/
10.2.2.1.8. ARP Spoofing Attack / Spoofing Attack
SecHard
10.2.2.1.8. ARP Spoofing Attack / Spoofing Attack
An ARP spoofing attack (MITM) occurs when forged ARP messages are sent over the LAN. The attackers MAC address is then mapped to a computer's IP address. At this point, the attacker will start receiving any data for that IP address. ARP spoofing allows attackers to capture, modify and intercept data.
Dynamic ARP inspection (DAI) rejects invalid ARP packets. DAI is based on DHCP snooping because DHCP snooping creates a connection database with MAC address and IP addresses. The switch drops any ARP packet if the sending MAC address and sending IP address do not match the corresponding table entry in the DHCP snooping bindings database.
ip arp inspection vlan 444
ip arp inspection trust / ip arp inspection limit rate 2
, multiple selections available,
Related content
10.2.2.1.8. ARP Spoofing Attack / Spoofing Attack
10.2.2.1.8. ARP Spoofing Attack / Spoofing Attack
More like this
ARP Spoofing Attack
ARP Spoofing Attack
More like this
10.2.2.1.7. DHCP Starvation Attack / Starvation Attack
10.2.2.1.7. DHCP Starvation Attack / Starvation Attack
More like this
CDP - LLDP Attack
CDP - LLDP Attack
More like this
DHCP Starvation Attack
DHCP Starvation Attack
More like this
SecHard