Mon Feb 07, 2011 6:57 pm
That's effectively - regardless of what is the root cause: a virus, or accidental misconfiguration - an ARP poisoning attack. You have to protect against that on the switchport level (could be an uplink to an AP), you can't defend against that on the router. Cisco calls their solution "dynamic ARP inspection", where switches learn IP-MAC address relationships by snooping DHCP traffic and also pulling in static configuration. When a host starts replying to ARP (or starts announcing via RARP) mappings that it shouldn't the switch shuts down the port. On an AP uplink that can of course affect service for other connected users. Other vendors have similar solutions.