SlideShare a Scribd company logo
Essential Protection for
The Fundamental of IP
Networking
JJ Sun
PSM
Agenda
• Why IP address and MAC address
• How packets are delivered through the network
• The address resolution mechanism (ARP) and how it works
• Vulnerabilities and cyberattacks to ARP
• Defense by network security – Dynamic ARP Inspection
• Korenix products with advanced cybersecurity features
Fundamental But Insecure
MAC
IP
TCP / UDP
Applications
IP Address vs. MAC Address
MAC Address
(Media Access Control Address)
• Unique hardware identifier
• Unchangeable
• Used for communication
on a specific type of
network media and within
a network segment
IP Address
(Internet Protocol Address)
• Logical network address
• Configurable by user
• Used for inter-network
communication, to find the
route through the network
from sender to receiver
How It Works
Sender IP: IPsupport
Receiver IP: IPPLC
Sender IP: IPsupport
Receiver IP: IPPLC
Sender IP: IPsupport
Receiver IP: IPPLC
Sender IP: IPsupport
Receiver IP: IPPLC
Sender MAC: MACSupport
Receiver MAC: MACA
Sender MAC: MACA
Receiver MAC: MACB
Sender MAC: MACB
Receiver MAC: MACC
Sender MAC: MACC
Receiver MAC: MACPLC
Router A Router B Router C
Support
IPsupport
MACsupport
PLC
IPPLC
MACPLC
Network segment A
Ethernet
B
FDDI
C
Token Ring
D
Wifi
Address Resolution
• ARP (Address Resolution Protocol), a
critical mechanism in IP networking to
find out the mapping between a MAC
address and an IP address
…
IPIP Address →
MAC Address →
ARP REQUEST (broadcast)
To everyone,
I am MAC1, IP1. What is the MAC of IP3 ?
How ARP Works
I/O
IP2
MAC2
HMI
IP1
MAC1
PLC
IP3
MAC3
Gateway
IP4
MAC4
Switch
IP5
MAC5
IP MACIP MACIP MAC IP MAC
Port MAC
IP MAC
IP1 MAC1
IP MAC
IP1 MAC1
IP MAC
IP1 MAC1
Port MAC
1 MAC1
Sender IP: IP1
Receiver IP: IP3
Sender MAC: MAC1
Receiver MAC: ?
MAC address table
ARP table
How ARP Works
ARP RESPONSE (unicast)
To IP1:
I am IP3, and my MAC is MAC3
IP MACIP MACIP MAC IP MAC
Port MAC
IP MAC
IP1 MAC1
IP MAC
IP1 MAC1
IP MAC
IP3 MAC3
IP MAC
IP1 MAC1
Port MAC
1 MAC1
Port MAC
1 MAC1
3 MAC3
I/O
IP2
MAC2
HMI
IP1
MAC1
PLC
IP3
MAC3
Gateway
IP4
MAC4
Switch
IP5
MAC5
Sender IP: IP1
Receiver IP: IP3
Sender MAC: MAC1
Receiver MAC: ?
How ARP Works
IP MACIP MACIP MAC IP MAC
Port MAC
IP MAC
IP1 MAC1
IP MAC
IP1 MAC1
IP MAC
IP3 MAC3
IP MAC
IP1 MAC1
Port MAC
1 MAC1
Port MAC
1 MAC1
3 MAC3
I/O
IP2
MAC2
HMI
IP1
MAC1
PLC
IP3
MAC3
Gateway
IP4
MAC4
Switch
IP5
MAC5
Sender IP: IP1
Receiver IP: IP3
Sender MAC: MAC1
Receiver MAC: MAC3
Gratuitous ARP
IP MAC
IP1 MAC1
IP MAC
IP1 MAC1
IP MAC
IP3 MAC3
IP MAC
IP1 MAC1
Port MAC
1 MAC1
3 MAC3
IP MAC
IP3 MAC3
IP4 MAC4
IP MAC
IP1 MAC1
IP4 MAC4
IP MAC
IP1 MAC1
IP4 MAC4
ARP RESPONSE (broadcast)
This is IP4, MAC4
Port MAC
1 MAC1
3 MAC3
4 MAC4
I/O
IP2
MAC2
HMI
IP1
MAC1
PLC
IP3
MAC3
Gateway
IP4
MAC4
Switch
IP5
MAC5
Vulnerabilities and Cyberattacks
• ARP spoofing
• Hijacking attack
• DoS attack
• Man-In-The-Middle attack
• Broadcasting
• No encryption
• No validation
• No authentication
Host X
IPx
MACx
ARP Spoofing
IP MAC
IP3 MAC3
IP MAC
IP3 MAC3
IP4 MAC4
ARP RESPONSE (broadcast)
This is IP1, MACx
Port MAC
1 MAC1
3 MAC3
4 MAC4
IP MAC
IP1 MAC1
IP MAC
IP1 MACx
Port MAC
1 MAC1
3 MAC3
4 MAC4
5 MACx
IP MAC
IP1 MAC1
IP4 MAC4
IP MAC
IP1 MAC1
IP4 MAC4
IP MAC
IP1 MACx
IP4 MAC4
IP MAC
IP1 MACx
IP4 MAC4
I/O
IP2
MAC2
HMI
IP1
MAC1
PLC
IP3
MAC3
Gateway
IP4
MAC4
Switch
IP5
MAC5
Hijacking Attack
IP MAC
IP3 MAC3
IP MAC
IP3 MAC3
IP4 MAC4
Port MAC
1 MAC1
3 MAC3
4 MAC4
IP MAC
IP1 MAC1
