
Task 1.18
Hi!
I am looking at the task in the CCNP workbook relating to DHCP snooping and DAI and bullet point 3 says to allow for static address for R4 and R6. I am not sure how to approach this task. Anyone going through the workbook that might have completed this task already?
Erick
Comments
DAI relies on the DHCP Snooping Binding Database to figure out what ARP
replies should be allowed. The problem is that if there are devices on
the segment that aren't running DHCP, the Snooping Binding Database
will not be populated with their IP address and MAC address pair, and
therefore their ARP request/replies will be dropped. To make a static
exception to DAI an ARP ACL is needed, with permit statements for their
individual IP address and MAC address pairings.
HTH,
(R&S/SP/Security)
[email protected]
Internetwork Expert, Inc.
http://www.INE.com
Toll Free: 877-224-8987 x 705
Outside US: 775-826-4344 x 705
Online Community: http://www.IEOC.com
CCIE Blog: http://blog.INE.com
eborgard wrote:
To the Cisco docs!
Erick
Brian,
Thanks for the reply. One other question if that's ok. Wouldn't it be acceptable to trust the interfaces for devices that aren't running DHCP? I'm a little confused by that.
Thanks,
Erick
Trust them under which feature? DHCP Snooping or DAI?
(R&S/SP/Security)
[email protected]
Internetwork Expert, Inc.
http://www.INE.com
Toll Free: 877-224-8987 x 705
Outside US: 775-826-4344 x 705
Online Community: http://www.IEOC.com
CCIE Blog: http://blog.INE.com
eborgard wrote:
I did find this link though. Maybe this can help me understand a little more.
http://ccietobe.blogspot.com/2009/01/dynamic-arp-inspection-with-non-dhcp.html
Thanks,
Erick
On Tue, Oct 13, 2009 at 2:47 PM, Brian McGahan <[email protected]> wrote:
Ok. I think I understand now. Correct me if I go in the wrong direction. If there are host on the network that had static IP addresses like a printer for example, we can create an arp ACL to allow that IP to MAC pair for that port, but if an attacker tried to use the printers port to initiate an attack, then those ARP requests would be dropped with DAI because although the IP address might be the same, the MAC address would be different so those requests/replies would be dropped. I hope I got that right. I think I got confused wondering why we couldn't just trust the ports going to the routers because they would be secured from the outside world. I was not considering that we were using the routers as an example for a typical host environment.
Erick
The key is that "trusting the port" from a DAI inspection is
configuring the ARP ACL. Also your example is correct assuming the
attacker has the wrong MAC address but the correct IP address.
(R&S/SP/Security)
[email protected]
Internetwork Expert, Inc.
http://www.INE.com
Toll Free: 877-224-8987 x 705
Outside US: 775-826-4344 x 705
Online Community: http://www.IEOC.com
CCIE Blog: http://blog.INE.com
eborgard wrote:
Kind Regards,
Erick