E5-120-TRAPS-MIB::sysMacAntiSpoofing #
MAC Anti-spoofing.
Variables #
- sysMacAntiSpoofOrig
- sysMacAntiSpoofNew
- sysMacAntiSpoofMAC
Definitions #
- sysMacAntiSpoofOrig
- The Original port of Mac-AntiSpoofing.
- sysMacAntiSpoofNew
- The New port of Mac-AntiSpoofing.
- sysMacAntiSpoofMAC
- The MAC of Mac-AntiSpoofing.
Here is a runbook for the SNMP trap description:
Meaning #
The E5-120-TRAPS-MIB::sysMacAntiSpoofing trap indicates that the MAC anti-spoofing feature has detected a MAC address spoofing attempt on the network. This trap is generated when the system detects a MAC address that is different from the one previously learned on a port.
Impact #
The impact of this trap is that a potential security threat has been detected on the network. MAC address spoofing can be used to launch various types of attacks, including man-in-the-middle attacks, denial-of-service attacks, and unauthorized access to network resources. If left unchecked, this could lead to a security breach and potential data loss or compromise.
Diagnosis #
To diagnose the issue, follow these steps:
- Check the value of
sysMacAntiSpoofOrig
to determine the original port where the MAC address was learned. - Check the value of
sysMacAntiSpoofNew
to determine the new port where the MAC address is being spoofed. - Check the value of
sysMacAntiSpoofMAC
to determine the MAC address that is being spoofed. - Investigate the device connected to the port specified in
sysMacAntiSpoofNew
to determine the source of the spoofed MAC address. - Review network logs and traffic captures to determine the extent of the spoofing activity.
Mitigation #
To mitigate the issue, follow these steps:
- Isolate the port specified in
sysMacAntiSpoofNew
to prevent further unauthorized access. - Identify and remove the device that is spoofing the MAC address.
- Implement additional security measures, such as MAC address filtering or port security, to prevent future MAC address spoofing attempts.
- Update the MAC address table to reflect the correct MAC address-port mapping.
- Monitor the network for further signs of suspicious activity and adjust security policies as needed.