SlideShare a Scribd company logo
1 of 28
Download to read offline
Essential Protection for
The Fundamental of IP
Networking
JJ Sun
PSM
Agenda
• Why IP address and MAC address
• How packets are delivered through the network
• The address resolution mechanism (ARP) and how it works
• Vulnerabilities and cyberattacks to ARP
• Defense by network security – Dynamic ARP Inspection
• Korenix products with advanced cybersecurity features
Fundamental But Insecure
MAC
IP
TCP / UDP
Applications
IP Address vs. MAC Address
MAC Address
(Media Access Control Address)
• Unique hardware identifier
• Unchangeable
• Used for communication
on a specific type of
network media and within
a network segment
IP Address
(Internet Protocol Address)
• Logical network address
• Configurable by user
• Used for inter-network
communication, to find the
route through the network
from sender to receiver
How It Works
Sender IP: IPsupport
Receiver IP: IPPLC
Sender IP: IPsupport
Receiver IP: IPPLC
Sender IP: IPsupport
Receiver IP: IPPLC
Sender IP: IPsupport
Receiver IP: IPPLC
Sender MAC: MACSupport
Receiver MAC: MACA
Sender MAC: MACA
Receiver MAC: MACB
Sender MAC: MACB
Receiver MAC: MACC
Sender MAC: MACC
Receiver MAC: MACPLC
Router A Router B Router C
Support
IPsupport
MACsupport
PLC
IPPLC
MACPLC
Network segment A
Ethernet
B
FDDI
C
Token Ring
D
Wifi
Address Resolution
• ARP (Address Resolution Protocol), a
critical mechanism in IP networking to
find out the mapping between a MAC
address and an IP address
…
IPIP Address →
MAC Address →
ARP REQUEST (broadcast)
To everyone,
I am MAC1, IP1. What is the MAC of IP3 ?
How ARP Works
I/O
IP2
MAC2
HMI
IP1
MAC1
PLC
IP3
MAC3
Gateway
IP4
MAC4
Switch
IP5
MAC5
IP MACIP MACIP MAC IP MAC
Port MAC
IP MAC
IP1 MAC1
IP MAC
IP1 MAC1
IP MAC
IP1 MAC1
Port MAC
1 MAC1
Sender IP: IP1
Receiver IP: IP3
Sender MAC: MAC1
Receiver MAC: ?
MAC address table
ARP table
How ARP Works
ARP RESPONSE (unicast)
To IP1:
I am IP3, and my MAC is MAC3
IP MACIP MACIP MAC IP MAC
Port MAC
IP MAC
IP1 MAC1
IP MAC
IP1 MAC1
IP MAC
IP3 MAC3
IP MAC
IP1 MAC1
Port MAC
1 MAC1
Port MAC
1 MAC1
3 MAC3
I/O
IP2
MAC2
HMI
IP1
MAC1
PLC
IP3
MAC3
Gateway
IP4
MAC4
Switch
IP5
MAC5
Sender IP: IP1
Receiver IP: IP3
Sender MAC: MAC1
Receiver MAC: ?
How ARP Works
IP MACIP MACIP MAC IP MAC
Port MAC
IP MAC
IP1 MAC1
IP MAC
IP1 MAC1
IP MAC
IP3 MAC3
IP MAC
IP1 MAC1
Port MAC
1 MAC1
Port MAC
1 MAC1
3 MAC3
I/O
IP2
MAC2
HMI
IP1
MAC1
PLC
IP3
MAC3
Gateway
IP4
MAC4
Switch
IP5
MAC5
Sender IP: IP1
Receiver IP: IP3
Sender MAC: MAC1
Receiver MAC: MAC3
Gratuitous ARP
IP MAC
IP1 MAC1
IP MAC
IP1 MAC1
IP MAC
IP3 MAC3
IP MAC
IP1 MAC1
Port MAC
1 MAC1
3 MAC3
IP MAC
IP3 MAC3
IP4 MAC4
IP MAC
IP1 MAC1
IP4 MAC4
IP MAC
IP1 MAC1
IP4 MAC4
ARP RESPONSE (broadcast)
This is IP4, MAC4
Port MAC
1 MAC1
3 MAC3
4 MAC4
I/O
IP2
MAC2
HMI
IP1
MAC1
PLC
IP3
MAC3
Gateway
IP4
MAC4
Switch
IP5
MAC5
Vulnerabilities and Cyberattacks
• ARP spoofing
• Hijacking attack
• DoS attack
• Man-In-The-Middle attack
• Broadcasting
• No encryption
• No validation
• No authentication
Host X
IPx
MACx
ARP Spoofing
IP MAC
IP3 MAC3
IP MAC
IP3 MAC3
IP4 MAC4
ARP RESPONSE (broadcast)
This is IP1, MACx
Port MAC
1 MAC1
3 MAC3
4 MAC4
IP MAC
IP1 MAC1
IP MAC
IP1 MACx
Port MAC
1 MAC1
3 MAC3
4 MAC4
5 MACx
IP MAC
IP1 MAC1
IP4 MAC4
IP MAC
IP1 MAC1
IP4 MAC4
IP MAC
IP1 MACx
IP4 MAC4
IP MAC
IP1 MACx
IP4 MAC4
I/O
IP2
MAC2
HMI
IP1
MAC1
PLC
IP3
MAC3
Gateway
IP4
MAC4
Switch
IP5
MAC5
Hijacking Attack
IP MAC
IP3 MAC3
IP MAC
IP3 MAC3
IP4 MAC4
Port MAC
1 MAC1
3 MAC3
4 MAC4
