<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Clarification on ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/clarification-on-asa/m-p/2320191#M311069</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I may add that the reason I'm looking to disable Proxy ARP from the interfaces is because the ASA seems to be under a great deal of ARP traffic that is causing network response problems. A lot of that traffic is unnecesary traffic. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Disabling Proxy ARP will not resolve the underlying problem, but might free the ASA a bit of resources (not having to Proxy ARP when not needed). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 11 Oct 2013 20:03:20 GMT</pubDate>
    <dc:creator>Federico Coto Fajardo</dc:creator>
    <dc:date>2013-10-11T20:03:20Z</dc:date>
    <item>
      <title>Clarification on ASA</title>
      <link>https://community.cisco.com/t5/network-security/clarification-on-asa/m-p/2320187#M311059</link>
      <description>&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just a clarification on Proxy ARP on ASAs. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Scenario: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;Web Server 10.1.1.1 -- in ----&amp;nbsp; ASA ---- out ----- Internet&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let's say the WWW server has real IP 10.1.1.1 and static NAT 200.1.1.2&lt;/P&gt;&lt;P&gt;ASA's outside IP is 200.1.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When traffic comes from the Internet to the NAT'ed IP of the Web Server (200.1.1.2), the ASA has to respond with it's own MAC (Proxy ARP). &lt;/P&gt;&lt;P&gt;If disabling Proxy ARP on the outside interface, then traffic will never reach the Web Server from the Internet (unless there's a static ARP entry in the Gateway pointing to the ASA's outside interface). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Same thing happens with dynamic NAT. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="text-decoration: underline; "&gt;Bottom line: &lt;/STRONG&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Can't disable Proxy ARP on ASA if using NAT (to present itself as another IP to another interface), unless there's a static ARP entry on the Next Hop. &lt;/LI&gt;&lt;LI&gt;Can safely disable Proxy ARP on the inside interface (unless there's NAT to present the inside network as something else to another interface)?&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am looking to understand this correctly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you very much, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:51:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/clarification-on-asa/m-p/2320187#M311059</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2019-03-12T02:51:12Z</dc:date>
    </item>
    <item>
      <title>Clarification on ASA</title>
      <link>https://community.cisco.com/t5/network-security/clarification-on-asa/m-p/2320188#M311062</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To my understanding the situation is the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have Proxy ARP disabled on the WAN interface then only WAN interface IP address related ARP requests are answered. ASA wont reply to any ARP request made related to the IP address that different from the IP address of the actual interface on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With regards to the &lt;STRONG&gt;"inside"&lt;/STRONG&gt; interface Proxy ARP I would imagine that the only situation you might need Proxy ARP on it would be if you are Dynamic PAT/NATing or Static NATing something to an IP address belonging to the &lt;STRONG&gt;"inside"&lt;/STRONG&gt; interfaces subnet from behind some other interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Traffic coming to any other destination subnet/IP from behind &lt;STRONG&gt;"inside"&lt;/STRONG&gt; interface would naturally be routed to the interface and no ARP Requests would be used by the device behind &lt;STRONG&gt;"inside"&lt;/STRONG&gt; interface since the destination is not from its network. (other than to determine the GW MAC address of the GW IP which would naturally be the ASA interface which should reply even if the Proxy ARP was disabled on the &lt;STRONG&gt;"inside"&lt;/STRONG&gt; interface)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Atleasts thats how I understand it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Oct 2013 19:24:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/clarification-on-asa/m-p/2320188#M311062</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-11T19:24:05Z</dc:date>
    </item>
    <item>
      <title>Clarification on ASA</title>
      <link>https://community.cisco.com/t5/network-security/clarification-on-asa/m-p/2320189#M311064</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;And I guess if you wanted to host a Web server with Proxy ARP disabled you could always use the &lt;STRONG&gt;"interface"&lt;/STRONG&gt; IP address of the external interface with Static PAT which would enable the connections to work to the server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess the same would apply if you were to PAT something towards the &lt;STRONG&gt;"inside" &lt;/STRONG&gt;using the &lt;STRONG&gt;"interface"&lt;/STRONG&gt; IP address of &lt;STRONG&gt;"inside".&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Oct 2013 19:37:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/clarification-on-asa/m-p/2320189#M311064</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-11T19:37:51Z</dc:date>
    </item>
    <item>
      <title>Clarification on ASA</title>
      <link>https://community.cisco.com/t5/network-security/clarification-on-asa/m-p/2320190#M311067</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you Jouni, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reason I ask is because I have a situation with some ASAs that have around 20 or more interfaces, and to make it interesting they all have dynamic and/or static NAT rules to every other interface. &lt;/P&gt;&lt;P&gt;So I'm trying to understand on which interfaces can I disable Proxy ARP safely without any problems. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Oct 2013 19:56:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/clarification-on-asa/m-p/2320190#M311067</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2013-10-11T19:56:49Z</dc:date>
    </item>
    <item>
      <title>Clarification on ASA</title>
      <link>https://community.cisco.com/t5/network-security/clarification-on-asa/m-p/2320191#M311069</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I may add that the reason I'm looking to disable Proxy ARP from the interfaces is because the ASA seems to be under a great deal of ARP traffic that is causing network response problems. A lot of that traffic is unnecesary traffic. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Disabling Proxy ARP will not resolve the underlying problem, but might free the ASA a bit of resources (not having to Proxy ARP when not needed). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Oct 2013 20:03:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/clarification-on-asa/m-p/2320191#M311069</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2013-10-11T20:03:20Z</dc:date>
    </item>
    <item>
      <title>Clarification on ASA</title>
      <link>https://community.cisco.com/t5/network-security/clarification-on-asa/m-p/2320192#M311071</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is the ASA then connected directly to some L2 network wihtout routing devices between the actual users and the ASA interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Oct 2013 20:19:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/clarification-on-asa/m-p/2320192#M311071</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-11T20:19:35Z</dc:date>
    </item>
    <item>
      <title>Clarification on ASA</title>
      <link>https://community.cisco.com/t5/network-security/clarification-on-asa/m-p/2320193#M311074</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jouni, yes and no &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; &lt;/P&gt;&lt;P&gt;Some interfaces are connected to the L2 network with no L3 devices between users and ASA. &lt;/P&gt;&lt;P&gt;Other interfaces do have a L3 device routing traffic. &lt;/P&gt;&lt;P&gt;All interfaces have static NATs (also dynamic NAT) between each other. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem is the ASA hangs at certain periods of time causing network disruption and we have narrowed it down to many ARP traffic hitting the ASA on almost all interfaces. The ASA won't failover to the other unit, but won't even respond to the console when the problem occurs. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, we think that one solution was to free the ASA from doing Proxy ARP when not needed, and see if that saves us from impacting the ASA so much with the ARP traffic. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Oct 2013 20:27:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/clarification-on-asa/m-p/2320193#M311074</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2013-10-11T20:27:26Z</dc:date>
    </item>
    <item>
      <title>Re: Clarification on ASA</title>
      <link>https://community.cisco.com/t5/network-security/clarification-on-asa/m-p/2320194#M311078</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can't say I have ever troubleshooted a situation where the amount of ARP would have caused a problem with the device operation. Most larger networks are never setup directly to a switched network but rather a core router/switch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is usually more common that I have to determine why ARP isnt getting through some device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I wonder if doing a ARP capture on the firewall would help determine the source of problem more closely or have you tried it?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;capture LAN-ARP ethernet-type arp interface &lt;NAMEIF&gt;&lt;/NAMEIF&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or would this just add to the problem while active.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I look at my own ASAs ARP capture on the WAN interface I can see constant ARP requests for different IP address MAC. Mostly since I have 2x /29 public subnets for testing purposes at home. Good to work for the ISP &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Oct 2013 20:46:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/clarification-on-asa/m-p/2320194#M311078</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-11T20:46:17Z</dc:date>
    </item>
    <item>
      <title>Clarification on ASA</title>
      <link>https://community.cisco.com/t5/network-security/clarification-on-asa/m-p/2320195#M311079</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You're right. We have some underlying design problems and that's causing lots of problems on this network. &lt;/P&gt;&lt;P&gt;There is work been done to correct them all and avoid having this problem in the first place. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But... in the meantime, I want to understand what criteria should I consider to find out if I can safely remove Proxy ARP on a specific interface on the ASA or not. If there are static NAT's on that interface or dynamic (translating to different addresses besides the ASA's interface IP), Proxy ARP cannot be disabled? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Oct 2013 20:56:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/clarification-on-asa/m-p/2320195#M311079</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2013-10-11T20:56:34Z</dc:date>
    </item>
    <item>
      <title>Re: Clarification on ASA</title>
      <link>https://community.cisco.com/t5/network-security/clarification-on-asa/m-p/2320196#M311081</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To my understanding the only situation where you need the Proxy ARP enabled on an ASA interface if NAT/PAT is performed to an IP address belonging to the subnet of that interface but the IP address is NOT the IP address of that interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface GigabitEthernet0/0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nameif LAN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; security-level 100&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; ip address 10.10.10.1 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface GigabitEthernet0/1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nameif DMZ&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; security-level 50&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; ip add 192.168.10.1 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (LAN) 1 10.10.10.100&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (DMZ) 1 192.168.10.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To my understanding the above configurations would required that interface &lt;STRONG&gt;"LAN" &lt;/STRONG&gt;has Proxy ARP enabled as any traffic coming towards the IP address 10.10.10.100 would result a device in the network 10.10.10.0/24 first sending an ARP to determine the MAC address of that IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However if the configurations was only&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (LAN) 1 interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (DMZ) 1 192.168.10.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then interface LAN would not require Proxy ARP enabled as the interface IP address would be the only IP address which MAC address should be determined by the hosts behind LAN and the ASA would answer to this normally as it holds the IP address in its actual interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Most of the environments we deal with nowadays are already running 8.3+ software levels and generaly only have Dynamic PAT/NAT towards external interface and have Proxy ARP enabled. Rest of the interfaces dont have any NAT configured between them and have their Proxy ARP disabled.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then again your configuration might be totally different to what I am used to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hopefully I have not gotten anything wrong.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is also a link a post about ASA ARP behaviour&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.packetu.com/2011/11/07/the-asas-arp-behavior/"&gt;http://www.packetu.com/2011/11/07/the-asas-arp-behavior/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Oct 2013 21:22:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/clarification-on-asa/m-p/2320196#M311081</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-11T21:22:11Z</dc:date>
    </item>
    <item>
      <title>Re: Clarification on ASA</title>
      <link>https://community.cisco.com/t5/network-security/clarification-on-asa/m-p/2320197#M311083</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jouni just to clarify, should the NAT be reversed: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;global (LAN) 1 10.10.10.100&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;nat (DMZ) 1 192.168.10.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Because LAN (security level = 100) and DMZ (security level = 50)? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In other words, the "normal" NAT will be from LAN to DMZ correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (DMZ) ... &lt;/P&gt;&lt;P&gt;nat (LAN) ...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Oct 2013 21:31:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/clarification-on-asa/m-p/2320197#M311083</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2013-10-11T21:31:29Z</dc:date>
    </item>
    <item>
      <title>Clarification on ASA</title>
      <link>https://community.cisco.com/t5/network-security/clarification-on-asa/m-p/2320198#M311085</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Oh right the old format wouldnt probably accept that configurations. I mean when you are doing Dynamic PAT from lower to higher &lt;STRONG&gt;"security-level"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would probably need to to use the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; parameter at the end of the &lt;STRONG&gt;"nat"&lt;/STRONG&gt; command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (LAN) 1 10.10.10.100&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (DMZ) 1 192.168.10.0 255.255.255.0 outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not saying the above Dynamic PAT configurations makes any sense. I would personally never even configure Dynamic PAT/NAT between local interfaces. Just was thinking as you mentioned there was a lot of Dynamic NAT/PAT configurations that I would use an example where the actual PAT address is from a directly connected network but NOT the interface IP address, which would mean that Proxy ARP would need to be active on the interface holding the PAT IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Oct 2013 21:36:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/clarification-on-asa/m-p/2320198#M311085</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-11T21:36:42Z</dc:date>
    </item>
    <item>
      <title>Clarification on ASA</title>
      <link>https://community.cisco.com/t5/network-security/clarification-on-asa/m-p/2320199#M311086</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you Jouni, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The same will be true (following your example), if I also have a static NAT? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (LAN,DMZ) 192.168.10.200 10.10.10.200&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I want the LAN host 10.10.10.200 to be "seen" in the DMZ as 192.168.10.200 this will also mean that I also need Proxy ARP enabled on the DMZ interface? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I mean with the configuration: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;global (LAN) 1 10.10.10.100&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;nat (DMZ) 1 192.168.10.0 255.255.255.0 outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (LAN,DMZ) 192.168.10.200 10.10.10.200&lt;/STRONG&gt;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This means I cannot disable Proxy ARP neither on LAN or DMZ is this correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Oct 2013 21:42:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/clarification-on-asa/m-p/2320199#M311086</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2013-10-11T21:42:29Z</dc:date>
    </item>
    <item>
      <title>Re: Clarification on ASA</title>
