<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Lock Down IP-MAC-Physical Interface Binding on ASA 5505? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/lock-down-ip-mac-physical-interface-binding-on-asa-5505/m-p/1237382#M860727</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Luke,  beside Vikran suggestions, Im not aware you can lock down macs for the builtin switch in asa5505 as you would with switches at the port level for 802.1x port security, there are however other strategies to prevent ip spoofing by using uRPF.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;have a look here &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a00809763ea.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a00809763ea.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 18 Apr 2009 15:41:13 GMT</pubDate>
    <dc:creator>JORGE RODRIGUEZ</dc:creator>
    <dc:date>2009-04-18T15:41:13Z</dc:date>
    <item>
      <title>Lock Down IP-MAC-Physical Interface Binding on ASA 5505?</title>
      <link>https://community.cisco.com/t5/network-security/lock-down-ip-mac-physical-interface-binding-on-asa-5505/m-p/1237380#M860725</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible to lock down an IP-MAC-Physical Interface binding similar to using port security or IP source guard on the physical ports of the ASA 5505? This is to prevent spoofing, man in the middle attacks and the connection of unauthorised devices on physical interfaces that will be patched to publicly accessible wall jacks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have tried making static MAC entries however this does not seem to be supported on the ASA 5505. I have also looked into the IP spoofing feature however this seems to be more for spoofing between VLANs (zones) than per physical interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any suggestions will be greatly appreciated. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 15:20:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/lock-down-ip-mac-physical-interface-binding-on-asa-5505/m-p/1237380#M860725</guid>
      <dc:creator>luke.o'hare</dc:creator>
      <dc:date>2019-03-11T15:20:17Z</dc:date>
    </item>
    <item>
      <title>Re: Lock Down IP-MAC-Physical Interface Binding on ASA 5505?</title>
      <link>https://community.cisco.com/t5/network-security/lock-down-ip-mac-physical-interface-binding-on-asa-5505/m-p/1237381#M860726</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;IP-MAC mappings are possible in transparent mode but not in routed mode.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You might have move mac-ip bindings to your switches I suppose&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 18 Apr 2009 13:17:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/lock-down-ip-mac-physical-interface-binding-on-asa-5505/m-p/1237381#M860726</guid>
      <dc:creator>vikram_anumukonda</dc:creator>
      <dc:date>2009-04-18T13:17:29Z</dc:date>
    </item>
    <item>
      <title>Re: Lock Down IP-MAC-Physical Interface Binding on ASA 5505?</title>
      <link>https://community.cisco.com/t5/network-security/lock-down-ip-mac-physical-interface-binding-on-asa-5505/m-p/1237382#M860727</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Luke,  beside Vikran suggestions, Im not aware you can lock down macs for the builtin switch in asa5505 as you would with switches at the port level for 802.1x port security, there are however other strategies to prevent ip spoofing by using uRPF.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;have a look here &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a00809763ea.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a00809763ea.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 18 Apr 2009 15:41:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/lock-down-ip-mac-physical-interface-binding-on-asa-5505/m-p/1237382#M860727</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2009-04-18T15:41:13Z</dc:date>
    </item>
  </channel>
</rss>

