GRANDSTREAM GCC6000 Series Security Defense
Specifications
- Product: GCC6000 Series Security Defense Guide
- Manufacturer: Grandstream Networks, Inc.
- Features: DoS Defense, ARP Protection
Product Usage Instructions
DoS Defense
The DoS Defense feature helps protect the network from Flood attacks by blocking SYNC requests. Follow these steps to prevent DoS attacks:
- Enable Flood attack defense on network service ports like port443 and port 80.
- Configure Flood attack defense for other protocols such as UDP, ICMP, or TCP Acknowledgments.
- Enable Port Scan detection to be alerted when a host attempts a SYN flood attack.
ARP Protection
The ARP Protection feature helps prevent ARP Spoofing attacks. Here’s how to configure ARP Protection:
- Enable Spoofing Defense under Firewall Module Security Defense ARP Protection.
- Set the action to Block to prevent ARP Spoofing attempts.
- Enable ARP Spoofing Defense and configure options to block ARP Replies with inconsistent MAC addresses.
Static ARP List
To create a Static ARP List for additional protection:
- Ensure Spoofing defense is enabled under Firewall Module Security Defense ARP Protection.
- Add a new mapping rule with the local IP address and corresponding MAC address.
- Define the Interface type based on your setup scenario.
Frequently Asked Questions (FAQ)
Q: How can I view security logs after configuring the security defenses?
A: You can view security logs that display information about attacks and actions taken in the Security Log section of the GCC device interface.
Q: What should I do if I suspect an ARP Spoofing attack?
A: If you suspect an ARP Spoofing attack, enable Spoofing Defense and configure ARP Spoofing Defense options to block inconsistent ARP Replies.
Introduction
Security Defense is a mechanism implemented in the GCC convergence device, to protect the network from common cyber attacks, such as DoS attacks, Man-in-the-middle attack, ARP Spoofing…
Each tool will have a set of parameters and configuration items to either block, isolate or delete the source endpoint from where the attack is detected.
In this guide, we will go through some of the defense methods used by the GCC device to protect the network from potential down time or security vulnerabilities.
The guide will cover the following configurations:
- DoS Defense
- ARP Protection
DoS Defense
The Flood attack defense, as the name implies, is used to block connected endpoints from flooding the network with SYNC requests, this is achieved by performing a SYNC FLOOD defense on network service ports (port 443, port 80…), and if it notices that too many requests are being sent to a targeted device, it will block sync messages, or inform the network administrator, depending on the way it is configured.
Some initial attack indications are: port scanning, where the GCC would signal an attempted scan for all internal service ports, and sees if any specific port is currently used, such as port 21 for FTP, port 22 for SSH access…, these kind of information can cause a vulnerability in the network if obtained by the wrong person, and can help him in some cases flood the network and launch a Denial-of-Service attack, to minimize the risks, we can enable the port scan detection feature to let us know, when a user is attempting a port scan.
Preventing the DoS attack
To prevent a flooding attack, we can follow the below steps on the GCC device:
- Under “Firewall Module → Security Defense → DoS Defense”, Enable the DoS Defense option.
- Set the action to “Block“, this will notify the user of an attempted SYN FLOOD, and at the same time, block the user from sending SYN FLOOD attacks, setting the action to “Monitor” will only inform the user that an attack is attempted, the information can be viewed on the security logs of the GCC device.
- Set the TCP SYN Flood Packet Threshold (packets/s) to 2000 packets per second, if the amount exceeds that, the system will consider it as a SYN Flood.
In the same manner, you have the possibility to enable Flood attack defense for other protocols such as UDP, ICMP, or for the TCP Acknowlegments. Additionally, we will enable the Port Scan detection option, the GCC device will notify us when a connected host is trying to launch a SYN flood attack, which can help us take preventive measures.
- Define the Port Scan Packet Threshold (packets/s) to be 50 packets per second, If the port packets reach the threshold, port scanning detection will start immediately.
After applying the above configuration, after a user attempts to flood the network, it will be blocked, and the GCC device will not experience any downtime.
You can view security logs displaying information about the exact time of the attack and the type of action, monitored only, or blocked
ARP Protection
Spoofing Defense is a security mechanism used to prevent connected users, to alter and modify their network information, in our case, we will focus on taking preventive measures against MAC spoofing attacks.
