<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE &amp; ARP inspection &amp; DHCP snooping in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-arp-inspection-dhcp-snooping/m-p/3525740#M517916</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Actually the active directory domain&amp;nbsp; permissions, but as you know, shadow IT is always present, moreover on an organization with many IT specialists.&lt;/P&gt;&lt;P&gt;Thanks for the reply chyps, you helped me out to find a valid reason for implementing DHCP snooping and ARP spoofing.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 13 Feb 2018 10:50:54 GMT</pubDate>
    <dc:creator>Antonio Macia</dc:creator>
    <dc:date>2018-02-13T10:50:54Z</dc:date>
    <item>
      <title>ISE &amp; ARP inspection &amp; DHCP snooping</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-arp-inspection-dhcp-snooping/m-p/3525736#M517912</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello there,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Makes sense configuring arp inspection and DHCP snooping on a network where access is controlled by ISE? I mean, if access is based on dot1x and MAB using profiling and all the traffic is blocked until the device matches an authorization policy, wouldn't be redundant protections?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 10 Feb 2018 16:50:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-arp-inspection-dhcp-snooping/m-p/3525736#M517912</guid>
      <dc:creator>Antonio Macia</dc:creator>
      <dc:date>2018-02-10T16:50:52Z</dc:date>
    </item>
    <item>
      <title>Re: ISE &amp; ARP inspection &amp; DHCP snooping</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-arp-inspection-dhcp-snooping/m-p/3525737#M517913</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Not clear on question.&amp;nbsp; Port Security (the locking down of a port to specific authorized MAC) may be considered redundant, and in general we do not support the combination of these two features, but ARP inspection is to validate that IP address is one that is seen on port.&amp;nbsp; dACLs or other enforcement could potentially block, but DHCP Snooping is complimentary as it helps verify that DHCP used and the IP address assigned to host.&amp;nbsp; It is also used for instantiating dACLs.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Feb 2018 14:10:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-arp-inspection-dhcp-snooping/m-p/3525737#M517913</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2018-02-12T14:10:22Z</dc:date>
    </item>
    <item>
      <title>Re: ISE &amp; ARP inspection &amp; DHCP snooping</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-arp-inspection-dhcp-snooping/m-p/3525738#M517914</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Chyps,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My question is aimed to get feedback on ISE deployments that might use DHCP snooping and ARP inspection on top as an added security mechanism.&lt;/P&gt;&lt;P&gt;They way I see it, during the first connection a device is profiled and allowed to access the network only after matching the conditions defined, so rogue DHCP servers would be prevented. Having said that, only on those exceptional cases where a legitimate device gets into the network and later enables any kind of DHCP service, then I could understand the need of DHCP snooping.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What's your take on this?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Feb 2018 14:42:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-arp-inspection-dhcp-snooping/m-p/3525738#M517914</guid>
      <dc:creator>Antonio Macia</dc:creator>
      <dc:date>2018-02-12T14:42:43Z</dc:date>
    </item>
    <item>
      <title>Re: ISE &amp; ARP inspection &amp; DHCP snooping</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-arp-inspection-dhcp-snooping/m-p/3525739#M517915</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What prevents an authorized user from posing as a DHCP server?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Feb 2018 14:52:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-arp-inspection-dhcp-snooping/m-p/3525739#M517915</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2018-02-12T14:52:35Z</dc:date>
    </item>
    <item>
      <title>Re: ISE &amp; ARP inspection &amp; DHCP snooping</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-arp-inspection-dhcp-snooping/m-p/3525740#M517916</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Actually the active directory domain&amp;nbsp; permissions, but as you know, shadow IT is always present, moreover on an organization with many IT specialists.&lt;/P&gt;&lt;P&gt;Thanks for the reply chyps, you helped me out to find a valid reason for implementing DHCP snooping and ARP spoofing.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Feb 2018 10:50:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-arp-inspection-dhcp-snooping/m-p/3525740#M517916</guid>
      <dc:creator>Antonio Macia</dc:creator>
      <dc:date>2018-02-13T10:50:54Z</dc:date>
    </item>
    <item>
      <title>Re: ISE &amp; ARP inspection &amp; DHCP snooping</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-arp-inspection-dhcp-snooping/m-p/3525741#M517917</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thats where dhcp snooping comes in.&amp;nbsp; trusted ports are identified as the source of dhcp servers.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Feb 2018 20:38:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-arp-inspection-dhcp-snooping/m-p/3525741#M517917</guid>
      <dc:creator>ndemers</dc:creator>
      <dc:date>2018-02-23T20:38:35Z</dc:date>
    </item>
    <item>
      <title>Re: ISE &amp; ARP inspection &amp; DHCP snooping</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-arp-inspection-dhcp-snooping/m-p/4298178#M565739</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/292144"&gt;@Antonio Macia&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;I currently, looking for implement&amp;nbsp;dynamic ARP inspection with ISE.&lt;/P&gt;&lt;P&gt;Could you help to share me. how can do that ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank in advance.&lt;/P&gt;</description>
      <pubDate>Fri, 26 Feb 2021 07:09:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-arp-inspection-dhcp-snooping/m-p/4298178#M565739</guid>
      <dc:creator>sinady</dc:creator>
      <dc:date>2021-02-26T07:09:32Z</dc:date>
    </item>
  </channel>
</rss>

