EasyManuals Logo
Home>Cisco>Switch>WS-C6506

Cisco WS-C6506 User Manual

Cisco WS-C6506
1488 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #1005 background imageLoading...
Page #1005 background image
40-11
Catalyst 6500 Series Switch Software Configuration Guide—Release 8.7
OL-8978-04
Chapter 40 Configuring 802.1X Authentication
Default Authentication Configuration
Understanding How 802.1X Authentication with ARP Traffic Inspection Works
Note This feature is available only with Supervisor Engine 2 with PFC2, Supervisor Engine 720 with
PFC3A/PFC3B/PFC3BXL, and Supervisor Engine 32 with PFC3B/PFC3BXL.
ARP traffic inspection allows you to configure a set of order-dependent rules within the security ACL
(VACL) framework to prevent ARP table attacks. ARP traffic inspection complements the 802.1X port
authentication protocol, which first binds the MAC address of the authenticated client to the port,
eliminating the possibility of spoofing additional MAC addresses by adding an IP to MAC address
binding for additional spoof proofing.
You can use 802.1X authentication with ARP traffic inspection to provide an additional layer of port and
user security by eliminating the possibility of malicious users/hosts corrupting the ARP tables of the
other hosts. After a successful 802.1X supplicant authentication, ARP traffic inspection, which binds the
supplicant’s IP address and MAC address, is invoked and eliminates the spoofing possibility.
ARP is a simple protocol that does not have an authentication mechanism so there is no means to ensure
that the ARP requests and replies are genuine. Without an authentication mechanism, a malicious
user/host can corrupt the ARP tables of the other hosts on the same VLAN in a Layer 2 network or bridge
domain.
For example, user/Host A (the malicious user) can send the unsolicited ARP replies (or the gratuitous
ARP packets) to the other hosts on the subnet with the IP address of the default router and the MAC
address of Host A.With some earlier operating systems, even if a host already has a static ARP entry for
the default router, the newly advertised binding from Host A is learned. If Host A enables IP forwarding
and forwards all packets from the “spoofed” hosts to the router and vice versa, then Host A can carry out
a man-in-the-middle attack (for example, using the program dsniff) without the spoofed hosts realizing
that all of their traffic is being sniffed.
In addition, ARP inspection can drop the packets where the source Ethernet MAC address (in the
Ethernet header) does not match the source MAC address in the ARP header. You can enable (or disable)
this feature through the CLI by entering the set security acl arp-inspection match-mac {enable [drop
[log]] | disable} command.
To configure ARP traffic inspection, see the “Inspecting ARP Traffic” section on page 15-30.
Default Authentication Configuration
Table 40-2 shows the default 802.1X authentication configuration.
Table 40-2 802.1X Authentication Default Configuration
Feature Default Value
PAE Capability Authenticator only
Protocol Version 1
802.1X port control Force-authorized
802.1X multiple hosts Disabled
802.1X system authentication control Enabled
802.1X quiet period time 60 seconds

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco WS-C6506 and is the answer not in the manual?

Cisco WS-C6506 Specifications

General IconGeneral
BrandCisco
ModelWS-C6506
CategorySwitch
LanguageEnglish

Related product manuals