Manage ARP Table¶
The ARP protocol thus makes network traffic communications a relatively simple and straightforward affair. However, ARP is also inherently vulnerable from a security perspective. ARP requires no authentication whatsoever of the addressing information it receives from any network peer. All ARP replies are cached in the ARP table as described above; existing table entries are automatically overwritten by the most recent information received. This lack of authentication makes ARP an easy target for cyber-security exploitation.
In particular, ARP is highly vulnerable to attacks such as “ARP Spoofing” and “ARP Poisoning.” The point of such attacks, the nature of which will be discussed further below, and which can be initiated from some compromised network device or from the hacker themselves if they have acquired physical access to the network in question, is to compromise the integrity of a local network’s ARP table by associating an attacker’s MAC address with the IP address of a particular target host. In this way, network traffic intended for a particular destination will instead be forwarded on to the attacker’s host location. That traffic can them be modified, stolen, or simply observed in order to support some additional cyberattack purpose in an on-demand fashion. ARP-related security breaches are very difficult to detect and defend against precisely because the ARP information is maintained and transmitted only within the L2 broadcast domain. Vigilant network administrators cannot tell, simply by looking at an ARP table, whether it’s been compromised or not, unless they have established some manual system to keep track of the expected IP-to-MAC address relationships.
NAC provides a plugin to manage ARP tables to solve these problems. Delete static ARP to prevent vulnerabilities bypassing NAC.
- Go to Policy in the top panel.
- Go to Policy > Node Policy > Agent Action in the left Policy panel.
- Find and click Manage ARP Table in the Agent Action window.
Under General section:
- For CWP Message, add message to be displayed in accordance with the Policy.
- For Label, add labels to help categorize your plugins with custom labels that appear in the "Description" field.
Under Agent Actions section:
- For Boolean Operator, choose AND or OR to add optional conditions.
- For Settings, click Add and select your optional conditions. Criteria/Operator/Value
Under Plugin Settings section:
- For Deleting Static ARP Entries, To remove static ARP set by the user of the Node that Agent is installed. (Except static ARP added by AAS)
- For Anti ARP Spoofing (AAS), To add Conflict Prevention Nodes to ARP table as Static.
- Node Group : To apply specific Node Group (If not selected, it applies to all Nodes to which Agent Action is assigned)
- Click Update.
- Go to Node Policy in the left Policy panel.
- Click the Default Policy in Node Policy window.
- Find Agent Action. Click Assign.
- Find Manage ARP Table in the Available section. Select and drag it into the Selected section.
- Click Add.
- Click Update.