IP MAC
IP1 MACx
Port MAC
1 MAC1
3 MAC3
4 MAC4
5 MACx
IP MAC
IP1 MAC1
IP4 MAC4
IP MAC
IP1 MAC1
IP4 MAC4
IP MAC
IP1 MACx
IP4 MAC4
IP MAC
IP1 MACx
IP4 MAC4
Host X
MACx
IPx
I/O
IP2
MAC2
HMI
IP1
MAC1
PLC
IP3
MAC3
Gateway
IP4
MAC4
Switch
IP5
MAC5
Sender IP: IP3
Receiver IP: IP1
Sender MAC: MAC3
Receiver MAC: MACx
Denial-of-Service Attack
IP MAC
IP3 MAC3
IP MAC
IP3 MAC3
IP4 MAC4
Port MAC
1 MAC1
3 MAC3
4 MAC4
IP MAC
IP1 MAC1
IP MAC
IP1 MAC1
IP4 MAC4
IP MAC
IP1 MAC1
IP4 MAC4
Host X
IPx
MACx
I/O
IP2
MAC2
HMI
IP1
MAC1
PLC
IP3
MAC3
Gateway
IP4
MAC4
Switch
IP5
MAC5
ARP RESPONSE (broadcast)
This is IP2, MAC1
This is IP3, MAC1
This is IP4, MAC1
…
IP MAC
IP1 MAC1
IP2 MAC1
IP3 MAC1
IP4 MAC1
… MAC1
IP MAC
IP1 MAC1
IP2 MAC1
IP3 MAC1
IP4 MAC1
… MAC1
IP MAC
IP1 MAC1
IP2 MAC1
IP3 MAC1
IP4 MAC1
… MAC1
IP MAC
IP1 MAC1
IP2 MAC1
IP3 MAC1
IP4 MAC1
… MAC1
Port MAC
5 MAC1
3 MAC3
4 MAC4
Attacks vs Defenses
ATTACKS
Arpspoof
Arpoison
ArpSpyX
ArpToXin
arpmitm
cSploit
Subterfuge
Seringe
zANTI
….
DEFENSES
AntiARP
Antidote
Arpalert
ArpON
ArpGuard
ArpStart
Panda Security
remarp
Winarpwatch
….PLC I/O Drive Sensor
HMI IPCWorkstation
Camera Reader
Laptop
Switch
Dynamic ARP Inspection
• DAI (Dynamic ARP Inspection)
A network security feature
inspects ARP, validates its
contain, rejects invalid and
malicious ones to prevent
ARP spoofing.
How DAI Works
I/O
IP2
MAC2
HMI
IP1
MAC1
PLC
IP3
MAC3
Gateway
IP4
MAC4
IP MACIP MACIP MAC IP MAC
!
!
!
Port IP MAC
1 IP1 MAC1
2 IP2 MAC2
3 IP3 MAC3
4 IP4 MAC4
Port MAC
!
Untrusted ports
Trusted database
How DAI Works
I/O
IP2
MAC2
HMI
IP1
MAC1
PLC
IP3
MAC3
Gateway
IP4
MAC4
IP MACIP MACIP MAC IP MAC
Port MAC
IP MAC
IP1 MAC1
IP MAC
IP1 MAC1
IP MAC
IP1 MAC1
!
!
!
Port IP MAC
1 IP1 MAC1
2 IP2 MAC2
3 IP3 MAC3
4 IP4 MAC4
!
ARP
I am MAC1, IP1
Port MAC
1 MAC1
Host X
IPx
MACx
!
!
!
How DAI Works
ARP
I am MACx, IP1
I/O
IP2
MAC2
HMI
IP1
MAC1
PLC
IP3
MAC3
Gateway
IP4
MAC4
IP MACIP MACIP MAC IP MAC
Port MAC
!
Port IP MAC
1 IP1 MAC1
2 IP2 MAC2
3 IP3 MAC3
4 IP4 MAC4
JetNet with Dynamic ARP Inspection
Din-Rail switches
Layer 2
• JetNet 5612G
• JetNet 5620G
Rackmount switches
Layer 2
• JetNet 5428G
• JetNet 6528G
• JetNet 6628G
• JetNet 6628X
Layer 3
• JetNet 7014G
• JetNet 7020G
Layer 3
• JetNet 6828G
• JetNet 7628X
JetPoE with Dynamic ARP Inspection
Din-Rail switches
Layer 2
• JetNet 5612GP
• JetNet 5620GP
Rackmount switches
Layer 2
• JetNet 5728G-16P
• JetNet 5728G-24P
• JetNet 6628XP
Layer 3
• JetNet 7310G
• JetNet 7714G
Layer 3
• JetNet 6728G-16P
• JetNet 6728G-24P
• JetNet 7628XP
Configuration
Web
Entry
Enable
Dynamic ARP Inspection
Assign
Trusted/Untrusted Ports
ARP Filters (DHCP Snooping)
Web
Configuration
Enable
DHCP Snooping
Address
Binding Table
ARP Filters (Manually)
ARP Filter
Add/Remote
ARP Filter
Rule Setting
Web Entry
Statistics
Web Entry Statistics Table
Event Warning
Enable
Event Warning
Web Entry
Summary
• ARP is one of the most fundamental mechanism of IP networking, but is
insecure by nature. Malicious user can simply hack a network without
advanced skills.
• Defense by network security is a more practical approach to protect ARP.
Network switches with Dynamic ARP Inspection help protect the system
against ARP spoofing, reduce hijacking, DoS, man-in-the-middle attacks.
• Addressing IEC62443 the security standard, Korenix has implemented
Dynamic ARP Inspection which helps to secure the most fundamental
network operation
Essential Protection for The Fundamental of IP Networking - Cybersecurity Training (2) 2019

More Related Content

What's hot

CCNA Exploration 2 - Chapter 7
CCNA Exploration 2 - Chapter 7CCNA Exploration 2 - Chapter 7
CCNA Exploration 2 - Chapter 7
Irsandi Hasan
 
Apipa
ApipaApipa
Www ccnav5 net_ccna_1_chapter_5_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_5_v5_0_exam_answers_2014Www ccnav5 net_ccna_1_chapter_5_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_5_v5_0_exam_answers_2014
Đồng Quốc Vương
 
ComThings Gollum
ComThings GollumComThings Gollum
ComThings Gollum
ComThings
 
Packet Tracer: SNMP, Netflow, Sys-log
Packet Tracer: SNMP, Netflow, Sys-logPacket Tracer: SNMP, Netflow, Sys-log
Packet Tracer: SNMP, Netflow, Sys-log
Rafat Khandaker
 
Exploration_Routing_Chapter_7
Exploration_Routing_Chapter_7Exploration_Routing_Chapter_7
Exploration_Routing_Chapter_7
dinuk123
 
Iuwne10 S02 L02
Iuwne10 S02 L02Iuwne10 S02 L02
Iuwne10 S02 L02
Ravi Ranjan
 
Nitek Ethernet over Coax explained
Nitek Ethernet over Coax explainedNitek Ethernet over Coax explained
Nitek Ethernet over Coax explained
Chris Rinket
 
IP Source Guard
IP Source Guard IP Source Guard
IP Source Guard
NetProtocol Xpert
 
Iuwne10 S01 L09
Iuwne10 S01 L09Iuwne10 S01 L09
Iuwne10 S01 L09
Ravi Ranjan
 
E instruction hardware compatibility charts
E instruction hardware compatibility chartsE instruction hardware compatibility charts
E instruction hardware compatibility charts
William McIntosh
 
Iuwne10 S02 L04
Iuwne10 S02 L04Iuwne10 S02 L04
Iuwne10 S02 L04
Ravi Ranjan
 
Iuwne10 S02 L07
Iuwne10 S02 L07Iuwne10 S02 L07
Iuwne10 S02 L07
Ravi Ranjan
 
Eigrp
EigrpEigrp
IGS-6325-24P4S Industrial Managed Ethernet Switch
IGS-6325-24P4S Industrial  Managed Ethernet Switch IGS-6325-24P4S Industrial  Managed Ethernet Switch
IGS-6325-24P4S Industrial Managed Ethernet Switch
BluBoxx Communication Pvt. ltd
 
IOT NodeMCU - IFTTT Templet to send SMS
IOT NodeMCU - IFTTT Templet to send SMSIOT NodeMCU - IFTTT Templet to send SMS
IOT NodeMCU - IFTTT Templet to send SMS
Elaf A.Saeed
 
Iuwne10 S02 L03
Iuwne10 S02 L03Iuwne10 S02 L03
Iuwne10 S02 L03
Ravi Ranjan
 
Airheads Tech Talks: Cloud Guest SSID on Aruba Central
Airheads Tech Talks: Cloud Guest SSID on Aruba CentralAirheads Tech Talks: Cloud Guest SSID on Aruba Central
Airheads Tech Talks: Cloud Guest SSID on Aruba Central
Aruba, a Hewlett Packard Enterprise company
 
lab1
lab1lab1
Attachment 11 use of common analyzing and positioning tools
Attachment 11 use of common analyzing and positioning toolsAttachment 11 use of common analyzing and positioning tools
Attachment 11 use of common analyzing and positioning tools
Christian Silva Espinoza
 

What's hot (20)

CCNA Exploration 2 - Chapter 7
CCNA Exploration 2 - Chapter 7CCNA Exploration 2 - Chapter 7
CCNA Exploration 2 - Chapter 7
 
Apipa
ApipaApipa
Apipa
 
Www ccnav5 net_ccna_1_chapter_5_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_5_v5_0_exam_answers_2014Www ccnav5 net_ccna_1_chapter_5_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_5_v5_0_exam_answers_2014
 
ComThings Gollum
ComThings GollumComThings Gollum
ComThings Gollum
 
Packet Tracer: SNMP, Netflow, Sys-log
Packet Tracer: SNMP, Netflow, Sys-logPacket Tracer: SNMP, Netflow, Sys-log
Packet Tracer: SNMP, Netflow, Sys-log
 
Exploration_Routing_Chapter_7
Exploration_Routing_Chapter_7Exploration_Routing_Chapter_7
Exploration_Routing_Chapter_7
 
