<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Strange Entries in ARP Table in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/strange-entries-in-arp-table/m-p/1847799#M459655</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Besides defined static ARPs, the ASA will also add arp entries for xlates (NATs).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 09 Feb 2012 23:48:54 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2012-02-09T23:48:54Z</dc:date>
    <item>
      <title>Strange Entries in ARP Table</title>
      <link>https://community.cisco.com/t5/network-security/strange-entries-in-arp-table/m-p/1847797#M459653</link>
      <description>&lt;P&gt;I need some advice on this topic.&amp;nbsp; I am seeing strange entries in my ARP table on my ASA 5510.&amp;nbsp; We do not use any static ARP on the firewall at all.&amp;nbsp; There are several dynamic arp entries being created that are not local to my network, yet they show up on the Management(Inside) interface.&amp;nbsp; I am pretty new to this so I may just not fully understand how/why a dynamic ARP entry is create on the inside interface of my firewall.&amp;nbsp; I see all of my local IP's in this table, but am concerned with the ones that are not local.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:27:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/strange-entries-in-arp-table/m-p/1847797#M459653</guid>
      <dc:creator>sabinj</dc:creator>
      <dc:date>2019-03-11T22:27:18Z</dc:date>
    </item>
    <item>
      <title>Strange Entries in ARP Table</title>
      <link>https://community.cisco.com/t5/network-security/strange-entries-in-arp-table/m-p/1847798#M459654</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you confirm if you do not have any static arp configured on your asa:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -Show run arp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also you said its on your managment interface, where is this port on the ASA going to ( connected to)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Feb 2012 22:26:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/strange-entries-in-arp-table/m-p/1847798#M459654</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-02-09T22:26:28Z</dc:date>
    </item>
    <item>
      <title>Strange Entries in ARP Table</title>
      <link>https://community.cisco.com/t5/network-security/strange-entries-in-arp-table/m-p/1847799#M459655</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Besides defined static ARPs, the ASA will also add arp entries for xlates (NATs).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Feb 2012 23:48:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/strange-entries-in-arp-table/m-p/1847799#M459655</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2012-02-09T23:48:54Z</dc:date>
    </item>
    <item>
      <title>Strange Entries in ARP Table</title>
      <link>https://community.cisco.com/t5/network-security/strange-entries-in-arp-table/m-p/1847800#M459656</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes I can confirm that there are no static arps configured.&amp;nbsp; &lt;/P&gt;&lt;P&gt;sho run arp: no results returned&amp;nbsp; &lt;/P&gt;&lt;P&gt;We don't NAT to any of the addresses that are showing up in the ARP table, they are addresses that are completely foreignto the networks that we access on our known networks.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Feb 2012 01:22:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/strange-entries-in-arp-table/m-p/1847800#M459656</guid>
      <dc:creator>sabinj</dc:creator>
      <dc:date>2012-02-10T01:22:14Z</dc:date>
    </item>
    <item>
      <title>Strange Entries in ARP Table</title>
      <link>https://community.cisco.com/t5/network-security/strange-entries-in-arp-table/m-p/1847801#M459657</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Whats more troubling is the fact they are showing up on my inside interface.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Feb 2012 01:30:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/strange-entries-in-arp-table/m-p/1847801#M459657</guid>
      <dc:creator>sabinj</dc:creator>
      <dc:date>2012-02-10T01:30:22Z</dc:date>
    </item>
    <item>
      <title>Strange Entries in ARP Table</title>
      <link>https://community.cisco.com/t5/network-security/strange-entries-in-arp-table/m-p/1847802#M459658</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So they are showing up on the inside and also managment interface? Right?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Feb 2012 01:37:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/strange-entries-in-arp-table/m-p/1847802#M459658</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-02-10T01:37:01Z</dc:date>
    </item>
    <item>
      <title>Re: Strange Entries in ARP Table</title>
      <link>https://community.cisco.com/t5/network-security/strange-entries-in-arp-table/m-p/1847803#M459659</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello, In our setup the management interface is also the inside interface. We do not dedicate an interface to management only. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Feb 2012 01:50:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/strange-entries-in-arp-table/m-p/1847803#M459659</guid>
      <dc:creator>sabinj</dc:creator>
      <dc:date>2012-02-10T01:50:19Z</dc:date>
    </item>
    <item>
      <title>Re: Strange Entries in ARP Table</title>
