<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: ARP CACHE POISONING in ExtremeWireless (WiNG)</title>
    <link>https://community.extremenetworks.com/t5/extremewireless-wing/arp-cache-poisoning/m-p/60442#M5339</link>
    <description>Exactly. Put the Access Points with port configuration in hybrid mode. The Untagged VLAN is where the L2 traffic of the controller will pass. SSID traffic must pass through specific tagged VLANs.&lt;BR /&gt;
&lt;BR /&gt;
 These ARP Poisoning (and many others) errors occur here and are only in places where my network is flat.&lt;BR /&gt;</description>
    <pubDate>Fri, 27 Jul 2018 17:19:00 GMT</pubDate>
    <dc:creator>Richard_Augusto</dc:creator>
    <dc:date>2018-07-27T17:19:00Z</dc:date>
    <item>
      <title>ARP CACHE POISONING</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/arp-cache-poisoning/m-p/60430#M5327</link>
      <description>Hello Community,&lt;BR /&gt;
&lt;BR /&gt;
I use ip mac conflict log only. AP75XX/AP65XX. WING 5.8.6+/5.9+.&lt;BR /&gt;
Recently, in several deployments I saw a lot of this type of logs messages:&lt;BR /&gt;
&lt;BR /&gt;
...%DATAPLANE-4-ARPPOISON: ARP CACHE POISONING:  Conflicting snoop entry found :Ethernet Src Mac: ....., Ethernet Dst Mac: FF-FF-FF-FF-FF-FF, ARP Src Mac: ...., ARP Dst Mac: 00-00-00-00-00-00, ARP Src IP: ...., ARP Target IP: ...., Snoop Table MAC = ...., Snoop Table IP = ....&lt;BR /&gt;
&lt;BR /&gt;
It seems the router is flooding some different info about mac adress table info with AP.&lt;BR /&gt;
Can it cause any network issues ?&lt;BR /&gt;
&lt;BR /&gt;
Thanks,&lt;BR /&gt;
&lt;BR /&gt;
Aviv Kedem</description>
      <pubDate>Sat, 09 Dec 2017 23:39:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/arp-cache-poisoning/m-p/60430#M5327</guid>
      <dc:creator>Aviv_Kedem</dc:creator>
      <dc:date>2017-12-09T23:39:00Z</dc:date>
    </item>
    <item>
      <title>RE: ARP CACHE POISONING</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/arp-cache-poisoning/m-p/60431#M5328</link>
      <description>At this moment i dont have de document,  but can you find a best practice firewall for wingx .</description>
      <pubDate>Sun, 10 Dec 2017 03:14:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/arp-cache-poisoning/m-p/60431#M5328</guid>
      <dc:creator>JESUS_REYES_DIA</dc:creator>
      <dc:date>2017-12-10T03:14:00Z</dc:date>
    </item>
    <item>
      <title>RE: ARP CACHE POISONING</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/arp-cache-poisoning/m-p/60432#M5329</link>
      <description>Hello Jesus,&lt;BR /&gt;
I would be happy to receive an answer for the question I asked.&lt;BR /&gt;
It's not about best practice.&lt;BR /&gt;
&lt;BR /&gt;
Regards,&lt;BR /&gt;
&lt;BR /&gt;
Aviv&lt;BR /&gt;</description>
      <pubDate>Sun, 10 Dec 2017 03:14:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/arp-cache-poisoning/m-p/60432#M5329</guid>
      <dc:creator>Aviv_Kedem</dc:creator>
      <dc:date>2017-12-10T03:14:00Z</dc:date>
    </item>
    <item>
      <title>RE: ARP CACHE POISONING</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/arp-cache-poisoning/m-p/60433#M5330</link>
      <description>HI Aviv,&lt;BR /&gt;
&lt;BR /&gt;
it rather depends on the source address - you see that destination is FF::FF / 00::00 which looks like &lt;A href="https://wiki.wireshark.org/Gratuitous_ARP" target="_blank" rel="nofollow noreferrer noopener"&gt;Gratuitous ARP&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
