<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Or more accurately you are in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5506-x-transparent-mode-dropping-arp-replies/m-p/2831027#M159626</link>
    <description>&lt;P&gt;Or more accurately you are missing&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;same-security-traffic permit inter-interface&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;for traffic flowing between interface with the same security level&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
    <pubDate>Sat, 13 Feb 2016 21:49:09 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2016-02-13T21:49:09Z</dc:date>
    <item>
      <title>ASA 5506-X Transparent mode dropping ARP replies</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-transparent-mode-dropping-arp-replies/m-p/2831025#M159624</link>
      <description>&lt;P&gt;Hi There,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I'm trying to configure a Cisco 5506-X running 9.5(2) as a transparent firewall in a lab:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The subnet is 10.1.50.0/24&lt;/P&gt;
&lt;P&gt;My client PC (10.1.50.2/24)&amp;nbsp; is on vlan 50&lt;/P&gt;
&lt;P&gt;My upstream router (10.1.50.1/24) is the default gateway for the subnet on vlan 2050&lt;/P&gt;
&lt;P&gt;The BVI is 10.1.50.100&lt;/P&gt;
&lt;P&gt;My upstream router has an internet connection with nat-overload on internet interface&lt;/P&gt;
&lt;P&gt;From my client PC (10.1.50.2/24)&amp;nbsp;i can ping my default gateway (upstream router 10.1.50.1/24) through the transparent firewall without issue&lt;/P&gt;
&lt;P&gt;However when I try to ping out to the internet (8.8.8.8) I get no response back&lt;/P&gt;
&lt;P&gt;When I put my Client PC (10.1.50.2/24) and upstream router (10.1.50.1/24)on the same vlan 2050 I get echo replies from 8.8.8.8&lt;/P&gt;
&lt;P&gt;I ran some captures on the inside and outside interfaces of the ASA - When I ping 8.8.8.8 from the Client PC I can see ARP requests for 8.8.8.8 on the inside interface but no replies:&lt;/P&gt;
&lt;P&gt;ciscoasa# cap caparp ethernet-type arp int inside-50 re &lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;Warning: using this option with a slow console connection may &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; result in an excessive amount of non-displayed packets &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; due to performance limitations. &lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;Use ctrl-c to terminate real-time capture &lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 1: 07:39:51.702386&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#50 P0 arp who-has 10.1.50.1 (d0:57:4c:e1:38:4f) tell 10.1.50.2 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 2: 07:39:51.704156&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#50 P0 arp reply 10.1.50.1 is-at d0:57:4c:e1:38:4f &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 3: 07:39:59.658123&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#50 P0 arp who-has 8.8.8.8 tell 10.1.50.2 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 4: 07:40:00.202641&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#50 P0 arp who-has 8.8.8.8 tell 10.1.50.2 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 5: 07:40:01.202717&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#50 P0 arp who-has 8.8.8.8 tell 10.1.50.2 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 6: 07:40:02.205571&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#50 P0 arp who-has 8.8.8.8 tell 10.1.50.2 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 7: 07:40:03.202870&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#50 P0 arp who-has 8.8.8.8 tell 10.1.50.2 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 8: 07:40:04.202900&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#50 P0 arp who-has 8.8.8.8 tell 10.1.50.2 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 9: 07:40:05.205510&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#50 P0 arp who-has 8.8.8.8 tell 10.1.50.2 &lt;BR /&gt;&amp;nbsp; 10: 07:40:06.202977&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#50 P0 arp who-has 8.8.8.8 tell 10.1.50.2 &lt;BR /&gt;&amp;nbsp; 11: 07:40:07.203053&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#50 P0 arp who-has 8.8.8.8 tell 10.1.50.2 &lt;BR /&gt;&amp;nbsp; 12: 07:40:08.205693&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#50 P0 arp who-has 8.8.8.8 tell 10.1.50.2 &lt;BR /&gt;&amp;nbsp; 13: 07:40:09.203129&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#50 P0 arp who-has 8.8.8.8 tell 10.1.50.2 &lt;BR /&gt;&amp;nbsp; 14: 07:40:10.203190&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#50 P0 arp who-has 8.8.8.8 tell 10.1.50.2 &lt;BR /&gt;&amp;nbsp; 15: 07:40:11.205769&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#50 P0 arp who-has 8.8.8.8 tell 10.1.50.2 &lt;BR /&gt;&amp;nbsp; 16: 07:40:12.203267&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#50 P0 arp who-has 8.8.8.8 tell 10.1.50.2 &lt;BR /&gt;&amp;nbsp; 17: 07:40:13.203343&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#50 P0 arp who-has 8.8.8.8 tell 10.1.50.2 &lt;BR /&gt;&amp;nbsp; 18: 07:40:14.205998&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#50 P0 arp who-has 8.8.8.8 tell 10.1.50.2 &lt;BR /&gt;&amp;nbsp; 19: 07:40:15.203511&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#50 P0 arp who-has 8.8.8.8 tell 10.1.50.2 &lt;BR /&gt;&amp;nbsp; 20: 07:40:16.203480&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#50 P0 arp who-has 8.8.8.8 tell 10.1.50.2 &lt;BR /&gt;&amp;nbsp; 21: 07:40:17.206288&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#50 P0 arp who-has 8.8.8.8 tell 10.1.50.2 &lt;BR /&gt;&amp;nbsp; 22: 07:40:18.203602&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#50 P0 arp who-has 8.8.8.8 tell 10.1.50.2 &lt;BR /&gt;&amp;nbsp; 23: 07:40:19.203694&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#50 P0 arp who-has 8.8.8.8 tell 10.1.50.2 &lt;BR /&gt;23 packets shown. &lt;BR /&gt;0 packets not shown due to performance limitations.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;However on the outside interface I can see ARP requests for 8.8.8.8 from the Clint PC and replies back from my upstream router (10.1.50.1/24 - d0:57:4c:e1:38:4f ) leading me to believe that the firewall is blocking the ARP replies:&lt;/P&gt;
&lt;P&gt;ciscoasa# cap caparp ethernet-type arp int outside-50 re &lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;Warning: using this option with a slow console connection may &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; result in an excessive amount of non-displayed packets &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; due to performance limitations. &lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;Use ctrl-c to terminate real-time capture &lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 1: 07:40:45.174292&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2050 P0 arp who-has 8.8.8.8 tell 10.1.50.2 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 2: 07:40:45.174978&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2050 P0 arp reply 8.8.8.8 is-at d0:57:4c:e1:38:4f &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 3: 07:40:45.710671&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2050 P0 arp who-has 8.8.8.8 tell 10.1.50.2 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 4: 07:40:45.711343&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2050 P0 arp reply 8.8.8.8 is-at d0:57:4c:e1:38:4f &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 5: 07:40:46.710824&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2050 P0 arp who-has 8.8.8.8 tell 10.1.50.2 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 6: 07:40:46.711511&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2050 P0 arp reply 8.8.8.8 is-at d0:57:4c:e1:38:4f &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 7: 07:40:47.714669&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2050 P0 arp who-has 8.8.8.8 tell 10.1.50.2 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 8: 07:40:47.715340&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2050 P0 arp reply 8.8.8.8 is-at d0:57:4c:e1:38:4f &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 9: 07:40:48.710824&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2050 P0 arp who-has 8.8.8.8 tell 10.1.50.2 &lt;BR /&gt;&amp;nbsp; 10: 07:40:48.711450&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2050 P0 arp reply 8.8.8.8 is-at d0:57:4c:e1:38:4f &lt;BR /&gt;&amp;nbsp; 11: 07:40:49.710900&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2050 P0 arp who-has 8.8.8.8 tell 10.1.50.2 &lt;BR /&gt;&amp;nbsp; 12: 07:40:49.711572&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2050 P0 arp reply 8.8.8.8 is-at d0:57:4c:e1:38:4f &lt;BR /&gt;&amp;nbsp; 13: 07:40:50.713570&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2050 P0 arp who-has 8.8.8.8 tell 10.1.50.2 &lt;BR /&gt;&amp;nbsp; 14: 07:40:50.714288&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2050 P0 arp reply 8.8.8.8 is-at d0:57:4c:e1:38:4f &lt;BR /&gt;&amp;nbsp; 15: 07:40:51.710992&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2050 P0 arp who-has 8.8.8.8 tell 10.1.50.2 &lt;BR /&gt;&amp;nbsp; 16: 07:40:51.711724&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2050 P0 arp reply 8.8.8.8 is-at d0:57:4c:e1:38:4f &lt;BR /&gt;&amp;nbsp; 17: 07:40:52.711053&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2050 P0 arp who-has 8.8.8.8 tell 10.1.50.2 &lt;BR /&gt;&amp;nbsp; 18: 07:40:52.711755&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2050 P0 arp reply 8.8.8.8 is-at d0:57:4c:e1:38:4f &lt;BR /&gt;&amp;nbsp; 19: 07:40:53.713677&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2050 P0 arp who-has 8.8.8.8 tell 10.1.50.2 &lt;BR /&gt;&amp;nbsp; 20: 07:40:53.714333&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2050 P0 arp reply 8.8.8.8 is-at d0:57:4c:e1:38:4f &lt;BR /&gt;&amp;nbsp; 21: 07:40:54.711129&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2050 P0 arp who-has 8.8.8.8 tell 10.1.50.2 &lt;BR /&gt;&amp;nbsp; 22: 07:40:54.711800&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2050 P0 arp reply 8.8.8.8 is-at d0:57:4c:e1:38:4f &lt;BR /&gt;&amp;nbsp; 23: 07:40:55.711190&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2050 P0 arp who-has 8.8.8.8 tell 10.1.50.2 &lt;BR /&gt;&amp;nbsp; 24: 07:40:55.711892&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2050 P0 arp reply 8.8.8.8 is-at d0:57:4c:e1:38:4f &lt;BR /&gt;&amp;nbsp; 25: 07:40:56.713860&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2050 P0 arp who-has 8.8.8.8 tell 10.1.50.2 &lt;BR /&gt;&amp;nbsp; 26: 07:40:56.714593&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2050 P0 arp reply 8.8.8.8 is-at d0:57:4c:e1:38:4f &lt;BR /&gt;&amp;nbsp; 27: 07:40:57.711343&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2050 P0 arp who-has 8.8.8.8 tell 10.1.50.2 &lt;BR /&gt;&amp;nbsp; 28: 07:40:57.711984&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2050 P0 arp reply 8.8.8.8 is-at d0:57:4c:e1:38:4f &lt;BR /&gt;&amp;nbsp; 29: 07:40:58.711388&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2050 P0 arp who-has 8.8.8.8 tell 10.1.50.2 &lt;BR /&gt;&amp;nbsp; 30: 07:40:58.713891&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2050 P0 arp reply 8.8.8.8 is-at d0:57:4c:e1:38:4f &lt;BR /&gt;&amp;nbsp; 31: 07:40:59.714028&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2050 P0 arp who-has 8.8.8.8 tell 10.1.50.2 &lt;BR /&gt;&amp;nbsp; 32: 07:40:59.716408&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2050 P0 arp reply 8.8.8.8 is-at d0:57:4c:e1:38:4f &lt;BR /&gt;&amp;nbsp; 33: 07:41:00.711465&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2050 P0 arp who-has 8.8.8.8 tell 10.1.50.2 &lt;BR /&gt;&amp;nbsp; 34: 07:41:00.715462&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2050 P0 arp reply 8.8.8.8 is-at d0:57:4c:e1:38:4f &lt;BR /&gt;&amp;nbsp; 35: 07:41:01.711572&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2050 P0 arp who-has 8.8.8.8 tell 10.1.50.2 &lt;BR /&gt;&amp;nbsp; 36: 07:41:01.712197&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2050 P0 arp reply 8.8.8.8 is-at d0:57:4c:e1:38:4f &lt;BR /&gt;&amp;nbsp; 37: 07:41:02.714135&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2050 P0 arp who-has 8.8.8.8 tell 10.1.50.2 &lt;BR /&gt;&amp;nbsp; 38: 07:41:02.715249&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2050 P0 arp reply 8.8.8.8 is-at d0:57:4c:e1:38:4f &lt;BR /&gt;&amp;nbsp; 39: 07:41:03.711663&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2050 P0 arp who-has 8.8.8.8 tell 10.1.50.2 &lt;BR /&gt;&amp;nbsp; 40: 07:41:03.712319&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2050 P0 arp reply 8.8.8.8 is-at d0:57:4c:e1:38:4f &lt;BR /&gt;40 packets shown. &lt;BR /&gt;0 packets not shown due to performance limitations.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Here is the running config - it couldn't be more basic, has anyone had this issue before and could you please advise on the solution?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ciscoasa# sho run &lt;BR /&gt;: Saved &lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;: &lt;BR /&gt;: Serial Number: JAD200406OG &lt;BR /&gt;: Hardware:&amp;nbsp;&amp;nbsp; ASA5506, 4096 MB RAM, CPU Atom C2000 series 1250 MHz, 1 CPU (4 cores) &lt;BR /&gt;: &lt;BR /&gt;ASA Version 9.5(2) &lt;BR /&gt;! &lt;BR /&gt;firewall transparent &lt;BR /&gt;hostname ciscoasa &lt;BR /&gt;enable password 8Ry2YjIyt7RRXU24 encrypted &lt;BR /&gt;names &lt;BR /&gt;! &lt;BR /&gt;interface GigabitEthernet1/1 &lt;BR /&gt;&amp;nbsp;no nameif &lt;BR /&gt;&amp;nbsp;no security-level &lt;BR /&gt;! &lt;BR /&gt;interface GigabitEthernet1/1.50 &lt;BR /&gt;&amp;nbsp;vlan 50 &lt;BR /&gt;&amp;nbsp;nameif inside-50 &lt;BR /&gt;&amp;nbsp;bridge-group 1 &lt;BR /&gt;&amp;nbsp;security-level 0 &lt;BR /&gt;! &lt;BR /&gt;interface GigabitEthernet1/1.100 &lt;BR /&gt;&amp;nbsp;vlan 100 &lt;BR /&gt;&amp;nbsp;nameif inside-100 &lt;BR /&gt;&amp;nbsp;bridge-group 2 &lt;BR /&gt;&amp;nbsp;security-level 0 &lt;BR /&gt;! &lt;BR /&gt;interface GigabitEthernet1/2 &lt;BR /&gt;&amp;nbsp;no nameif &lt;BR /&gt;&amp;nbsp;no security-level &lt;BR /&gt;! &lt;BR /&gt;interface GigabitEthernet1/2.200 &lt;BR /&gt;&amp;nbsp;vlan 200 &lt;BR /&gt;&amp;nbsp;nameif outside-100 &lt;BR /&gt;&amp;nbsp;bridge-group 2 &lt;BR /&gt;&amp;nbsp;security-level 100 &lt;BR /&gt;! &lt;BR /&gt;interface GigabitEthernet1/2.2050 &lt;BR /&gt;&amp;nbsp;vlan 2050 &lt;BR /&gt;&amp;nbsp;nameif outside-50 &lt;BR /&gt;&amp;nbsp;bridge-group 1 &lt;BR /&gt;&amp;nbsp;security-level 100 &lt;BR /&gt;! &lt;BR /&gt;interface GigabitEthernet1/3 &lt;BR /&gt;&amp;nbsp;shutdown &lt;BR /&gt;&amp;nbsp;no nameif &lt;BR /&gt;&amp;nbsp;no security-level &lt;BR /&gt;! &lt;BR /&gt;interface GigabitEthernet1/4 &lt;BR /&gt;&amp;nbsp;shutdown &lt;BR /&gt;&amp;nbsp;no nameif &lt;BR /&gt;&amp;nbsp;no security-level &lt;BR /&gt;! &lt;BR /&gt;interface GigabitEthernet1/5 &lt;BR /&gt;&amp;nbsp;shutdown &lt;BR /&gt;&amp;nbsp;no nameif &lt;BR /&gt;&amp;nbsp;no security-level &lt;BR /&gt;! &lt;BR /&gt;interface GigabitEthernet1/6 &lt;BR /&gt;&amp;nbsp;shutdown &lt;BR /&gt;&amp;nbsp;no nameif &lt;BR /&gt;&amp;nbsp;no security-level &lt;BR /&gt;! &lt;BR /&gt;interface GigabitEthernet1/7 &lt;BR /&gt;&amp;nbsp;shutdown &lt;BR /&gt;&amp;nbsp;no nameif &lt;BR /&gt;&amp;nbsp;no security-level &lt;BR /&gt;! &lt;BR /&gt;interface GigabitEthernet1/8 &lt;BR /&gt;&amp;nbsp;shutdown &lt;BR /&gt;&amp;nbsp;no nameif &lt;BR /&gt;&amp;nbsp;no security-level &lt;BR /&gt;! &lt;BR /&gt;interface Management1/1 &lt;BR /&gt;&amp;nbsp;management-only &lt;BR /&gt;&amp;nbsp;shutdown &lt;BR /&gt;&amp;nbsp;no nameif &lt;BR /&gt;&amp;nbsp;no security-level &lt;BR /&gt;&amp;nbsp;ip address 20.20.20.100 255.255.255.0 &lt;BR /&gt;! &lt;BR /&gt;interface BVI1 &lt;BR /&gt;&amp;nbsp;ip address 10.1.50.100 255.255.255.0 &lt;BR /&gt;! &lt;BR /&gt;interface BVI2 &lt;BR /&gt;&amp;nbsp;ip address 10.1.100.100 255.255.255.0 &lt;BR /&gt;! &lt;BR /&gt;ftp mode passive &lt;BR /&gt;access-list inside-50 extended permit ip any any log &lt;BR /&gt;access-list inside-100 extended permit ip any any log &lt;BR /&gt;pager lines 24 &lt;BR /&gt;logging enable &lt;BR /&gt;logging buffered debugging &lt;BR /&gt;mtu inside-50 1500 &lt;BR /&gt;mtu inside-100 1500 &lt;BR /&gt;mtu outside-100 1500 &lt;BR /&gt;mtu outside-50 1500 &lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1 &lt;BR /&gt;no asdm history enable &lt;BR /&gt;arp inside-50 8.8.8.8 d057.4ce1.384f &lt;BR /&gt;arp timeout 14400 &lt;BR /&gt;no arp permit-nonconnected &lt;BR /&gt;access-group inside-50 in interface inside-50 &lt;BR /&gt;access-group inside-100 in interface inside-100 &lt;BR /&gt;timeout xlate 3:00:00 &lt;BR /&gt;timeout pat-xlate 0:00:30 &lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02 &lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00 &lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00 &lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute &lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00 &lt;BR /&gt;timeout floating-conn 0:00:00 &lt;BR /&gt;user-identity default-domain LOCAL &lt;BR /&gt;no snmp-server location &lt;BR /&gt;no snmp-server contact &lt;BR /&gt;service sw-reset-button &lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite &lt;BR /&gt;crypto ca trustpool policy &lt;BR /&gt;telnet timeout 5 &lt;BR /&gt;no ssh stricthostkeycheck &lt;BR /&gt;ssh timeout 5 &lt;BR /&gt;ssh key-exchange group dh-group1-sha1 &lt;BR /&gt;console timeout 0 &lt;BR /&gt;threat-detection basic-threat &lt;BR /&gt;threat-detection statistics access-list &lt;BR /&gt;no threat-detection statistics tcp-intercept &lt;BR /&gt;mac-address-table static inside-50 d057.4ce1.384f &lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy &lt;BR /&gt;! &lt;BR /&gt;class-map inspection_default &lt;BR /&gt;&amp;nbsp;match default-inspection-traffic &lt;BR /&gt;! &lt;BR /&gt;! &lt;BR /&gt;policy-map type inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp;parameters &lt;BR /&gt;&amp;nbsp; message-length maximum client auto &lt;BR /&gt;&amp;nbsp; message-length maximum 512 &lt;BR /&gt;policy-map global_policy &lt;BR /&gt;&amp;nbsp;class inspection_default &lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;&amp;nbsp; inspect icmp &lt;BR /&gt;! &lt;BR /&gt;service-policy global_policy global &lt;BR /&gt;prompt hostname context &lt;BR /&gt;no call-home reporting anonymous &lt;BR /&gt;Cryptochecksum:9d7e1c52a0993c5552b76dc666e0ae15 &lt;BR /&gt;: end &lt;BR /&gt;ciscoasa#&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:17:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-transparent-mode-dropping-arp-replies/m-p/2831025#M159624</guid>
      <dc:creator>derekmccabe</dc:creator>
      <dc:date>2019-03-12T07:17:24Z</dc:date>
    </item>
    <item>
      <title>You are missing a default</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-transparent-mode-dropping-arp-replies/m-p/2831026#M159625</link>
      <description>&lt;P&gt;You are missing the following command:&lt;/P&gt;
&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;
&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;
&lt;P&gt;posts&lt;/P&gt;</description>
      <pubDate>Sat, 13 Feb 2016 21:47:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-transparent-mode-dropping-arp-replies/m-p/2831026#M159625</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-02-13T21:47:44Z</dc:date>
    </item>
    <item>
      <title>Or more accurately you are</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-transparent-mode-dropping-arp-replies/m-p/2831027#M159626</link>
      <description>&lt;P&gt;Or more accurately you are missing&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;same-security-traffic permit inter-interface&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;for traffic flowing between interface with the same security level&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Sat, 13 Feb 2016 21:49:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-transparent-mode-dropping-arp-replies/m-p/2831027#M159626</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-02-13T21:49:09Z</dc:date>
    </item>
    <item>
      <title>Thanks for your response</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-transparent-mode-dropping-arp-replies/m-p/2831028#M159627</link>
      <description>&lt;P&gt;Thanks for your response Marius,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;could you you explain why this is required when my inside interface for each bridge-group is security-level 0 and outside interface is security-level 100 please?&lt;/P&gt;</description>
      <pubDate>Sun, 14 Feb 2016 07:54:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-transparent-mode-dropping-arp-replies/m-p/2831028#M159627</guid>
      <dc:creator>derekmccabe</dc:creator>
      <dc:date>2016-02-14T07:54:54Z</dc:date>
    </item>
    <item>
      <title>Sorry I read the config too</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-transparent-mode-dropping-arp-replies/m-p/2831029#M159628</link>
      <description>&lt;P&gt;Sorry I read the config too fast and saw the 50 on the interface name instead. &amp;nbsp;In that case your configuration looks correct. &amp;nbsp;I will try to recreate the issue in my lab and let you know what I find. &amp;nbsp;It will not be exact as I do not have a 5506 to test on.&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Sun, 14 Feb 2016 22:51:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-transparent-mode-dropping-arp-replies/m-p/2831029#M159628</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-02-14T22:51:45Z</dc:date>
    </item>
    <item>
      <title>That would be great Marius,</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-transparent-mode-dropping-arp-replies/m-p/2831030#M159629</link>
      <description>&lt;P&gt;That would be great Marius,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I look forward to hearing about your results as I have been able to find a workaround for this issue as yet&lt;/P&gt;</description>
      <pubDate>Mon, 15 Feb 2016 07:30:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-transparent-mode-dropping-arp-replies/m-p/2831030#M159629</guid>
      <dc:creator>derekmccabe</dc:creator>
      <dc:date>2016-02-15T07:30:48Z</dc:date>
    </item>
    <item>
      <title>I am sorry to say that I have</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-transparent-mode-dropping-arp-replies/m-p/2831031#M159630</link>
      <description>&lt;P&gt;I am sorry to say that I have not been able to reproduce the issue. &amp;nbsp;I copied your configuration with the exception of one command:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;arp inside-50 8.8.8.8 d057.4ce1.384f &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I assume you added this to see if a static arp entry would help. &amp;nbsp;But my pings were always successful.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;have you tried reloading the ASA?&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Mon, 15 Feb 2016 22:46:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-transparent-mode-dropping-arp-replies/m-p/2831031#M159630</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-02-15T22:46:33Z</dc:date>
    </item>
    <item>
      <title>Hi Marius,</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-transparent-mode-dropping-arp-replies/m-p/2831032#M159631</link>
      <description>&lt;P&gt;Hi Marius,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Yes i have reloaded the device numerous times - i've given up on this one now&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Many thanks for all of your time and effort I greatly appreciate it&lt;/P&gt;</description>
      <pubDate>Tue, 16 Feb 2016 07:53:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-transparent-mode-dropping-arp-replies/m-p/2831032#M159631</guid>
      <dc:creator>derekmccabe</dc:creator>
      <dc:date>2016-02-16T07:53:27Z</dc:date>
    </item>
    <item>
      <title>Hi! I am currently having the</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-transparent-mode-dropping-arp-replies/m-p/2831033#M159632</link>
      <description>&lt;P&gt;Hi! I am currently having the same problem with the same release. How had you solved it? if you had...&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2017 22:16:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-transparent-mode-dropping-arp-replies/m-p/2831033#M159632</guid>
      <dc:creator>Stanislav Itkind</dc:creator>
      <dc:date>2017-05-15T22:16:47Z</dc:date>
    </item>
  </channel>
</rss>

