<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ARP Poisioning in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/arp-poisioning/m-p/1695996#M529486</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mike &lt;/P&gt;&lt;P&gt;thanks for the reply&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These are the states in the configuration..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (amadeus) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The (amadeus) interface being 57.24.130.8 , so no I dont have any statement referecing 57.24.130.1&lt;/P&gt;&lt;P&gt;but there is pat..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;below is a sequece of events of what happens from when I ping 57.24.130.11 from fwl 57.24.130.8&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ping 57.24.130.11&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 57.24.130.11, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;!????&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh arp | grep 57.24.130.11&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; amadeus 57.24.130.11 000d.88ee.1262 12&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;000d.88ee.1262 mac belogs to&amp;nbsp; firewall 57.24.130.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then I recieve the following mssage Pix 57.24.130.8&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;msg&amp;nbsp;&amp;nbsp; : %PIX-4-405001: Received ARP response collision from 57.24.130.11/000d.88ee.1262 on interface amadeus&lt;/P&gt;&lt;P&gt;type&amp;nbsp;&amp;nbsp; : attack&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; color: black; font-size: 8pt; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-ZA; mso-fareast-language: EN-ZA; mso-bidi-language: AR-SA;"&gt;msg&amp;nbsp;&amp;nbsp; : %PIX-4-405001: Received ARP response collision from 57.24.130.11/000d.88ee.1262 on interface amadeus&lt;BR /&gt;type&amp;nbsp;&amp;nbsp; : attack&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;is this nothing to worry about? as this will also happen randomly with out me trying to simulate the situation...?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 23 Jun 2011 09:01:12 GMT</pubDate>
    <dc:creator>sneakster1</dc:creator>
    <dc:date>2011-06-23T09:01:12Z</dc:date>
    <item>
      <title>ARP Poisioning</title>
      <link>https://community.cisco.com/t5/network-security/arp-poisioning/m-p/1695994#M529480</link>
      <description>&lt;P&gt;Hi ..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a subnet of 57.24.130.0/27&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i have two routers in that subnet ip'd as followed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;57.24.130.11 with a mac address of&amp;nbsp; 001d.46c4.0c60&lt;/P&gt;&lt;P&gt;57.24.130.12 with a mac address of&amp;nbsp; 001c.f6f8.b570&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;now in this subnet I also two PIX firewalls ver 8.0(4) with IPs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;57.24.130.1 with mac 000d.88ee.1262&lt;/P&gt;&lt;P&gt;57.24.130.8 with mac 00e0.b603.d823&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Okay I have the firewalls syslog sending its output to a firewall analyzer and every couple months I get a notification of &lt;/P&gt;&lt;P&gt;ARP poisioing on firewall 57.24.130.8 with the following situation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the two routers IP (57.24.130.11,57.24.130.12) appear in the ARP table of&amp;nbsp; 57.24.130.8 with the mac address of 57.24.130.1 being 000d.88ee.1262.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How is this possible ? and why is this happening ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any ideas?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:49:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/arp-poisioning/m-p/1695994#M529480</guid>
      <dc:creator>sneakster1</dc:creator>
      <dc:date>2019-03-11T20:49:03Z</dc:date>
    </item>
    <item>
      <title>ARP Poisioning</title>
      <link>https://community.cisco.com/t5/network-security/arp-poisioning/m-p/1695995#M529484</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If the Pix with the IP address 57.24.130.8 is running NAT and it has the IP address 57.24.130.1 on an statement, then, that would be expeted since the Pix will proxy arp for that IP (due to the NAT configured) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is the only way because of a Firewall will answer an ARP request that does not belong to its interface IP. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Jun 2011 21:11:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/arp-poisioning/m-p/1695995#M529484</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-06-22T21:11:18Z</dc:date>
    </item>
    <item>
      <title>Re: ARP Poisioning</title>
      <link>https://community.cisco.com/t5/network-security/arp-poisioning/m-p/1695996#M529486</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mike &lt;/P&gt;&lt;P&gt;thanks for the reply&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These are the states in the configuration..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (amadeus) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The (amadeus) interface being 57.24.130.8 , so no I dont have any statement referecing 57.24.130.1&lt;/P&gt;&lt;P&gt;but there is pat..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;below is a sequece of events of what happens from when I ping 57.24.130.11 from fwl 57.24.130.8&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ping 57.24.130.11&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 57.24.130.11, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;!????&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh arp | grep 57.24.130.11&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; amadeus 57.24.130.11 000d.88ee.1262 12&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;000d.88ee.1262 mac belogs to&amp;nbsp; firewall 57.24.130.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then I recieve the following mssage Pix 57.24.130.8&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;msg&amp;nbsp;&amp;nbsp; : %PIX-4-405001: Received ARP response collision from 57.24.130.11/000d.88ee.1262 on interface amadeus&lt;/P&gt;&lt;P&gt;type&amp;nbsp;&amp;nbsp; : attack&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; color: black; font-size: 8pt; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-ZA; mso-fareast-language: EN-ZA; mso-bidi-language: AR-SA;"&gt;msg&amp;nbsp;&amp;nbsp; : %PIX-4-405001: Received ARP response collision from 57.24.130.11/000d.88ee.1262 on interface amadeus&lt;BR /&gt;type&amp;nbsp;&amp;nbsp; : attack&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;is this nothing to worry about? as this will also happen randomly with out me trying to simulate the situation...?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Jun 2011 09:01:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/arp-poisioning/m-p/1695996#M529486</guid>
      <dc:creator>sneakster1</dc:creator>
      <dc:date>2011-06-23T09:01:12Z</dc:date>
    </item>
    <item>
      <title>Re: ARP Poisioning</title>
      <link>https://community.cisco.com/t5/network-security/arp-poisioning/m-p/1695997#M529487</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am sorry, I think I mispoke on my reply, I meant if 57.24.130.1 was running NAT. Please feel free to post the sh run NAT of 57.24.130.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Jun 2011 17:17:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/arp-poisioning/m-p/1695997#M529487</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-06-23T17:17:52Z</dc:date>
    </item>
  </channel>
</rss>

