<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hello Sir, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/switching-from-pix-to-asa-having-issue-with-additional-public/m-p/2888841#M153618</link>
    <description>&lt;P&gt;Hello Sir,&lt;/P&gt;
&lt;P&gt;Kindly please enable the arp permit non-connected command and that should do the trick.&lt;/P&gt;
&lt;P&gt;ciscoasa(config)# &lt;B class="cCN_CmdName"&gt;arp&lt;/B&gt; &lt;B class="cBold"&gt; permit-nonconnected&lt;/B&gt;&lt;/P&gt;
&lt;P&gt;The ASA by default from asa code 8.4.5&amp;nbsp; does not answer arp requests for subnets that are not direcly connected to the box (this means that if you do not have an interface configured in the ASA within the range 172.17.x.x or 172.18.x.x, he will reject&amp;nbsp; both incoming arp requests and responses), the command mentioned above overwrites that behavior and allows the connectivity for the subnets that are not directly connected, on the pix&amp;nbsp; and older code like 8.0,8.2 you do not see the problem and do not have the need to enable this command since the feauture is already enabled within the code, it&amp;nbsp; is integraded, but after 8.4 the feature is turned off by default.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please refer to the following docs for more information:&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference/A-H/cmdref1/a3.html#pgfId-1837762&lt;/P&gt;
&lt;P&gt;https://supportforums.cisco.com/discussion/11848306/arp-permit-nonconnected&lt;/P&gt;
&lt;P&gt;Hope this helps!&lt;/P&gt;</description>
    <pubDate>Wed, 25 May 2016 17:58:03 GMT</pubDate>
    <dc:creator>Kornelia Gutierrez</dc:creator>
    <dc:date>2016-05-25T17:58:03Z</dc:date>
    <item>
      <title>Switching from PIX to ASA, having issue with additional public subnets</title>
      <link>https://community.cisco.com/t5/network-security/switching-from-pix-to-asa-having-issue-with-additional-public/m-p/2888840#M153617</link>
      <description>&lt;P&gt;I tried switching from a PIX 515-E to an ASA 5515-X over the weekend and while initially it seemed promising ultimately I had to go back to the PIX.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;For the sake of sanitization, we'll say that with my ISP I have the following IP address space assigned to us:&lt;/P&gt;
&lt;P&gt;172.16.126.32/27 &amp;lt;-- the first block we were assigned.&lt;/P&gt;
&lt;P&gt;172.17.50.120/30 &amp;lt;-- subsequent assignment A&lt;/P&gt;
&lt;P&gt;172.18.96.216/29 &amp;lt;-- subsequent assignment B&lt;/P&gt;
&lt;P&gt;172.19.131.224/28 &amp;lt;-- subsequent assignment C&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;The ISP's upstream router has the first useable IP in all of the above blocks assigned to our VLAN interface on their equipment.&amp;nbsp; On our PIX we had &lt;STRONG&gt;172.16.126.34&lt;/STRONG&gt;&lt;STRONG&gt;&lt;/STRONG&gt; assigned to its outside interface and its default outside route pointed to &lt;STRONG&gt;172.16.126.33&lt;/STRONG&gt;.&amp;nbsp; Then for all of our other public IP needs--regardless of what block they were in--just having the &lt;STRONG&gt;nat (inside,outside)&lt;/STRONG&gt; statement was all that was needed.&amp;nbsp; For instance, we have a server in the DMZ that uses that /30 above.&amp;nbsp; In the PIX config I have &lt;STRONG&gt;nat (DMZ,outside) static 172.17.50.122 10.251.30.5 netmask 255.255.255.255 &lt;/STRONG&gt;and the server is able to get online fine.&amp;nbsp; I don't have anything in the config showing that &lt;STRONG&gt;172.17.50.121&lt;/STRONG&gt; is assigned or routed anywhere; it just worked.&amp;nbsp; Whether this is by design or by luck, I don't know, and I only bring that up in case it's part of the problem I had when I made the switch.&lt;/P&gt;
&lt;P&gt;When I first put the new ASA in I used the same information: the outside interface on the ASA had &lt;STRONG&gt;172.16.126.34&lt;/STRONG&gt; and the default route was pointed to &lt;STRONG&gt;172.16.126.33&lt;/STRONG&gt;.&amp;nbsp; I immediately was able to ping out.&amp;nbsp; I started testing my inbound access list and was able to see things in my DMZ that I'd opened up, and things started looking good.&amp;nbsp; I did notice one host's ports couldn't be reached from outside (one in the &lt;STRONG&gt;172.18.96.216/29&lt;/STRONG&gt; range) but since it was a lab server I wasn't really worried about it at that moment.&amp;nbsp; I decided to go back to my desk and finish going line by line through my access-list and making sure everything worked.&lt;/P&gt;