IP MAC
IP1 MAC1
IP MAC
IP1 MACx
Port MAC
1 MAC1
3 MAC3
4 MAC4
5 MACx
IP MAC
IP1 MAC1
IP4 MAC4
IP MAC
IP1 MAC1
IP4 MAC4
IP MAC
IP1 MACx
IP4 MAC4
IP MAC
IP1 MACx
IP4 MAC4
Host X
MACx
IPx
I/O
IP2
MAC2
HMI
IP1
MAC1
PLC
IP3
MAC3
Gateway
IP4
MAC4
Switch
IP5
MAC5
Sender IP: IP3
Receiver IP: IP1
Sender MAC: MAC3
Receiver MAC: MACx
Denial-of-Service Attack
IP MAC
IP3 MAC3
IP MAC
IP3 MAC3
IP4 MAC4
Port MAC
1 MAC1
3 MAC3
4 MAC4
IP MAC
IP1 MAC1
IP MAC
IP1 MAC1
IP4 MAC4
IP MAC
IP1 MAC1
IP4 MAC4
Host X
IPx
MACx
I/O
IP2
MAC2
HMI
IP1
MAC1
PLC
IP3
MAC3
Gateway
IP4
MAC4
Switch
IP5
MAC5
ARP RESPONSE (broadcast)
This is IP2, MAC1
This is IP3, MAC1
This is IP4, MAC1
…
IP MAC
IP1 MAC1
IP2 MAC1
IP3 MAC1
IP4 MAC1
… MAC1
IP MAC
IP1 MAC1
IP2 MAC1
IP3 MAC1
IP4 MAC1
… MAC1
IP MAC
IP1 MAC1
IP2 MAC1
IP3 MAC1
IP4 MAC1
… MAC1
IP MAC
IP1 MAC1
IP2 MAC1
IP3 MAC1
IP4 MAC1
… MAC1
Port MAC
5 MAC1
3 MAC3
4 MAC4
Attacks vs Defenses
ATTACKS
Arpspoof
Arpoison
ArpSpyX
ArpToXin
arpmitm
cSploit
Subterfuge
Seringe
zANTI
….
DEFENSES
AntiARP
Antidote
Arpalert
ArpON
ArpGuard
ArpStart
Panda Security
remarp
Winarpwatch
….PLC I/O Drive Sensor
HMI IPCWorkstation
Camera Reader
Laptop
Switch
Dynamic ARP Inspection
• DAI (Dynamic ARP Inspection)
A network security feature
inspects ARP, validates its
contain, rejects invalid and
malicious ones to prevent
ARP spoofing.
How DAI Works
I/O
IP2
MAC2
HMI
IP1
MAC1
PLC
IP3
MAC3
Gateway
IP4
MAC4
IP MACIP MACIP MAC IP MAC
!
!
!
Port IP MAC
1 IP1 MAC1
2 IP2 MAC2
3 IP3 MAC3
4 IP4 MAC4
Port MAC
!
Untrusted ports
Trusted database
How DAI Works
I/O
IP2
MAC2
HMI
IP1
MAC1
PLC
IP3
MAC3
Gateway
IP4
MAC4
IP MACIP MACIP MAC IP MAC
Port MAC
IP MAC
IP1 MAC1
IP MAC
IP1 MAC1
IP MAC
IP1 MAC1
!
!
!
Port IP MAC
1 IP1 MAC1
2 IP2 MAC2
3 IP3 MAC3
4 IP4 MAC4
!
ARP
I am MAC1, IP1
Port MAC
1 MAC1
Host X
IPx
MACx
!
!
!
How DAI Works
ARP
I am MACx, IP1
I/O
IP2
MAC2
HMI
IP1
MAC1
PLC
IP3
MAC3
Gateway
IP4
MAC4
IP MACIP MACIP MAC IP MAC
Port MAC
!
Port IP MAC
1 IP1 MAC1
2 IP2 MAC2
3 IP3 MAC3
4 IP4 MAC4
JetNet with Dynamic ARP Inspection
Din-Rail switches
Layer 2
• JetNet 5612G
• JetNet 5620G
Rackmount switches
Layer 2
• JetNet 5428G
• JetNet 6528G
• JetNet 6628G
• JetNet 6628X
Layer 3
• JetNet 7014G
• JetNet 7020G
Layer 3
• JetNet 6828G
• JetNet 7628X
JetPoE with Dynamic ARP Inspection
Din-Rail switches
Layer 2
• JetNet 5612GP
• JetNet 5620GP
Rackmount switches
Layer 2
• JetNet 5728G-16P
• JetNet 5728G-24P
• JetNet 6628XP
Layer 3
• JetNet 7310G
• JetNet 7714G
Layer 3
• JetNet 6728G-16P
• JetNet 6728G-24P
• JetNet 7628XP
Configuration
Web
Entry
Enable
Dynamic ARP Inspection
Assign
Trusted/Untrusted Ports
ARP Filters (DHCP Snooping)
Web
Configuration
Enable
DHCP Snooping
Address
Binding Table
ARP Filters (Manually)
ARP Filter
Add/Remote
ARP Filter
Rule Setting
Web Entry
Statistics
Web Entry Statistics Table
Event Warning
Enable
Event Warning
Web Entry
Summary
• ARP is one of the most fundamental mechanism of IP networking, but is
insecure by nature. Malicious user can simply hack a network without
advanced skills.
• Defense by network security is a more practical approach to protect ARP.
Network switches with Dynamic ARP Inspection help protect the system
against ARP spoofing, reduce hijacking, DoS, man-in-the-middle attacks.
• Addressing IEC62443 the security standard, Korenix has implemented
Dynamic ARP Inspection which helps to secure the most fundamental
network operation
Essential Protection for The Fundamental of IP Networking - Cybersecurity Training (2) 2019

More Related Content

What's hot

CCNA Exploration 2 - Chapter 7
CCNA Exploration 2 - Chapter 7CCNA Exploration 2 - Chapter 7
CCNA Exploration 2 - Chapter 7Irsandi Hasan
 
Www ccnav5 net_ccna_1_chapter_5_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_5_v5_0_exam_answers_2014Www ccnav5 net_ccna_1_chapter_5_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_5_v5_0_exam_answers_2014Đồng Quốc Vương
 
ComThings Gollum
ComThings GollumComThings Gollum
ComThings GollumComThings
 
Packet Tracer: SNMP, Netflow, Sys-log
Packet Tracer: SNMP, Netflow, Sys-logPacket Tracer: SNMP, Netflow, Sys-log
Packet Tracer: SNMP, Netflow, Sys-logRafat Khandaker
 
Exploration_Routing_Chapter_7
Exploration_Routing_Chapter_7Exploration_Routing_Chapter_7
Exploration_Routing_Chapter_7dinuk123
 
Nitek Ethernet over Coax explained
Nitek Ethernet over Coax explainedNitek Ethernet over Coax explained
Nitek Ethernet over Coax explainedChris Rinket
 
E instruction hardware compatibility charts
E instruction hardware compatibility chartsE instruction hardware compatibility charts
E instruction hardware compatibility chartsWilliam McIntosh
 
IOT NodeMCU - IFTTT Templet to send SMS
IOT NodeMCU - IFTTT Templet to send SMSIOT NodeMCU - IFTTT Templet to send SMS
IOT NodeMCU - IFTTT Templet to send SMSElaf A.Saeed
 
Attachment 11 use of common analyzing and positioning tools
Attachment 11 use of common analyzing and positioning toolsAttachment 11 use of common analyzing and positioning tools
Attachment 11 use of common analyzing and positioning toolsChristian Silva Espinoza
 

What's hot (20)

CCNA Exploration 2 - Chapter 7
CCNA Exploration 2 - Chapter 7CCNA Exploration 2 - Chapter 7
CCNA Exploration 2 - Chapter 7
 
Apipa
ApipaApipa
Apipa
 
Www ccnav5 net_ccna_1_chapter_5_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_5_v5_0_exam_answers_2014Www ccnav5 net_ccna_1_chapter_5_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_5_v5_0_exam_answers_2014
 
ComThings Gollum
ComThings GollumComThings Gollum
ComThings Gollum
 
Packet Tracer: SNMP, Netflow, Sys-log
Packet Tracer: SNMP, Netflow, Sys-logPacket Tracer: SNMP, Netflow, Sys-log
Packet Tracer: SNMP, Netflow, Sys-log
 
Exploration_Routing_Chapter_7
Exploration_Routing_Chapter_7Exploration_Routing_Chapter_7
Exploration_Routing_Chapter_7
 
Iuwne10 S02 L02
Iuwne10 S02 L02Iuwne10 S02 L02
Iuwne10 S02 L02
 
Nitek Ethernet over Coax explained
Nitek Ethernet over Coax explainedNitek Ethernet over Coax explained
Nitek Ethernet over Coax explained
 
IP Source Guard
IP Source Guard IP Source Guard
IP Source Guard
 
Iuwne10 S01 L09
Iuwne10 S01 L09Iuwne10 S01 L09
Iuwne10 S01 L09
 
E instruction hardware compatibility charts
E instruction hardware compatibility chartsE instruction hardware compatibility charts
E instruction hardware compatibility charts
 
