Dynamic ARP inspection (DAI)
The primary goal of DAI is to protect the network against ARP Poisening and Man in the middle attacks.
ARP poisoning, also known as ARP spoofing, is a type of attack that involves sending falsified ARP (Address Resolution Protocol) messages to an Ethernet LAN. The purpose of these messages is to link the attacker's MAC address with the IP address of a legitimate computer or server on the network, which causes the traffic meant for that IP address to be misdirected to the attacker. This allows the attacker to intercept, modify, or stop data in transit, facilitating man-in-the-middle or denial-of-service attacks.
If DHCP Snooping is activated, two databases are maintained by the fortigate by monitoring DHCP Offers and Requests:
DHCP snooping Client DB.
IPSG (IP Source Guard) DB contains the statically assigned IPs
All ARP packets on untrusted ports without a valid entry in one of theses databases are dropped.
When an ARP Request or ARP reply arives on a untrusted port, it's checked against the IP, interface and VLAN. No DAI is happening on DHCP Snooping trusted ports.
DAI is is configured on a per-VLAN basis and can only be activated through the CLI:
View DAI Statistics:
ARP inspection log entries:
Only malicious ARP Packets are dropped, the port remains functionial.
By default DAI is linked to the DHCP-snooping port setting, distinguishing between Trusted and Untrusted ports. ARP spoofing is permitted on Trusted ports, while it is blocked on Untrusted ports. However, it is possible to manually disable ARP inspection on a DHCP snooping Untrusted port.:
Last updated
Was this helpful?