🌐
CCNA Prep
  • Intro
  • Network Devices
  • Interfaces and Cables
  • OSI Model & TCP/IP Suite
  • Intro to the CLI
  • Ethernet LAN Switching (Part 1)
  • Ethernet LAN Switching (Part 2)
  • IPv4 Addressing (Part 1)
  • IPv4 Addressing (Part 2)
  • Switch Interfaces
  • IPv4 Header
  • Routing Fundamentals
  • The Life of a Packet
  • Subnetting (Part 1)
  • Subnetting (Part 2)
  • Subnetting (Part 3 - VLSM)
  • VLANs (Part 1)
  • VLANs (Part 2)
  • VLANs (Part 3)
  • DTP/VTP
  • Spanning Tree Protocol (Part 1)
  • Spanning Tree Protocol (Part 2)
  • Rapid Spanning Tree Protocol
  • EtherChannel
  • Dynamic Routing
  • RIP & EIGRP
  • OSPF (Part 1)
  • OSPF (Part 2)
  • OSPF (Part 3)
  • First Hop Redundancy Protocols
  • TCP & UDP
  • IPv6 (Part 1)
  • IPv6 (Part 2)
  • IPv6 (Part 3)
  • Standard ACLs
  • Extended ACLs
  • CDP & LLDP
  • NTP
  • DNS
  • DHCP
  • SNMP
  • Syslog
  • SSH
  • FTP & TFTP
  • NAT (Part 1)
  • NAT (part 2)
  • QoS (Part 1)
  • QoS (Part 2)
  • Security Fundamentals
  • Port Security
  • DHCP Snooping
  • Dynamic ARP Inspection
  • LAN Architectures
  • WAN Architectures
  • Virtualization & Cloud, Containers, VRF
  • Wireless Fundamentals
  • Wireless Architectures
  • Wireless Security
  • Wireless Configuration
  • Network Automation
  • JSON, XML, & YAML
  • REST APIs
  • Software-Defined Networking
  • Ansible, Puppet, & Chef
Powered by GitBook
On this page

Dynamic ARP Inspection

Day 51

PreviousDHCP SnoopingNextLAN Architectures

Last updated 1 year ago

CtrlK
  • Operations
  • Configuration
  • Rate-Limiting
  • Optional Checks

DAI (Dynamic ARP Inspection) is a security feature of switches that is used to filter ARP messages received on untrusted ports. DAI only filters ARP messages. All ports are untrusted by default. Typically, all ports connected to other network devices should be configured as trusted, and interfaces connected to end hosts should remain untrusted.

DAI demo

Operations

DAI inspects the sender MAC and sender IP fields of ARP messages received on untrusted ports and checks the DHCP snooping binding table. If there is a matching entry, the ARP message is forwarded normally, otherwise the ARP message is discarded. The hosts that don't use DHCP can use ARP ACLs. Those can be configured manually to map IP addresses/MAC addresses for DAI to check. DAI can also be configured to perform in-depth checks. Like DHCP snooping, DAI also supports rate limiting.

Configuration

To configure DAI from the global config mode:

  1. ip arp inspection vlan followed by the VLAN number - enable DAI on the specified VLAN

  2. interface followed by the interface number - enter the interface config mode

  3. ip arp inspection trust - make the interface trusted

To view the DAI configuration, use the command show ip arp inspection, for DIA settings of interfaces - show ip arp inspection interfaces.

Rate-Limiting

DAI rate limiting is enabled on untrusted ports by default with a rate of 15 packets per second. It is disabled on trusted ports by default. The DAI burst interval allows to configure rate limiting like this - x packets per y seconds. So, it doesn't need to be x packets per second like in DHCP snooping. To configure it, use the command ip arp inspection limit rate followed by the number of packets and optionally you can add burst interval followed by the number in seconds. If you skip the optional part, the default burst interval is 1 second. If ARP messages are received faster than the specified rate, the interface is put in an err-disabled state.

Optional Checks

To use optional checks, enter the command ip arp inspection validate followed by either dst-mac/ip/src-mac. If several are configured sequentially, the previous one gets overwritten. So, to enable several checks, they should be entered in a single command separated by space( ).

  • dst-mac - enabled validation of the destination MAC address in the Ethernet header against the target MAC address in the ARP body for ARP Responses.

  • ip - enabled validation of the ARP body for invalid and unexpected IP addresses like 0.0.0.0, 255.255.255.255, multicast addresses, etc.

  • src-mac - enabled validation of the source MAC address in the Ethernet header against the sender MAC address in the ARP body for ARP Requests and ARP Responses.

Summary
8KB
Day 51 Flashcards - Dynamic ARP Inspection.apkg
51KB
Day 51 Lab - Dynamic ARP Inspection.pkt
show ip arp inspection interfaces command output
Summary