Volume 2 - Chapter 12: DHCP Snooping and ARP Inspection Flashcards

1
Q

In regards to DHCP snooping, which of the following types of devices are most likely to have their connected ports configured as “trusted”?
* Hosts
* Routers
* Switches
* DHCP Servers
* Access Points

A

Hosts, routers, and DHCP servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the function of the untrusted port type in regards to DHCP snooping.

A

The untrusted port will discard DHCP messages that would normally only be sent by servers (Offer & Ack.)

The untrusted port will forward DHCP client messages (Discover & Request), but may filter them if they are part of an attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe how DHCP is used in a man-in-the-middle attack.

A

The attacker will configure a DHCP server on their machine and offer the default gateway option as its own IP address. The attacker can then snoop the traffic before passing it along the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe how untrusted ports filter DHCP traffic for client messages

A
  1. For DISCOVER and REQUEST messages: compare the source MAC of the frame with the hardware address (chaddr) field in the DHCP message
  2. For RELEASE & DECLINE messages: compare the source port of the incoming RELEASE/DECLINE with the DHCP Snooping binding table
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A switch is configured with DHCP snooping and a connected host makes a successful DHCP request to a trusted server.

What happens after the host receives the new IP address?

A

The switch will add a new binding in the DHCP snooping binding table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What information is stored for each entry in the DHCP snooping binding table?

A

Each entry will contain the following:
* The source port of the host with the IP address
* The source VLAN of the host
* The IP address that was assigned to the host
* The MAC address of the host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What commands are required at a minimum to enable the use of DHCP snooping?

A

DHCP snooping must be enabled globally and for the specific VLANs for it to function:
* ip dhcp snooping
* ip dhcp snooping vlan XX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What command can be used to list the enabled/disabled state of DHCP snooping and the VLANs that it is currently enabled on?

A

show ip dhcp snooping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What additional option is added to DHCP requests when a request is forwarded to an external DHCP server by a relay agent?

A

Option 82

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A switch enabled with DHCP snooping, but does not act as a DHCP relay.

What command is required on the switch to prevent it from blocking valid DHCP client requests?

A

no ip dhcp snooping information option

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What command can be enabled to restrict the amount of DHCP messages being processed by DHCP snooping on the switch?

A

DHCP Snooping Rate Limits:

ip dhcp snooping limit rate messagespersecond

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe what happens when the DHCP snooping limit rate is exceeded?

A

The switch will put the interface configured with the limit rate into an err-disable state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What command(s) are required to enable the automatic recovery of a port put into err-disable due to exceeding the DHCP snooping rate limit?

A

errdisable recovery cause dhcp-rate-limit
errdisable recovery interval seconds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What 4 main fields are included in a typical ARP request?

A

Sender Hardware Address
Sender Protocol (IP) Address
Target Hardware Address
Target Protocol (IP) Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An ARP reply that is sent to a host without first having received an ARP request is refered to as?

A

A gratuitous ARP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe the function of a gratuitous ARP.

A

The grauitous ARP uses a destination broadcast address to notify all hosts on the network that its MAC has changed.

17
Q

Describe how an attacker uses gratuitous ARP messages to compromise a host.

A

An attacker can use gratuitous ARPs as part of a man-in-the-middle attack:

  1. The attacker sends a gratuitous ARP with its MAC as the desination for IP address x.x.x.x
  2. When hosts try to communicate with x.x.x.x, the message is sent to the MAC address of the attacker
  3. The attacker then copies these messages, before forwarding them to the actual intended recipient
18
Q

Describe how Dynamic ARP Inspection uses the DHCP snooping binding table.

A

By comparing the source MAC and IP to the valid bindings in the table for any untrusted port. If they do not match, the packet is discarded.

19
Q

True or False:

Dynamic ARP inspection can only be used with DHCP-enabled hosts.

A

False; hosts configured with static IP addresses can also benefit from DAI. Static ARP ACLs can be configured on the switch to filter these messages the same as DHCP hosts.

20
Q

Describe what checks are performed by Dynamic ARP inspection.

A
  • Compare the source MAC in the Ethernet header with the sender MAC in the ARP message
  • Compare the destination MAC in the Ethernet header with the target MAC in the ARP message
  • Check for unexpected IPs in the two ARP fields
21
Q

What command is used to enable the use of Dynamic ARP inspection for a VLAN?

A

In global mode:

ip arp inspection vlan xx

22
Q

A technician enables the use of DAI with the following configuration:

ip arp inspection vlan 11
!
interface GigabitEthernet1/0/2
ip arp inspection trust

What is the problem with the way this configuration is setup?

A

Neither DHCP snooping or ARP ACLs are configured. As such, all untrusted ports will drop any ARP requests even if they are valid.

Either DHCP snooping or static ARP ACLs must be configured at a minimum to support functional DAI

23
Q

A technician wants to configure the following on a switch that does not have a DHCP relay configured:
* DHCP snooping on VLAN 50
* Dynamic ARP inspection on VLAN 50
* Interface Gi1/0/10 as trusted for DHCP snooping
* Interface Gi1/0/10 as trusted for DAI

What commands must be configured to support this?

A

ip arp inspection vlan 50
ip dhcp snooping
ip dhcp snooping vlan 50
no ip dhcp snooping information option
!
interface GigabitEthernet1/0/1
ip arp inspection trust
ip dhcp snooping trust

24
Q

What command can be used to show the current statistics for DAI?

A

show ip arp inspection

or

show ip arp inspection statistics

25
Q

What command can be used to enable restricting the amount of ARP requests for an interface?

A

ip arp inspection limit rate numberofmessages

or

ip arp inspection limit rate numberofmessages burst interval numberofseconds

26
Q

What is the default burst rate for DAI if a burst rate is not specified?

A

1 second.

27
Q

Describe how limit rates differ with DAI versus DHCP snooping by default?

A

DAI defaults to use rate limits for all interfaces (trusted and untrusted) by default. DHCP snooping does not enable limit rates by default.

DAI allows a burst rate (per x seconds) to be configured, whereas DHCP does not.

28
Q

What is the command to enable the use of automatic err-disable recovery for ARP-inpection?

A

errdisable recovery cause arp-inspection

29
Q

What is the default interface rate limit for Dynamic ARP Inspection by default?

A

15 messages over a 1 second burst.

30
Q

What DAI check is always performed when DAI is enabled?

A

Sender MAC and Sender IP

31
Q

What commands can be used to enable the following optional checks for DAI?
* Source MAC
* Destination MAC
* IP addresses

A

ip arp inspection validate src-mac
ip arp inspection validate dst-mac
ip arp inspection validate ip

32
Q

What command can be used to disable DAI rate limits?

A

ip arp inspection rate limit none