<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Protect my Lan against ARP spoofing/Poisoning in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/protect-my-lan-against-arp-spoofing-poisoning/m-p/3950367#M900732</link>
    <description>&lt;P&gt;Okay, so i have just to enter this configuration in each interface (pre-configured with VLan).&lt;/P&gt;&lt;P&gt;Could you give the specific configuration of&amp;nbsp;Dynamic ARP Inspection in VLan Environment&lt;/P&gt;&lt;P&gt;Exp: i have VLan 10 in interface 1 using this ip adresse 192.168.10.1 and have his own DHCP mode and linked with gateway 192.168.99.1 in interface 24&lt;/P&gt;</description>
    <pubDate>Wed, 30 Oct 2019 10:57:06 GMT</pubDate>
    <dc:creator>mydi88</dc:creator>
    <dc:date>2019-10-30T10:57:06Z</dc:date>
    <item>
      <title>Protect my Lan against ARP spoofing/Poisoning</title>
      <link>https://community.cisco.com/t5/network-security/protect-my-lan-against-arp-spoofing-poisoning/m-p/3950323#M900727</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am suffering against arp attacks into my Lan (Netcut -&amp;nbsp; selfishnet). What configuration i must do in my CISCO SWITCH 2960 to stop this&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:38:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/protect-my-lan-against-arp-spoofing-poisoning/m-p/3950323#M900727</guid>
      <dc:creator>mydi88</dc:creator>
      <dc:date>2020-02-21T17:38:36Z</dc:date>
    </item>
    <item>
      <title>Re: Protect my Lan against ARP spoofing/Poisoning</title>
      <link>https://community.cisco.com/t5/network-security/protect-my-lan-against-arp-spoofing-poisoning/m-p/3950326#M900728</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;
&lt;P&gt;Take a look at Dynamic ARP Inspection:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960x/software/15-0_2_EX/security/configuration_guide/b_sec_152ex_2960-x_cg/b_sec_152ex_2960-x_cg_chapter_01111.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960x/software/15-0_2_EX/security/configuration_guide/b_sec_152ex_2960-x_cg/b_sec_152ex_2960-x_cg_chapter_01111.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cheers,&lt;/P&gt;
&lt;P&gt;Seb.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Oct 2019 10:00:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/protect-my-lan-against-arp-spoofing-poisoning/m-p/3950326#M900728</guid>
      <dc:creator>Seb Rupik</dc:creator>
      <dc:date>2019-10-30T10:00:09Z</dc:date>
    </item>
    <item>
      <title>Re: Protect my Lan against ARP spoofing/Poisoning</title>
      <link>https://community.cisco.com/t5/network-security/protect-my-lan-against-arp-spoofing-poisoning/m-p/3950338#M900729</link>
      <description>&lt;P&gt;Could i drop all my VLans and conserve just this configuration to protect my Lan ? Because of massive attacks i configured VLans to limit attacks in some zones.&lt;/P&gt;&lt;P&gt;Now if i use this config, can i use my switch in simple mode without VLans?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Oct 2019 10:23:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/protect-my-lan-against-arp-spoofing-poisoning/m-p/3950338#M900729</guid>
      <dc:creator>mydi88</dc:creator>
      <dc:date>2019-10-30T10:23:22Z</dc:date>
    </item>
    <item>
      <title>Re: Protect my Lan against ARP spoofing/Poisoning</title>
      <link>https://community.cisco.com/t5/network-security/protect-my-lan-against-arp-spoofing-poisoning/m-p/3950351#M900730</link>
      <description>You can but its not recommended. You can use dynamic arp inspection with vlans on switch</description>
      <pubDate>Wed, 30 Oct 2019 10:42:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/protect-my-lan-against-arp-spoofing-poisoning/m-p/3950351#M900730</guid>
      <dc:creator>kubn2</dc:creator>
      <dc:date>2019-10-30T10:42:04Z</dc:date>
    </item>
    <item>
      <title>Re: Protect my Lan against ARP spoofing/Poisoning</title>
      <link>https://community.cisco.com/t5/network-security/protect-my-lan-against-arp-spoofing-poisoning/m-p/3950359#M900731</link>
      <description>&lt;P&gt;hmmm how epidemic is this attack?! If you unify all of your connected devices into a single subnet/ VLAN then you put all of the devcies at risk from the ARP attack.&lt;/P&gt;
&lt;P&gt;By using VLANs you reduce the broadcast domain and therefore the reach of an ARP based attack.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would keep the VLANs and implement DAI. Don't adjust your topology, get the switch to do the work.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cheers,&lt;/P&gt;
&lt;P&gt;Seb.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Oct 2019 10:53:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/protect-my-lan-against-arp-spoofing-poisoning/m-p/3950359#M900731</guid>
      <dc:creator>Seb Rupik</dc:creator>
      <dc:date>2019-10-30T10:53:04Z</dc:date>
    </item>
    <item>
      <title>Re: Protect my Lan against ARP spoofing/Poisoning</title>
      <link>https://community.cisco.com/t5/network-security/protect-my-lan-against-arp-spoofing-poisoning/m-p/3950367#M900732</link>
      <description>&lt;P&gt;Okay, so i have just to enter this configuration in each interface (pre-configured with VLan).&lt;/P&gt;&lt;P&gt;Could you give the specific configuration of&amp;nbsp;Dynamic ARP Inspection in VLan Environment&lt;/P&gt;&lt;P&gt;Exp: i have VLan 10 in interface 1 using this ip adresse 192.168.10.1 and have his own DHCP mode and linked with gateway 192.168.99.1 in interface 24&lt;/P&gt;</description>
      <pubDate>Wed, 30 Oct 2019 10:57:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/protect-my-lan-against-arp-spoofing-poisoning/m-p/3950367#M900732</guid>
      <dc:creator>mydi88</dc:creator>
      <dc:date>2019-10-30T10:57:06Z</dc:date>
    </item>
    <item>
      <title>Re: Protect my Lan against ARP spoofing/Poisoning</title>
      <link>https://community.cisco.com/t5/network-security/protect-my-lan-against-arp-spoofing-poisoning/m-p/3950368#M900733</link>
      <description>Based on this instruction linked above by Seb Rupik: &lt;A href="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960x/software/15-0_2_EX/security/configuration_guide/b_sec_152ex_2960-x_cg/b_sec_152ex_2960-x_cg_chapter_01111.html#task_1961618808BA41BA941D3B9979D36518" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960x/software/15-0_2_EX/security/configuration_guide/b_sec_152ex_2960-x_cg/b_sec_152ex_2960-x_cg_chapter_01111.html#task_1961618808BA41BA941D3B9979D36518&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;You turning ARP inspection per vlan basis (or you can turn it on on vlan range) so for vlan 10:&lt;BR /&gt;-ip arp inspection vlan 10&lt;BR /&gt;And remember to set some ports as trusted (between switches and port to dhcp server).</description>
      <pubDate>Wed, 30 Oct 2019 11:06:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/protect-my-lan-against-arp-spoofing-poisoning/m-p/3950368#M900733</guid>
      <dc:creator>kubn2</dc:creator>
      <dc:date>2019-10-30T11:06:31Z</dc:date>
    </item>
  </channel>
</rss>

