Block and Prevent ARP Spoofing / Poisoning in Mikrotik

https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNGYnRQltJTeOXqLd18obDyFA_mXh74Ap-vx3LwQAkNOFNvOwUosszgOHK47ZbFt3lRKUR7u3BjV7ktBUbEFQE-3fFW7IpIBIk5PsOWrWGgLf79PTXK1bU8NvtLGkByDY_AEqBDQnc_A0/s1600/arp-spoofing-revo-brain.jpg

What is ARP Spoofing / Poisoning?


ARP Spoofing is network hacking with sending falsified ARP (Address Resolution Protocol) messages over a local area network. Once attackers MAC address is linking with target's IP address, attacker will begins receiving all packet data is intended with victim IP address. ARP spoofing can enable malicious parties to intercept, modify or even stop data in-transit. ARP spoofing attacks can only occur on local area networks that utilize the Address.
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWDiyEW64NKI1bzwbuYrkKyEb7pA1_l2N7HXsC6C_ZUjaRsloycg15uhcXw8mZ19PicXc0h4YB1nbIzb9ssiddVuC9eRHuyu4mCHAa8ql2waJ5MNkJ0LiwKJ70HH0xewo4xQVcaJcFKvo/s1600/arp-poisoning-revo-brain.png


How Do We Prevent ARP Spoofing?

Have you ever heard about NetCut? Yes, that application is one of attacking application using ARP Spoofing method. We can prevent it using Mikrotik router as a firewall in our network. First step, you have to :
  1. Set IP address lease time into 1 day and check Add ARP For Leases in IP -> DHCP Server - DHCP.
    https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxsF6C_7qRbFzoh7bP2tf0Cqk9RKHAYZU490m1wdyzFLgl1DibCWYWnJVTOp4S0BYqiIXauURcXj59m03EIVK7g2-l8u8IR3Zb_Bjpgp47flhBXSwOL3nOASgRlIIr7HfH_yQBl5DPx6Y/s1600/lease-time-revo-brain.gif  
    2.  Set your netmask into /32 in IP -> DHCP Server - Networks.
    https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjavxJMziqt4B8yuluXOzkRJ800a1GRZMwKrnQBpCrFlRENT0w2cgrtYZHAucCbmpyWo-92cihXNik3oVYkdeQTDKIjSqRrcArEAn_Os4lqtg4ICj_OK9y0v8yQGgPFCx5zTKI34XNeqM/s1600/netmask-revo-brain.gif
    3. Last configuration, but this is not recommended because you as a network administrator will have difficulty to find the problem if you have any trouble in your network. Because with this configuration, ICMP packet will be disallowed in firewall rules except you desperate with attackers.  

 /ip firewall filter add action=accept chain=input comment="default configuration \  
 anti netcut, defaultnya accept)" disabled=no protocol=icmp  
Hope this article will help your problem.

Comments

Post a Comment

Please leave your comment politely and do not write a spam message.

Thank you. :)