Iuwne10 S02 L04
Iuwne10 S02 L04Iuwne10 S02 L04
Iuwne10 S02 L04
 
Iuwne10 S02 L07
Iuwne10 S02 L07Iuwne10 S02 L07
Iuwne10 S02 L07
 
Eigrp
EigrpEigrp
Eigrp
 
IGS-6325-24P4S Industrial Managed Ethernet Switch
IGS-6325-24P4S Industrial  Managed Ethernet Switch IGS-6325-24P4S Industrial  Managed Ethernet Switch
IGS-6325-24P4S Industrial Managed Ethernet Switch
 
IOT NodeMCU - IFTTT Templet to send SMS
IOT NodeMCU - IFTTT Templet to send SMSIOT NodeMCU - IFTTT Templet to send SMS
IOT NodeMCU - IFTTT Templet to send SMS
 
Iuwne10 S02 L03
Iuwne10 S02 L03Iuwne10 S02 L03
Iuwne10 S02 L03
 
Airheads Tech Talks: Cloud Guest SSID on Aruba Central
Airheads Tech Talks: Cloud Guest SSID on Aruba CentralAirheads Tech Talks: Cloud Guest SSID on Aruba Central
Airheads Tech Talks: Cloud Guest SSID on Aruba Central
 
lab1
lab1lab1
lab1
 
Attachment 11 use of common analyzing and positioning tools
Attachment 11 use of common analyzing and positioning toolsAttachment 11 use of common analyzing and positioning tools
Attachment 11 use of common analyzing and positioning tools
 

Similar to Essential Protection for The Fundamental of IP Networking - Cybersecurity Training (2) 2019

Packet sniffing in switched LANs
Packet sniffing in switched LANsPacket sniffing in switched LANs
Packet sniffing in switched LANsIshraq Al Fataftah
 
PLNOG 9: Piotr Wojciechowski - Multicast Security
PLNOG 9: Piotr Wojciechowski - Multicast Security PLNOG 9: Piotr Wojciechowski - Multicast Security
PLNOG 9: Piotr Wojciechowski - Multicast Security PROIDEA
 
Bh fed-03-kaminsky
Bh fed-03-kaminskyBh fed-03-kaminsky
Bh fed-03-kaminskyDan Kaminsky
 
ITN_Module_9.pptx
ITN_Module_9.pptxITN_Module_9.pptx
ITN_Module_9.pptxFhKh5
 
Group Apres
Group ApresGroup Apres
Group Apresramya5a
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05Irsandi Hasan
 
Protect The Fundamental of IP Networking - Network Security Features 2019
Protect The Fundamental of IP Networking - Network Security Features 2019Protect The Fundamental of IP Networking - Network Security Features 2019
Protect The Fundamental of IP Networking - Network Security Features 2019Jiunn-Jer Sun
 
Et4045-3-attacks-2
Et4045-3-attacks-2Et4045-3-attacks-2
Et4045-3-attacks-2Tutun Juhana
 
Unknown Unicast Traffic and Ping Pollers
Unknown Unicast Traffic and Ping PollersUnknown Unicast Traffic and Ping Pollers
Unknown Unicast Traffic and Ping PollersAPNIC
 
NAT 64 FPGA Implementation
NAT 64 FPGA ImplementationNAT 64 FPGA Implementation
NAT 64 FPGA ImplementationJanith Rukman
 
Internet Protocol.pdf
Internet Protocol.pdfInternet Protocol.pdf
Internet Protocol.pdfBIT DURG
 
PLNOG 7: Emil Gągała, Sławomir Janukowicz - carrier grade NAT
PLNOG 7: Emil Gągała,  Sławomir Janukowicz - carrier grade NAT PLNOG 7: Emil Gągała,  Sławomir Janukowicz - carrier grade NAT
PLNOG 7: Emil Gągała, Sławomir Janukowicz - carrier grade NAT PROIDEA
 

Similar to Essential Protection for The Fundamental of IP Networking - Cybersecurity Training (2) 2019 (20)

Packet sniffing in switched LANs
Packet sniffing in switched LANsPacket sniffing in switched LANs
Packet sniffing in switched LANs
 
Packet sniffingin switch lans
Packet sniffingin switch lansPacket sniffingin switch lans
Packet sniffingin switch lans
 
Nnnnnn
NnnnnnNnnnnn
Nnnnnn
 
Arp spoofing
Arp spoofingArp spoofing
Arp spoofing
 
PLNOG 9: Piotr Wojciechowski - Multicast Security
PLNOG 9: Piotr Wojciechowski - Multicast Security PLNOG 9: Piotr Wojciechowski - Multicast Security
PLNOG 9: Piotr Wojciechowski - Multicast Security
 
Bh fed-03-kaminsky
Bh fed-03-kaminskyBh fed-03-kaminsky
Bh fed-03-kaminsky
 
ITN_Module_9.pptx
ITN_Module_9.pptxITN_Module_9.pptx
ITN_Module_9.pptx
 
Group Apres
Group ApresGroup Apres
Group Apres
 
C Cpres
C CpresC Cpres
C Cpres
 
C Cpres
C CpresC Cpres
C Cpres
 
C Cpres
C CpresC Cpres
C Cpres
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05
 
Protect The Fundamental of IP Networking - Network Security Features 2019
Protect The Fundamental of IP Networking - Network Security Features 2019Protect The Fundamental of IP Networking - Network Security Features 2019
Protect The Fundamental of IP Networking - Network Security Features 2019
 
Packet sniffing
Packet sniffingPacket sniffing
Packet sniffing
 
Et4045-3-attacks-2
Et4045-3-attacks-2Et4045-3-attacks-2
Et4045-3-attacks-2
 
CCNA_ITN_Chp5.pptx
CCNA_ITN_Chp5.pptxCCNA_ITN_Chp5.pptx
CCNA_ITN_Chp5.pptx
 
Unknown Unicast Traffic and Ping Pollers
Unknown Unicast Traffic and Ping PollersUnknown Unicast Traffic and Ping Pollers
Unknown Unicast Traffic and Ping Pollers
 
NAT 64 FPGA Implementation
NAT 64 FPGA ImplementationNAT 64 FPGA Implementation
NAT 64 FPGA Implementation
 
Internet Protocol.pdf
Internet Protocol.pdfInternet Protocol.pdf
Internet Protocol.pdf
 
PLNOG 7: Emil Gągała, Sławomir Janukowicz - carrier grade NAT
PLNOG 7: Emil Gągała,  Sławomir Janukowicz - carrier grade NAT PLNOG 7: Emil Gągała,  Sławomir Janukowicz - carrier grade NAT
PLNOG 7: Emil Gągała, Sławomir Janukowicz - carrier grade NAT
 

More from Jiunn-Jer Sun

Make The Impossible Possible - Industrial PoE Brochure 2014
Make The Impossible Possible - Industrial PoE Brochure 2014Make The Impossible Possible - Industrial PoE Brochure 2014
Make The Impossible Possible - Industrial PoE Brochure 2014Jiunn-Jer Sun
 
Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018Jiunn-Jer Sun
 
Market Trend And Korenix IIoT Vision - 2018
Market Trend And Korenix IIoT Vision - 2018Market Trend And Korenix IIoT Vision - 2018
Market Trend And Korenix IIoT Vision - 2018Jiunn-Jer Sun
 
Industrial Wireless for Transportation - Korenix Wireless Solution 2016
Industrial Wireless for Transportation - Korenix Wireless Solution 2016Industrial Wireless for Transportation - Korenix Wireless Solution 2016
Industrial Wireless for Transportation - Korenix Wireless Solution 2016Jiunn-Jer Sun
 
Secure Reliable Quality Networking Solutions for Railway 2019
Secure Reliable Quality Networking Solutions for Railway 2019Secure Reliable Quality Networking Solutions for Railway 2019
Secure Reliable Quality Networking Solutions for Railway 2019Jiunn-Jer Sun
 
Effective Network Security Against Cyber Threats - Network Segmentation Techn...
Effective Network Security Against Cyber Threats - Network Segmentation Techn...Effective Network Security Against Cyber Threats - Network Segmentation Techn...
Effective Network Security Against Cyber Threats - Network Segmentation Techn...Jiunn-Jer Sun
 
A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018
A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018
A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018Jiunn-Jer Sun
 
Outstanding In Redundancy And Security - Korenix Ethernet Switches Brochure ...
Outstanding In Redundancy And Security  - Korenix Ethernet Switches Brochure ...Outstanding In Redundancy And Security  - Korenix Ethernet Switches Brochure ...
Outstanding In Redundancy And Security - Korenix Ethernet Switches Brochure ...Jiunn-Jer Sun
 
Power Distribution Feeder Automation - Application Story 2012
Power Distribution Feeder Automation -  Application Story 2012Power Distribution Feeder Automation -  Application Story 2012
Power Distribution Feeder Automation - Application Story 2012Jiunn-Jer Sun
 
Ensuring Network Reliabilty And Quality For IP Surveillance 2012
Ensuring Network Reliabilty And Quality For IP Surveillance 2012Ensuring Network Reliabilty And Quality For IP Surveillance 2012
Ensuring Network Reliabilty And Quality For IP Surveillance 2012Jiunn-Jer Sun
 
Enhancing Network Quality for Video Transmission 2012
Enhancing Network Quality for Video Transmission 2012Enhancing Network Quality for Video Transmission 2012
Enhancing Network Quality for Video Transmission 2012Jiunn-Jer Sun
 
Beijer Korenix Connected - Beijer Sales Kit 2019
Beijer Korenix Connected - Beijer Sales Kit 2019Beijer Korenix Connected - Beijer Sales Kit 2019
Beijer Korenix Connected - Beijer Sales Kit 2019Jiunn-Jer Sun
 
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...Jiunn-Jer Sun
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Jiunn-Jer Sun
 
