request packet to contain information on the switch port where it originated.

Add a note here3. Configure DHCP server interfaces or uplink ports as trusted:

Add a note hereSwitch(config-if)# ip dhcp snooping
trust

Add a note hereAt least one trusted port must be configured. Use the no keyword to revert to untrusted.

Add a note hereBy default, all ports are untrusted.

Add a note here4. Configure the number of DHCP packets per second (pps) that are acceptable on the port:

Add a note hereSwitch(config-if)#ip dhcp snooping limit
rate rate

Add a note hereConfigure the number of DHCP pps that an interface can receive. Normally, the rate limit applies to untrusted interfaces.

Add a note hereThis is used to prevent DHCP starvation attacks by limiting the rate of the DHCP requests on untrusted ports.

Add a note here5. Enable DHCP snooping on specific VLANs:

Add a note hereSwitch(config)#ip dhcp snooping vlan
number [number]

Add a note hereThis is required to identify those VLANs that will be subject to DHCP snooping. Default is no VLANs are enabled for DHCP snooping.

Add a note here6. Verify the configuration:

Add a note hereSwitch#show ip dhcp snooping

Add a note hereVerify the configuration.

Add a note here Example 6-8 illustrates sample DHCP snooping configuration for a simple topology of an access layer switch in Figure 6-15.

Add a note here Example 6-8: DCHP Snooping Configuration

Add a note hereswitch(config)# ip dhcp snooping
switch(config)# ip dhcp snooping information option
switch(config)# ip dhcp snooping vlan 10,20
switch(config)# interface fastethernet 0/1
switch(config-if)# description Access Port
switch(config-if)# ip dhcp limit rate 5
switch(config)# interface fastethernet 0/24
switch(config-if)# description Uplink
switch(config-if)# switchport mode trunk
switch(config-if)# switchport trunk allowed vlan 10,20
switch(config-if)# ip dhcp snooping trust

Image from book
Add a note hereFigure 6-15: DHCP Snooping Configuration

Add a note here The show ip dhcp snooping family of commands is used to display information about the DHCP snooping configuration, as shown in Example 6-9.

Add a note hereIn Example 6-9, DHCP snooping is configured for VLANs 10 and 20 and operational on both of them. Only ports that are trusted or that have a rate limit applied will be shown in the output. Interface f0/1 has its rate limited and is not trusted, whereas interface f0/24 does not have any rate limitation and is trusted. All the other ports are untrusted and do not have a rate limit. They are not displayed.

Add a note here Example 6-9: Displaying DHCP Snooping Information

Add a note hereswitch# show ip dhcp snooping
Switch DHCP snooping is enabled
DHCP snooping is configured on following VLANs:
10,20
DHCP snooping is operational on following VLANs:
10,20
DHCP snooping is configured on the following L3 Interfaces:
Insertion of option 82 is enabled
circuit-id default format: vlan-mod-port
remote-id: 001a.e372.ab00 (MAC)
Option 82 on untrusted port is not allowed
Verification of hwaddr field is enabled
Verification of giaddr field is enabled
DHCP snooping trust/rate is configured on the following Interfaces:
Interface Trusted Allow option Rate limit (pps)
----------------------- ------- ------------ ----------------
FastEthernet0/1 no no 5
FastEthernet0/24 yes yes unlimited

Add a note here ARP Spoofing Attack

Add a note here In a normal ARP operation, a host sends a broadcast to determine the MAC address of a host with a particular IP address. The device at that IP address replies with its MAC address. The originating host caches the ARP response, using it to populate the destination Layer 2 header of packets sent to that IP address.

Add a note hereBy spoofing an ARP reply from a legitimate device with a gratuitous ARP, an attacking device appears to be the destination host sought by the senders. The ARP reply from the attacker causes the sender to store the MAC address of the attacking system in its ARP cache. All packets destined for those IP addresses are forwarded through the attacker system.

Add a note hereAn ARP spoofing attack follows the sequence shown in Table 6-4, as illustrated in Figure 6-16.

Add a note here Table 6-4: ARP Spoofing Attack
Open table as spreadsheet

Add a note hereSequence Number

Add a note hereDescription

Add a note here1.

Add a note hereHost A sends an ARP request for C’s MAC address.

Add a note here2.

Add a note hereRouter C replies with its MAC and IP addresses. C also updates its ARP cache.

Add a note here3.

Add a note hereHost A binds C’s MAC address to its IP address in its ARP cache.

Add a note here4.

Add a note hereHost B (attacker) sends ARP binding B’s MAC address to C’s IP address.

Add a note here5.

Add a note hereHost A updates ARP cache with B’s MAC address bound to C’s IP address.

Add a note here6.

Add a note hereHost B sends ARP binding B’s MAC address to A’s IP address.

Add a note here7.

Add a note hereRouter C updates ARP cache with B’s MAC address bound to A’s IP address.

Add a note here8.

Add a note herePackets are diverted through attacker (B).

Click to collapse
Add a note hereFigure 6-16: ARP Poisoning

Add a note here Preventing ARP Spoofing Through Dynamic ARP Inspection

Add a note here ARP does not have any authentication. It is quite simple for a malicious user to spoof addresses by using tools such as ettercap, dsniff, and arpspoof to poison the ARP tables of other hosts on the same VLAN. In a typical attack, a malicious user can send unsolicited ARP replies (gratuitous ARP packets) to other hosts on the subnet with the attacker’s MAC address and the default gateway’s IP address. Frames intended for default gateways sent from hosts with poisoned ARP tables are sent to the hacker’s machine (enabling the packets to be sniffed) or an unreachable host as a DoS attack. ARP poisoning leads to various man-in-the-middle attacks, posing a security threat in the network.

Add a note hereDynamic ARP inspection helps prevent the man-in-the-middle attacks by not relaying invalid or gratuitous ARP replies out to other ports in the same VLAN, as shown in Figure 6-17. Dynamic ARP inspection intercepts all ARP requests and all replies on the untrusted ports. Each intercepted packet is verified for valid IP-to-MAC bindings that are gathered via DHCP snooping. Denied ARP packets are either dropped or logged by the switch for auditing, so ARP poisoning attacks are stopped. Incoming ARP packets on the trusted ports are not inspected. Dynamic ARP inspection can also rate-limit ARP requests from client ports to minimize port scanning mechanisms.

Image from book
Add a note hereFigure 6-17: Dynamic ARP Inspection

Add a note here To prevent ARP spoofing or “poisoning,” a switch must ensure that only valid ARP requests and responses are relayed. DAI prevents these attacks by intercepting and validating all ARP requests and responses. Each intercepted ARP reply is verified for valid MAC-address-to-IP-address bindings before it is forwarded to a PC to update the ARP cache. ARP replies coming from invalid devices are dropped.

Add a note hereDAI determines the validity of an ARP packet based on a valid MAC-address-to-IP-address bindings database built by DHCP snooping. In addition, to handle hosts that use statically configured IP addresses, DAI can also validate ARP packets against user-configured ARP ACLs.

Add a note hereTo ensure that only valid ARP requests and responses are relayed, DAI takes these actions:

  • Add a note hereForwards ARP packets received on a trusted interface without any checks

  • Add a note hereIntercepts all ARP packets on untrusted ports

  • Add a note hereVerifies that each intercepted packet has a valid IP-to-MAC address binding before forwarding packets that can update the local ARP cache

  • Add a note hereDrops and logs ARP packets with invalid IP-to-MAC address bindings

Add a note hereConfigure all access switch ports as untrusted and all switch ports connected to other switches as trusted. In this case, all ARP packets entering the network would be from an upstream distribution or core switch, bypassing the security check and requiring no further validation.

Add a note here DAI can also be used to rate limit the ARP packets and then errdisable the interface if the rate is exceeded. Figure 6-18 shows the DAI recommended configuration.

