<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: HostDoS[8] Attack ( arpNd ) detected on vlan in ExtremeSwitching (EOS)</title>
    <link>https://community.extremenetworks.com/t5/extremeswitching-eos/hostdos-8-attack-arpnd-detected-on-vlan/m-p/16046#M235</link>
    <description>Hi,&lt;BR /&gt;
&lt;BR /&gt;
Out of interest, where a lot of these SA mac addresses logged against the same port? - assume you have considered implementing antispoofing to close the loophole?&lt;BR /&gt;
&lt;BR /&gt;</description>
    <pubDate>Mon, 20 Oct 2014 16:04:00 GMT</pubDate>
    <dc:creator>Anonymous</dc:creator>
    <dc:date>2014-10-20T16:04:00Z</dc:date>
    <item>
      <title>HostDoS[8] Attack ( arpNd ) detected on vlan</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-eos/hostdos-8-attack-arpnd-detected-on-vlan/m-p/16045#M234</link>
      <description>I have enterasys S8 switch and found following log on the switch. we have found many no of SA  mac addressees in the logs.&lt;BR /&gt;
&lt;BR /&gt;
HostDoS[8] Attack ( arpNd ) detected on vlan.0.6 [  InPort(ge.8.27) LEN(64) DA(FF:FF:FF:FF:FF:FF) SA(00:1C:C4:54:EC:25) ETYPE(0806)  ]&lt;BR /&gt;
&lt;BR /&gt;
how should i identify the exact loophole, we have not implemented and configured ipv6  in the network.&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Wed, 01 Oct 2014 10:59:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-eos/hostdos-8-attack-arpnd-detected-on-vlan/m-p/16045#M234</guid>
      <dc:creator>Sandeep_Rajguru</dc:creator>
      <dc:date>2014-10-01T10:59:00Z</dc:date>
    </item>
    <item>
      <title>RE: HostDoS[8] Attack ( arpNd ) detected on vlan</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-eos/hostdos-8-attack-arpnd-detected-on-vlan/m-p/16046#M235</link>
      <description>Hi,&lt;BR /&gt;
&lt;BR /&gt;
Out of interest, where a lot of these SA mac addresses logged against the same port? - assume you have considered implementing antispoofing to close the loophole?&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Mon, 20 Oct 2014 16:04:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-eos/hostdos-8-attack-arpnd-detected-on-vlan/m-p/16046#M235</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2014-10-20T16:04:00Z</dc:date>
    </item>
    <item>
      <title>RE: HostDoS[8] Attack ( arpNd ) detected on vlan</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-eos/hostdos-8-attack-arpnd-detected-on-vlan/m-p/16047#M236</link>
      <description>We have the same issue with 2 different customers!&lt;BR /&gt;
SSA HostDoS[1] and S8 Chassis HostDoS[4]&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Thu, 24 Sep 2015 14:40:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-eos/hostdos-8-attack-arpnd-detected-on-vlan/m-p/16047#M236</guid>
      <dc:creator>MartinS1</dc:creator>
      <dc:date>2015-09-24T14:40:00Z</dc:date>
    </item>
    <item>
      <title>RE: HostDoS[8] Attack ( arpNd ) detected on vlan</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-eos/hostdos-8-attack-arpnd-detected-on-vlan/m-p/16048#M237</link>
      <description>&lt;BR /&gt;
Hello Martin, Sandeep,&lt;BR /&gt;
&lt;BR /&gt;
The arpNd hostdos log entry is tripped by a single device sending more than 3 arps (or neighbor discovery packets) in &amp;lt;.5 seconds. &lt;BR /&gt;
&lt;A href="https://gtacknowledge.extremenetworks.com/articles/Q_A/K-S-7100-Series-What-constitutes-host-dos-ARP-ND-attack-and-how-is-it-mitigated/?q=ARP%2FND&amp;amp;#38;l=en_US&amp;amp;#38;fs=Search&amp;amp;#38;pn=1" target="_blank" rel="nofollow noreferrer noopener"&gt;https://gtacknowledge.extremenetworks.com/articles/Q_A/K-S-7100-Series-What-constitutes-host-dos-ARP-ND-attack-and-how-is-it-mitigated/?q=ARP%2FND&amp;amp;l=en_US&amp;amp;fs=Search&amp;amp;pn=1&lt;/A&gt; &lt;BR /&gt;
&lt;BR /&gt;
The action taken is this:  That SA is put in the penalty box for a short period of time.  The router will not process arps (nor nd...) for this end station during this period.  &lt;BR /&gt;
After the time interval has passed, traffic is again allowed from that source address.  If still misbehaving, back to jail.  &lt;BR /&gt;
No penalty in the traditional sense of course -  The client doesn't know and doesn't care about the steps taken by the router.  It's about protecting functional capacity on the router.&lt;BR /&gt;
&lt;BR /&gt;
Then we're back to the original question from Sandeep: &lt;BR /&gt;
so what's going on?&lt;BR /&gt;
Understanding the criteria for the arp/nd attack flag gives you a single piece of data.  You need more.  The messaging itself is descriptive enough. It might be all you will need:  vlan, port, mac; the location and address of the offending end station.  &lt;BR /&gt;
Or - understanding context may still be a stretch. &lt;BR /&gt;
&lt;BR /&gt;
How the network arrives at this point is a broad topic; I won't be covering it in detail here.  With a little luck, a few thoughts will allow you to put still more puzzle pieces in place.&lt;BR /&gt;
&lt;BR /&gt;
Naturally, this event may be an attack.  Maybe nefarious activity on the part of a user - or some other presence on your trusted network.  It may be something as simple as glitchy equipment may be responsible.   Maybe a bad piece of hardware rapidly sending arp, or  a nic driver sending high rates of neighbor discovery or arp (seen in power save mode), maybe a L2 loop, maybe a security scan tool running.  We've encountered each of these in gtac.  &lt;BR /&gt;
I'm sure there are other circumstances we haven't yet seen that result in replication of - or repeating of - broadcast and/or multicast traffic.&lt;BR /&gt;
&lt;BR /&gt;
Let us know how it turns out Gents&lt;BR /&gt;
&lt;BR /&gt;
Regards,&lt;BR /&gt;
Mike&lt;BR /&gt;
&lt;BR /&gt;
   &lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Thu, 01 Oct 2015 22:20:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-eos/hostdos-8-attack-arpnd-detected-on-vlan/m-p/16048#M237</guid>
      <dc:creator>Mike_D</dc:creator>
      <dc:date>2015-10-01T22:20:00Z</dc:date>
    </item>
  </channel>
</rss>