A MAC spoofing attack involves changing the MAC address of a network interface on a device to impersonate another device on the network. This can be used to bypass network access controls, such as the 802.1X authentication, disguise the attacker’s device, or intercept network traffic intended for another device.
Preventing the ARP Spoofing
The GCC device allows its users to prevent such ARP spoofing attacks, by implementing specific rules to block the device from reconnecting and obtaining the modified MAC address, this can be done by following the below steps:
- Under “Firewall Module → Security Defense →ARP Protection”, Enable the Spoofing Defense option.
- Set the action to “Block“, this will block the device from sniffing the traffic between the victim device and the router, it will also notify the user that an ARP spoofing attempt happened, this can be viewed in the security log.
- Enable the ARP Spoofing Defense, by enabling the following options, “Block ARP Replies with Inconsistent Source MAC Addresses” , and “Block ARP Replies with Inconsistent Destination MAC Addresses“
- Additionally you can enable “Decline VRRP MAC Into ARP Table” to decline including any generated virtual MAC address in the ARP table.
Block ARP Replies with Inconsistent Source MAC Addresses: The GCC device will verify the destination MAC address of a specific packet, and when the response is received by the device, it will verify the source MAC address and it will make sure that they match. Otherwise, the GCC device will not forward the packet.
Block ARP Replies with Inconsistent Destination MAC Addresses: The GCC601X(W) will verify the source MAC address when the response is received. The device will verify the destination MAC address and it will make sure that they match. Otherwise, the device will not forward the packet.
Decline VRRP MAC Into ARP Table: Virtual Router Redundancy Protocol (VRRP) allows multiple routers to manage a single virtual IP address for high availability. This defense ensures that VRRP MAC addresses are not accepted into the ARP table, which can prevent certain types of attacks that involve VRRP.
Static ARP List
In addition to the above mentioned tools and options used, another useful approach would be to map MAC to IP address, this is done by stating to the GCC firewall, a list of IP addresses in your local network, and their corresponding allowed MAC addresses, this means that if an attacker, within your LAN tries to impersonate one of the IP addresses added but with a different MAC address, it will be detected as a spoofing attempt and will be blocked, This is achieved through the feature called Static ARP List.
We will take the below example for better understanding:
For a connected internal server with the local static IP address 192.168.3.230, we will do the following:
- Go to Firewall Module → Security Defense →ARP Protection →Static ARP List, before that make sure Spoofing defense is enabled under Firewall Module → Security Defense →ARP Protection →Spoofing Defense
- Click
to Add a new Mapping rule.
- Define the local IP address of the endpoint, in our case it is “192.168.3.230”.
- You have the option to either manually enter the MAC address of the connected unit, or click on “Automatic Acquisition” to be able to retrieve the MAC address of the device automatically from the list of connected devices. this will map the MAC address with the local IP address
- Defining the Interface type depends on your set up scenario, in our case we will select LAN:
- LAN: Selecting the LAN interface is used when you want to protect your internal devices against internal spoofing attempts, by mapping each device in the LAN to its corresponding IP address, it is important to note that the IP address must be set statically to avoid having to update the mapping rule each time with the new IP address.
- WAN: The WAN interface will be selected when we want to protect our Internal network by defining to the Firewall the public IP address of the ISP gateway provided , and its corresponding MAC address, which is the MAC address of the gateway device used, this is useful if you have a server hosted on your network and that is exposed to the internet, and you want to ensure that only traffic coming from the gateway is allowed to communicate with it.
- Define a description that matches the device.
Results
With the ARP spoofing defense mechanism applied, the GCC device can help you prevent many security threats, such as Man-in the middle attack, and altering MAC address to bypass the NAC authentication.
The security logs will display the information about the blocked ARP spoofing attempt, make sure to set the type of attack to DoS & Spoofing to view the logs, as shown below:
Supported Devices
Device Model | Firmware Required |
GCC6010W | 1.0.1.7+ |
GCC6010 | 1.0.1.7+ |
GCC6011 | 1.0.1.7+ |
Need Support?
Can’t find the answer you’re looking for? Don’t worry we’re here to help!
Documents / Resources
![]() |
GRANDSTREAM GCC6000 Series Security Defense Guide [pdf] User Guide GCC6000, GCC6000 Series Security Defense Guide, GCC6000 Series, Security Defense Guide, Defense Guide, Guide |