EasyManuals Logo

FoxGate S6424-S2C2 series User Manual

FoxGate S6424-S2C2 series
286 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #81 background imageLoading...
Page #81 background image
ARP Configuration
81
value of the hardware address length field is "6”. For an IP(v4) address, the value of the
protocol address length field is “4”.
OP: Operation code. This field specifies the type of ARP message. The value “1”
represents an ARP request and “2” represents an ARP reply.
Sender hardware address: This field specifies the hardware address of the device sending
the message.
Sender protocol address: This field specifies the protocol address of the device sending
the message.
Target hardware address: This field specifies the hardware address of the device the
message is being sent to.
Target protocol address: This field specifies the protocol address of the device the
message is being sent to.
12.2 Configuring ARP Attack Spoofing
12.2.1 Brief Introduction to ARP Spoofing
ARP provides no security mechanism and thus is prone to network attacks. An attacker
can construct and send ARP packets, thus threatening network security.
A forged ARP packet has the following characteristics:
The sender MAC address or target MAC address in the ARP message is inconsistent with
the source MAC or destination MAC address in the Ethernet frame.
The mapping between the sender IP address and the sender MAC address in the forged
ARP message is not the true IP-to-MAC address binding of a valid client.
ARP attacks bring many malicious effects. Network communications become unstable,
users cannot access the Internet, and serious industrial accidents may even occur. ARP
attacks may also intercept accounts and passwords of services such as games, network
banks, and file services.
12.2.2 ARP Anti-Spoofing Protection
ARP spoofing attacks to protection, the key is to identify and prohibit forwarding spoofed
ARP packets. From the principle of ARP spoofing, we can see, to prevent ARP spoofing
attack requires two ways, first to prevent the virus disguised as the gateway host, it will cause
the entire segment of the user can not access; followed by preventing the virus from the host
masquerade as another host, eavesdropping data or cause the same network segment can’t
communicate between the individual host.

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the FoxGate S6424-S2C2 series and is the answer not in the manual?

FoxGate S6424-S2C2 series Specifications

General IconGeneral
BrandFoxGate
ModelS6424-S2C2 series
CategorySwitch
LanguageEnglish

Related product manuals