&lt;P&gt;Unfortunately what I found was that none of my other subnets were working.&amp;nbsp; Anything that was in the &lt;STRONG&gt;172.16.126.32/27&lt;/STRONG&gt; subnet worked fine, but I couldn't access any hosts in the other subnets, and they couldn't get online, either.&amp;nbsp; I was wondering if it may have been some routing/ARP caching issue on the ISP's upstream router, so as a test I tried changing the outside interface IP to an unused IP in another block (&lt;STRONG&gt;172.19.131.238&lt;/STRONG&gt;) and was suddenly able to get to hosts in that range, and they were able to get online themselves.&amp;nbsp; I changed the default IP back to &lt;STRONG&gt;172.16.126.34&lt;/STRONG&gt; and the &lt;STRONG&gt;172.19.131.224/28 &lt;/STRONG&gt;subnet continued to work, so I thought maybe I was on to something.&amp;nbsp; However after a minute or two my outbound pings from those hosts to the internet stopped working, as did inbound pings/port access.&amp;nbsp; If I repeated the above steps they'd start working again, but they'd always stop working after a couple of minutes.&lt;/P&gt;
&lt;P&gt;Any ideas what could cause this?&amp;nbsp; Is it something that would have resolved itself on its own?&amp;nbsp; I'm really hoping I don't have to create subinterfaces&amp;nbsp;on the ASA or something, each with an IP in the above subnets.&amp;nbsp; I don't know if there's just some command that makes things like this work or if it's something known ("Yeah, the PIX used to let you do stuff like that but the ASA won't" sort of thing).&amp;nbsp; I'm working on a sanitized config to upload with this.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;**EDIT** Added config.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:47:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/switching-from-pix-to-asa-having-issue-with-additional-public/m-p/2888840#M153617</guid>
      <dc:creator>jgrover1108</dc:creator>
      <dc:date>2019-03-12T07:47:14Z</dc:date>
    </item>
    <item>
      <title>Hello Sir,</title>
      <link>https://community.cisco.com/t5/network-security/switching-from-pix-to-asa-having-issue-with-additional-public/m-p/2888841#M153618</link>
      <description>&lt;P&gt;Hello Sir,&lt;/P&gt;
&lt;P&gt;Kindly please enable the arp permit non-connected command and that should do the trick.&lt;/P&gt;
&lt;P&gt;ciscoasa(config)# &lt;B class="cCN_CmdName"&gt;arp&lt;/B&gt; &lt;B class="cBold"&gt; permit-nonconnected&lt;/B&gt;&lt;/P&gt;
&lt;P&gt;The ASA by default from asa code 8.4.5&amp;nbsp; does not answer arp requests for subnets that are not direcly connected to the box (this means that if you do not have an interface configured in the ASA within the range 172.17.x.x or 172.18.x.x, he will reject&amp;nbsp; both incoming arp requests and responses), the command mentioned above overwrites that behavior and allows the connectivity for the subnets that are not directly connected, on the pix&amp;nbsp; and older code like 8.0,8.2 you do not see the problem and do not have the need to enable this command since the feauture is already enabled within the code, it&amp;nbsp; is integraded, but after 8.4 the feature is turned off by default.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please refer to the following docs for more information:&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference/A-H/cmdref1/a3.html#pgfId-1837762&lt;/P&gt;
&lt;P&gt;https://supportforums.cisco.com/discussion/11848306/arp-permit-nonconnected&lt;/P&gt;
&lt;P&gt;Hope this helps!&lt;/P&gt;</description>
      <pubDate>Wed, 25 May 2016 17:58:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/switching-from-pix-to-asa-having-issue-with-additional-public/m-p/2888841#M153618</guid>
      <dc:creator>Kornelia Gutierrez</dc:creator>
      <dc:date>2016-05-25T17:58:03Z</dc:date>
    </item>
    <item>
      <title>I was really hoping this</title>
      <link>https://community.cisco.com/t5/network-security/switching-from-pix-to-asa-having-issue-with-additional-public/m-p/2888842#M153619</link>
      <description>&lt;P&gt;I was really hoping this would work, but apparently it didn't.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;HQ-ASA-FW# config t&lt;BR /&gt;HQ-ASA-FW(config)# arp permit-nonconnected&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; ^&lt;BR /&gt;ERROR: % Invalid input detected at '^' marker.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;After looking around online I found another discussion here:&amp;nbsp;https://supportforums.cisco.com/discussion/11797666/asa-86-allow-publishing-only-one-range-public-ip&lt;/P&gt;
&lt;P&gt;The correct answer indicates that the&amp;nbsp;&lt;STRONG&gt;arp permit-nonconnected&lt;/STRONG&gt; command is not available in 8.5(1), 8.6(1) or 8.7(1). &amp;nbsp;My ASA is 8.6(1).&lt;/P&gt;
&lt;P&gt;It appears that I'll need to have the ISP change these to routed blocks&amp;nbsp;pointed at our external interface (as I'd rather not go to an older software version on the device).&lt;/P&gt;
&lt;P&gt;Thanks for pointing me in the right direction.&lt;/P&gt;</description>
      <pubDate>Thu, 26 May 2016 14:01:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/switching-from-pix-to-asa-having-issue-with-additional-public/m-p/2888842#M153619</guid>
      <dc:creator>jgrover1108</dc:creator>
      <dc:date>2016-05-26T14:01:05Z</dc:date>
    </item>
  </channel>
</rss>

