Download the PDF pdficon

Using Dynamic ARP Inspection

Introduction

This document will define the operation of DAI or Dynamic ARP Inspection on the system. This document will also define how to configure the DAI feature and implement it in the network.

Document Number

ENG-010616

Applies To

This document applies to the DAI feature on all OLAN platforms. The DAI feature is applicable to releases 30.1 and above.

Document Revisions

Revision Date Notes
Revision A Jan 2016 Initial Release of Document
Revision B Aug 2025 Added DAI and DHCP trust states. Added DHCP Snooping checks and violation logging.

Dynamic ARP Inspection

Description

using-dynamic-arp-inspection-img0001

Dynamic ARP inspection provides protection from ARP Spoofing attacks and helps to ensure that the proper MAC / IP binding is maintained in the ARP tables.  Dynamic ARP inspection ensures that all the ARP requests and responses are inspected to ensure they agree with the bindings given by DHCP or an ACL associated with the port.

As seen in the diagram above, ARP Spoofing occurs when a host uses a gratuitous ARP to bind its own MAC to an IP address that it wants to spoof.  If accepted, the gratuitous ARP will cause all the devices on the subnet to update their ARP tables to send traffic to the hackers' MAC for traffic to the Spoofed IP.  Typically, these are man in the middle of attacks and the hacker will intercept and then forward the traffic to the correct MAC for that IP binding so that the victim is not tipped off that their traffic is being diverted.  This attack only works within layer 2 domains. Once the hacker has redirected traffic, he can then inspect, modify, or drop the user’s traffic on the subnet.  

It should be noted that some devices use the gratuitous ARP to allow redundant computers or systems to dynamically take over in the event of a failure.  This is true of the VGW, for example, and many voice switches.  

 

using-dynamic-arp-inspection-img0002

Dynamic ARP Inspection works via two mechanisms. The first is DHCP snooping.  DHCP snooping allows the system to maintain a database of DHCP entries with MAC to IP address bindings. This table is used to track the legitimate binding of MACs to IPs and ensure that all ARP entries agree with the bindings of DHCP. There is also an added benefit that the IP address binding and IP addresses associated with a port can be seen in the DHCP snooping database.

Dynamic ARP Inspection or DAI inspects all the ARP Responses and ensures that their binding matches that in the DHCP message exchange.  If it does not match, the ARP response is dropped, ensuring that a man in the middle attack will fail and that the ARP table cannot be poisoned. Up to four bindings per MAC are supported.  

The Tellabs OLAN system is a layer 2 switch and, generally speaking, is only aware of the Layer 2 MAC addresses.  The addition of DAI and DHCP snooping adds the capability to learn and display the MAC to IP binding on a port. The DHCP lease time is also learned and can be displayed at the EMS in the switching display.

Dynamic ARP Inspection also uses ACLs to handle Static IP addresses and maintain those entries in the database.

DAI Configuration

DAI has a global enable that is required for the DAI feature to be enabled for use. The user must first configure this panel and define the desired behavior of the feature:

 

using-dynamic-arp-inspection-img0003

 

The following configurable attributes exist:

DAI is enabled on a per VLAN basis. For each VLAN which you wish DAI to be enforced, the VLAN Properties for that VLAN should have the Enable DAI attribute checked. The system will support 24 DAI VLANs per QOIU7.

 

using-dynamic-arp-inspection-img0004

 

In the port profile, there is also the option to disable DAI on specific ports. There may be special requirements in the users' network which are valid but violate the DAI rules. The user can configure a port to be a trusted port with no ARP checks to be performed for that port. It is rare that this will be needed. One typical use case is if the device does not use IPv4 and either uses IPv6 or an Ethertype different from IPv4.  Some discovery protocols and special-purpose protocols use proprietary non-IP packets and therefore no IP to MAC binding can be learned and no ARP or DHCP snooping can occur.

The default setting is for the port to be untrusted and if DAI is enabled, the checks will be performed.

using-dynamic-arp-inspection-img0005

 

The behavior of each port with respect to DAI is configured within the port profile via two attributes:

 

DAI Trust State

DHCP Trust State

DHCP Snooping Checks

When DAI is enabled on a VLAN, DHCP snooping checks will be performed on that VLAN. The following checks are performed: 

Syslogging of DHCP Violations

DHCP Violations will be logged to syslog with the message type of: DHCPSVRINVALID. The DHCPServer IP MAC and Port ID are logged.

Static IP Addresses

DAI depends on learning of MAC to IP binding via snooping of DHCP message exchanges. Some devices have static IP addresses and therefore are never going to send DHCP messages. This section addresses how to handle Static IP addresses.

Static IPs can be handled in one of several ways:

 

Sticky MAC ACL:

using-dynamic-arp-inspection-img0006

 

MAC with bound IP:

using-dynamic-arp-inspection-img0007

DAI Scope

DAI scope is per QOIU/OIU card. This maps well to the number of ports on a PON card.  

DAI Statistics

The system supports statistics on the DAI Interface that are used to understand the number of packets that have been processed or acted on by DAI.

 

using-dynamic-arp-inspection-img0008

The user first enters the VLAN ID to retrieve the statistics, then presses the Locate button to retrieve the statistics for that VLAN.  The following statistics are displayed:

DHCP Snooping Statistics

DHCP snooping statistics are currently only supported at the CLI and can be seen using the command: 
         ne dhcpsnoopinginspection show 

The following counters are displayed: