<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ARP Reply-to-Broadcast in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/arp-reply-to-broadcast/m-p/1500340#M68839</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This can be caused by devices that perform an unsolicited, or &lt;STRONG&gt;Gratuitous ARP&lt;/STRONG&gt; replies.&lt;/P&gt;&lt;P&gt;Load balancers, High Availbility pairs (dual NICs in a host, dual firewalls, etc) will send a broad cast ARP reply to update everyones ARP table so that know what MAC to send frames for the shared IP address.&lt;/P&gt;&lt;P&gt;Here's some reading on the subject:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://linux-ip.net/html/ether-arp.html"&gt;http://linux-ip.net/html/ether-arp.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://fixunix.com/tcp-ip/66247-arp-behaviour.html"&gt;http://fixunix.com/tcp-ip/66247-arp-behaviour.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should trace down the device by i's MAC address to determine if this is the case or not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Bob&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 13 Jul 2010 15:06:58 GMT</pubDate>
    <dc:creator>rhermes</dc:creator>
    <dc:date>2010-07-13T15:06:58Z</dc:date>
    <item>
      <title>ARP Reply-to-Broadcast</title>
      <link>https://community.cisco.com/t5/network-security/arp-reply-to-broadcast/m-p/1500338#M68809</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Im seeing a Huge amount of events related with the signature ARP Reply-to-Broadcast 7102.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The sensor saw an ARP Reply packet with its payload Destination MAC containing a broadcast address. This is not normal traffic and can indicate an ARP poisioning attack. Note: This signature is only available in Cisco IDS versions 4.0 and greater.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;TABLE border="0" cellpadding="2" cellspacing="0" width="100%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="98%"&gt;&lt;SPAN class="label2"&gt;Benign Triggers&lt;/SPAN&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD align="left" width="100%"&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="100%"&gt;&lt;SPAN class="data2"&gt;No known triggers.&lt;/SPAN&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It says that there are not Benign triggers. Im Dropping the packets related with this signature.... Should I Drop the packets to avoid ARP Poisioning??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do not want to drops benign packets but it seems that this signature will not fire with benign packets.&amp;nbsp; Any advise will be really appreciated.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 12:03:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/arp-reply-to-broadcast/m-p/1500338#M68809</guid>
      <dc:creator>Diego Armando Cambronero Arias</dc:creator>
      <dc:date>2019-03-10T12:03:21Z</dc:date>
    </item>
    <item>
      <title>Re: ARP Reply-to-Broadcast</title>
      <link>https://community.cisco.com/t5/network-security/arp-reply-to-broadcast/m-p/1500339#M68816</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is the traffic coming from your network or the outside?&amp;nbsp; If inside, I'd track it down and investigate the device sending the packets.&amp;nbsp; If outside, contact the admin of that network and discuss with them.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 11 Jul 2010 11:45:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/arp-reply-to-broadcast/m-p/1500339#M68816</guid>
      <dc:creator>terrygwazdosky</dc:creator>
      <dc:date>2010-07-11T11:45:28Z</dc:date>
    </item>
    <item>
      <title>Re: ARP Reply-to-Broadcast</title>
      <link>https://community.cisco.com/t5/network-security/arp-reply-to-broadcast/m-p/1500340#M68839</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This can be caused by devices that perform an unsolicited, or &lt;STRONG&gt;Gratuitous ARP&lt;/STRONG&gt; replies.&lt;/P&gt;&lt;P&gt;Load balancers, High Availbility pairs (dual NICs in a host, dual firewalls, etc) will send a broad cast ARP reply to update everyones ARP table so that know what MAC to send frames for the shared IP address.&lt;/P&gt;&lt;P&gt;Here's some reading on the subject:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://linux-ip.net/html/ether-arp.html"&gt;http://linux-ip.net/html/ether-arp.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://fixunix.com/tcp-ip/66247-arp-behaviour.html"&gt;http://fixunix.com/tcp-ip/66247-arp-behaviour.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should trace down the device by i's MAC address to determine if this is the case or not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Bob&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Jul 2010 15:06:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/arp-reply-to-broadcast/m-p/1500340#M68839</guid>
      <dc:creator>rhermes</dc:creator>
      <dc:date>2010-07-13T15:06:58Z</dc:date>
    </item>
    <item>
      <title>Re: ARP Reply-to-Broadcast</title>
      <link>https://community.cisco.com/t5/network-security/arp-reply-to-broadcast/m-p/1500341#M68857</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Bob's answer regarding gratuitous ARP from clustering/HA is spot on.&amp;nbsp; I'll look into getting the SIO entry updated to reflect the fact that these are known benign triggers. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-juteixei&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Jul 2010 15:18:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/arp-reply-to-broadcast/m-p/1500341#M68857</guid>
      <dc:creator>Justin Teixeira</dc:creator>
      <dc:date>2010-07-13T15:18:30Z</dc:date>
    </item>
  </channel>
</rss>

