<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Dustin, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/disbling-proxy-arp/m-p/3096029#M133202</link>
    <description>&lt;P&gt;Hi Dustin,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Any reason to turn off this feature.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Proxy ARP is used when a device responds to an ARP request with its own MAC address, even though the device does not own the IP address. The adaptive security appliance uses proxy ARP when you configure NAT and specify a mapped address that is on the same network as the adaptive security appliance interface. &lt;STRONG&gt;The only way traffic can reach the hosts is if the adaptive security appliance uses proxy ARP to claim that the adaptive security appliance MAC address is assigned to destination mapped addresses.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa83/asdm63/configuration_guide/config/route_overview.html#wp1106863&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Aditya&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Please rate helpful and mark correct answers&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 17 Aug 2017 11:18:55 GMT</pubDate>
    <dc:creator>Aditya Ganjoo</dc:creator>
    <dc:date>2017-08-17T11:18:55Z</dc:date>
    <item>
      <title>Disbling Proxy Arp</title>
      <link>https://community.cisco.com/t5/network-security/disbling-proxy-arp/m-p/3096028#M133200</link>
      <description>&lt;P&gt;I have an ASA interface in which Proxy Arp is still enabled for some reason. If I turn this off for this interface, will there be any type of down time for resources or blips when this is done?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:50:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disbling-proxy-arp/m-p/3096028#M133200</guid>
      <dc:creator>Dustin Flint</dc:creator>
      <dc:date>2019-03-12T09:50:18Z</dc:date>
    </item>
    <item>
      <title>Hi Dustin,</title>
      <link>https://community.cisco.com/t5/network-security/disbling-proxy-arp/m-p/3096029#M133202</link>
      <description>&lt;P&gt;Hi Dustin,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Any reason to turn off this feature.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Proxy ARP is used when a device responds to an ARP request with its own MAC address, even though the device does not own the IP address. The adaptive security appliance uses proxy ARP when you configure NAT and specify a mapped address that is on the same network as the adaptive security appliance interface. &lt;STRONG&gt;The only way traffic can reach the hosts is if the adaptive security appliance uses proxy ARP to claim that the adaptive security appliance MAC address is assigned to destination mapped addresses.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa83/asdm63/configuration_guide/config/route_overview.html#wp1106863&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Aditya&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Please rate helpful and mark correct answers&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Aug 2017 11:18:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disbling-proxy-arp/m-p/3096029#M133202</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2017-08-17T11:18:55Z</dc:date>
    </item>
    <item>
      <title>Yes, proxy arp has caused</title>
      <link>https://community.cisco.com/t5/network-security/disbling-proxy-arp/m-p/3096030#M133203</link>
      <description>&lt;P&gt;Yes, proxy arp has caused problems for us in the past. It mainly causes problems when trying to reach devices.&lt;/P&gt;
&lt;P&gt;For example, I have an ME3800 switch I cant reach via ssh. I could 2 weeks go, up until I put another switch in, then I could no longer reach the 3800. They have different ip addresses, but when you do an arp lookup, they both show as having the same arp address. This has caused us huge problems in the past, especially in our virtual environment.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Also, most engineers I have talked to said if proxy arp is on by default when ever they are deploying new equipmnet, the first thing they do is turn it off.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Aug 2017 11:43:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disbling-proxy-arp/m-p/3096030#M133203</guid>
      <dc:creator>Dustin Flint</dc:creator>
      <dc:date>2017-08-17T11:43:23Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/disbling-proxy-arp/m-p/3096031#M133204</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If that's the issue you can turn off the proxy-arp on that interface.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Also, the switch you were not able to reach through SSH, does it have any NAT on the ASA?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If yes, you can disable proxy-arp on the particular NAT statement.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Aditya&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Please rate helpful and mark correct answers&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Aug 2017 14:01:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disbling-proxy-arp/m-p/3096031#M133204</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2017-08-17T14:01:40Z</dc:date>
    </item>
    <item>
      <title>I dont need NAT on the</title>
      <link>https://community.cisco.com/t5/network-security/disbling-proxy-arp/m-p/3096032#M133205</link>
      <description>&lt;P&gt;I dont need NAT on the interface for switch I am going too. I am trying to reach via the local subnet, so the traffic shouldnt pass through firewall. Thats where the problem of the firewall interface showing as the arp address for that device comes into play.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Aug 2017 14:04:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disbling-proxy-arp/m-p/3096032#M133205</guid>
      <dc:creator>Dustin Flint</dc:creator>
      <dc:date>2017-08-17T14:04:44Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/disbling-proxy-arp/m-p/3096033#M133206</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;In that case, you can turn off this feature.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Just to emphasize the role of Proxy-ARP on ASA:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;When you disable proxy arp on the inside (or any other) interface, make sure that you are not doing any NAT on that interface i.e. static (&lt;G class="gr_ gr_408 gr-alert gr_gramm gr_inline_cards gr_run_anim Style replaceWithoutSep" id="408" data-gr-id="408"&gt;DMZ,inside&lt;/G&gt;) for example. The moment you disable proxy arp, the firewall will stop proxy-&lt;G class="gr_ gr_285 gr-alert gr_spell gr_inline_cards gr_disable_anim_appear ContextualSpelling ins-del multiReplace" id="285" data-gr-id="285"&gt;arping&lt;/G&gt; for the valid IP addresses it is hosting through NAT. So, in the above scenario, the firewall will not respond to the NATTED IP of the DMZ server.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Reference:&lt;/P&gt;
&lt;P&gt;https://supportforums.cisco.com/discussion/10942001/cisco-asa-arp-poison&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Aditya&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Please rate helpful and mark correct answers&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Aug 2017 14:38:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disbling-proxy-arp/m-p/3096033#M133206</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2017-08-17T14:38:15Z</dc:date>
    </item>
  </channel>
</rss>

