<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: SERIOUS SECURITY LAPSE IN EXTREME SUMMIT SWITCHES. MANINMIDDLE ATTACK, GATEWAY SPOOFING. in ExtremeSwitching (EXOS/Switch Engine)</title>
    <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/serious-security-lapse-in-extreme-summit-switches-maninmiddle/m-p/56216#M16385</link>
    <description>Ashish,&lt;BR /&gt;
&lt;BR /&gt;
If you know any other security methods that is supported by other vendor(L3 switch) then Let us know If there is any similar way thern I  could guide your on Extreme Devices.&lt;BR /&gt;
&lt;BR /&gt;
Sumit&lt;BR /&gt;
&lt;BR /&gt;</description>
    <pubDate>Thu, 26 Jun 2014 21:34:00 GMT</pubDate>
    <dc:creator>Sumit_Tokle</dc:creator>
    <dc:date>2014-06-26T21:34:00Z</dc:date>
    <item>
      <title>SERIOUS SECURITY LAPSE IN EXTREME SUMMIT SWITCHES. MANINMIDDLE ATTACK, GATEWAY SPOOFING.</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/serious-security-lapse-in-extreme-summit-switches-maninmiddle/m-p/56213#M16382</link>
      <description>SERIOUS &lt;B&gt;SECURITY LAPSE&lt;/B&gt; IN EXTREME SUMMIT SWITCHES. We have a &lt;B&gt;Summit X450e-48p&lt;/B&gt; switch, in which we have created a Vlan that is acting as a gateway for the hosts. The switch is configured to forward the traffic to the router (internet). However this has caused a serious security issue which is as follows. A host has entered the IP address of the gateway and is getting all the traffic routed through his host machine to the router.  Is there any way to stop such a situation, I think its called &lt;B&gt;gateway spoofing&lt;/B&gt;. note:  The IPs are being assigned manually to the host machines (no dhcp). Please help!!!!!! &lt;BR /&gt;
&lt;BR /&gt;
also note:&lt;BR /&gt;
1.)also note there is &lt;B&gt;no&lt;/B&gt; way to make a policy (egress) to stop this.&lt;BR /&gt;
2.)there no way to &lt;B&gt;bind ip address to a port&lt;/B&gt;.&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Thu, 26 Jun 2014 15:46:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/serious-security-lapse-in-extreme-summit-switches-maninmiddle/m-p/56213#M16382</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2014-06-26T15:46:00Z</dc:date>
    </item>
    <item>
      <title>RE: SERIOUS SECURITY LAPSE IN EXTREME SUMMIT SWITCHES. MANINMIDDLE ATTACK, GATEWAY SPOOFING.</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/serious-security-lapse-in-extreme-summit-switches-maninmiddle/m-p/56214#M16383</link>
      <description>Hello Ashish&lt;BR /&gt;
&lt;BR /&gt;
This sounds like a man in the middle attack.  Please look at the concepts guide for 15.4 page 879&lt;BR /&gt;
&lt;BR /&gt;
From the guide:&lt;BR /&gt;
To protect against this type of attack, the router sends out its own gratuitous ARP request to override&lt;BR /&gt;
the attacker whenever a gratuitous ARP request broadcast packet with the router's IP address as the&lt;BR /&gt;
source is received on the network.&lt;BR /&gt;
If you enable both DHCP secured ARP and gratuitous ARP protection, the switch protects its own IP&lt;BR /&gt;
address and those of the hosts that appear as secure entries in the ARP table.&lt;BR /&gt;
&lt;BR /&gt;
Since you are statically assigned IP addresses that makes it harder to protect against this attack as the switch cant use DHCP snooping, Trusted DHCP server or DHCP secured ARP whichhelps to prevent people setting static addresses on the network.  &lt;BR /&gt;
&lt;BR /&gt;
Enabling Gratuitous ARP protection and CPU DoS Protection will help.&lt;BR /&gt;
&lt;BR /&gt;
Thanks&lt;BR /&gt;
P&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Thu, 26 Jun 2014 17:14:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/serious-security-lapse-in-extreme-summit-switches-maninmiddle/m-p/56214#M16383</guid>
      <dc:creator>Paul_Russo</dc:creator>
      <dc:date>2014-06-26T17:14:00Z</dc:date>
    </item>
    <item>
      <title>RE: SERIOUS SECURITY LAPSE IN EXTREME SUMMIT SWITCHES. MANINMIDDLE ATTACK, GATEWAY SPOOFING.</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/serious-security-lapse-in-extreme-summit-switches-maninmiddle/m-p/56215#M16384</link>
      <description>Ashish&lt;BR /&gt;
&lt;BR /&gt;
I can look into this and maybe put some commands together with the folowing idea.&lt;BR /&gt;
&lt;BR /&gt;
I think using DHCPSnooping/ArpInspection may be the way to go.&lt;BR /&gt;
Making your up link ports facing the DHCP server as trusted ports as well as "AP" ports&lt;BR /&gt;
if you are bridging traffic locally on the AP's&lt;BR /&gt;
&lt;BR /&gt;
Does this sound like something that you would like to try?&lt;BR /&gt;
&lt;BR /&gt;
Someone may provide this information to you before I put it together.&lt;BR /&gt;
&lt;BR /&gt;
you may need to create a case and have someone review your configuration just to make sure this is something that will not cause any issues&lt;BR /&gt;
&lt;BR /&gt;
Jason&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Thu, 26 Jun 2014 19:41:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/serious-security-lapse-in-extreme-summit-switches-maninmiddle/m-p/56215#M16384</guid>
      <dc:creator>Jason_Parker</dc:creator>
      <dc:date>2014-06-26T19:41:00Z</dc:date>
    </item>
    <item>
      <title>RE: SERIOUS SECURITY LAPSE IN EXTREME SUMMIT SWITCHES. MANINMIDDLE ATTACK, GATEWAY SPOOFING.</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/serious-security-lapse-in-extreme-summit-switches-maninmiddle/m-p/56216#M16385</link>
      <description>Ashish,&lt;BR /&gt;
&lt;BR /&gt;
If you know any other security methods that is supported by other vendor(L3 switch) then Let us know If there is any similar way thern I  could guide your on Extreme Devices.&lt;BR /&gt;
&lt;BR /&gt;
Sumit&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Thu, 26 Jun 2014 21:34:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/serious-security-lapse-in-extreme-summit-switches-maninmiddle/m-p/56216#M16385</guid>
      <dc:creator>Sumit_Tokle</dc:creator>
      <dc:date>2014-06-26T21:34:00Z</dc:date>
    </item>
  </channel>
</rss>

