Tp-Link T2600G-28MPS (TL-SG3424P) [296/379] Arp inspection

Tp-Link T2600G-28MPS (TL-SG3424P) [296/379] Arp inspection
Choose the menu Network Security→DHCPv6 Snooping→DHCPv6 Snooping to load the
following page.
Figure 14-14 DHCPv6 Snooping
DHCPV6 Snooping
DHCPv6 Snooping:
Enable/Disable the DHCPv6 Snooping function globally.
VLAN ID:
Enable/Disable the DHCPv6 Snooping function in the
specified VLAN.
VLAN Configuration
Display:
Displays the VLANs with DHCPv6 Snooping function enabled
.
Trusted Port
UNIT:1/LAGS:
Select the desired unit or LAGS for configuration.
Trusted Port:
Select the port to be a Trusted Port. Only the Trusted Port can
forward the DHCPv6 packets from DHCPv6 servers.
14.5 ARP Inspection
According to the ARP Implementation Procedure stated in 14.1.3 ARP Scanning, it can be
found that ARP protocol can facilitate the Hosts in the same network segment to communicate
with one another or access to external network via Gateway. However, since ARP protocol is
implemented with the premise that all the Hosts and Gateways are trusted, there are high
security risks during ARP Implementation Procedure in the actual complex network. Thus, the
cheating attacks against ARP, such as imitating Gateway, cheating Gateway, cheating terminal
Hosts and ARP Flooding Attack, frequently occur to the network, especially to the large
network such as campus network. The following part will simply introduce these ARP attacks.
Imitating Gateway
284

Содержание

Скачать