<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic JonThanks for your patience. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-proxy-arp-another-ip-subnet/m-p/2648617#M196941</link>
    <description>&lt;P&gt;Jon&lt;/P&gt;&lt;P&gt;Thanks for your patience. You're right I'm using 8.0(2).&amp;nbsp;Here's the full config. I've made the changes and still nothing. My DMZ host (actually a router in GNS3) still can't ping it's default GW or 8.8.8.8 and I'm getting nothing back in response from 10.6.11.187.&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;hostname SITE-A-ASA&lt;BR /&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 10.9.100.253 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.100.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;&amp;nbsp;nameif DMZ&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 192.168.20.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;ftp mode passive&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;access-list VPN-INTERESTING-TRAFFIC extended permit ip 192.168.100.0 255.255.255.0 192.168.200.0 255.255.255.0&lt;BR /&gt;access-list NO-NAT-TRAFFIC extended permit ip 192.168.100.0 255.255.255.0 192.168.200.0 255.255.255.0&lt;BR /&gt;access-list PING_INBOUND extended permit icmp any 10.6.11.184 255.255.255.248&lt;BR /&gt;pager lines 24&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu DMZ 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 0 access-list NO-NAT-TRAFFIC&lt;BR /&gt;static (DMZ,outside) 10.16.11.186 192.168.20.247 netmask 255.255.255.255&lt;BR /&gt;static (DMZ,outside) 10.16.11.187 192.168.20.248 netmask 255.255.255.255&lt;BR /&gt;static (DMZ,outside) 10.16.11.188 192.168.20.249 netmask 255.255.255.255&lt;BR /&gt;access-group PING_INBOUND in interface outside&lt;BR /&gt;access-group PING_INBOUND out interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 10.9.100.254 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout uauth 0:05:00 absolute&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto map outside_map 1 match address VPN-INTERESTING-TRAFFIC&lt;BR /&gt;crypto map outside_map 1 set pfs&lt;BR /&gt;crypto map outside_map 1 set peer 10.9.200.253 10.9.100.253&lt;BR /&gt;crypto map outside_map 1 set transform-set ESP-DES-SHA ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;no crypto isakmp nat-traversal&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;tunnel-group 10.9.200.253 type ipsec-l2l&lt;BR /&gt;tunnel-group 10.9.200.253 ipsec-attributes&lt;BR /&gt;&amp;nbsp;pre-shared-key *&lt;BR /&gt;prompt hostname context&lt;BR /&gt;Cryptochecksum:e48689449ebb9d177dc19becec6cee0e&lt;BR /&gt;: end&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 19 Feb 2015 13:21:48 GMT</pubDate>
    <dc:creator>codflanglers</dc:creator>
    <dc:date>2015-02-19T13:21:48Z</dc:date>
    <item>
      <title>ASA Proxy arp another IP subnet</title>
      <link>https://community.cisco.com/t5/network-security/asa-proxy-arp-another-ip-subnet/m-p/2648610#M196934</link>
      <description>&lt;P&gt;Morning&lt;/P&gt;&lt;P&gt;I've another subnet from my ISP and I need to get my ASA to respond to these new IPs.&lt;/P&gt;&lt;P&gt;Basically, I'm relying on the ASA doing proxy arp.&lt;/P&gt;&lt;P&gt;I've added in a few&amp;nbsp;static NAT as below (assuming 10.16.11.184/29 is the new range I've been given and 192.168.20.0/24 is my DMZ).&lt;/P&gt;&lt;P&gt;static (DMZ,outside) 10.16.11.186 192.168.20.247 netmask 255.255.255.255&lt;BR /&gt;static (DMZ,outside) 10.16.11.187 192.168.20.248 netmask 255.255.255.255&lt;BR /&gt;static (DMZ,outside) 10.16.11.188 192.168.20.249 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;I've not done much on the ASA devices. Is that all I have to do?&lt;/P&gt;&lt;P&gt;Presumably I would need to include the new IP subnet in any ACLs, etc?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:31:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-proxy-arp-another-ip-subnet/m-p/2648610#M196934</guid>
      <dc:creator>codflanglers</dc:creator>
      <dc:date>2019-03-12T05:31:35Z</dc:date>
    </item>
    <item>
      <title>Yes you do need to include</title>
      <link>https://community.cisco.com/t5/network-security/asa-proxy-arp-another-ip-subnet/m-p/2648611#M196935</link>
      <description>&lt;P&gt;Yes you do need to include them in your acls and with version 8.2 or lower you use the NAT&amp;nbsp;IP address not the real IP.&lt;/P&gt;&lt;P&gt;If this is a new block and your outside interface is in another subnet as a I understand it this is not proxy arp because the ISP will simply route that block to your ASA.&lt;/P&gt;&lt;P&gt;It does depend on how the ISP has got their router configured though.&lt;/P&gt;&lt;P&gt;Where it definitely would be proxy arp is if the static NAT statements were using IPs from the same subnet as the IP on the outside interface of the ASA because the ISP router thinks all those IPs are on the local subnet.&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Thu, 19 Feb 2015 10:55:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-proxy-arp-another-ip-subnet/m-p/2648611#M196935</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-02-19T10:55:21Z</dc:date>
    </item>
    <item>
      <title>Yes, the outside interface is</title>
      <link>https://community.cisco.com/t5/network-security/asa-proxy-arp-another-ip-subnet/m-p/2648612#M196936</link>
      <description>&lt;P&gt;Yes, the outside interface is on a separate IP subnet from the new IP range.&lt;/P&gt;&lt;P&gt;Basically, all I need is for the firewall to nat the addresses in my DMZ as the new IP range and to respond to requests on those new IPs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Been trying to test in GNS3 but getting nowhere as I was using ping to test (not ideal on a firewall).&lt;/P&gt;</description>
      <pubDate>Thu, 19 Feb 2015 11:07:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-proxy-arp-another-ip-subnet/m-p/2648612#M196936</guid>
      <dc:creator>codflanglers</dc:creator>
      <dc:date>2015-02-19T11:07:51Z</dc:date>
    </item>
    <item>
      <title>The static statements and</title>
      <link>https://community.cisco.com/t5/network-security/asa-proxy-arp-another-ip-subnet/m-p/2648613#M196937</link>
      <description>&lt;P&gt;The static statements and allowing the traffic in your outside acl should be all you need to get it working.&lt;/P&gt;&lt;P&gt;If you use ping and are initiating the connection from the outside then as long as you allow that in the acl it should work.&lt;/P&gt;&lt;P&gt;If you are pinging from a server to the outside you either need to allow the return packets back in your acl or enable ICMP inspection.&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Thu, 19 Feb 2015 11:15:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-proxy-arp-another-ip-subnet/m-p/2648613#M196937</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-02-19T11:15:30Z</dc:date>
    </item>
    <item>
      <title>If you are testing in GNS3</title>
      <link>https://community.cisco.com/t5/network-security/asa-proxy-arp-another-ip-subnet/m-p/2648614#M196938</link>
      <description>&lt;P&gt;If you are testing in GNS3 make sure your ISP router has route for that subnet with the next hop being the outside interface of your ASA.&lt;/P&gt;&lt;P&gt;And obviously make sure the ASA has a default route pointing back to the ISP router.&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Thu, 19 Feb 2015 11:18:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-proxy-arp-another-ip-subnet/m-p/2648614#M196938</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-02-19T11:18:31Z</dc:date>
    </item>
    <item>
      <title>routes are set up either side</title>
      <link>https://community.cisco.com/t5/network-security/asa-proxy-arp-another-ip-subnet/m-p/2648615#M196939</link>
      <description>&lt;P&gt;routes are set up either side and I have an ACL applied to both the outside and DMZ interfaces in both directions&amp;nbsp;(overkill but just trying to get it working) to allow icmp and nothing&lt;/P&gt;&lt;P&gt;access-list inbound extended permit icmp any 192.168.20.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-group inbound in interface outside&lt;BR /&gt;access-group inbound out interface outside&lt;BR /&gt;access-group inbound in interface DMZ&lt;BR /&gt;access-group inbound out interface DMZ&lt;/P&gt;&lt;P&gt;If it helps I configured a loopback on my upstream router as 8.8.8.8 and the ASA can ping outbound to that OK.&lt;/P&gt;&lt;P&gt;The ASA can't ping 192.168.20.248 which is connected to the DMZ interface 192.168.20.254 (/24). The downstream router (192.168.20.248) can't ping the ASA 192.168.20.254.&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Feb 2015 11:48:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-proxy-arp-another-ip-subnet/m-p/2648615#M196939</guid>
      <dc:creator>codflanglers</dc:creator>
      <dc:date>2015-02-19T11:48:39Z</dc:date>
    </item>
    <item>
      <title>From your NAT statements I'm</title>
      <link>https://community.cisco.com/t5/network-security/asa-proxy-arp-another-ip-subnet/m-p/2648616#M196940</link>
      <description>&lt;P&gt;From your NAT statements I'm assuming your software version is 8.2 or lower.&lt;/P&gt;&lt;P&gt;If so your acls are wrong and you can't use the same acl for both interfaces.&lt;/P&gt;&lt;P&gt;Your outside acl needs to reference the 10.16.11.x IPs not the real IPs..&lt;/P&gt;&lt;P&gt;And the acl applied to the DMZ interface&amp;nbsp;won't work because the source is 192.168.20.x not the destination.&lt;/P&gt;&lt;P&gt;As long as the DMZ interface is a higher security level than the outside interface traffic will be allowed so just remove the acl there.&lt;/P&gt;&lt;P&gt;You still need the outside acl.&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Thu, 19 Feb 2015 12:18:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-proxy-arp-another-ip-subnet/m-p/2648616#M196940</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-02-19T12:18:04Z</dc:date>
    </item>
    <item>
      <title>JonThanks for your patience.</title>
      <link>https://community.cisco.com/t5/network-security/asa-proxy-arp-another-ip-subnet/m-p/2648617#M196941</link>
      <description>&lt;P&gt;Jon&lt;/P&gt;&lt;P&gt;Thanks for your patience. You're right I'm using 8.0(2).&amp;nbsp;Here's the full config. I've made the changes and still nothing. My DMZ host (actually a router in GNS3) still can't ping it's default GW or 8.8.8.8 and I'm getting nothing back in response from 10.6.11.187.&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;hostname SITE-A-ASA&lt;BR /&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 10.9.100.253 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.100.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;&amp;nbsp;nameif DMZ&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 192.168.20.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;ftp mode passive&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;access-list VPN-INTERESTING-TRAFFIC extended permit ip 192.168.100.0 255.255.255.0 192.168.200.0 255.255.255.0&lt;BR /&gt;access-list NO-NAT-TRAFFIC extended permit ip 192.168.100.0 255.255.255.0 192.168.200.0 255.255.255.0&lt;BR /&gt;access-list PING_INBOUND extended permit icmp any 10.6.11.184 255.255.255.248&lt;BR /&gt;pager lines 24&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu DMZ 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 0 access-list NO-NAT-TRAFFIC&lt;BR /&gt;static (DMZ,outside) 10.16.11.186 192.168.20.247 netmask 255.255.255.255&lt;BR /&gt;static (DMZ,outside) 10.16.11.187 192.168.20.248 netmask 255.255.255.255&lt;BR /&gt;static (DMZ,outside) 10.16.11.188 192.168.20.249 netmask 255.255.255.255&lt;BR /&gt;access-group PING_INBOUND in interface outside&lt;BR /&gt;access-group PING_INBOUND out interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 10.9.100.254 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout uauth 0:05:00 absolute&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto map outside_map 1 match address VPN-INTERESTING-TRAFFIC&lt;BR /&gt;crypto map outside_map 1 set pfs&lt;BR /&gt;crypto map outside_map 1 set peer 10.9.200.253 10.9.100.253&lt;BR /&gt;crypto map outside_map 1 set transform-set ESP-DES-SHA ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;no crypto isakmp nat-traversal&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;tunnel-group 10.9.200.253 type ipsec-l2l&lt;BR /&gt;tunnel-group 10.9.200.253 ipsec-attributes&lt;BR /&gt;&amp;nbsp;pre-shared-key *&lt;BR /&gt;prompt hostname context&lt;BR /&gt;Cryptochecksum:e48689449ebb9d177dc19becec6cee0e&lt;BR /&gt;: end&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Feb 2015 13:21:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-proxy-arp-another-ip-subnet/m-p/2648617#M196941</guid>
      <dc:creator>codflanglers</dc:creator>
      <dc:date>2015-02-19T13:21:48Z</dc:date>
    </item>
    <item>
      <title>Remove this from your config</title>
      <link>https://community.cisco.com/t5/network-security/asa-proxy-arp-another-ip-subnet/m-p/2648618#M196942</link>
      <description>&lt;P&gt;Remove this from your config ie.&lt;/P&gt;&lt;P&gt;no access-group PING_INBOUND out interface outside&lt;/P&gt;&lt;P&gt;you won't be able to ping the DMZ interface from your client unless you add something to your config but that;s not the problem.&lt;/P&gt;&lt;P&gt;Are you trying to ping to 10.16.11.x from an outside device ?&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Thu, 19 Feb 2015 13:29:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-proxy-arp-another-ip-subnet/m-p/2648618#M196942</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-02-19T13:29:55Z</dc:date>
    </item>
    <item>
      <title>JonI'm trying to do two</title>
      <link>https://community.cisco.com/t5/network-security/asa-proxy-arp-another-ip-subnet/m-p/2648619#M196943</link>
      <description>&lt;P&gt;Jon&lt;/P&gt;&lt;P&gt;I'm trying to do two things.&lt;/P&gt;&lt;P&gt;From my DMZ host router&amp;nbsp;I'm trying to ping out&amp;nbsp;past the firewall&amp;nbsp;ping but it can't even ping it's default gateway (although this is just to prove connectivity).&lt;/P&gt;&lt;P&gt;From outside the firewall, I'm trying to get the firewall to respond to a ping to 10.16.11.187 which should nat to my DMZ host router.&lt;/P&gt;&lt;P&gt;Problem is I'm at home with no other means to test.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Feb 2015 13:44:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-proxy-arp-another-ip-subnet/m-p/2648619#M196943</guid>
      <dc:creator>codflanglers</dc:creator>
      <dc:date>2015-02-19T13:44:28Z</dc:date>
    </item>
    <item>
      <title>It's the same thing ie.</title>
      <link>https://community.cisco.com/t5/network-security/asa-proxy-arp-another-ip-subnet/m-p/2648620#M196944</link>
      <description>&lt;P&gt;It's the same thing ie. pinging from your host to the outside and from outside to your host.&lt;/P&gt;&lt;P&gt;If you want to check connectivity to the DMZ interface add this -&lt;/P&gt;&lt;P&gt;icmp permit any DMZ&lt;/P&gt;&lt;P&gt;You do not need an acl applied outbound anywhere because traffic is allowed by default from the DMZ to outside because of your security levels.&lt;/P&gt;&lt;P&gt;All you need are the statics and the inbound acl on your outside interface allowing ICMP to the 10.16.11.x IP.&lt;/P&gt;&lt;P&gt;When you ping from outside you ping that IP and the ASA will translate it to the 192.168.20.x IP.&lt;/P&gt;&lt;P&gt;When you ping from the DMZ your ASA will translate the 192.168.20.x IP to the 10.16.11.x IP.&lt;/P&gt;&lt;P&gt;So it should work providing your routing is setup correctly.&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Thu, 19 Feb 2015 13:49:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-proxy-arp-another-ip-subnet/m-p/2648620#M196944</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-02-19T13:49:29Z</dc:date>
    </item>
    <item>
      <title>Ok, this is interesting. I</title>
      <link>https://community.cisco.com/t5/network-security/asa-proxy-arp-another-ip-subnet/m-p/2648621#M196945</link>
      <description>&lt;P&gt;Ok, this is interesting. I just ran a packet-tracer on the ASA and it said this&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: DMZ&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;That's a ping from 10.9.100.254 (outside router) to new IP range that nats through to my DMZ host.&lt;/P&gt;&lt;P&gt;Thing is when I actually do a ping, I get nothing back on the router.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Feb 2015 14:21:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-proxy-arp-another-ip-subnet/m-p/2648621#M196945</guid>
      <dc:creator>codflanglers</dc:creator>
      <dc:date>2015-02-19T14:21:18Z</dc:date>
    </item>
    <item>
      <title>Can you post your ASA</title>
      <link>https://community.cisco.com/t5/network-security/asa-proxy-arp-another-ip-subnet/m-p/2648622#M196946</link>
      <description>&lt;P&gt;Can you post your ASA configuration again plus a "sh ip route" from your outside router.&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Thu, 19 Feb 2015 14:25:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-proxy-arp-another-ip-subnet/m-p/2648622#M196946</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-02-19T14:25:11Z</dc:date>
    </item>
    <item>
      <title>JonHere's the sh ip route</title>
      <link>https://community.cisco.com/t5/network-security/asa-proxy-arp-another-ip-subnet/m-p/2648623#M196947</link>
      <description>&lt;P&gt;Jon&lt;/P&gt;&lt;P&gt;Here's the sh ip route (FYI, the router and the ASA are directly connected on 10.9.100.0)&lt;/P&gt;&lt;P&gt;Gateway of last resort is 172.16.250.101 to network 0.0.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 194.168.11.0/29 is subnetted, 1 subnets&lt;BR /&gt;S&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 194.168.11.184 [1/0] via 10.9.100.253&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.16.0.0/30 is subnetted, 1 subnets&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.16.250.100 is directly connected, FastEthernet0/0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 8.0.0.0/32 is subnetted, 1 subnets&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 8.8.8.8 is directly connected, Loopback88&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.0.0.0/24 is subnetted, 1 subnets&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.9.100.0 is directly connected, FastEthernet1/0&lt;BR /&gt;S&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.100.0/24 is directly connected, FastEthernet1/0&lt;BR /&gt;S*&amp;nbsp;&amp;nbsp; 0.0.0.0/0 [1/0] via 172.16.250.101&lt;/P&gt;&lt;P&gt;And here's the config of the ASA&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;hostname SITE-A-ASA&lt;BR /&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 10.9.100.253 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.100.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;&amp;nbsp;nameif DMZ&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 192.168.20.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;ftp mode passive&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;access-list VPN-INTERESTING-TRAFFIC extended permit ip 192.168.100.0 255.255.255.0 192.168.200.0 255.255.255.0&lt;BR /&gt;access-list NO-NAT-TRAFFIC extended permit ip 192.168.100.0 255.255.255.0 192.168.200.0 255.255.255.0&lt;BR /&gt;access-list PING_INBOUND extended permit icmp any 10.16.11.184 255.255.255.248&lt;BR /&gt;pager lines 24&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu DMZ 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 0 access-list NO-NAT-TRAFFIC&lt;BR /&gt;static (DMZ,outside) 10.16.11.186 192.168.20.247 netmask 255.255.255.255&lt;BR /&gt;static (DMZ,outside) 10.16.11.187 192.168.20.248 netmask 255.255.255.255&lt;BR /&gt;static (DMZ,outside) 10.16.11.188 192.168.20.249 netmask 255.255.255.255&lt;BR /&gt;access-group PING_INBOUND in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 10.9.100.254 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout uauth 0:05:00 absolute&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto map outside_map 1 match address VPN-INTERESTING-TRAFFIC&lt;BR /&gt;crypto map outside_map 1 set pfs&lt;BR /&gt;crypto map outside_map 1 set peer 10.9.200.253 10.9.100.253&lt;BR /&gt;crypto map outside_map 1 set transform-set ESP-DES-SHA ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;no crypto isakmp nat-traversal&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;tunnel-group 10.9.200.253 type ipsec-l2l&lt;BR /&gt;tunnel-group 10.9.200.253 ipsec-attributes&lt;BR /&gt;&amp;nbsp;pre-shared-key *&lt;BR /&gt;prompt hostname context&lt;BR /&gt;Cryptochecksum:e48689449ebb9d177dc19becec6cee0e&lt;BR /&gt;: end&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Feb 2015 14:37:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-proxy-arp-another-ip-subnet/m-p/2648623#M196947</guid>
      <dc:creator>codflanglers</dc:creator>
      <dc:date>2015-02-19T14:37:30Z</dc:date>
    </item>
    <item>
      <title>Your router does not know how</title>
      <link>https://community.cisco.com/t5/network-security/asa-proxy-arp-another-ip-subnet/m-p/2648624#M196948</link>
      <description>&lt;P&gt;Your router does not know how to get to the 10.16.11.184/29 subnet.&lt;/P&gt;&lt;P&gt;Add this to your router -&lt;/P&gt;&lt;P&gt;ip route 10.16.11.184 255.255.255.248 10.9.100.253&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Thu, 19 Feb 2015 14:54:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-proxy-arp-another-ip-subnet/m-p/2648624#M196948</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-02-19T14:54:17Z</dc:date>
    </item>
    <item>
      <title>No joy. Still the same.</title>
      <link>https://community.cisco.com/t5/network-security/asa-proxy-arp-another-ip-subnet/m-p/2648625#M196949</link>
      <description>&lt;P&gt;No joy. Still the same.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Feb 2015 15:03:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-proxy-arp-another-ip-subnet/m-p/2648625#M196949</guid>
      <dc:creator>codflanglers</dc:creator>
      <dc:date>2015-02-19T15:03:00Z</dc:date>
    </item>
    <item>
      <title>If you are using a router as</title>
      <link>https://community.cisco.com/t5/network-security/asa-proxy-arp-another-ip-subnet/m-p/2648626#M196950</link>
      <description>&lt;P&gt;If you are using a router as the DMZ host can you do a "debug ip packet" on that and then try to ping from the outside router and see if you see -&lt;/P&gt;&lt;P&gt;1) hits on the ASA acl&lt;/P&gt;&lt;P&gt;2) any packets arriving at the host (router)&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Thu, 19 Feb 2015 15:06:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-proxy-arp-another-ip-subnet/m-p/2648626#M196950</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-02-19T15:06:55Z</dc:date>
    </item>
    <item>
      <title>When you setup your router as</title>
      <link>https://community.cisco.com/t5/network-security/asa-proxy-arp-another-ip-subnet/m-p/2648627#M196951</link>
      <description>&lt;P&gt;When you setup your router as a host did you -&lt;/P&gt;&lt;P&gt;1) disable ip routing&lt;/P&gt;&lt;P&gt;2) add this -&lt;/P&gt;&lt;P&gt;"ip default-gateway 192.168.20.254"&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Thu, 19 Feb 2015 15:10:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-proxy-arp-another-ip-subnet/m-p/2648627#M196951</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-02-19T15:10:50Z</dc:date>
    </item>
    <item>
      <title>No packets on router but</title>
      <link>https://community.cisco.com/t5/network-security/asa-proxy-arp-another-ip-subnet/m-p/2648628#M196952</link>
      <description>&lt;P&gt;No packets on router but looks like the ASA is doing what it should&lt;/P&gt;&lt;P&gt;SITE-A-ASA# ICMP echo request from outside:10.9.100.254 to DMZ:10.16.11.187 ID=19 seq=0 len=72&lt;BR /&gt;ICMP echo request untranslating outside:10.16.11.187 to DMZ:192.168.20.248&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Feb 2015 15:14:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-proxy-arp-another-ip-subnet/m-p/2648628#M196952</guid>
      <dc:creator>codflanglers</dc:creator>
      <dc:date>2015-02-19T15:14:29Z</dc:date>
    </item>
    <item>
      <title>Can you post the</title>
      <link>https://community.cisco.com/t5/network-security/asa-proxy-arp-another-ip-subnet/m-p/2648629#M196953</link>
      <description>&lt;P&gt;Can you post the configuration of the host router ?&lt;/P&gt;&lt;P&gt;How is the router connected to the ASA ie. is it via a switch or direct.&lt;/P&gt;&lt;P&gt;If it is via a switch check your vlans.&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Thu, 19 Feb 2015 15:16:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-proxy-arp-another-ip-subnet/m-p/2648629#M196953</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-02-19T15:16:52Z</dc:date>
    </item>
  </channel>
</rss>

