51. DYNAMIC ARP INSPECTION
WHAT IS DYNAMIC ARP INSPECTION (DAI) ?
ARP REVIEW
- ARP is used to learn the MAC ADDRESS of another DEVICE with a known IP ADDRESS
- For example, a PC will use ARP to learn the MAC ADDRESS of its DEFAULT GATEWAY to communicate with external NETWORKS
- Typically, it is a TWO MESSAGE EXCHANGE : ARP REQUEST and ARP REPLY
GRATUITOUS ARP
- A GRATUITOUS ARP MESSAGE is an ARP REPLY that is sent without receiving an ARP REQUEST
- It is SENT to the BROADCAST MAC ADDRESS
- It allows other DEVICES to learn the MAC ADDRESS of the sending DEVICE without having to send ARP REQUESTS.
- Some DEVICES automatically send GARP MESSAGES when an INTERFACE is enabled, IP ADDRESS is changed, MAC address is changed, etc.
DYNAMIC ARP INSPECTION
- DAI is a SECURITY FEATURE of SWITCHES that is used to filter ARP MESSAGES received on UNTRUSTED PORTS
- DAI only filters ARP MESSAGES. Non-ARP MESSAGES are NOT affected
- All PORTS are UNTRUSTED, by DEFAULT
- Typically, all PORTS connected to other NETWORK DEVICES (SWITCHES, ROUTERS) should be configured as TRUSTED, while INTERFACES connected to END HOSTS should remain UNTRUSTED
Click to enlarge
Click to enlarge
Click to enlarge
ARP POISONING (MAN IN THE MIDDLE)
- Similar to DHCP POISONING, ARP POISONING involved an ATTACKER manipulating TARGET’S ARP TABLES so TRAFFIC is sent to the ATTACKER
- To do this, the ATTACKER can send GRATUITOUS ARP MESSAGES using another DEVICE’S IP ADDRESS
- Other DEVICES in the NETWORK will receive the GARP and update their ARP TABLES, causing them to send TRAFFIC to the ATTACKER instead of the legitimate DESTINATION
Click to enlarge
DYNAMIC ARP INSPECTION OPERATIONS
- DAI inspects the SENDER MAC and SENDER IP fields of ARP MESSAGES received on UNTRUSTED PORTS and checks that there is a matching entry in the DHCP SNOOPING BINDING TABLE
- If there is a MATCH, the ARP MESSAGE is FORWARDED
- If there is NO MATCH, the ARP MESSAGE is DISCARDED
Click to enlarge
-
DAI doesn’t inspect messages received on TRUSTED PORTS. They are FORWARDED as normal.
-
ARP ACLs can be manually configured to map IP ADDRESSES / MAC ADDRESSES for DAI to check
- Useful for HOSTS that don’t use DHCP
-
DAI can be configured to perform more in-depth checks also - but these are optional
-
Like DHCP SNOOPING, DAI also supports RATE-LIMITING to prevent ATTACKERS from overwhelming the SWITCH with ARP MESSAGES
- DHCP SNOOPING and DAI both require work from the SWITCH’S CPU
- Even if the ATTACKER’S messages are BLOCKED, they can OVERLOAD the SWITCH CPU with ARP MESSAGES
DYNAMIC ARP INSPECTION CONFIGURATION
Click to enlarge
Click to enlarge
Command : show ip arp inspection interfaces
Click to enlarge
DAI RATE LIMITING
Click to enlarge
DAI OPTIONAL CHECKS
Click to enlarge
Click to enlarge
Click to enlarge
ARP ACLs (Beyond Scope of CCNA)
CREATE AN ARP ACL FOR SRV1
Click to enlarge
AFTER APPLYING IT TO SWITCH 2, SRV1 is able to send ARP REQUEST to R1
Click to enlarge
Command: show ip arp inspection
Shows a summary of the DAI configuration and statistics
Click to enlarge
COMMAND REVIEW
Click to enlarge