03-28-2015 09:51 AM - edited 03-07-2019 11:17 PM
3 switches in the same broadcast domain (transparent mode), approx 200 vlans. Trunk links between switches allow all vlans 1-4096
I setup arp inspection for 1 particular vlan to troubleshoot an arp server issue, possibly an unintentionally arp MITM. Setup as follows:
ip arp inspection vlan 100
!
arp access-list DAI
permit ip any mac any
!
!
ip arp inspection filter DAI vlan 100
!
ip arp inspection vlan 100 logging acl-match matchlog
Once enabled some of the servers in each switch on vlan100 went into error disable mode and the Port channel between switches went into error disabled status, once I removed "no ip inspection vlan 100" and shut/no shut on the Port channel the Port channel came back up and I had to wade through and shut/no shut on all the error disabled server ports everything was back to normal.
Am I right saying the problem was caused by not setting the Port Channels between switches to "arp inspection trust" and should I just leave all the server ports to untrusted (default). i.e for all inter switch links
conf t
int Po200
ip arp inspection trust
end
then leave everything else is? Would this make the problem go away. I can't try now as Production kit, don't really have an ideal UAT lab as such yet.
03-28-2015 12:35 PM
Hello stephendrkw,
I believe you are right about the port channel causing the outage.
Typically all host ports would be configured as untrusted and all switchports connected to other switches would be trusted. Configuring a port as untrusted when it should be trusted, can cause an outage.
If you suspect a MITM attack, you can go to a pc that you think may be sending the ip traffic to the wrong mac and at the command prompt, type "arp -a 192.168.1.1" and verify it has the correct mac address mapped to the ip address. If it has the wrong mac, you can login to the switch then "show mac address-table address xxxx.xxxx.xxxx to locate the source of the MITM attack.
On the switch side, you can type "show arp | i 192.168.1.1" and "show arp | i "mac address" to verify what mac is binded to the ip address.
Hope this helps....
03-29-2015 01:59 PM
Thanks, I give the Port channel command a try I did think this was the case (switch inter links - trust) but wanted to share, the other suggestion I was aware but most servers are bonding on these switches not easy to identify, 400 odd hosts on vlanx.
Thanks.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide