Now 26 visitors
Today:213 Yesterday:622
Total: 43152 19S 5P 0R
2025-07-12, Week 28
TACT Journal Page
Call for Paper
Author Page
Paper Procedure
Paper Submission
Registration
Welcome Message
Statistics
Committee
Paper Archives
Outstanding Papers
Proceedings
Presentation Assistant
Hotel & Travel Info
Photo Gallery
FAQ
Member Login
Scheduler Login
Seminar
Archives Login
Sponsors




















IEEE/ICACT20210126 Question.1
Questioner: wkdgus4788@chungbuk.ac.kr    2021-02-09 ¿ÀÈÄ 2:32:14
IEEE/ICACT20210126 Answer.1
Answer by Auhor k.agordzo@gmail.com   2021-02-09 ¿ÀÈÄ 2:32:14
Can you explain the algorithms for the prevention of the attack in more detail? First, enable DHCP snooping after, one needs to configure all trusted ports in the topology (Gateway port Gi0/0). We configure trusted ports so that packets will not be dropped on this interface when the packets sent or received are more than 10 in a second. After, the transfer rate of frames from untrusted Port (Gi0/2 ) is limited to 10 frames per second. These packets sent from this interface can¡¯t exceed 10 in a second else the interface will be shut. Enable Dynamic ARP Inspection in the particular LAN of interest and set Gateway port as a trust for successful communication between the gateway and other hosts. finally, perform DHCP binding so that the IP and mac address of all hosts in the LAN will be found in the DHCP database. Once the setup is done, if frames received from any untrusted port are more than 10 frames then it should be dropped and the port should be shut. Or if the IP address of the untrusted port does not match with the IP address in the database then frames should be dropped and the port shut or if the MAC address of the untrusted port does not match the MAC address in the database then frames dropped and port shut.

Select Voice