RE: computer networking and inter-connectivity Tutorial 2- Network Types, Technologies And Network Security by wisdomdavid

View this thread on steempeak.com

Viewing a response to: @henrychidiebere/re-wisdomdavid-201867t152559633z

· @wisdomdavid ·
First, there are different techniques used to identify spoofing via arp. Softwares can be implemented  but I will just give a quick info not going too deep. You know that arp works mainly on LAN to request and recognize the mac address and ip address of different host in the same network when sent with respect to the ip address. When an arp request is being sent, the distinct host replies with both the ip address and the MAC address in unicast(one to one) depends though. And all these contains packets that is packaged in a frame that is transmitted in the network. Thus, one solution is implementing Reverse path forwarding. In the place where I work, we make use of Fortigate firewall which perform this aspect of RPF. Fortigate is owned by Fortinet which tries as much to enhance network security on different enterprise. We make use of forti analyzer, forticlient in compliance with fortigate(on an end user computer). Our firewall blocks ip packets from reaching a destination if it does not belong to the routing domain and if its subnet is corresponding our network. Also, since arp is mainly used by switches, security measures can be taken in the area of the switch but that depends on the process you want to use. One is port security on the switch.
👍  
properties (23)
post_id52,096,320
authorwisdomdavid
permlinkre-henrychidiebere-re-wisdomdavid-201867t152559633z-20180607t171714571z
categorysteemstem
json_metadata"{"app": "steemit/0.1", "tags": ["steemstem"]}"
created2018-06-07 17:17:15
last_update2018-06-07 17:17:15
depth2
children3
net_rshares5,070,111,547
last_payout2018-06-14 17:17:15
cashout_time1969-12-31 23:59:59
total_payout_value0.000 SBD
curator_payout_value0.000 SBD
pending_payout_value0.000 SBD
promoted0.000 SBD
body_length1,264
author_reputation1,190,023,548,895
root_title"computer networking and inter-connectivity Tutorial 2- Network Types, Technologies And Network Security"
beneficiaries[]
max_accepted_payout1,000,000.000 SBD
percent_steem_dollars10,000
author_curate_reward""
vote details (1)
@henrychidiebere ·
A very nice response but I have a little correction to make, address resolution protocol is used by a host within a LAN to identify the MAC address. Hence, it already knows the IP address, so only the MAC address is returned after a successful ARP. Also you answered my question from a layer 7 perspective but I was expecting you to answer the question from a layer 3 to layer 1 perspective, though your answer is purely valid and helpful. Thanks buddy.
👍  
properties (23)
post_id52,098,461
authorhenrychidiebere
permlinkre-wisdomdavid-re-henrychidiebere-re-wisdomdavid-201867t152559633z-20180607t173830353z
categorysteemstem
json_metadata"{"app": "steemit/0.1", "tags": ["steemstem"]}"
created2018-06-07 17:38:18
last_update2018-06-07 17:38:18
depth3
children2
net_rshares1,305,951,808
last_payout2018-06-14 17:38:18
cashout_time1969-12-31 23:59:59
total_payout_value0.000 SBD
curator_payout_value0.000 SBD
pending_payout_value0.000 SBD
promoted0.000 SBD
body_length453
author_reputation9,143,471,406,700
root_title"computer networking and inter-connectivity Tutorial 2- Network Types, Technologies And Network Security"
beneficiaries[]
max_accepted_payout1,000,000.000 SBD
percent_steem_dollars10,000
author_curate_reward""
vote details (1)
@wisdomdavid · (edited)
Thanks buddy..in my response I quoted "in respect to the ip address".  and to correct you too, In the format of arp, when replying, the ip address and the MAC is sent back to the host together.  if you need the layer 1 to 3, then you can consider..port security, dynamic arp inspection and T-Arp as well. in additiion, fortigate does not only work in layer 7, because its configuration is done exactly like when configuring a router or a switch as it has its own CLI. you can check it out if your are interested
properties (22)
post_id52,101,950
authorwisdomdavid
permlinkre-henrychidiebere-re-wisdomdavid-re-henrychidiebere-re-wisdomdavid-201867t152559633z-20180607t181211421z
categorysteemstem
json_metadata"{"app": "steemit/0.1", "tags": ["steemstem"]}"
created2018-06-07 18:12:12
last_update2018-06-07 18:15:42
depth4
children1
net_rshares0
last_payout2018-06-14 18:12:12
cashout_time1969-12-31 23:59:59
total_payout_value0.000 SBD
curator_payout_value0.000 SBD
pending_payout_value0.000 SBD
promoted0.000 SBD
body_length511
author_reputation1,190,023,548,895
root_title"computer networking and inter-connectivity Tutorial 2- Network Types, Technologies And Network Security"
beneficiaries[]
max_accepted_payout1,000,000.000 SBD
percent_steem_dollars10,000
@henrychidiebere ·
The address resolution protocol is a broadcast that says "hey buddies, I have this layer 3 address, does anyone of you bear the same address?" If any host has such ip address, it responds with "hey man, I heard someone is looking for my physical address, take, this is it".  Of course every frame has source and destination field but that's not part of the response of an arp like you stated. Also I said the information you provided was would be useful to me. Thanks anyways
properties (22)
post_id52,106,956
authorhenrychidiebere
permlinkre-wisdomdavid-201867t20042580z
categorysteemstem
json_metadata"{"tags": "steemstem", "format": "markdown+html", "community": "esteem", "app": "esteem/1.6.0"}"
created2018-06-07 19:00:48
last_update2018-06-07 19:00:48
depth5
children0
net_rshares0
last_payout2018-06-14 19:00:48
cashout_time1969-12-31 23:59:59
total_payout_value0.000 SBD
curator_payout_value0.000 SBD
pending_payout_value0.000 SBD
promoted0.000 SBD
body_length475
author_reputation9,143,471,406,700
root_title"computer networking and inter-connectivity Tutorial 2- Network Types, Technologies And Network Security"
beneficiaries
0.
weight1,000
accountesteemapp
max_accepted_payout1,000,000.000 SBD
percent_steem_dollars10,000