      <link>https://community.cisco.com/t5/network-security/clarification-on-asa/m-p/2320200#M311087</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, this is my understanding atleast.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the other hand if the situation was that both the Dynamic PAT and Static NAT used a mapped IP address that doesnt belong to the directly connected network of the mapped interface, neither interface would require Proxy ARP as the device behind either interface would be forwarding the traffic to their default gateway (ASA interface IP) and when the packet reached the interface of the ASA it would match the destination IP address to the configured Static NAT or and existing PAT translation (return traffic) and go through with no Proxy ARP involved in the whole process.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (LAN) 1 10.1.1.100&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (DMZ) 1 192.168.10.0 255.255.255.0 outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (LAN,DMZ) 192.168.1.200 10.10.10.200&amp;nbsp; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Oct 2013 21:55:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/clarification-on-asa/m-p/2320200#M311087</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-11T21:55:09Z</dc:date>
    </item>
    <item>
      <title>Clarification on ASA</title>
      <link>https://community.cisco.com/t5/network-security/clarification-on-asa/m-p/2320201#M311089</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Excellent Jouni, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At least we have the same understanding at this point &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you very much, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Oct 2013 21:57:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/clarification-on-asa/m-p/2320201#M311089</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2013-10-11T21:57:37Z</dc:date>
    </item>
    <item>
      <title>Re: Clarification on ASA</title>
      <link>https://community.cisco.com/t5/network-security/clarification-on-asa/m-p/2320202#M311090</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No problem,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let us know how the situation evolves. Would be interesting to know what is causing the problems. If this is caused by something intentional action rather than normal network behaviour (considering the environment)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Oct 2013 22:01:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/clarification-on-asa/m-p/2320202#M311090</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-11T22:01:46Z</dc:date>
    </item>
    <item>
      <title>Clarification on ASA</title>
      <link>https://community.cisco.com/t5/network-security/clarification-on-asa/m-p/2320203#M311091</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Will do. &lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Oct 2013 22:15:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/clarification-on-asa/m-p/2320203#M311091</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2013-10-11T22:15:30Z</dc:date>
    </item>
    <item>
      <title>Clarification on ASA</title>
      <link>https://community.cisco.com/t5/network-security/clarification-on-asa/m-p/2320204#M311092</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;One more thing: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With this configuration: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;global (LAN) 1 10.1.1.100&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;nat (DMZ) 1 192.168.10.0 255.255.255.0 outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;static (LAN,DMZ) 192.168.1.200 10.10.10.200 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We said that the ASA requires Proxy ARP in both LAN &amp;amp; DMZ in order to be able to respond with it's own MAC address to requests being send to the NATed IP. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Question: &lt;/P&gt;&lt;P&gt;What about if the next L3 device on both interfaces have a static route pointing to the ASA? &lt;/P&gt;&lt;P&gt;For example: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route 192.168.1.200 255.255.255.255 ASA-DMZ-IP &lt;/P&gt;&lt;P&gt;ip route 10.1.1.100 255.255.255.0 ASA-LAN-IP &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Shouldn't this take care that all packets WILL be sent to the ASA (thus removing the need for the ASA to do Proxy ARP)? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Oct 2013 16:21:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/clarification-on-asa/m-p/2320204#M311092</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2013-10-15T16:21:03Z</dc:date>
    </item>
    <item>
      <title>Re: Clarification on ASA</title>
      <link>https://community.cisco.com/t5/network-security/clarification-on-asa/m-p/2320205#M311094</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well if we consider the example setup when the LAN network is 10.10.10.0/24 and the DMZ network is 192.168.10.0/24 and we are NATing DMZ IPs to the LAN network addresses and LAN network addresses to DMZ network addresses...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then it still doesnt remove the fact that the connected L3 device will see this network as directly connected (as we are NATing to the connected network address space from behind the other interface of the ASA). And directly connected network naturally overrides any static route for the same network and therefore the device will ARP for the MAC address of the destination address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Whether there is some way around this behaviour I am not sure&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Oct 2013 16:42:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/clarification-on-asa/m-p/2320205#M311094</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-15T16:42:43Z</dc:date>
    </item>
    <item>
      <title>Re: Clarification on ASA</title>
      <link>https://community.cisco.com/t5/network-security/clarification-on-asa/m-p/2320206#M311095</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jouni, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Correct me if I'm wrong but if you have a more specific route it will indeed overide the directly connected. &lt;/P&gt;&lt;P&gt;Say you have directly connected 10.0.0.0/24 &lt;/P&gt;&lt;P&gt;If you enter a static route to 10.0.0.5/32, then most specific route wins and therefore packets are going to be sent to the ASA which eliminates the need for Proxy ARP on that interface? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Oct 2013 17:38:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/clarification-on-asa/m-p/2320206#M311095</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2013-10-15T17:38:06Z</dc:date>
    </item>
  </channel>
</rss>

