10-09-2012 04:13 PM - edited 03-10-2019 12:19 PM
Hi ,
I would like to secure my network against layer 2 attacks and is principally made of ARP spoofing
I know there are methods such as: DAI and IP Source Guard, but due to my knowledge these two features as pre requisite "DHCP snooping"
is there another features or solution against "ARP spoofing" without enabling DHCP snooping in my Switch ???
Regards
Solved! Go to Solution.
10-09-2012 08:55 PM
Hello Mohamed,
is there another features or solution against "ARP spoofing" without enabling DHCP snooping in my Switch ???
There are none. Both DAI and IPSG must verify the correspondence of MAC and IP address as seen in ARP messages or in Ethernet-encapsulated IP packets. This correspondence is best obtained by snooping on the DHCP communication. There are ways to configure these mappings manually without using DHCP Snooping but maintaining a large number of stations in this manual way will get very tedious, impractical and prone to error.
Best regards,
Peter
10-09-2012 08:55 PM
Hello Mohamed,
is there another features or solution against "ARP spoofing" without enabling DHCP snooping in my Switch ???
There are none. Both DAI and IPSG must verify the correspondence of MAC and IP address as seen in ARP messages or in Ethernet-encapsulated IP packets. This correspondence is best obtained by snooping on the DHCP communication. There are ways to configure these mappings manually without using DHCP Snooping but maintaining a large number of stations in this manual way will get very tedious, impractical and prone to error.
Best regards,
Peter
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide