<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How can I use policies to combat Denial of Service Attacks? in FAQs</title>
    <link>https://community.extremenetworks.com/t5/faqs/how-can-i-use-policies-to-combat-denial-of-service-attacks/m-p/46813#M419</link>
    <description>Article ID: 9372 &lt;BR /&gt;
&lt;BR /&gt;
A hacker can easily associate an operationally significant IP address to a false MAC address. For instance, a hacker can send an ARP Reply associating a gateway?s IP address for a network with a MAC address that doesn't exist or one that does. Your computers believe the layer 2 destination of your default gateway, but in reality they're sending any packet whose destination is not on the local segment to a nonexistent layer 2 address. In one move, the hacker has cut off your trusted host from all communication outside the local network. &lt;BR /&gt;
&lt;BR /&gt;
The denial of service attack can be stopped by applying a policy on user ports that denies any traffic with a source IP address equal to the gateway. This works because the matrix products treat ARP packets as IP packets. This rule would drop any ARP reply packet coming from a user with a source protocol address equal to the gateway.</description>
    <pubDate>Thu, 05 Sep 2013 06:03:00 GMT</pubDate>
    <dc:creator>FAQ_User</dc:creator>
    <dc:date>2013-09-05T06:03:00Z</dc:date>
    <item>
      <title>How can I use policies to combat Denial of Service Attacks?</title>
      <link>https://community.extremenetworks.com/t5/faqs/how-can-i-use-policies-to-combat-denial-of-service-attacks/m-p/46813#M419</link>
      <description>Article ID: 9372 &lt;BR /&gt;
&lt;BR /&gt;
A hacker can easily associate an operationally significant IP address to a false MAC address. For instance, a hacker can send an ARP Reply associating a gateway?s IP address for a network with a MAC address that doesn't exist or one that does. Your computers believe the layer 2 destination of your default gateway, but in reality they're sending any packet whose destination is not on the local segment to a nonexistent layer 2 address. In one move, the hacker has cut off your trusted host from all communication outside the local network. &lt;BR /&gt;
&lt;BR /&gt;
The denial of service attack can be stopped by applying a policy on user ports that denies any traffic with a source IP address equal to the gateway. This works because the matrix products treat ARP packets as IP packets. This rule would drop any ARP reply packet coming from a user with a source protocol address equal to the gateway.</description>
      <pubDate>Thu, 05 Sep 2013 06:03:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/faqs/how-can-i-use-policies-to-combat-denial-of-service-attacks/m-p/46813#M419</guid>
      <dc:creator>FAQ_User</dc:creator>
      <dc:date>2013-09-05T06:03:00Z</dc:date>
    </item>
  </channel>
</rss>

