Cisco IP Communicator (ARP spoofing issue)

I’m at a complete loss. I’ve been using Comodo FW and D+ for roughly 3yrs and have enjoyed it but I have hit a brick wall with Cisco’s IP Communicator. I have had the Communicator set up on other laptops with Comodo before with no problems.

The Communicator works great if I disable the Comodo FW, once I enable the FW the Communicator will NOT register. For a last resort I put the FW in training mode and that didn’t work. For the rules I allowed anything for the Communicator and it didn’t work.

I did a netstat -an and looked for any extra ports or IP’s. Also looked at the Firewall events…nothing there, and watched Comodo’s Active Connections…nothing new there.

I’m starting to think there is a application I’m not allowing to get through. I’m hoping someone here has had exp setting up IP communicator. I have run Sys Internals Process Explorer and didn’t notice anything different.

Please let there be some simple fix. Thanks for your help and time :slight_smile:

Hi Ieke,

There are a few options here;

-The IP Communicator needs inbound traffic and that could be blocked depending on your global rules setup
-The IP Communicator uses fragmented traffic and that gets blocked by the FW if the option is set on the advanced page.
-There is a FW rule in place that blocks some traffic of the IP Com.

Can you please post your CIS version your using?
Check your FW global rules to see if there is a blocking rule there that might cause issues (probably incoming traffic blocked)
Check if you have ‘block fragmented traffic’ enabled on the advanced FW settings
Make sure to verify the Firewall policy for the IP Com executable(s) and see if they are set to ‘Trusted Application’ which would allow both incoming and outgoing traffic from IP Com.

Please also note this;

Note: The Cisco CallManager sends keepalive acknowledge messages to the registered devices once every 30 seconds. If Cisco IP Communicator is behind a firewall, or if there is some Access Control List(ACL) configured in the network, the keepalive traffic between the Cisco CallManager and IP Communicator is blocked. In this case, make sure that the firewall/ACL is configured to pass TFTP and RTP traffic using the appropriate port range.
Source [url=http://www.cisco.com/en/US/products/sw/voicesw/ps5475/products_tech_note09186a008026d36f.shtml]Cisco Documentation[/url]

I’m using CIS 5.5.195786.1383

I’m going to go thru the settings now and pray one of them works. I did allow fragmented IP’s through and that didn’t work. I’ll work on the others now.

Thanks for the quick response.

Well it came down to the unchecking the “Protect the ARP Cache”. I verified it by checking it and then trying to launch the Communicator. I left the “Block Fragmented IP datagrams” unchecked as well.

Now I’m trying to figure out why the ARP cache setting is preventing the IP communicator from registering.

Thank you for your help.

This should be because a IP is overwritten by a new MAC address, maybe the IP Com takes over all traffic from your local router?

Can you do the following in a command-box, show the arp table before connecting and show one while connected with the IP Com.


arp -a

Before IP Com is running

Interface: 10.150.0.166 — 0xb
Internet Address Physical Address Type
10.150.0.1 68-ef-bd-3a-9d-70 dynamic
10.150.0.6 00-e0-4c-68-74-bb dynamic
10.150.0.51 d8-30-62-56-c0-7c dynamic
10.150.0.52 90-4c-e5-a8-f9-0b dynamic
10.150.0.58 c8-bc-c8-b9-a0-81 dynamic
10.150.0.164 00-23-15-5d-28-20 dynamic
10.150.0.168 d8-a2-5e-98-70-c0 dynamic
10.150.0.169 04-0c-ce-d7-6e-30 dynamic
10.150.0.170 64-31-50-67-6d-13 dynamic
10.150.0.255 ff-ff-ff-ff-ff-ff static
224.0.0.2 01-00-5e-00-00-02 static
224.0.0.22 01-00-5e-00-00-16 static
224.0.0.251 01-00-5e-00-00-fb static
224.0.0.252 01-00-5e-00-00-fc static
229.55.150.208 01-00-5e-37-96-d0 static
239.255.255.250 01-00-5e-7f-ff-fa static
255.255.255.255 ff-ff-ff-ff-ff-ff static

Interface: 10.150.0.200 — 0x16
Internet Address Physical Address Type
10.150.0.1 00-30-44-09-8e-72 dynamic
10.150.0.52 00-30-44-09-8e-72 dynamic
10.150.0.164 00-30-44-09-8e-72 dynamic
10.150.0.170 00-30-44-09-8e-72 dynamic
10.150.0.255 ff-ff-ff-ff-ff-ff static
224.0.0.22 01-00-5e-00-00-16 static
224.0.0.252 01-00-5e-00-00-fc static
229.55.150.208 01-00-5e-37-96-d0 static
239.255.255.250 01-00-5e-7f-ff-fa static