Try to search for the source and if found, confirm you do not have IP conflict.&lt;BR /&gt;
&lt;BR /&gt;
Regards,&lt;BR /&gt;
Ondrej</description>
      <pubDate>Mon, 11 Dec 2017 18:11:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/arp-cache-poisoning/m-p/60433#M5330</guid>
      <dc:creator>Ondrej_Lepa</dc:creator>
      <dc:date>2017-12-11T18:11:00Z</dc:date>
    </item>
    <item>
      <title>RE: ARP CACHE POISONING</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/arp-cache-poisoning/m-p/60434#M5331</link>
      <description>Hello Ondrej,&lt;BR /&gt;
&lt;BR /&gt;
We do not have IP conflict but still have a lot of these messages.&lt;BR /&gt;
It seems that router is fluding different L2 data .&lt;BR /&gt;
&lt;BR /&gt;
Any ideas?&lt;BR /&gt;
&lt;BR /&gt;
Thanks,&lt;BR /&gt;
&lt;BR /&gt;
Aviv&lt;BR /&gt;</description>
      <pubDate>Mon, 11 Dec 2017 18:11:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/arp-cache-poisoning/m-p/60434#M5331</guid>
      <dc:creator>Aviv_Kedem</dc:creator>
      <dc:date>2017-12-11T18:11:00Z</dc:date>
    </item>
    <item>
      <title>RE: ARP CACHE POISONING</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/arp-cache-poisoning/m-p/60435#M5332</link>
      <description>Well, if you see those hits it mean that internal firewall detected those and took action.&lt;BR /&gt;
I would not say this is something you'll fix on the AP.&lt;BR /&gt;
&lt;BR /&gt;
Regards,&lt;BR /&gt;
Ondrej&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Mon, 11 Dec 2017 18:11:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/arp-cache-poisoning/m-p/60435#M5332</guid>
      <dc:creator>Ondrej_Lepa</dc:creator>
      <dc:date>2017-12-11T18:11:00Z</dc:date>
    </item>
    <item>
      <title>RE: ARP CACHE POISONING</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/arp-cache-poisoning/m-p/60436#M5333</link>
      <description>Do you use a firewall cluster? See this offend, if two MAC address share the same IP. This is mostly, if it's a cluster.&lt;BR /&gt;
&lt;BR /&gt;
If you use a cluster you can set "ip arp trust" to the interface or disable the check under the firewall policy:&lt;BR /&gt;
no ip-mac conflict&lt;BR /&gt;
&lt;BR /&gt;
no ip-mac routing conflict&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Mon, 11 Dec 2017 18:11:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/arp-cache-poisoning/m-p/60436#M5333</guid>
      <dc:creator>Timo1</dc:creator>
      <dc:date>2017-12-11T18:11:00Z</dc:date>
    </item>
    <item>
      <title>RE: ARP CACHE POISONING</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/arp-cache-poisoning/m-p/60437#M5334</link>
      <description>Many thanks guys.&lt;BR /&gt;
&lt;BR /&gt;
Aviv</description>
      <pubDate>Mon, 11 Dec 2017 18:11:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/arp-cache-poisoning/m-p/60437#M5334</guid>
      <dc:creator>Aviv_Kedem</dc:creator>
      <dc:date>2017-12-11T18:11:00Z</dc:date>
    </item>
    <item>
      <title>RE: ARP CACHE POISONING</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/arp-cache-poisoning/m-p/60438#M5335</link>
      <description>Hello All,&lt;BR /&gt;
&lt;BR /&gt;
This issue may appear if used vc for ap6532 + other vc for ap7532 on the same vlan?&lt;BR /&gt;
We need it for configuration provosioning of these two models of ap.&lt;BR /&gt;
&lt;BR /&gt;
Thanks,&lt;BR /&gt;
&lt;BR /&gt;
Aviv&lt;BR /&gt;</description>
      <pubDate>Sun, 28 Jan 2018 14:21:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/arp-cache-poisoning/m-p/60438#M5335</guid>
      <dc:creator>Aviv_Kedem</dc:creator>
      <dc:date>2018-01-28T14:21:00Z</dc:date>
    </item>
    <item>
      <title>RE: ARP CACHE POISONING</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/arp-cache-poisoning/m-p/60439#M5336</link>
      <description>With best practice all its ok</description>
      <pubDate>Thu, 26 Jul 2018 22:45:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/arp-cache-poisoning/m-p/60439#M5336</guid>
      <dc:creator>Joffre_Flores</dc:creator>
      <dc:date>2018-07-26T22:45:00Z</dc:date>
    </item>
    <item>
      <title>RE: ARP CACHE POISONING</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/arp-cache-poisoning/m-p/60440#M5337</link>
      <description>Hello,&lt;BR /&gt;
&lt;BR /&gt;
These Firewall (L2) Logs occur when the controller is running on the same data VLAN of an environment (which has servers, cameras, printers, and so on). &lt;BR /&gt;
&lt;BR /&gt;
In my case, when I segmented the controller network into a separate VLAN (where it only has L2 traffic from the APs and controller), the problems have stopped.&lt;BR /&gt;
&lt;BR /&gt;
  I recommend doing a rework on the internal network, creating native / untagged VLANs to exchange traffic between controller and access point. The problems will disappear.&lt;BR /&gt;</description>
      <pubDate>Fri, 27 Jul 2018 17:19:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/arp-cache-poisoning/m-p/60440#M5337</guid>
      <dc:creator>Richard_Augusto</dc:creator>
      <dc:date>2018-07-27T17:19:00Z</dc:date>
    </item>
    <item>
      <title>RE: ARP CACHE POISONING</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/arp-cache-poisoning/m-p/60441#M5338</link>
      <description>Hello Richard Augusto,&lt;BR /&gt;
&lt;BR /&gt;
Do you mean a have to separate the controller vlan and the wlan traffic vlan?&lt;BR /&gt;
&lt;BR /&gt;
Thanks,&lt;BR /&gt;
&lt;BR /&gt;
Aviv&lt;BR /&gt;</description>
      <pubDate>Fri, 27 Jul 2018 17:19:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/arp-cache-poisoning/m-p/60441#M5338</guid>
      <dc:creator>Aviv_Kedem</dc:creator>
      <dc:date>2018-07-27T17:19:00Z</dc:date>
    </item>
    <item>
      <title>RE: ARP CACHE POISONING</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/arp-cache-poisoning/m-p/60442#M5339</link>
      <description>Exactly. Put the Access Points with port configuration in hybrid mode. The Untagged VLAN is where the L2 traffic of the controller will pass. SSID traffic must pass through specific tagged VLANs.&lt;BR /&gt;
&lt;BR /&gt;
 These ARP Poisoning (and many others) errors occur here and are only in places where my network is flat.&lt;BR /&gt;</description>
      <pubDate>Fri, 27 Jul 2018 17:19:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/arp-cache-poisoning/m-p/60442#M5339</guid>
      <dc:creator>Richard_Augusto</dc:creator>
      <dc:date>2018-07-27T17:19:00Z</dc:date>
    </item>
    <item>
      <title>RE: ARP CACHE POISONING</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/arp-cache-poisoning/m-p/60443#M5340</link>
      <description>Hello Richard,&lt;BR /&gt;
&lt;BR /&gt;
Thank you for your support.&lt;BR /&gt;
&lt;BR /&gt;
Aviv&lt;BR /&gt;</description>
      <pubDate>Fri, 27 Jul 2018 17:19:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/arp-cache-poisoning/m-p/60443#M5340</guid>
      <dc:creator>Aviv_Kedem</dc:creator>
      <dc:date>2018-07-27T17:19:00Z</dc:date>
    </item>
  </channel>
</rss>

