How do you defend against ARP spoofing?

How do you defend against ARP spoofing?

How do you defend against ARP spoofing?

A.
Place static ARP entries on servers, workstation and routers

B.
True IDS Sensors to look for large amount of ARP traffic on local subnets C. Use private VLANS

C.
Use ARPWALL system and block ARP spoofing attacks

Explanation:
ARPWALL is a opensource tools will give early warning when arp attack occurs.
This tool is still under construction.



Leave a Reply 7

Your email address will not be published. Required fields are marked *


rednael

rednael

ARPWALL doesn’t even seem to beeing developed at all. No activity whatsoever. You probably could use ArpWatch and parse the logfile to do the same.

Answer A would stop any ARP poisioning I guess.

H

H

The answer here A,C,D

leo

leo

nope. the answer here is A,B,C. ARPWALL has never been fully developed, and therefore, is not functional

anonymous

anonymous

How do you defend against ARP Spoofing? Select three.
A. Use ARPWALL system and block ARP spoofing attacks
B. Tune IDS Sensors to look for large amount of ARP traffic on local subnets
C. Use private VLANS
D. Place static ARP entries on servers, workstation and routers
Answer: A,C,D

anonymous

anonymous

IDS option may works fine in case of monitoring the traffic from outside the network but not from internal hosts.

j0k3r

j0k3r

Seems like the only bad answer is the IDS. Arp Spoofing would not necessarily lead to large amount of ARP traffic.

Azuris

Azuris

I think its a problem with the reader,It was supposed to select A,B and C ..
Use private Vlans,
Use IDS to track large arp requests
Place mac addresses statically in mac table of routers