<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Weird ARP issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/weird-arp-issue/m-p/2439341#M269287</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That might be. There is quite some NAT configured for that interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (GAESTE_OUT,DMZ_PUBLIC) source static range-172.16.116.0_22 range-172.16.116.0_22 destination static range-192.168.52.0_22 range-192.168.52.0_22&lt;/P&gt;&lt;P&gt;nat (GAESTE_OUT,dmz-80) source static range-172.16.116.0_22 range-172.16.116.0_22 destination static range-192.168.80.0_24 range-192.168.80.0_24&lt;/P&gt;&lt;P&gt;nat (GAESTE_OUT,VPN_OUT) source static range-172.16.116.0_22 range-172.16.116.0_22 destination static vpn-lb_1.36 vpn-lb_1.36&lt;/P&gt;&lt;P&gt;nat (GAESTE_OUT,any) source static range-192.168.240.0_24 range-192.168.240.0_24 destination static range-192.168.0.0_16 range-192.168.0.0_16&lt;/P&gt;&lt;P&gt;nat (GAESTE_OUT,any) source static range-192.168.1.0_28 range-192.168.1.0_28&lt;/P&gt;&lt;P&gt;nat (GAESTE_OUT,outside) source dynamic any range-192.168.0.2_32&lt;/P&gt;&lt;P&gt;nat (GAESTE_OUT,DMZ_INS) source dynamic any interface destination static range-192.168.8.0_22 range-192.168.8.0_22&lt;/P&gt;&lt;P&gt;nat (GAESTE_OUT,DMZ_INS) source dynamic any interface destination static range-192.168.120.0_22 range-192.168.120.0_22&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;nat (GAESTE_OUT,DMZ_PUBLIC) source static range-172.16.116.0_22 range-172.16.116.0_22 destination static range-192.168.52.0_22 range-192.168.52.0_22&lt;BR /&gt;nat (GAESTE_OUT,dmz-80) source static range-172.16.116.0_22 range-172.16.116.0_22 destination static range-192.168.80.0_24 range-192.168.80.0_24&lt;BR /&gt;nat (GAESTE_OUT,VPN_OUT) source static range-172.16.116.0_22 range-172.16.116.0_22 destination static vpn-lb_1.36 vpn-lb_1.36&lt;BR /&gt;nat (GAESTE_OUT,any) source static range-192.168.240.0_24 range-192.168.240.0_24 destination static range-192.168.0.0_16 range-192.168.0.0_16&lt;BR /&gt;nat (GAESTE_OUT,any) source static range-192.168.1.0_28 range-192.168.1.0_28&lt;BR /&gt;nat (GAESTE_OUT,outside) source dynamic any range-192.168.0.2_32&lt;BR /&gt;nat (GAESTE_OUT,DMZ_INS) source dynamic any interface destination static range-192.168.8.0_22 range-192.168.8.0_22&lt;BR /&gt;nat (GAESTE_OUT,DMZ_INS) source dynamic any interface destination static range-192.168.120.0_22 range-192.168.120.0_22&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not so sure now if the disabling of Proxy ARP is a good idea in this case. I'm no NAT specialist though.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 20 Feb 2014 13:42:42 GMT</pubDate>
    <dc:creator>patoberli</dc:creator>
    <dc:date>2014-02-20T13:42:42Z</dc:date>
    <item>
      <title>Weird ARP issue</title>
      <link>https://community.cisco.com/t5/network-security/weird-arp-issue/m-p/2439339#M269283</link>
      <description>&lt;P&gt;Hello all&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a very weird ARP issue on my ASA 5585-X SSP10 with software 8.4.6(5).&lt;/P&gt;&lt;P&gt;First the setup:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA - VLAN2 - IP 192.168.1.1 Mask 255.255.255.240 (ASA is in routing mode) - MAC 6c20.5658.8764&lt;/P&gt;&lt;P&gt;Second Router (router2) - VLAN2 - IP 192.168.1.14 Mask 255.255.255.240 - MAC 00:19:aa:85:6b:49&lt;/P&gt;&lt;P&gt;Server - VLAN2 - IP 192.168.1.6 Mask 255.255.255.240 - MAC 00:50:56:bd:4e:74&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, we have&amp;nbsp; Vlan 2 with 3 devices in it. The ASA which is a router, an other router for special traffic and a server (which will redirect the traffic to one of the two routers depending on policy).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The server shows this arp table:&lt;/P&gt;&lt;P&gt;arp -a -i eth1&lt;/P&gt;&lt;P&gt;? (192.168.1.14) at 6c:20:56:58:87:64 [ether] on eth1 (Mac address of ASA and not of router2!!!)