Image from book
Add a note hereFigure 6-18: DAI Recommended Configuration

Add a note hereTo illustrate DAI operation in a multilayer switched network, consider the network shown in Figure 6-19 with two switches, Switches A and B. Host 1 is connected to Switch A, and Host 2 is connected to Switch B. The DHCP server is connected to Switch A. DHCP snooping is enabled on both Switch A and Switch B as a prerequisite for DAI. The inter-switch links are configured as DAI trusted ports, and the user ports are left in the default untrusted state.

Click to collapse
Add a note hereFigure 6-19: DAI Enabled Catalyst Switches

Add a note here Example 6-10 shows the configuration and verification of the switches for DAI for the scenario in Figure 6-19. Assume that all the devices are in VLAN 10 in this scenario. (The switches connect to each other via uplink ports GigabitEthernet 1/1.)

Add a note here Example 6-10: Configuration and Verification of DAI on Catalyst Switch

Add a note hereSwitchA# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
SwitchA(config)# ip arp inspection vlan 10
SwitchA(config)# interface gigabitEthernet 1/1
SwitchA(config-if)# ip arp inspection trust
SwitchA(config-if)# end
SwitchA#
SwitchB# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
SwitchB(config)# ip arp inspection vlan 10
SwitchB(config)# interface gigabitEthernet 1/1
SwitchB(config-if)# ip arp inspection trust
SwitchB(config-if)# end
SwitchB#
SwitchA# show ip arp inspection interfaces
Interface Trust State Rate (pps) Burst Interval
--------------- ----------- ---------- --------------
Gi1/1 Trusted None N/A
Gi1/2 Untrusted 15 1
Fa2/1 Untrusted 15 1
Fa2/2 Untrusted 15 1
Fa2/3 Untrusted 15 1
Fa2/4 Untrusted 15 1

SwitchA# show ip arp inspection vlan 10
Source Mac Validation : Disabled
Destination Mac Validation : Disabled
IP Address Validation : Disabled
Vlan Configuration Operation ACL Match Static ACL
---- ------------- --------- --------- ----------
10 Enabled Active
Vlan ACL Logging DHCP Logging
---- ----------- ------------
10 Deny Deny
SwitchA#
SwitchA# show ip dhcp snooping binding
MacAddress IpAddress Lease(sec) Type VLAN Interface
------------------ --------------- ---------- ------------- ---- --------------
00:01:00:01:00:01 10.10.10.1 4995 dhcp-snooping 10
FastEthernet2/1
SwitchB# show ip arp inspection interfaces
Interface Trust State Rate (pps) Burst Interval
--------------- ----------- ---------- --------------
Gi1/1 Trusted None N/A
Gi1/2 Untrusted 15 1
Fa2/1 Untrusted 15 1
Fa2/2 Untrusted 15 1
Fa2/3 Untrusted 15 1
Fa2/4 Untrusted 15 1

SwitchB# show ip arp inspection vlan 10
Source Mac Validation : Disabled
Destination Mac Validation : Disabled
IP Address Validation : Disabled
Vlan Configuration Operation ACL Match Static ACL
---- ------------- --------- --------- ----------
10 Enabled Active
Vlan ACL Logging DHCP Logging
---- ----------- ------------
10 Deny Deny
SwitchB#
SwitchB# show ip dhcp snooping binding
MacAddress IpAddress Lease(sec) Type VLAN Interface
----------------- ------------- ---------- ------------- ---- --------------
00:02:00:02:00:02 10.10.10.2 4995 dhcp-snooping 10 FastEthernet2/2

Add a note here Now if an attacker connects to Switch B, as shown in Figure 6-20, and tries to send a bogus ARP request, Switch B will detect it and drop the ARP request packet. The switch can also err-disable or shut down the port and send a log message to alert the administrator. DAI discards any ARP packets with invalid MAC address-to-IP address bindings.

Click to collapse
Add a note hereFigure 6-20: DAI Prevents Attacker’s Bogus ARP Request

Add a note here The error message displayed on the switch when such a security violation occurs is

Add a note here02:46:49: %SW_DAI-4-DHCP_SNOOPING_DENY: 1 Invalid ARPs (Req) on Fa3/3, vlan
10.([0001.0001.0001/10.10.10.1/0000.0000.0000/0.0.0.0/09:23:24 UTC Thu Nov 27
2003])

Add a note here Table 6-5 describes the commands used to configure DAI on Cisco Catalyst switch.

Add a note here Table 6-5: DAI Commands
Open table as spreadsheet

Add a note hereCommand

Add a note hereDescription

Add a note hereSwitch(config)# ip arp inspection vlan vlan_id [,vlan_id]

Add a note hereEnables DAI on a VLAN or range of VLANs

Add a note hereSwitch(config-if)# ip arp inspection trust

Add a note hereEnables DAI on an interface and sets the interface as a trusted interface

Add a note hereSwitch(config)# ip arp inspection validate {[src-mac] [dst-mac] [ip]}

Add a note hereConfigures DAI to drop ARP packets when the IP addresses are invalid, or when the MAC addresses in the body of the ARP packets do not match the addresses specified in the Ethernet header

Add a note hereIt is generally advisable to configure all access switch ports as untrusted and to configure all uplink ports connected to other switches as trusted.

Add a note here IP Spoofing and IP Source Guard

Add a note here IP spoofing can occur when the attack is impersonating as a legitimate host on the network, as shown in Figure 6-21. IP spoofing can result in unauthorized access or DoS attacks initiated by the attacker.

Image from book
Add a note hereFigure 6-21: IP Spoofing Attack

Add a note hereIP Source Guard prevents a malicious host from attacking the network by hijacking its neighbor’s IP address. IP Source Guard provides per-port IP traffic filtering of the assigned source IP addresses at wire speed. It dynamically maintains per-port VLAN ACLs based on IP-to-MAC-to-switch port bindings. The binding table is populated either by the DHCP snooping feature or through static configuration of entries. IP Source Guard is typically deployed for untrusted switch ports in the access layer.

Add a note hereIP Source Guard works closely with DHCP snooping. This feature can be enabled on a DHCP snooping untrusted Layer 2 port to prevent IP address spoofing, as shown in Figure 6-22. To start, all IP traffic on the port is blocked except for DHCP packets captured by the DHCP snooping process.

Click to collapse
Add a note hereFigure 6-22: IP Source Guard

Add a note hereWhen a client receives a valid IP address from the DHCP server, or when a static IP source binding is configured by the user, a per-port and VLAN Access Control List (PVACL) is installed on the port.

Add a note hereThis process restricts the client IP traffic to those source IP addresses configured in the binding; any IP traffic with a source IP address other than that in the IP source binding is filtered out. This filtering limits a host’s capability to attack the network by claiming a neighbor host’s IP address.

Add a note here IP Source Guard supports only the Layer 2 port, including both access and trunk. For each untrusted Layer 2 port, two levels of IP traffic security filtering exist:

  • Add a note here Source IP address filter: IP traffic is filtered based on its source IP address. Only IP traffic with a source IP address that matches the IP source binding entry is permitted.

    Add a note hereAn IP source address filter is changed when a new IP source entry binding is created or deleted on the port. The PVACL will be recalculated and reapplied in the hardware to reflect the IP source binding change. By default, if the IP filter is enabled without any IP source binding on the port, a default PVACL that denies all IP traffic is installed on the port. Similarly, when the IP filter is disabled, any IP source filter PVACL is removed from the interface.

  • Add a note here Source IP and MAC address filter: IP traffic is filtered based on its source IP address in addition to its MAC address; only IP traffic with source IP and MAC addresses that match the IP source binding entry are permitted.

Configuring IPSG

Add a note here IPSG requires that DHCP snooping be enabled on the required VLAN to enable automated IP source bindings.

Add a note here Table 6-6 describes the procedure for enabling IP Source Guard.

Add a note here Table 6-6: IP Source Guard Configuration Commands
Open table as spreadsheet

Add a note hereCommand

Add a note herePurpose

Add a note hereStep 1

Add a note hereSwitch(config)# ip dhcp snooping

Add a note hereEnables DHCP snooping, globally.