**** And after IP Comm is running ****

Interface: 10.150.0.166 — 0xb
Internet Address Physical Address Type
10.150.0.1 68-ef-bd-3a-9d-70 dynamic
10.150.0.6 00-e0-4c-68-74-bb dynamic
10.150.0.51 d8-30-62-56-c0-7c dynamic
10.150.0.52 90-4c-e5-a8-f9-0b dynamic
10.150.0.58 c8-bc-c8-b9-a0-81 dynamic
10.150.0.164 00-23-15-5d-28-20 dynamic
10.150.0.168 d8-a2-5e-98-70-c0 dynamic
10.150.0.169 04-0c-ce-d7-6e-30 dynamic
10.150.0.170 64-31-50-67-6d-13 dynamic
10.150.0.255 ff-ff-ff-ff-ff-ff static
224.0.0.2 01-00-5e-00-00-02 static
224.0.0.22 01-00-5e-00-00-16 static
224.0.0.251 01-00-5e-00-00-fb static
224.0.0.252 01-00-5e-00-00-fc static
229.55.150.208 01-00-5e-37-96-d0 static
239.255.255.250 01-00-5e-7f-ff-fa static
255.255.255.255 ff-ff-ff-ff-ff-ff static

Interface: 10.150.0.200 — 0x16
Internet Address Physical Address Type
10.150.0.1 00-30-44-09-8e-72 dynamic
10.150.0.52 00-30-44-09-8e-72 dynamic
10.150.0.164 00-30-44-09-8e-72 dynamic
10.150.0.170 00-30-44-09-8e-72 dynamic
10.150.0.255 ff-ff-ff-ff-ff-ff static
224.0.0.22 01-00-5e-00-00-16 static
224.0.0.252 01-00-5e-00-00-fc static
229.55.150.208 01-00-5e-37-96-d0 static
239.255.255.250 01-00-5e-7f-ff-fa static

Is this with ‘protect ARP cache’ disabled? there is no difference here, there is no visible reason why ‘protect ARP cache’ should block here…

oops, I forgot to turn ARP protection back on.

Let me try this again. :stuck_out_tongue:

There was one difference it. IP 10.150.0.1

Before IP Comm and protected ARP.

Interface: 10.150.0.200 — 0x16
Internet Address Physical Address Type
10.150.0.1 00-30-44-09-8e-72 dynamic
10.150.0.52 00-30-44-09-8e-72 dynamic
10.150.0.164 00-30-44-09-8e-72 dynamic
10.150.0.170 00-30-44-09-8e-72 dynamic
10.150.0.255 ff-ff-ff-ff-ff-ff static
224.0.0.22 01-00-5e-00-00-16 static
224.0.0.252 01-00-5e-00-00-fc static
229.55.150.208 01-00-5e-37-96-d0 static
239.255.255.250 01-00-5e-7f-ff-fa static

*** After IP Comm with ARP protection turned ON

Interface: 10.150.0.200 — 0x16
Internet Address Physical Address Type
10.150.0.52 00-30-44-09-8e-72 dynamic
10.150.0.164 00-30-44-09-8e-72 dynamic
10.150.0.170 00-30-44-09-8e-72 dynamic
10.150.0.255 ff-ff-ff-ff-ff-ff static
224.0.0.22 01-00-5e-00-00-16 static
224.0.0.252 01-00-5e-00-00-fc static
229.55.150.208 01-00-5e-37-96-d0 static
239.255.255.250 01-00-5e-7f-ff-fa static

Yes and that’s probably the ‘default gateway’ causing the issues.
Just before and after it seems to have the same MAC so I suspect a bug here.
I’ll notify dev’s to have a look at this post.

Can you please post the version and servicepack level of Windows your using?
Preferably also the make and model of the network adapter used.

Grrrr I had everything typed out and the connection timed out.

I’m using Win 7 pro x64, SP1
Realtek PCIe GBE NIC
HP Pavilion dm4 laptop
Cisco VPN client 5.0.07.0290

I cleared the arp cache and ran the comparison again. I enabled ARP protection and tried running IP comm. The 10.150.0.200 (Cisco VPN) Interface failed to show up in the cache.

I cleared the arp cache again and DISABLED ARP protection and ran IP comm and the 10.150.0.200 Interface showed up.

Why would ARP protection block the VPN Interface (10.150.0.200)?

thanks again for all your help.