Eset pops up detecting an ARP cache poisoning attack from a source on the network.
- “ICMP attack” or “DNS Cache poisoning attack” is detected by the ESET firewall
- “Detected ARP cache poisoning attack” is detected by the ESET firewall
- ESET technical support directed you to this article to flush your DNS cache and restore the MS Hosts file
- Firewall threat warning received in ESET Remote Administrator (ERA)
If the ESET firewall is detecting a threat to your system, create an exception for internal IP traffic. Run the DNS flush tool if the issue is not resolved.
Create an exception for internal IP traffic
- Determine if the IP address detected in the notification is a number that falls within the following range (where “x” is 0-255):
- 172.16.x.x – 172.31.x.x
- If the IP address detected is within the safe range listed above, open the main program window of your ESET Windows product. Skip to step 4.
- If the IP address being detected as a threat is not within the safe range listed above, or there are no network peripherals currently in use on your network, the device being detected by the firewall is located on a public network and could be a threat to your system.
See the ESET DNS-Flush tool section and use it to repair any files that may have been damaged by DNS cache poisoning.
- Press the F5 key on your keyboard to access Advanced setup.
- Click Firewall, expand Advanced and then click Edit next to Zones.
Version 8.x: Expand Network → Personal firewall and then click Rules and zones.
In the Zone and rule editor pane, click Setup. Click to view a screenshot.
- In the Firewall zones window, select Trusted zone and click Edit.
If you are running version 8.x: Click the Zones tab, select Addresses excluded from active protection (IDS) and then click Edit. Click to view a screenshot.
In the Zone setup window, click Add IPv4 address. Click to view a screenshot.
- Type the IP address of the device being incorrectly detected as a threat in the Remote computer address (IPv4, IPv6, range, mask) field.
If you are running version 8.x: Select Single address, and then enter the IP address of the device being incorrectly detected as a threat. Click to view a screenshot.
- Click OK three times to exit Advanced setup and save your changes. You should no longer see any messages about attacks coming from an internal IP address that you know to be safe. If you continue to experience this issue, proceed to solution 2 below.
If you are running version 8.x: Click OK four times to exit the Advanced setup tree and save your changes.
Run the DNS Flush tool (DNS poisoning only)
You can use the ESET DNS Flush tool to flush your DNS cache . Follow the step-by-step instructions below to download and run the DNS Flush tool:
- Download the DNS-Flush.exe tool and save the file to your Desktop.
- Navigate to your Desktop and double-click DNS-Flush.exe (if you are prompted to continue, click Yes). The tool will automatically flush and register your DNS cache.
- After your computer restarts, open your ESET product and run a Computer scan. For assistance, refer to the following Knowledgebase articles:
The Computer scan should finish without detecting an infection. If no threat is detected, you are finished.
Check source IP on server DHCP
Open up DHCP on the server and locate the source IP detected on ESET
Use banner grabbing techniques to establish what kind of device is associated with the source IP.
Delete the entry otherwise.