[nsp] ARP filtering
    Oliver Boehmer (oboehmer) 
    oboehmer at cisco.com
       
    Mon Jul 12 11:40:00 EDT 2004
    
    
  
> 
> We limit customers in shared VLANs by filtering IP addresses on the
> switch. ie.
> 
> ip access-list ex CUST_EXAMPLE
>   permit ip 192.168.0.0 0.0.0.31
>   deny ip any any
> 
> However, it's my understandig that this will still allow ARP replies
> from outside the specified IP range, that will populate the MAC
> address tables in the switch and the end-station/router. For ingress
> ACLs this could result in traffic being sent to the rouge machine
> (but never being allowed back), or in the case of ingress and egress
> ACLs, the dropping all traffic.
> 
> Is there anyway to stop this happening?
I don't think there is a way filtering legitimit ARP replies. But why
are you allowing "rogue" machines on the LAN if you don't want them to
communicate?
	oli
    
    
More information about the cisco-nsp
mailing list