&lt;/P&gt;&lt;P&gt;? (192.168.1.1) at 6c:20:56:58:87:64 [ether] on eth1 (Mac address of ASA, ok)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA shows this arp table:&lt;/P&gt;&lt;P&gt;show arp | inc GAES&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; GAESTE_OUT 192.168.1.6 0050.56bd.4e74 36 (correct)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; GAESTE_OUT 192.168.1.14 0019.aa85.6b49 156 (correct)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now the weird stuff. &lt;/P&gt;&lt;P&gt;If I clear the arp table on the server and ping 192.168.1.14, this is what the capture gets:&lt;/P&gt;&lt;P&gt;14:01:47.614577 00:50:56:bd:4e:74 (oui Unknown) &amp;gt; Broadcast, ethertype ARP (0x0806), length 42: Request who-has 192.168.1.14 tell 192.168.1.6, length 28&lt;BR /&gt;14:01:47.614998 6c:20:56:58:87:64 (oui Unknown) &amp;gt; 00:50:56:bd:4e:74 (oui Unknown), ethertype ARP (0x0806), length 60: Reply 192.168.1.14 is-at 6c:20:56:58:87:64 (oui Unknown), length 46&lt;BR /&gt;14:01:47.615332 00:19:aa:85:6b:49 (oui Unknown) &amp;gt; 00:50:56:bd:4e:74 (oui Unknown), ethertype ARP (0x0806), length 60: Reply 192.168.1.14 is-at 00:19:aa:85:6b:49 (oui Unknown), length 46&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you can see, the router2 AND the ASA reply to this arp request! Why is this ASA sending this wrong reply?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also a capture on the ASA on ARP shows this:&lt;/P&gt;&lt;P&gt;#capture arp ethernet-type arp interface GAESTE_OUT&lt;/P&gt;&lt;P&gt;#show captur arp det&lt;/P&gt;&lt;P&gt;2 packets captured&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 14:09:48.597411 0050.56bd.4e74 ffff.ffff.ffff 0x8100 64: 802.1Q vlan#2 P0 arp who-has 192.168.1.14 tell 192.168.1.6 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 2: 14:09:48.597610 6c20.5658.8764 0050.56bd.4e74 0x8100 46: 802.1Q vlan#2 P0 arp reply 192.168.1.14 is-at 6c:20:56:58:87:64 &lt;BR /&gt;2 packets shown&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#sh ip add | inc 192.168.1.14&lt;/P&gt;&lt;P&gt;#sh int GAESTE_OUT &lt;/P&gt;&lt;P&gt;Interface GigabitEthernet0/2.2 "GAESTE_OUT", is up, line protocol is up&lt;/P&gt;&lt;P&gt;&amp;nbsp; Hardware is bcm56801 rev 01, BW 1000 Mbps, DLY 10 usec&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; VLAN identifier 2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Description: VLAN to GAESTE_OUT&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; MAC address 6c20.5658.8764, MTU 1500&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IP address 192.168.1.1, subnet mask 255.255.255.240&lt;/P&gt;&lt;P&gt;&amp;nbsp; Traffic Statistics for "GAESTE_OUT":&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 200186428 packets input, 51055961549 bytes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 299581495 packets output, 300211809798 bytes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 447891 packets dropped&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am really confused and wondering if I miss something.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:48:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/weird-arp-issue/m-p/2439339#M269283</guid>
      <dc:creator>patoberli</dc:creator>
      <dc:date>2019-03-12T03:48:00Z</dc:date>
    </item>
    <item>
      <title>Weird ARP issue</title>
      <link>https://community.cisco.com/t5/network-security/weird-arp-issue/m-p/2439340#M269285</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So the ASA is answering for ARP requests that are meant for the Router2 to reply?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Generelly you will avoid this by configuring&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;sysopt noproxyarp &lt;INTERFACE through="" which="" asa="" is="" answering="" arp=""&gt;&lt;/INTERFACE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will disable the Proxy ARP on the ASA interface. It will still answer to ARP related to the IP address configured on its interface. If you are NATing users to some other IP address other than the interface IP address towards the interface in question then you should not disable Proxy ARP. If you have no such NAT requirements you should be able to safely disable Proxy ARP and avoid ASA answering the ARP request.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess the ASA has to have some NAT configuration related to 192.168.1.0/24 that causes it to answer to ARP requests on behalf of some IP address that it doesnt really own.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Feb 2014 13:35:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/weird-arp-issue/m-p/2439340#M269285</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-02-20T13:35:58Z</dc:date>
    </item>
    <item>
      <title>Weird ARP issue</title>
      <link>https://community.cisco.com/t5/network-security/weird-arp-issue/m-p/2439341#M269287</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That might be. There is quite some NAT configured for that interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (GAESTE_OUT,DMZ_PUBLIC) source static range-172.16.116.0_22 range-172.16.116.0_22 destination static range-192.168.52.0_22 range-192.168.52.0_22&lt;/P&gt;&lt;P&gt;nat (GAESTE_OUT,dmz-80) source static range-172.16.116.0_22 range-172.16.116.0_22 destination static range-192.168.80.0_24 range-192.168.80.0_24&lt;/P&gt;&lt;P&gt;nat (GAESTE_OUT,VPN_OUT) source static range-172.16.116.0_22 range-172.16.116.0_22 destination static vpn-lb_1.36 vpn-lb_1.36&lt;/P&gt;&lt;P&gt;nat (GAESTE_OUT,any) source static range-192.168.240.0_24 range-192.168.240.0_24 destination static range-192.168.0.0_16 range-192.168.0.0_16&lt;/P&gt;&lt;P&gt;nat (GAESTE_OUT,any) source static range-192.168.1.0_28 range-192.168.1.0_28&lt;/P&gt;&lt;P&gt;nat (GAESTE_OUT,outside) source dynamic any range-192.168.0.2_32&lt;/P&gt;&lt;P&gt;nat (GAESTE_OUT,DMZ_INS) source dynamic any interface destination static range-192.168.8.0_22 range-192.168.8.0_22&lt;/P&gt;&lt;P&gt;nat (GAESTE_OUT,DMZ_INS) source dynamic any interface destination static range-192.168.120.0_22 range-192.168.120.0_22&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;nat (GAESTE_OUT,DMZ_PUBLIC) source static range-172.16.116.0_22 range-172.16.116.0_22 destination static range-192.168.52.0_22 range-192.168.52.0_22&lt;BR /&gt;nat (GAESTE_OUT,dmz-80) source static range-172.16.116.0_22 range-172.16.116.0_22 destination static range-192.168.80.0_24 range-192.168.80.0_24&lt;BR /&gt;nat (GAESTE_OUT,VPN_OUT) source static range-172.16.116.0_22 range-172.16.116.0_22 destination static vpn-lb_1.36 vpn-lb_1.36&lt;BR /&gt;nat (GAESTE_OUT,any) source static range-192.168.240.0_24 range-192.168.240.0_24 destination static range-192.168.0.0_16 range-192.168.0.0_16&lt;BR /&gt;nat (GAESTE_OUT,any) source static range-192.168.1.0_28 range-192.168.1.0_28&lt;BR /&gt;nat (GAESTE_OUT,outside) source dynamic any range-192.168.0.2_32&lt;BR /&gt;nat (GAESTE_OUT,DMZ_INS) source dynamic any interface destination static range-192.168.8.0_22 range-192.168.8.0_22&lt;BR /&gt;nat (GAESTE_OUT,DMZ_INS) source dynamic any interface destination static range-192.168.120.0_22 range-192.168.120.0_22&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not so sure now if the disabling of Proxy ARP is a good idea in this case. I'm no NAT specialist though.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Feb 2014 13:42:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/weird-arp-issue/m-p/2439341#M269287</guid>
      <dc:creator>patoberli</dc:creator>
      <dc:date>2014-02-20T13:42:42Z</dc:date>
    </item>
    <item>
      <title>Weird ARP issue</title>
      <link>https://community.cisco.com/t5/network-security/weird-arp-issue/m-p/2439342#M269288</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I've disabled proxy arp now. So far I can't see any negative impact, thanks for the info!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Feb 2014 14:30:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/weird-arp-issue/m-p/2439342#M269288</guid>
      <dc:creator>patoberli</dc:creator>
      <dc:date>2014-02-20T14:30:25Z</dc:date>
    </item>
    <item>
      <title>Weird ARP issue</title>
      <link>https://community.cisco.com/t5/network-security/weird-arp-issue/m-p/2439343#M269289</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seems I actually had a little slip in the logic there.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I mean you will only need the Proxy ARP enabled on the interface if you are doing NAT from networks behind other interfaces towards the interface in question (the one answer ARP requests) and use a NAT IP address that is part of the directly connected network of this interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In most typical firewall configurations the only interface that needs to have Proxy ARP enabled in the external interface of your firewall if you have a public subnet connected to the external interface that is big enough to support more than the ASA external interface IP address. Then the ASA needs to use Proxy ARP for you to be able to use the additional public IP address from that subnet as NAT IP address (in other words Proxy ARP is needed for the ASA to reply to the ARP requests from the ISP for the NAT IP addresses you are using)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Feb 2014 14:38:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/weird-arp-issue/m-p/2439343#M269289</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-02-20T14:38:03Z</dc:date>
    </item>
  </channel>
</rss>