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...Jiunn-Jer Sun
 
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020Jiunn-Jer Sun
 
Levels Up Your Redundant Network By ERPS - Redundant Technology 2019
Levels Up Your Redundant Network By ERPS - Redundant Technology 2019Levels Up Your Redundant Network By ERPS - Redundant Technology 2019
Levels Up Your Redundant Network By ERPS - Redundant Technology 2019Jiunn-Jer Sun
 
Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012
Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012
Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012Jiunn-Jer Sun
 
Wireless AP and Antenna Quick Selection Guide 2013
Wireless AP and Antenna Quick Selection Guide 2013Wireless AP and Antenna Quick Selection Guide 2013
Wireless AP and Antenna Quick Selection Guide 2013Jiunn-Jer Sun
 
Making Your Heavy Chores Easy - Industrial PoE Handbook 2008
Making Your Heavy Chores Easy - Industrial PoE Handbook 2008Making Your Heavy Chores Easy - Industrial PoE Handbook 2008
Making Your Heavy Chores Easy - Industrial PoE Handbook 2008Jiunn-Jer Sun
 

More from Jiunn-Jer Sun (20)

Make The Impossible Possible - Industrial PoE Brochure 2014
Make The Impossible Possible - Industrial PoE Brochure 2014Make The Impossible Possible - Industrial PoE Brochure 2014
Make The Impossible Possible - Industrial PoE Brochure 2014
 
Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018
 
Market Trend And Korenix IIoT Vision - 2018
Market Trend And Korenix IIoT Vision - 2018Market Trend And Korenix IIoT Vision - 2018
Market Trend And Korenix IIoT Vision - 2018
 
Industrial Wireless for Transportation - Korenix Wireless Solution 2016
Industrial Wireless for Transportation - Korenix Wireless Solution 2016Industrial Wireless for Transportation - Korenix Wireless Solution 2016
Industrial Wireless for Transportation - Korenix Wireless Solution 2016
 
Secure Reliable Quality Networking Solutions for Railway 2019
Secure Reliable Quality Networking Solutions for Railway 2019Secure Reliable Quality Networking Solutions for Railway 2019
Secure Reliable Quality Networking Solutions for Railway 2019
 
Effective Network Security Against Cyber Threats - Network Segmentation Techn...
Effective Network Security Against Cyber Threats - Network Segmentation Techn...Effective Network Security Against Cyber Threats - Network Segmentation Techn...
Effective Network Security Against Cyber Threats - Network Segmentation Techn...
 
A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018
A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018
A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018
 
Outstanding In Redundancy And Security - Korenix Ethernet Switches Brochure ...
Outstanding In Redundancy And Security  - Korenix Ethernet Switches Brochure ...Outstanding In Redundancy And Security  - Korenix Ethernet Switches Brochure ...
Outstanding In Redundancy And Security - Korenix Ethernet Switches Brochure ...
 
Power Distribution Feeder Automation - Application Story 2012
Power Distribution Feeder Automation -  Application Story 2012Power Distribution Feeder Automation -  Application Story 2012
Power Distribution Feeder Automation - Application Story 2012
 
Ensuring Network Reliabilty And Quality For IP Surveillance 2012
Ensuring Network Reliabilty And Quality For IP Surveillance 2012Ensuring Network Reliabilty And Quality For IP Surveillance 2012
Ensuring Network Reliabilty And Quality For IP Surveillance 2012
 
Enhancing Network Quality for Video Transmission 2012
Enhancing Network Quality for Video Transmission 2012Enhancing Network Quality for Video Transmission 2012
Enhancing Network Quality for Video Transmission 2012
 
Beijer Korenix Connected - Beijer Sales Kit 2019
Beijer Korenix Connected - Beijer Sales Kit 2019Beijer Korenix Connected - Beijer Sales Kit 2019
Beijer Korenix Connected - Beijer Sales Kit 2019
 
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
 
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...
 
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
 
Levels Up Your Redundant Network By ERPS - Redundant Technology 2019
Levels Up Your Redundant Network By ERPS - Redundant Technology 2019Levels Up Your Redundant Network By ERPS - Redundant Technology 2019
Levels Up Your Redundant Network By ERPS - Redundant Technology 2019
 
Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012
Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012
Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012
 
Wireless AP and Antenna Quick Selection Guide 2013
Wireless AP and Antenna Quick Selection Guide 2013Wireless AP and Antenna Quick Selection Guide 2013
Wireless AP and Antenna Quick Selection Guide 2013
 
Making Your Heavy Chores Easy - Industrial PoE Handbook 2008
Making Your Heavy Chores Easy - Industrial PoE Handbook 2008Making Your Heavy Chores Easy - Industrial PoE Handbook 2008
Making Your Heavy Chores Easy - Industrial PoE Handbook 2008
 

Recently uploaded

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 

Essential Protection for The Fundamental of IP Networking - Cybersecurity Training (2) 2019