Iuwne10 S02 L02
Iuwne10 S02 L02Iuwne10 S02 L02
Iuwne10 S02 L02
 
Nitek Ethernet over Coax explained
Nitek Ethernet over Coax explainedNitek Ethernet over Coax explained
Nitek Ethernet over Coax explained
 
IP Source Guard
IP Source Guard IP Source Guard
IP Source Guard
 
Iuwne10 S01 L09
Iuwne10 S01 L09Iuwne10 S01 L09
Iuwne10 S01 L09
 
E instruction hardware compatibility charts
E instruction hardware compatibility chartsE instruction hardware compatibility charts
E instruction hardware compatibility charts
 
Iuwne10 S02 L04
Iuwne10 S02 L04Iuwne10 S02 L04
Iuwne10 S02 L04
 
Iuwne10 S02 L07
Iuwne10 S02 L07Iuwne10 S02 L07
Iuwne10 S02 L07
 
Eigrp
EigrpEigrp
Eigrp
 
IGS-6325-24P4S Industrial Managed Ethernet Switch
IGS-6325-24P4S Industrial  Managed Ethernet Switch IGS-6325-24P4S Industrial  Managed Ethernet Switch
IGS-6325-24P4S Industrial Managed Ethernet Switch
 
IOT NodeMCU - IFTTT Templet to send SMS
IOT NodeMCU - IFTTT Templet to send SMSIOT NodeMCU - IFTTT Templet to send SMS
IOT NodeMCU - IFTTT Templet to send SMS
 
Iuwne10 S02 L03
Iuwne10 S02 L03Iuwne10 S02 L03
Iuwne10 S02 L03
 
Airheads Tech Talks: Cloud Guest SSID on Aruba Central
Airheads Tech Talks: Cloud Guest SSID on Aruba CentralAirheads Tech Talks: Cloud Guest SSID on Aruba Central
Airheads Tech Talks: Cloud Guest SSID on Aruba Central
 
lab1
lab1lab1
lab1
 
Attachment 11 use of common analyzing and positioning tools
Attachment 11 use of common analyzing and positioning toolsAttachment 11 use of common analyzing and positioning tools
Attachment 11 use of common analyzing and positioning tools
 

Similar to Essential Protection for The Fundamental of IP Networking - Cybersecurity Training (2) 2019

Packet sniffing in switched LANs
Packet sniffing in switched LANsPacket sniffing in switched LANs
Packet sniffing in switched LANs
Ishraq Al Fataftah
 
Packet sniffingin switch lans
Packet sniffingin switch lansPacket sniffingin switch lans
Packet sniffingin switch lans
Encarnación Marín Caballero
 
Nnnnnn
NnnnnnNnnnnn
Nnnnnn
nautami
 
Arp spoofing
Arp spoofingArp spoofing
Arp spoofing
Luthfi Widyanto
 
PLNOG 9: Piotr Wojciechowski - Multicast Security
PLNOG 9: Piotr Wojciechowski - Multicast Security PLNOG 9: Piotr Wojciechowski - Multicast Security
PLNOG 9: Piotr Wojciechowski - Multicast Security
PROIDEA
 
Bh fed-03-kaminsky
Bh fed-03-kaminskyBh fed-03-kaminsky
Bh fed-03-kaminsky
Dan Kaminsky
 
ITN_Module_9.pptx
ITN_Module_9.pptxITN_Module_9.pptx
ITN_Module_9.pptx
FhKh5
 
Group Apres
Group ApresGroup Apres
Group Apres
ramya5a
 
C Cpres
C CpresC Cpres
C Cpres
ramya5a
 
C Cpres
C CpresC Cpres
C Cpres
ramya5a
 
C Cpres
C CpresC Cpres
C Cpres
ramya5a
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05
Irsandi Hasan
 
Protect The Fundamental of IP Networking - Network Security Features 2019
Protect The Fundamental of IP Networking - Network Security Features 2019Protect The Fundamental of IP Networking - Network Security Features 2019
Protect The Fundamental of IP Networking - Network Security Features 2019
Jiunn-Jer Sun
 
Packet sniffing
Packet sniffingPacket sniffing
Packet sniffing
Shyama Bhuvanendran
 
Et4045-3-attacks-2
Et4045-3-attacks-2Et4045-3-attacks-2
Et4045-3-attacks-2
Tutun Juhana
 
CCNA_ITN_Chp5.pptx
CCNA_ITN_Chp5.pptxCCNA_ITN_Chp5.pptx
CCNA_ITN_Chp5.pptx
NguyenLe340487
 
Unknown Unicast Traffic and Ping Pollers
Unknown Unicast Traffic and Ping PollersUnknown Unicast Traffic and Ping Pollers
Unknown Unicast Traffic and Ping Pollers
APNIC
 
NAT 64 FPGA Implementation
NAT 64 FPGA ImplementationNAT 64 FPGA Implementation
NAT 64 FPGA Implementation
Janith Rukman
 
Internet Protocol.pdf
Internet Protocol.pdfInternet Protocol.pdf
Internet Protocol.pdf
BIT DURG
 
PLNOG 7: Emil Gągała, Sławomir Janukowicz - carrier grade NAT
PLNOG 7: Emil Gągała,  Sławomir Janukowicz - carrier grade NAT PLNOG 7: Emil Gągała,  Sławomir Janukowicz - carrier grade NAT
PLNOG 7: Emil Gągała, Sławomir Janukowicz - carrier grade NAT
PROIDEA
 

Similar to Essential Protection for The Fundamental of IP Networking - Cybersecurity Training (2) 2019 (20)

Packet sniffing in switched LANs
Packet sniffing in switched LANsPacket sniffing in switched LANs
Packet sniffing in switched LANs
 
Packet sniffingin switch lans
Packet sniffingin switch lansPacket sniffingin switch lans
Packet sniffingin switch lans
 
Nnnnnn
NnnnnnNnnnnn
Nnnnnn
 
Arp spoofing
Arp spoofingArp spoofing
Arp spoofing
 
PLNOG 9: Piotr Wojciechowski - Multicast Security
PLNOG 9: Piotr Wojciechowski - Multicast Security PLNOG 9: Piotr Wojciechowski - Multicast Security
PLNOG 9: Piotr Wojciechowski - Multicast Security
 
Bh fed-03-kaminsky
Bh fed-03-kaminskyBh fed-03-kaminsky
Bh fed-03-kaminsky
 
ITN_Module_9.pptx
ITN_Module_9.pptxITN_Module_9.pptx
ITN_Module_9.pptx
 
Group Apres
Group ApresGroup Apres
Group Apres
 
C Cpres
C CpresC Cpres
C Cpres
 
C Cpres
C CpresC Cpres
C Cpres
 
C Cpres
C CpresC Cpres
C Cpres
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05
 
Protect The Fundamental of IP Networking - Network Security Features 2019
Protect The Fundamental of IP Networking - Network Security Features 2019Protect The Fundamental of IP Networking - Network Security Features 2019
Protect The Fundamental of IP Networking - Network Security Features 2019
 
Packet sniffing
Packet sniffingPacket sniffing
Packet sniffing
 
Et4045-3-attacks-2
Et4045-3-attacks-2Et4045-3-attacks-2
Et4045-3-attacks-2
 
CCNA_ITN_Chp5.pptx
CCNA_ITN_Chp5.pptxCCNA_ITN_Chp5.pptx
CCNA_ITN_Chp5.pptx
 
Unknown Unicast Traffic and Ping Pollers
Unknown Unicast Traffic and Ping PollersUnknown Unicast Traffic and Ping Pollers
Unknown Unicast Traffic and Ping Pollers
 
NAT 64 FPGA Implementation
NAT 64 FPGA ImplementationNAT 64 FPGA Implementation
NAT 64 FPGA Implementation
 
Internet Protocol.pdf
Internet Protocol.pdfInternet Protocol.pdf
Internet Protocol.pdf
 
PLNOG 7: Emil Gągała, Sławomir Janukowicz - carrier grade NAT
PLNOG 7: Emil Gągała,  Sławomir Janukowicz - carrier grade NAT PLNOG 7: Emil Gągała,  Sławomir Janukowicz - carrier grade NAT
PLNOG 7: Emil Gągała, Sławomir Janukowicz - carrier grade NAT
 

More from Jiunn-Jer Sun

Make The Impossible Possible - Industrial PoE Brochure 2014
Make The Impossible Possible - Industrial PoE Brochure 2014Make The Impossible Possible - Industrial PoE Brochure 2014
Make The Impossible Possible - Industrial PoE Brochure 2014
Jiunn-Jer Sun
 
Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018
Jiunn-Jer Sun
 
Market Trend And Korenix IIoT Vision - 2018
Market Trend And Korenix IIoT Vision - 2018Market Trend And Korenix IIoT Vision - 2018
Market Trend And Korenix IIoT Vision - 2018
Jiunn-Jer Sun
 
Industrial Wireless for Transportation - Korenix Wireless Solution 2016
Industrial Wireless for Transportation - Korenix Wireless Solution 2016Industrial Wireless for Transportation - Korenix Wireless Solution 2016
Industrial Wireless for Transportation - Korenix Wireless Solution 2016
Jiunn-Jer Sun
 
Secure Reliable Quality Networking Solutions for Railway 2019
Secure Reliable Quality Networking Solutions for Railway 2019Secure Reliable Quality Networking Solutions for Railway 2019
Secure Reliable Quality Networking Solutions for Railway 2019
Jiunn-Jer Sun
 
Effective Network Security Against Cyber Threats - Network Segmentation Techn...
Effective Network Security Against Cyber Threats - Network Segmentation Techn...Effective Network Security Against Cyber Threats - Network Segmentation Techn...
Effective Network Security Against Cyber Threats - Network Segmentation Techn...
Jiunn-Jer Sun
 
A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018
A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018
A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018
Jiunn-Jer Sun
 
Outstanding In Redundancy And Security - Korenix Ethernet Switches Brochure ...
Outstanding In Redundancy And Security  - Korenix Ethernet Switches Brochure ...Outstanding In Redundancy And Security  - Korenix Ethernet Switches Brochure ...
Outstanding In Redundancy And Security - Korenix Ethernet Switches Brochure ...
Jiunn-Jer Sun
 
Power Distribution Feeder Automation - Application Story 2012
Power Distribution Feeder Automation -  Application Story 2012Power Distribution Feeder Automation -  Application Story 2012
Power Distribution Feeder Automation - Application Story 2012
Jiunn-Jer Sun
 
Ensuring Network Reliabilty And Quality For IP Surveillance 2012
Ensuring Network Reliabilty And Quality For IP Surveillance 2012Ensuring Network Reliabilty And Quality For IP Surveillance 2012
Ensuring Network Reliabilty And Quality For IP Surveillance 2012
Jiunn-Jer Sun
 
Enhancing Network Quality for Video Transmission 2012
Enhancing Network Quality for Video Transmission 2012Enhancing Network Quality for Video Transmission 2012
Enhancing Network Quality for Video Transmission 2012
Jiunn-Jer Sun
 
Beijer Korenix Connected - Beijer Sales Kit 2019
Beijer Korenix Connected - Beijer Sales Kit 2019Beijer Korenix Connected - Beijer Sales Kit 2019
Beijer Korenix Connected - Beijer Sales Kit 2019
Jiunn-Jer Sun
 
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...
Jiunn-Jer Sun
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Jiunn-Jer Sun
 
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...
Jiunn-Jer Sun
 
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
Jiunn-Jer Sun
 
Levels Up Your Redundant Network By ERPS - Redundant Technology 2019
Levels Up Your Redundant Network By ERPS - Redundant Technology 2019Levels Up Your Redundant Network By ERPS - Redundant Technology 2019
Levels Up Your Redundant Network By ERPS - Redundant Technology 2019
Jiunn-Jer Sun
 
Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012
Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012
Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012
Jiunn-Jer Sun
 
Wireless AP and Antenna Quick Selection Guide 2013
Wireless AP and Antenna Quick Selection Guide 2013Wireless AP and Antenna Quick Selection Guide 2013
Wireless AP and Antenna Quick Selection Guide 2013
Jiunn-Jer Sun
 
Making Your Heavy Chores Easy - Industrial PoE Handbook 2008
Making Your Heavy Chores Easy - Industrial PoE Handbook 2008Making Your Heavy Chores Easy - Industrial PoE Handbook 2008
Making Your Heavy Chores Easy - Industrial PoE Handbook 2008
Jiunn-Jer Sun
 

More from Jiunn-Jer Sun (20)

Make The Impossible Possible - Industrial PoE Brochure 2014
Make The Impossible Possible - Industrial PoE Brochure 2014Make The Impossible Possible - Industrial PoE Brochure 2014
Make The Impossible Possible - Industrial PoE Brochure 2014
 
Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018
 
Market Trend And Korenix IIoT Vision - 2018
Market Trend And Korenix IIoT Vision - 2018Market Trend And Korenix IIoT Vision - 2018
Market Trend And Korenix IIoT Vision - 2018
 
Industrial Wireless for Transportation - Korenix Wireless Solution 2016
Industrial Wireless for Transportation - Korenix Wireless Solution 2016Industrial Wireless for Transportation - Korenix Wireless Solution 2016
Industrial Wireless for Transportation - Korenix Wireless Solution 2016
 
Secure Reliable Quality Networking Solutions for Railway 2019
Secure Reliable Quality Networking Solutions for Railway 2019Secure Reliable Quality Networking Solutions for Railway 2019
Secure Reliable Quality Networking Solutions for Railway 2019
 
Effective Network Security Against Cyber Threats - Network Segmentation Techn...
Effective Network Security Against Cyber Threats - Network Segmentation Techn...Effective Network Security Against Cyber Threats - Network Segmentation Techn...
Effective Network Security Against Cyber Threats - Network Segmentation Techn...
 
A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018
A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018
A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018
 
Outstanding In Redundancy And Security - Korenix Ethernet Switches Brochure ...
Outstanding In Redundancy And Security  - Korenix Ethernet Switches Brochure ...Outstanding In Redundancy And Security  - Korenix Ethernet Switches Brochure ...
Outstanding In Redundancy And Security - Korenix Ethernet Switches Brochure ...
 
Power Distribution Feeder Automation - Application Story 2012
Power Distribution Feeder Automation -  Application Story 2012Power Distribution Feeder Automation -  Application Story 2012
Power Distribution Feeder Automation - Application Story 2012
 
Ensuring Network Reliabilty And Quality For IP Surveillance 2012
Ensuring Network Reliabilty And Quality For IP Surveillance 2012Ensuring Network Reliabilty And Quality For IP Surveillance 2012
Ensuring Network Reliabilty And Quality For IP Surveillance 2012
 
Enhancing Network Quality for Video Transmission 2012
Enhancing Network Quality for Video Transmission 2012Enhancing Network Quality for Video Transmission 2012
Enhancing Network Quality for Video Transmission 2012
 
Beijer Korenix Connected - Beijer Sales Kit 2019
Beijer Korenix Connected - Beijer Sales Kit 2019Beijer Korenix Connected - Beijer Sales Kit 2019
Beijer Korenix Connected - Beijer Sales Kit 2019
 
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
 
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...
 
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
 
Levels Up Your Redundant Network By ERPS - Redundant Technology 2019
Levels Up Your Redundant Network By ERPS - Redundant Technology 2019Levels Up Your Redundant Network By ERPS - Redundant Technology 2019
Levels Up Your Redundant Network By ERPS - Redundant Technology 2019
 
Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012
Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012
Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012
 
Wireless AP and Antenna Quick Selection Guide 2013
Wireless AP and Antenna Quick Selection Guide 2013Wireless AP and Antenna Quick Selection Guide 2013
Wireless AP and Antenna Quick Selection Guide 2013
 
Making Your Heavy Chores Easy - Industrial PoE Handbook 2008
Making Your Heavy Chores Easy - Industrial PoE Handbook 2008Making Your Heavy Chores Easy - Industrial PoE Handbook 2008
Making Your Heavy Chores Easy - Industrial PoE Handbook 2008
 

Recently uploaded

Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 

Recently uploaded (20)

Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 

Essential Protection for The Fundamental of IP Networking - Cybersecurity Training (2) 2019

  • 1. Essential Protection for The Fundamental of IP Networking JJ Sun PSM
  • 2. Agenda • Why IP address and MAC address • How packets are delivered through the network • The address resolution mechanism (ARP) and how it works • Vulnerabilities and cyberattacks to ARP • Defense by network security – Dynamic ARP Inspection • Korenix products with advanced cybersecurity features
  • 4. IP Address vs. MAC Address MAC Address (Media Access Control Address) • Unique hardware identifier • Unchangeable • Used for communication on a specific type of network media and within a network segment IP Address (Internet Protocol Address) • Logical network address • Configurable by user • Used for inter-network communication, to find the route through the network from sender to receiver
  • 5. How It Works Sender IP: IPsupport Receiver IP: IPPLC Sender IP: IPsupport Receiver IP: IPPLC Sender IP: IPsupport Receiver IP: IPPLC Sender IP: IPsupport Receiver IP: IPPLC Sender MAC: MACSupport Receiver MAC: MACA Sender MAC: MACA Receiver MAC: MACB Sender MAC: MACB Receiver MAC: MACC Sender MAC: MACC Receiver MAC: MACPLC Router A Router B Router C Support IPsupport MACsupport PLC IPPLC MACPLC Network segment A Ethernet B FDDI C Token Ring D Wifi
  • 6. Address Resolution • ARP (Address Resolution Protocol), a critical mechanism in IP networking to find out the mapping between a MAC address and an IP address … IPIP Address → MAC Address →
  • 7. ARP REQUEST (broadcast) To everyone, I am MAC1, IP1. What is the MAC of IP3 ? How ARP Works I/O IP2 MAC2 HMI IP1 MAC1 PLC IP3 MAC3 Gateway IP4 MAC4 Switch IP5 MAC5 IP MACIP MACIP MAC IP MAC Port MAC IP MAC IP1 MAC1 IP MAC IP1 MAC1 IP MAC IP1 MAC1 Port MAC 1 MAC1 Sender IP: IP1 Receiver IP: IP3 Sender MAC: MAC1 Receiver MAC: ? MAC address table ARP table
  • 8. How ARP Works ARP RESPONSE (unicast) To IP1: I am IP3, and my MAC is MAC3 IP MACIP MACIP MAC IP MAC Port MAC IP MAC IP1 MAC1 IP MAC IP1 MAC1 IP MAC IP3 MAC3 IP MAC IP1 MAC1 Port MAC 1 MAC1 Port MAC 1 MAC1 3 MAC3 I/O IP2 MAC2 HMI IP1 MAC1 PLC IP3 MAC3 Gateway IP4 MAC4 Switch IP5 MAC5 Sender IP: IP1 Receiver IP: IP3 Sender MAC: MAC1 Receiver MAC: ?
  • 9. How ARP Works IP MACIP MACIP MAC IP MAC Port MAC IP MAC IP1 MAC1 IP MAC IP1 MAC1 IP MAC IP3 MAC3 IP MAC IP1 MAC1 Port MAC 1 MAC1 Port MAC 1 MAC1 3 MAC3 I/O IP2 MAC2 HMI IP1 MAC1 PLC IP3 MAC3 Gateway IP4 MAC4 Switch IP5 MAC5 Sender IP: IP1 Receiver IP: IP3 Sender MAC: MAC1 Receiver MAC: MAC3
  • 10. Gratuitous ARP IP MAC IP1 MAC1 IP MAC IP1 MAC1 IP MAC IP3 MAC3 IP MAC IP1 MAC1 Port MAC 1 MAC1 3 MAC3 IP MAC IP3 MAC3 IP4 MAC4 IP MAC IP1 MAC1 IP4 MAC4 IP MAC IP1 MAC1 IP4 MAC4 ARP RESPONSE (broadcast) This is IP4, MAC4 Port MAC 1 MAC1 3 MAC3 4 MAC4 I/O IP2 MAC2 HMI IP1 MAC1 PLC IP3 MAC3 Gateway IP4 MAC4 Switch IP5 MAC5
  • 11. Vulnerabilities and Cyberattacks • ARP spoofing • Hijacking attack • DoS attack • Man-In-The-Middle attack • Broadcasting • No encryption • No validation • No authentication
  • 12. Host X IPx MACx ARP Spoofing IP MAC IP3 MAC3 IP MAC IP3 MAC3 IP4 MAC4 ARP RESPONSE (broadcast) This is IP1, MACx Port MAC 1 MAC1 3 MAC3 4 MAC4 IP MAC IP1 MAC1 IP MAC IP1 MACx Port MAC 1 MAC1 3 MAC3 4 MAC4 5 MACx IP MAC IP1 MAC1 IP4 MAC4 IP MAC IP1 MAC1 IP4 MAC4 IP MAC IP1 MACx IP4 MAC4 IP MAC IP1 MACx IP4 MAC4 I/O IP2 MAC2 HMI IP1 MAC1 PLC IP3 MAC3 Gateway IP4 MAC4 Switch IP5 MAC5
  • 13. Hijacking Attack IP MAC IP3 MAC3 IP MAC IP3 MAC3 IP4 MAC4 Port MAC 1 MAC1 3 MAC3 4 MAC4 IP MAC IP1 MAC1 IP MAC IP1 MACx Port MAC 1 MAC1 3 MAC3 4 MAC4 5 MACx IP MAC IP1 MAC1 IP4 MAC4 IP MAC IP1 MAC1 IP4 MAC4 IP MAC IP1 MACx IP4 MAC4 IP MAC IP1 MACx IP4 MAC4 Host X MACx IPx I/O IP2 MAC2 HMI IP1 MAC1 PLC IP3 MAC3 Gateway IP4 MAC4 Switch IP5 MAC5 Sender IP: IP3 Receiver IP: IP1 Sender MAC: MAC3 Receiver MAC: MACx
  • 14. Denial-of-Service Attack IP MAC IP3 MAC3 IP MAC IP3 MAC3 IP4 MAC4 Port MAC 1 MAC1 3 MAC3 4 MAC4 IP MAC IP1 MAC1 IP MAC IP1 MAC1 IP4 MAC4 IP MAC IP1 MAC1 IP4 MAC4 Host X IPx MACx I/O IP2 MAC2 HMI IP1 MAC1 PLC IP3 MAC3 Gateway IP4 MAC4 Switch IP5 MAC5 ARP RESPONSE (broadcast) This is IP2, MAC1 This is IP3, MAC1 This is IP4, MAC1 … IP MAC IP1 MAC1 IP2 MAC1 IP3 MAC1 IP4 MAC1 … MAC1 IP MAC IP1 MAC1 IP2 MAC1 IP3 MAC1 IP4 MAC1 … MAC1 IP MAC IP1 MAC1 IP2 MAC1 IP3 MAC1 IP4 MAC1 … MAC1 IP MAC IP1 MAC1 IP2 MAC1 IP3 MAC1 IP4 MAC1 … MAC1 Port MAC 5 MAC1 3 MAC3 4 MAC4
  • 16. Dynamic ARP Inspection • DAI (Dynamic ARP Inspection) A network security feature inspects ARP, validates its contain, rejects invalid and malicious ones to prevent ARP spoofing.
  • 17. How DAI Works I/O IP2 MAC2 HMI IP1 MAC1 PLC IP3 MAC3 Gateway IP4 MAC4 IP MACIP MACIP MAC IP MAC ! ! ! Port IP MAC 1 IP1 MAC1 2 IP2 MAC2 3 IP3 MAC3 4 IP4 MAC4 Port MAC ! Untrusted ports Trusted database
  • 18. How DAI Works I/O IP2 MAC2 HMI IP1 MAC1 PLC IP3 MAC3 Gateway IP4 MAC4 IP MACIP MACIP MAC IP MAC Port MAC IP MAC IP1 MAC1 IP MAC IP1 MAC1 IP MAC IP1 MAC1 ! ! ! Port IP MAC 1 IP1 MAC1 2 IP2 MAC2 3 IP3 MAC3 4 IP4 MAC4 ! ARP I am MAC1, IP1 Port MAC 1 MAC1
  • 19. Host X IPx MACx ! ! ! How DAI Works ARP I am MACx, IP1 I/O IP2 MAC2 HMI IP1 MAC1 PLC IP3 MAC3 Gateway IP4 MAC4 IP MACIP MACIP MAC IP MAC Port MAC ! Port IP MAC 1 IP1 MAC1 2 IP2 MAC2 3 IP3 MAC3 4 IP4 MAC4
  • 20. JetNet with Dynamic ARP Inspection Din-Rail switches Layer 2 • JetNet 5612G • JetNet 5620G Rackmount switches Layer 2 • JetNet 5428G • JetNet 6528G • JetNet 6628G • JetNet 6628X Layer 3 • JetNet 7014G • JetNet 7020G Layer 3 • JetNet 6828G • JetNet 7628X
  • 21. JetPoE with Dynamic ARP Inspection Din-Rail switches Layer 2 • JetNet 5612GP • JetNet 5620GP Rackmount switches Layer 2 • JetNet 5728G-16P • JetNet 5728G-24P • JetNet 6628XP Layer 3 • JetNet 7310G • JetNet 7714G Layer 3 • JetNet 6728G-16P • JetNet 6728G-24P • JetNet 7628XP
  • 23. ARP Filters (DHCP Snooping) Web Configuration Enable DHCP Snooping Address Binding Table
  • 24. ARP Filters (Manually) ARP Filter Add/Remote ARP Filter Rule Setting Web Entry
  • 27. Summary • ARP is one of the most fundamental mechanism of IP networking, but is insecure by nature. Malicious user can simply hack a network without advanced skills. • Defense by network security is a more practical approach to protect ARP. Network switches with Dynamic ARP Inspection help protect the system against ARP spoofing, reduce hijacking, DoS, man-in-the-middle attacks. • Addressing IEC62443 the security standard, Korenix has implemented Dynamic ARP Inspection which helps to secure the most fundamental network operation