01-27-2004 11:30 AM - edited 03-02-2019 01:11 PM
Is there any configuration to prevent the potential impact of somebody taking the default gateway IP and configuring it on a device on the same vlan/network. As devices learn of this new default gateway mac there will be traffic that gets black holed.
01-27-2004 01:36 PM
not that I know of.
If we're talking a new device, you could use 802.1X or mac-security on the switch port.
As for devices already on the vlan, use an OS that can lock out users from the network settings.
As for the affect, it would be gradual unless a large number of pc's fired up at the same time. PC's already using the current default gateway would keep using it, dependent on usage and arp timeouts of course. Should be enough time to jump on the issue before it gets out of hand.
01-27-2004 05:04 PM
Dynamic ARP Inspection was introduced recently to help with this problem: http://www.cisco.com/en/US/products/hw/switches/ps4324/products_configuration_guide_chapter09186a00801cddb9.html
I don't know what other platforms support it.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide