No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>


To have a better experience, please upgrade your IE browser.


How to determine whether an S series switch suffers an ARP attack

Publication Date:  2016-11-21 Views:  333 Downloads:  0
Issue Description
How to determine whether an S series switch suffers an ARP attack
On an S series switch:
If a network suffers an ARP attack, the following symptoms may occur:
Users are frequently disconnected, network access speed is low, or services are interrupted.
The switch has a high CPU usage and is out of management, the connected clients go offline, the active/standby switchover frequently occurs, and the port indicator blinks fast in red.
The ping operation has a long delay, lost packets, or fails.

When locating an ARP attack, determine whether the problem occurred on the link, loop, or route, and then perform the following operations:Saving the results of each troubleshooting step is recommended. If your troubleshooting fails to correct the fault, you can provide the record of your actions to Huawei.
1. Run the display cpu-defend statistics all command on the gateway to view the statistics about ARP request, ARP reply, and ARP Miss packets. Check whether the Drop count increases.
If the Drop count is 0, no ARP packet is lost. Go to step 2.
If the drop count is not 0, the rate of ARP request packets exceeds the CPCAR settings and excess ARP requests are discarded.
If many ARP Miss packets are discarded, the switch may suffer an ARP Miss attack.
If many ARP request or reply packets are discarded, the switch may suffer an ARP request or reply attack.
2. Run the display arp all command on the gateway to view ARP entries of users.
If the ARP entries exist, check the entries again to determine whether the ARP entry of any user or gateway is modified.
If the user ARP entries on the gateway are modified, the switch is suffering an ARP gateway spoofing attack.
If the gateway ARP entry on clients is modified, the switch is suffering an ARP bogus gateway attack.
If ARP entries of other users on a client are modified, perform the following operations:
     Capture packets on the user-side interface, and find the attacker according to the source addresses of ARP packets.
     Find out the attacker and scan virus or uninstall the attack tool. Alternatively, you can configure attack defense on the access switch.
If there is no user ARP entry, perform the following operations:
Run the debugging arp packet interface <interface-type> <interface-number> command in the user view to enable ARP packet debugging. Check whether the switch has sent ARP request packets and received ARP reply packets.
3. Collect the following information and contact Huawei technical support personnel.
Results of the preceding troubleshooting procedure
Configuration file, logs, and alarms of the switch