  • 1. Essential Protection for The Fundamental of IP Networking JJ Sun PSM
  • 2. Agenda • Why IP address and MAC address • How packets are delivered through the network • The address resolution mechanism (ARP) and how it works • Vulnerabilities and cyberattacks to ARP • Defense by network security – Dynamic ARP Inspection • Korenix products with advanced cybersecurity features
  • 4. IP Address vs. MAC Address MAC Address (Media Access Control Address) • Unique hardware identifier • Unchangeable • Used for communication on a specific type of network media and within a network segment IP Address (Internet Protocol Address) • Logical network address • Configurable by user • Used for inter-network communication, to find the route through the network from sender to receiver
  • 5. How It Works Sender IP: IPsupport Receiver IP: IPPLC Sender IP: IPsupport Receiver IP: IPPLC Sender IP: IPsupport Receiver IP: IPPLC Sender IP: IPsupport Receiver IP: IPPLC Sender MAC: MACSupport Receiver MAC: MACA Sender MAC: MACA Receiver MAC: MACB Sender MAC: MACB Receiver MAC: MACC Sender MAC: MACC Receiver MAC: MACPLC Router A Router B Router C Support IPsupport MACsupport PLC IPPLC MACPLC Network segment A Ethernet B FDDI C Token Ring D Wifi
  • 6. Address Resolution • ARP (Address Resolution Protocol), a critical mechanism in IP networking to find out the mapping between a MAC address and an IP address … IPIP Address → MAC Address →
  • 7. ARP REQUEST (broadcast) To everyone, I am MAC1, IP1. What is the MAC of IP3 ? How ARP Works I/O IP2 MAC2 HMI IP1 MAC1 PLC IP3 MAC3 Gateway IP4 MAC4 Switch IP5 MAC5 IP MACIP MACIP MAC IP MAC Port MAC IP MAC IP1 MAC1 IP MAC IP1 MAC1 IP MAC IP1 MAC1 Port MAC 1 MAC1 Sender IP: IP1 Receiver IP: IP3 Sender MAC: MAC1 Receiver MAC: ? MAC address table ARP table
  • 8. How ARP Works ARP RESPONSE (unicast) To IP1: I am IP3, and my MAC is MAC3 IP MACIP MACIP MAC IP MAC Port MAC IP MAC IP1 MAC1 IP MAC IP1 MAC1 IP MAC IP3 MAC3 IP MAC IP1 MAC1 Port MAC 1 MAC1 Port MAC 1 MAC1 3 MAC3 I/O IP2 MAC2 HMI IP1 MAC1 PLC IP3 MAC3 Gateway IP4 MAC4 Switch IP5 MAC5 Sender IP: IP1 Receiver IP: IP3 Sender MAC: MAC1 Receiver MAC: ?
  • 9. How ARP Works IP MACIP MACIP MAC IP MAC Port MAC IP MAC IP1 MAC1 IP MAC IP1 MAC1 IP MAC IP3 MAC3 IP MAC IP1 MAC1 Port MAC 1 MAC1 Port MAC 1 MAC1 3 MAC3 I/O IP2 MAC2 HMI IP1 MAC1 PLC IP3 MAC3 Gateway IP4 MAC4 Switch IP5 MAC5 Sender IP: IP1 Receiver IP: IP3 Sender MAC: MAC1 Receiver MAC: MAC3
  • 10. Gratuitous ARP IP MAC IP1 MAC1 IP MAC IP1 MAC1 IP MAC IP3 MAC3 IP MAC IP1 MAC1 Port MAC 1 MAC1 3 MAC3 IP MAC IP3 MAC3 IP4 MAC4 IP MAC IP1 MAC1 IP4 MAC4 IP MAC IP1 MAC1 IP4 MAC4 ARP RESPONSE (broadcast) This is IP4, MAC4 Port MAC 1 MAC1 3 MAC3 4 MAC4 I/O IP2 MAC2 HMI IP1 MAC1 PLC IP3 MAC3 Gateway IP4 MAC4 Switch IP5 MAC5
  • 11. Vulnerabilities and Cyberattacks • ARP spoofing • Hijacking attack • DoS attack • Man-In-The-Middle attack • Broadcasting • No encryption • No validation • No authentication
  • 12. Host X IPx MACx ARP Spoofing IP MAC IP3 MAC3 IP MAC IP3 MAC3 IP4 MAC4 ARP RESPONSE (broadcast) This is IP1, MACx Port MAC 1 MAC1 3 MAC3 4 MAC4 IP MAC IP1 MAC1 IP MAC IP1 MACx Port MAC 1 MAC1 3 MAC3 4 MAC4 5 MACx IP MAC IP1 MAC1 IP4 MAC4 IP MAC IP1 MAC1 IP4 MAC4 IP MAC IP1 MACx IP4 MAC4 IP MAC IP1 MACx IP4 MAC4 I/O IP2 MAC2 HMI IP1 MAC1 PLC IP3 MAC3 Gateway IP4 MAC4 Switch IP5 MAC5
  • 13. Hijacking Attack IP MAC IP3 MAC3 IP MAC IP3 MAC3 IP4 MAC4 Port MAC 1 MAC1 3 MAC3 4 MAC4 IP MAC IP1 MAC1 IP MAC IP1 MACx Port MAC 1 MAC1 3 MAC3 4 MAC4 5 MACx IP MAC IP1 MAC1 IP4 MAC4 IP MAC IP1 MAC1 IP4 MAC4 IP MAC IP1 MACx IP4 MAC4 IP MAC IP1 MACx IP4 MAC4 Host X MACx IPx I/O IP2 MAC2 HMI IP1 MAC1 PLC IP3 MAC3 Gateway IP4 MAC4 Switch IP5 MAC5 Sender IP: IP3 Receiver IP: IP1 Sender MAC: MAC3 Receiver MAC: MACx
  • 14. Denial-of-Service Attack IP MAC IP3 MAC3 IP MAC IP3 MAC3 IP4 MAC4 Port MAC 1 MAC1 3 MAC3 4 MAC4 IP MAC IP1 MAC1 IP MAC IP1 MAC1 IP4 MAC4 IP MAC IP1 MAC1 IP4 MAC4 Host X IPx MACx I/O IP2 MAC2 HMI IP1 MAC1 PLC IP3 MAC3 Gateway IP4 MAC4 Switch IP5 MAC5 ARP RESPONSE (broadcast) This is IP2, MAC1 This is IP3, MAC1 This is IP4, MAC1 … IP MAC IP1 MAC1 IP2 MAC1 IP3 MAC1 IP4 MAC1 … MAC1 IP MAC IP1 MAC1 IP2 MAC1 IP3 MAC1 IP4 MAC1 … MAC1 IP MAC IP1 MAC1 IP2 MAC1 IP3 MAC1 IP4 MAC1 … MAC1 IP MAC IP1 MAC1 IP2 MAC1 IP3 MAC1 IP4 MAC1 … MAC1 Port MAC 5 MAC1 3 MAC3 4 MAC4
  • 16. Dynamic ARP Inspection • DAI (Dynamic ARP Inspection) A network security feature inspects ARP, validates its contain, rejects invalid and malicious ones to prevent ARP spoofing.
  • 17. How DAI Works I/O IP2 MAC2 HMI IP1 MAC1 PLC IP3 MAC3 Gateway IP4 MAC4 IP MACIP MACIP MAC IP MAC ! ! ! Port IP MAC 1 IP1 MAC1 2 IP2 MAC2 3 IP3 MAC3 4 IP4 MAC4 Port MAC ! Untrusted ports Trusted database
  • 18. How DAI Works I/O IP2 MAC2 HMI IP1 MAC1 PLC IP3 MAC3 Gateway IP4 MAC4 IP MACIP MACIP MAC IP MAC Port MAC IP MAC IP1 MAC1 IP MAC IP1 MAC1 IP MAC IP1 MAC1 ! ! ! Port IP MAC 1 IP1 MAC1 2 IP2 MAC2 3 IP3 MAC3 4 IP4 MAC4 ! ARP I am MAC1, IP1 Port MAC 1 MAC1
  • 19. Host X IPx MACx ! ! ! How DAI Works ARP I am MACx, IP1 I/O IP2 MAC2 HMI IP1 MAC1 PLC IP3 MAC3 Gateway IP4 MAC4 IP MACIP MACIP MAC IP MAC Port MAC ! Port IP MAC 1 IP1 MAC1 2 IP2 MAC2 3 IP3 MAC3 4 IP4 MAC4
  • 20. JetNet with Dynamic ARP Inspection Din-Rail switches Layer 2 • JetNet 5612G • JetNet 5620G Rackmount switches Layer 2 • JetNet 5428G • JetNet 6528G • JetNet 6628G • JetNet 6628X Layer 3 • JetNet 7014G • JetNet 7020G Layer 3 • JetNet 6828G • JetNet 7628X
  • 21. JetPoE with Dynamic ARP Inspection Din-Rail switches Layer 2 • JetNet 5612GP • JetNet 5620GP Rackmount switches Layer 2 • JetNet 5728G-16P • JetNet 5728G-24P • JetNet 6628XP Layer 3 • JetNet 7310G • JetNet 7714G Layer 3 • JetNet 6728G-16P • JetNet 6728G-24P • JetNet 7628XP
  • 23. ARP Filters (DHCP Snooping) Web Configuration Enable DHCP Snooping Address Binding Table
  • 24. ARP Filters (Manually) ARP Filter Add/Remote ARP Filter Rule Setting Web Entry
  • 27. Summary • ARP is one of the most fundamental mechanism of IP networking, but is insecure by nature. Malicious user can simply hack a network without advanced skills. • Defense by network security is a more practical approach to protect ARP. Network switches with Dynamic ARP Inspection help protect the system against ARP spoofing, reduce hijacking, DoS, man-in-the-middle attacks. • Addressing IEC62443 the security standard, Korenix has implemented Dynamic ARP Inspection which helps to secure the most fundamental network operation