<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hello, You already have the in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-firewall/m-p/2537238#M236342</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You already have the arp permit.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Well we would need to take captures to determine whether the ASA is responding to arp packets.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As for:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: rgb(119, 119, 119); font-size: 14px;"&gt;Meanwhile, do you think routing the x.y.111.1 - 10 on the internet router towards the firewall Outside interface help?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: rgb(119, 119, 119); font-size: 14px;"&gt;Yes, That would fix it.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: rgb(119, 119, 119); font-size: 14px;"&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: rgb(119, 119, 119); font-size: 14px;"&gt;Jcarvaja&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: rgb(119, 119, 119); font-size: 14px; background-color: rgb(247, 247, 247);"&gt;CCIE 42930, 2-CCNP,JNCIS-SEC&lt;/SPAN&gt;&lt;BR style="color: rgb(119, 119, 119); font-size: 14px; background-color: rgb(247, 247, 247);" /&gt;&lt;SPAN style="color: rgb(119, 119, 119); font-size: 14px; background-color: rgb(247, 247, 247);"&gt;Looking for a quick remote support session? Contact us at&lt;/SPAN&gt;&lt;STRONG style="color: rgb(119, 119, 119); font-size: 14px; background-color: rgb(247, 247, 247);"&gt;&amp;nbsp;inetworks.cr&lt;/STRONG&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 22 Jul 2014 06:20:24 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2014-07-22T06:20:24Z</dc:date>
    <item>
      <title>Cisco ASA Firewall</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firewall/m-p/2537235#M236335</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a Cisco ASA 9.1(3) 5545 device. A request from my customer required that a few servers in DMZ be accessible from outside. The details are as follows:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Servers in DMZ: 10.20.30.40-49&lt;/P&gt;&lt;P&gt;Public IP used for static NAT: x.y.111.1 - 10&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The DMZ interface IP: 10.20.30.1&lt;/P&gt;&lt;P&gt;The Outside interface IP: a.b.c.d&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The customer has 2 different Public IP pools. The Outside interface is configured with an IP from one of these pools (a.b.c.*/26). While in this request the customer has asked us to use the other pool (x.y.111.1-10).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have configured the following on the firewall&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1] Static NAT:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; object network 10.20.30.40&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; nat (any , any) static x.y.111.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and so on upto 10.20.30.49. I am skipping those for brevity.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2] ACL for inbound traffic from DMZ&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; access-list Dmz_access_in extended permit tcp object int-10.20.30.40 any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; (Similar policies for other DMZ IPs)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3] ACL for inbound traffic from Outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; access-list Outside_access_in extended permit tcp any object int-10.20.30.40 eq www&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; access-list Outside_access_in extended permit tcp any object int-10.20.30.40 eq ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; (Similar policies for other inbound traffic on Outside interface)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This config is not working. Please suggest if I am missing something. Also could anyone explain how Proxy-ARP would work in this scenario if the firewall gets an ARP request for x.y.111.1-10 IPs from a Router?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:30:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firewall/m-p/2537235#M236335</guid>
      <dc:creator>svchougule</dc:creator>
      <dc:date>2019-03-12T04:30:50Z</dc:date>
    </item>
    <item>
      <title>Hello, Those are a lot of</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firewall/m-p/2537236#M236336</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Those are a lot of questions you have &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;First of all recommendations with the NAT&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Be as specific as possible.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Never do a (any,any) translation that just makes the ARP process crazy in the ASA. You got to be as clean as possible. Be specific!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Remeber that the firewall is stateful so if you were pretending to allow the replies from the DMZ server to the outside clients on the Dmz_access_in access-list this is NOT required.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Why it's not working???&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Because you want to use Proxy-ARP and the behavior of this feature has changed in the versions of the ASA 8.4 and higher where the ASA not longer reply to any IP not listed in one of it's interfaces network domains.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How to Fix it?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Enable the Proxy-ARP for this IPs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Config te&lt;/P&gt;&lt;P&gt;arp permit non-connected&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;jcarvaja&lt;/EM&gt;&lt;BR /&gt;CCIE 42930, 2-CCNP,JNCIS-SEC&lt;BR /&gt;Looking for a quick remote support session? Contact us at&lt;STRONG&gt; inetworks.cr&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Jul 2014 05:01:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firewall/m-p/2537236#M236336</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2014-07-22T05:01:03Z</dc:date>
    </item>
    <item>
      <title>Thanks jcarvaja, I had</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firewall/m-p/2537237#M236340</link>
      <description>&lt;P&gt;Thanks &lt;EM&gt;jcarvaja,&lt;/EM&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I had already configured the &lt;STRONG&gt;arp permit non-connected &lt;/STRONG&gt;command. Even then it's not working. I'll try giving specific interfaces in the static NAT.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Meanwhile, do you think routing the x.y.111.1 - 10 on the internet router towards the firewall Outside interface help?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;</description>
      <pubDate>Tue, 22 Jul 2014 06:13:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firewall/m-p/2537237#M236340</guid>
      <dc:creator>svchougule</dc:creator>
      <dc:date>2014-07-22T06:13:52Z</dc:date>
    </item>
    <item>
      <title>Hello, You already have the</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firewall/m-p/2537238#M236342</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You already have the arp permit.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Well we would need to take captures to determine whether the ASA is responding to arp packets.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As for:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: rgb(119, 119, 119); font-size: 14px;"&gt;Meanwhile, do you think routing the x.y.111.1 - 10 on the internet router towards the firewall Outside interface help?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: rgb(119, 119, 119); font-size: 14px;"&gt;Yes, That would fix it.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: rgb(119, 119, 119); font-size: 14px;"&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: rgb(119, 119, 119); font-size: 14px;"&gt;Jcarvaja&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: rgb(119, 119, 119); font-size: 14px; background-color: rgb(247, 247, 247);"&gt;CCIE 42930, 2-CCNP,JNCIS-SEC&lt;/SPAN&gt;&lt;BR style="color: rgb(119, 119, 119); font-size: 14px; background-color: rgb(247, 247, 247);" /&gt;&lt;SPAN style="color: rgb(119, 119, 119); font-size: 14px; background-color: rgb(247, 247, 247);"&gt;Looking for a quick remote support session? Contact us at&lt;/SPAN&gt;&lt;STRONG style="color: rgb(119, 119, 119); font-size: 14px; background-color: rgb(247, 247, 247);"&gt;&amp;nbsp;inetworks.cr&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Jul 2014 06:20:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firewall/m-p/2537238#M236342</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2014-07-22T06:20:24Z</dc:date>
    </item>
  </channel>
</rss>