Add a note hereYou can use the no keyword to disable DHCP snooping.

Add a note hereStep 2

Add a note hereSwitch(config)# ip dhcp snooping vlan number [number]

Add a note hereEnables DHCP snooping on your VLANs.

Add a note hereStep 3

Add a note hereSwitch(config-if)# ip verify source vlan dhcp-snooping

Add a note hereOr

Add a note hereSwitch(config-if)# ip verify source vlan dhcp-snooping port-security

Add a note hereEnables IP Source Guard with source IP filtering.

Add a note hereEnables IP Source Guard with source IP and source MAC address filtering.

Add a note hereStep 4

Add a note hereSwitch(config-if)# switchport port-security limit rate invalid-source-mac N

Add a note here(Optional) Sets the rate limit for bad packets. This rate limit also applies to the port where DHCP snooping security mode is enabled as filtering the IP and MAC address.

Add a note hereStep 5

Add a note hereSwitch(config)# ip source binding ip-addr ip vlan number interface interface-id

Add a note hereConfigures a static IP binding on the port.

Add a note hereFor more information on how to configure IPSG on CatOS-based Catalyst 6500 switches, refer to the “Configuring DHCP Snooping and IP Source Guard” section in the software configuration guide on Cisco.com.

Add a note here Figure 6-23 shows a scenario in which a workstation using DHCP for acquiring IP addresses and a server that uses a static IP address connect to a Catalyst switch. Example 6-11 shows configuration and verification of IPSG for the scenario in Figure 6-23.

Click to collapse
Add a note hereFigure 6-23: IP Source Guard on Catalyst IOS-Based Switches
Add a note here Example 6-11: Configuration and Verification of IPSG on Catalyst Switch

Add a note hereSwitch# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)# ip dhcp snooping
Switch(config)# ip dhcp snooping vlan 1,10
Switch(config)# ip dhcp snooping verify mac-address
Switch(config)# ip source binding 0000.000a.000b vlan 10 10.1.10.11 interface
Fa2/18
Switch(config)# interface fastethernet 2/1
Switch(config-if)# switchport
Switch(config-if)# switchport mode access
Switch(config-if)# switchport port-security
Switch(config-if)# ip verify source vlan dhcp-snooping port-security
Switch(config)# interface fastethernet 2/18
Switch(config-if)# switchport
Switch(config-if)# switchport mode access
Switch(config-if)# switchport port-security
Switch(config-if)# ip verify source vlan dhcp-snooping port-security
Switch(config-if)# end
Switch# show ip source binding
MacAddress IpAddress Lease(sec) Type VLAN Interface
------------------ ------------ ---------- ------------- ---- ----------
00:02:B3:3F:3B:99 10.1.1.11 6522 dhcp-snooping 1 FastEthernet2/1
00:00:00:0A:00:0B 10.1.10.11 infinite static 10 FastEthernet2/18
Switch# show ip verify source
Interface Filter-type Filter-mode IP-address Mac-address Vlan
--------- ----------- ----------- --------------- ----------------- ----------
Fa2/1 ip-mac active 10.1.1.11 00:02:B3:3F:3B:99 1
Fa2/18 ip-mac active 10.1.10.11 00:00:00:0a:00:0b 10

Add a note here Figure 6-24 shows that an attacker is connected to interface 2/10 and is trying to spoof the IP address of the server. The Catalyst switch detects and drops the packets in the hardware path. The Catalyst switch also provides an error message to indicate the violation.

Image from book
Add a note hereFigure 6-24: IPSG Protecting Against an Attacker on Catalyst Switch

Add a note here IPSG is an essential security feature to prevent IP address spoof attacks at the Layer 2 level. Recommended practice is to enable IPSG on access layer switches in a multilayer switched network.


Note

Add a note hereThe static IP source binding can be configured on a switch port only. If you issue the IP source binding VLAN interface command on a Layer 3 port, you will receive this error message:

  • Add a note hereStatic IP source binding can be configured on the switch port only.

0 comments

Post a Comment