<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic arp inspection in routed mode in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/arp-inspection-in-routed-mode/m-p/925396#M918662</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have only one host connected to a separate interface (dmz2). It is natted to a Public IP to allow it access to a partner network.&lt;/P&gt;&lt;P&gt;I want to make sure that no one (internally) spoofs the IP of this host or uses it's IP. I was looking at placing a static arp entry&lt;/P&gt;&lt;P&gt;and using dynamic arp inspection but it seems that this works only in transparent mode, but we have a routed mode running. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any other way?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All help is appreciated&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 12:57:14 GMT</pubDate>
    <dc:creator>mo shea</dc:creator>
    <dc:date>2019-03-11T12:57:14Z</dc:date>
    <item>
      <title>arp inspection in routed mode</title>
      <link>https://community.cisco.com/t5/network-security/arp-inspection-in-routed-mode/m-p/925396#M918662</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have only one host connected to a separate interface (dmz2). It is natted to a Public IP to allow it access to a partner network.&lt;/P&gt;&lt;P&gt;I want to make sure that no one (internally) spoofs the IP of this host or uses it's IP. I was looking at placing a static arp entry&lt;/P&gt;&lt;P&gt;and using dynamic arp inspection but it seems that this works only in transparent mode, but we have a routed mode running. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any other way?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All help is appreciated&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 12:57:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/arp-inspection-in-routed-mode/m-p/925396#M918662</guid>
      <dc:creator>mo shea</dc:creator>
      <dc:date>2019-03-11T12:57:14Z</dc:date>
    </item>
    <item>
      <title>Re: arp inspection in routed mode</title>
      <link>https://community.cisco.com/t5/network-security/arp-inspection-in-routed-mode/m-p/925397#M918663</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You could put a VLAN access-map or port-acl on the switch connected to the DMZ VLAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also you can still put static arp enties in Routed mode, however ARP inspection is not supported in routed mode.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/a2.html#wp1600694" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/a2.html#wp1600694&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jun 2008 10:40:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/arp-inspection-in-routed-mode/m-p/925397#M918663</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-06-10T10:40:59Z</dc:date>
    </item>
    <item>
      <title>Re: arp inspection in routed mode</title>
      <link>https://community.cisco.com/t5/network-security/arp-inspection-in-routed-mode/m-p/925398#M918664</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the response.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I placed a static arp entry on the interface, but it seems if any other pc uses the same IP, it can pass through.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As for the port acl, due you mean to use a mac list on the port.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jun 2008 15:28:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/arp-inspection-in-routed-mode/m-p/925398#M918664</guid>
      <dc:creator>mo shea</dc:creator>
      <dc:date>2008-06-10T15:28:24Z</dc:date>
    </item>
    <item>
      <title>Re: arp inspection in routed mode</title>
      <link>https://community.cisco.com/t5/network-security/arp-inspection-in-routed-mode/m-p/925399#M918665</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yes or a VLAN access-map on the whole VLAN, whatever suits you, both are mutually exclusive.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jun 2008 18:10:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/arp-inspection-in-routed-mode/m-p/925399#M918665</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-06-10T18:10:46Z</dc:date>
    </item>
    <item>
      <title>Re: arp inspection in routed mode</title>
      <link>https://community.cisco.com/t5/network-security/arp-inspection-in-routed-mode/m-p/925400#M918666</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The following link could help also if you have the required IOS software on your switch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/switches/lan/catalyst3750/software/release/12.2_25_see/configuration/guide/swdynarp.html" target="_blank"&gt;http://www.cisco.com/en/US/docs/switches/lan/catalyst3750/software/release/12.2_25_see/configuration/guide/swdynarp.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jun 2008 18:32:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/arp-inspection-in-routed-mode/m-p/925400#M918666</guid>
      <dc:creator>Amadou TOURE</dc:creator>
      <dc:date>2008-06-10T18:32:15Z</dc:date>
    </item>
    <item>
      <title>Re: arp inspection in routed mode</title>
      <link>https://community.cisco.com/t5/network-security/arp-inspection-in-routed-mode/m-p/925401#M918667</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the feedback&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was wondering if it is possible using VACL, to limit access based on both the host's IP AND MAC address, since using a mac list on the port blocks mac address, but doesnt check IP addresses. I hope arp inspection can be made available on the ASA routed mode.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jun 2008 20:28:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/arp-inspection-in-routed-mode/m-p/925401#M918667</guid>
      <dc:creator>mo shea</dc:creator>
      <dc:date>2008-06-10T20:28:54Z</dc:date>
    </item>
    <item>
      <title>Re: arp inspection in routed mode</title>
      <link>https://community.cisco.com/t5/network-security/arp-inspection-in-routed-mode/m-p/925402#M918669</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Its possible, but there is a very important Caveat, which I should have mentioned earlier, this is true for both mac ACLs on layer 2 (port ACLs) and mac ACLs inside Vlan Access Lists (VACLs):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"IP packets are matched against standard or extended IP access lists. *Non-IP packets* are only matched against named MAC extended access lists."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ARP Inspection option on the switch is also a good suggestion made by amad.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jun 2008 06:37:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/arp-inspection-in-routed-mode/m-p/925402#M918669</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-06-11T06:37:29Z</dc:date>
    </item>
  </channel>
</rss>