      <link>https://community.cisco.com/t5/network-security/strange-entries-in-arp-table/m-p/1847804#M459660</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hmmm, is the ASA the only path to get in or get out of your network?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Feb 2012 02:03:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/strange-entries-in-arp-table/m-p/1847804#M459660</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-02-10T02:03:00Z</dc:date>
    </item>
    <item>
      <title>Re: Strange Entries in ARP Table</title>
      <link>https://community.cisco.com/t5/network-security/strange-entries-in-arp-table/m-p/1847805#M459661</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes that is correct.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sabin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Feb 2012 02:10:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/strange-entries-in-arp-table/m-p/1847805#M459661</guid>
      <dc:creator>sabinj</dc:creator>
      <dc:date>2012-02-10T02:10:24Z</dc:date>
    </item>
    <item>
      <title>Re: Strange Entries in ARP Table</title>
      <link>https://community.cisco.com/t5/network-security/strange-entries-in-arp-table/m-p/1847806#M459662</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I were in your place I would start inmediatly to investigate what is going on in here because looks like there are devices on the internal network that do not belong to your company, if you have their ip addresses I would definitly shun them&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know what you find out!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Feb 2012 17:37:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/strange-entries-in-arp-table/m-p/1847806#M459662</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-02-10T17:37:03Z</dc:date>
    </item>
    <item>
      <title>Strange Entries in ARP Table</title>
      <link>https://community.cisco.com/t5/network-security/strange-entries-in-arp-table/m-p/1847807#M459663</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you doing anything that might use Reverse Route Injection?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you show us the routes configured on the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Feb 2012 17:46:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/strange-entries-in-arp-table/m-p/1847807#M459663</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2012-02-10T17:46:33Z</dc:date>
    </item>
    <item>
      <title>Strange Entries in ARP Table</title>
      <link>https://community.cisco.com/t5/network-security/strange-entries-in-arp-table/m-p/1847808#M459664</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Richard,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We had reverse route injection selected on our L2L cryptomap rule.&amp;nbsp; It really was not needed so I disabled it.&amp;nbsp; However I still am getting some of the addresses popping up.&amp;nbsp; I did a lookup on them and most are coming back as the following..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Reverse lookup for addresses below: .deploy.akamaitechnologies.com&lt;/P&gt;&lt;P&gt;23.1.217.83&amp;nbsp; whois = Domain Name: AKAMAITECHNOLOGIES.COM&lt;/P&gt;&lt;P&gt;65.197.244.80&amp;nbsp; whois = Domain Name: AKAMAITECHNOLOGIES.COM&lt;/P&gt;&lt;P&gt;65.197.244.82&amp;nbsp; whois = Domain Name: AKAMAITECHNOLOGIES.COM&lt;/P&gt;&lt;P&gt;72.246.225.83&amp;nbsp; whois = AKAMAITECHNOLOGIES.COM&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Apparently this AKAMAITECHNOLOGIES.COM provide deployment services and bandwidth for companies such as Microsoft and many more.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No results&lt;/P&gt;&lt;P&gt;206.160.105.254&amp;nbsp; whois = Sprint.com&lt;/P&gt;&lt;P&gt;204.95.60.12&amp;nbsp; whois = Sprint.com&lt;/P&gt;&lt;P&gt;112.80.48.236 whois = Something in China...Blocked this network at firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Reverse lookup for addresses below:&amp;nbsp; dns-redir-lb-02.tampabay.rr.com&lt;/P&gt;&lt;P&gt;65.32.5.112&lt;/P&gt;&lt;P&gt;65.32.5.111&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A little more background on our setup.&amp;nbsp; We have a very small network with no more than 80 connected devices.&amp;nbsp; All devices have been accounted for.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have a L2L VPN tunnel to our client (did have Reverse route injection enable/now disabled as not needed).&amp;nbsp; Here we use a dynamic policy NAT to NAT our internal hosts to an address space (Provided by ISP) usable in our clients network.&amp;nbsp; The nat is configured so packets destined for client network on VPN tunnel get hit a pool of addresses and the source IP is then translated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are also using PAT, which is used for packets not destined for the vpn tunnel (like the web).&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is most puzzling, is if I turn off the PAT and delete the dynamic policy nat, then recreate a new dynamic nat with any any to the pool of addresses, these strange addresses do not show up in ARP table.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Feb 2012 21:48:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/strange-entries-in-arp-table/m-p/1847808#M459664</guid>
      <dc:creator>sabinj</dc:creator>
      <dc:date>2012-02-10T21:48:09Z</dc:date>
    </item>
  </channel>
</rss>

