<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ARP spoofing solution in Panorama Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/panorama-discussions/arp-spoofing-solution/m-p/538166#M1468</link>
    <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/225048"&gt;@ParkerFoster&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Strict IP Address Check&lt;/SPAN&gt; under the Zone Protection Profile is a more strict version of &lt;SPAN&gt;Spoofed IP Address.&amp;nbsp; Click on the ? in the upper right to see the details.&amp;nbsp; Those options correspond to uRPF and Strict uRPF in the general sense.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The NGFW does not mitigate ARP spoofing.&amp;nbsp; That should be done on a switch so that it can protect all devices connected to the switch.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;With regard to scalability, someone manually configures the IP address of every device.&amp;nbsp; You could add an extra step to configure the MAC table, or consider moving everything to DHCP.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Tom&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 10 Apr 2023 20:04:41 GMT</pubDate>
    <dc:creator>TomYoung</dc:creator>
    <dc:date>2023-04-10T20:04:41Z</dc:date>
    <item>
      <title>ARP spoofing solution</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/arp-spoofing-solution/m-p/533391#M1392</link>
      <description>&lt;P&gt;Looking for a solution for ARP spoofing within a network to protect against MiM attacks. Our security team has asked us to implement such a solution after performing successful MiM ARP spoofing within a segment, simulating a compromised host.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;All network segments in the data center use the PA as the gateway. The switch VLAN's are L2 only. If the switches were L3 VLANs I could look at Dynamic ARP inspection and DHCP snooping.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I've started looking at PA zone protection but uncertain if it would work and specifically what I need to configure.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any ideas / links / experience?&lt;/P&gt;</description>
      <pubDate>Tue, 07 Mar 2023 01:03:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/arp-spoofing-solution/m-p/533391#M1392</guid>
      <dc:creator>ParkerFoster</dc:creator>
      <dc:date>2023-03-07T01:03:43Z</dc:date>
    </item>
    <item>
      <title>Re: ARP spoofing solution</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/arp-spoofing-solution/m-p/533400#M1393</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/225048"&gt;@ParkerFoster&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You don't need L3 switches to do DAI and DHCP Snooping.&amp;nbsp; They can be configured on L2 switches.&amp;nbsp; It works like this:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Configure DHCP Snooping and Dynamic ARP Inspection (DAI) on your VLANs.&lt;/LI&gt;
&lt;LI&gt;Configure your trusted port to the DHCP server.&lt;/LI&gt;
&lt;LI&gt;Configure static entries for your static IP addresses or change them to DHCP.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;The switch will build the DHCP Snooping binding table.&amp;nbsp; Any ARP response that does not match the IP-MAC pair in the table is dropped.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Mon, 10 Apr 2023 19:46:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/arp-spoofing-solution/m-p/533400#M1393</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2023-04-10T19:46:41Z</dc:date>
    </item>
    <item>
      <title>Re: ARP spoofing solution</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/arp-spoofing-solution/m-p/538156#M1467</link>
      <description>&lt;P&gt;Thanks Tom, sorry for the delayed response and thanks for your response. Two factors affecting this as a workable / scalable solution are 1) we don't use DHCP in our data centers and 2) using static MAC tables simply isn't scalable for the data center. I'm hoping Palo Zome Protection, and specifically strict IP check in Packet Protection will help.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Apr 2023 18:02:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/arp-spoofing-solution/m-p/538156#M1467</guid>
      <dc:creator>ParkerFoster</dc:creator>
      <dc:date>2023-04-10T18:02:53Z</dc:date>
    </item>
    <item>
      <title>Re: ARP spoofing solution</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/arp-spoofing-solution/m-p/538166#M1468</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/225048"&gt;@ParkerFoster&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Strict IP Address Check&lt;/SPAN&gt; under the Zone Protection Profile is a more strict version of &lt;SPAN&gt;Spoofed IP Address.&amp;nbsp; Click on the ? in the upper right to see the details.&amp;nbsp; Those options correspond to uRPF and Strict uRPF in the general sense.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The NGFW does not mitigate ARP spoofing.&amp;nbsp; That should be done on a switch so that it can protect all devices connected to the switch.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;With regard to scalability, someone manually configures the IP address of every device.&amp;nbsp; You could add an extra step to configure the MAC table, or consider moving everything to DHCP.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Tom&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Apr 2023 20:04:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/arp-spoofing-solution/m-p/538166#M1468</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2023-04-10T20:04:41Z</dc:date>
    </item>
    <item>
      <title>Re: ARP spoofing solution</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/arp-spoofing-solution/m-p/538173#M1469</link>
      <description>&lt;P&gt;Hey Tom, thanks so much for your input. One concern I have is the switch doesn't have a L3 SVI, it is L2 only. I know you said it works on L2 switch VLAN interfaces but I don't understand how a switch can enforce ARP restrictions when it sees no ARP for the VLAN.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I was thinking more about this, and if it does work, my primary concern is to protect the gateway itself, so perhaps this is do-able without worrying about scaling. Example:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;arp access-list Vlan84-Gateway-Protect&lt;BR /&gt;permit ip host 10.100.84.1 mac host xxx.xxx.xxx.xxx&amp;nbsp; &amp;nbsp; &amp;nbsp;!! assign static entry for Palo FW gateway only !!&lt;BR /&gt;deny ip host 10.100.84.1 mac any&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; !! deny anyone else from gateway MAC !!&lt;BR /&gt;permit ip any mac any&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;!! permit all others !!&lt;/P&gt;</description>
      <pubDate>Mon, 10 Apr 2023 21:35:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/arp-spoofing-solution/m-p/538173#M1469</guid>
      <dc:creator>ParkerFoster</dc:creator>
      <dc:date>2023-04-10T21:35:19Z</dc:date>
    </item>
  </channel>
</rss>

