<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ARP Spoofing in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/arp-spoofing/m-p/4696894#M1093851</link>
    <description>&lt;P&gt;That could be due to a static route that is pointing to the exit interface rather than to the next hop which is not really recommended at all.&lt;/P&gt;</description>
    <pubDate>Fri, 30 Sep 2022 16:59:32 GMT</pubDate>
    <dc:creator>Aref Alsouqi</dc:creator>
    <dc:date>2022-09-30T16:59:32Z</dc:date>
    <item>
      <title>ARP Spoofing</title>
      <link>https://community.cisco.com/t5/network-security/arp-spoofing/m-p/4696835#M1093845</link>
      <description>&lt;P&gt;Hi everyone&lt;span class="lia-inline-image-display-wrapper lia-image-align-right" image-alt="Untitled.png" style="width: 563px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/163830i5EBEF3349EC6F1E1/image-dimensions/563x419?v=v2" width="563" height="419" role="button" title="Untitled.png" alt="Untitled.png" /&gt;&lt;/span&gt;, have a nice day&lt;/P&gt;&lt;P&gt;I have a big network with multiple cisco routers, switches(IOSXE, IOSXR), and NX, I found in the ARP table multiple IP addresses with the same mac address, I try to track the mac address but the port for this mac return me the previous router&amp;nbsp;&lt;/P&gt;&lt;P&gt;please any help or explain this issue&lt;/P&gt;</description>
      <pubDate>Fri, 30 Sep 2022 15:19:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/arp-spoofing/m-p/4696835#M1093845</guid>
      <dc:creator>ahmed ferhan</dc:creator>
      <dc:date>2022-09-30T15:19:11Z</dc:date>
    </item>
    <item>
      <title>Re: ARP Spoofing</title>
      <link>https://community.cisco.com/t5/network-security/arp-spoofing/m-p/4696864#M1093847</link>
      <description>&lt;P&gt;are there any static route toward this router&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Sep 2022 16:14:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/arp-spoofing/m-p/4696864#M1093847</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-09-30T16:14:39Z</dc:date>
    </item>
    <item>
      <title>Re: ARP Spoofing</title>
      <link>https://community.cisco.com/t5/network-security/arp-spoofing/m-p/4696894#M1093851</link>
      <description>&lt;P&gt;That could be due to a static route that is pointing to the exit interface rather than to the next hop which is not really recommended at all.&lt;/P&gt;</description>
      <pubDate>Fri, 30 Sep 2022 16:59:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/arp-spoofing/m-p/4696894#M1093851</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2022-09-30T16:59:32Z</dc:date>
    </item>
    <item>
      <title>Re: ARP Spoofing</title>
      <link>https://community.cisco.com/t5/network-security/arp-spoofing/m-p/4696964#M1093860</link>
      <description>&lt;P&gt;of course, there is ..&lt;/P&gt;</description>
      <pubDate>Fri, 30 Sep 2022 19:57:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/arp-spoofing/m-p/4696964#M1093860</guid>
      <dc:creator>ahmed ferhan</dc:creator>
      <dc:date>2022-09-30T19:57:08Z</dc:date>
    </item>
    <item>
      <title>Re: ARP Spoofing</title>
      <link>https://community.cisco.com/t5/network-security/arp-spoofing/m-p/4696965#M1093861</link>
      <description>&lt;P&gt;the default route already exist into the switch because i need the end user to reach the internet&lt;/P&gt;</description>
      <pubDate>Fri, 30 Sep 2022 19:59:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/arp-spoofing/m-p/4696965#M1093861</guid>
      <dc:creator>ahmed ferhan</dc:creator>
      <dc:date>2022-09-30T19:59:38Z</dc:date>
    </item>
    <item>
      <title>Re: ARP Spoofing</title>
      <link>https://community.cisco.com/t5/network-security/arp-spoofing/m-p/4696966#M1093862</link>
      <description>&lt;P&gt;so config the static route as following&amp;nbsp;&lt;BR /&gt;ip route x.x.x.x y.y.y.y &amp;lt;egress interface&amp;gt; &amp;lt;next-hop&amp;gt;&lt;BR /&gt;this will stop ARP issue.&amp;nbsp;&lt;BR /&gt;for more info. check link below&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/dial-access/floating-static-route/118263-technote-nexthop-00.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/dial-access/floating-static-route/118263-technote-nexthop-00.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Sep 2022 20:01:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/arp-spoofing/m-p/4696966#M1093862</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-09-30T20:01:20Z</dc:date>
    </item>
    <item>
      <title>Re: ARP Spoofing</title>
      <link>https://community.cisco.com/t5/network-security/arp-spoofing/m-p/4696970#M1093864</link>
      <description>&lt;P&gt;i config this route as ( ip route 0.0.0.0 0.0.0.0 + (ip which is the gateway))&lt;/P&gt;</description>
      <pubDate>Fri, 30 Sep 2022 20:14:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/arp-spoofing/m-p/4696970#M1093864</guid>
      <dc:creator>ahmed ferhan</dc:creator>
      <dc:date>2022-09-30T20:14:42Z</dc:date>
    </item>
    <item>
      <title>Re: ARP Spoofing</title>
      <link>https://community.cisco.com/t5/network-security/arp-spoofing/m-p/4697069#M1093872</link>
      <description>&lt;P&gt;that great you already specify the the next-hop so no issue at all but for many arp let me make deep dive,&amp;nbsp;&lt;BR /&gt;I will update you soon&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 01 Oct 2022 13:45:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/arp-spoofing/m-p/4697069#M1093872</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-10-01T13:45:43Z</dc:date>
    </item>
    <item>
      <title>Re: ARP Spoofing</title>
      <link>https://community.cisco.com/t5/network-security/arp-spoofing/m-p/4697238#M1093884</link>
      <description>&lt;P&gt;I'll be appreciated you&lt;/P&gt;</description>
      <pubDate>Sun, 02 Oct 2022 14:43:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/arp-spoofing/m-p/4697238#M1093884</guid>
      <dc:creator>ahmed ferhan</dc:creator>
      <dc:date>2022-10-02T14:43:41Z</dc:date>
    </item>
    <item>
      <title>Re: ARP Spoofing</title>
      <link>https://community.cisco.com/t5/network-security/arp-spoofing/m-p/4703547#M1094261</link>
      <description>&lt;P&gt;hi friend&amp;nbsp;&lt;BR /&gt;I dont forget you but I was looking for case that ARP is use for each IP in subnet&amp;nbsp;&lt;BR /&gt;1- static route toward interface (this we discus before you confirm that you use next-hop not interface)&lt;BR /&gt;2- PBR with set interface&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;so for second case can you confirm that you use PBR?&lt;/P&gt;</description>
      <pubDate>Fri, 14 Oct 2022 19:16:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/arp-spoofing/m-p/4703547#M1094261</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-10-14T19:16:26Z</dc:date>
    </item>
    <item>
      <title>Re: ARP Spoofing</title>
      <link>https://community.cisco.com/t5/network-security/arp-spoofing/m-p/4703640#M1094267</link>
      <description>&lt;P&gt;Hi MHM, thank you for your support, I am so appreciated your followed&lt;BR /&gt;into( Router and SW)&amp;nbsp; I am setting two access list controls only without route-map&amp;nbsp;&lt;BR /&gt;the first access list is used for management access and this set on ssh protocol&amp;nbsp; and the second access list is used for port security ( traffic or services )that allowed to pass through the router and this set to the management interface&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 15 Oct 2022 07:17:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/arp-spoofing/m-p/4703640#M1094267</guid>
      <dc:creator>ahmed ferhan</dc:creator>
      <dc:date>2022-10-15T07:17:11Z</dc:date>
    </item>
  </channel>
</rss>

