<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Firewall starts randomly responding to ARP requests for other IP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firewall-starts-randomly-responding-to-arp-requests-for-other/m-p/1803028#M532759</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is a feature called proxy ARP on the ASA firewall that causes the ASA to respond for ARP request if it has a NAT configured. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Most likely this is caused by an static (inside,inside) with the same subnet twice, an outside NAT etc. Would you please paste your NAT configuration? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Other thing that you can do is to disable proxy arp on the inside interface to make the firewall stop doing that. Here is how you do it: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# sysopt noproxyarp inside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 23 Aug 2011 17:26:38 GMT</pubDate>
    <dc:creator>Maykol Rojas</dc:creator>
    <dc:date>2011-08-23T17:26:38Z</dc:date>
    <item>
      <title>Firewall starts randomly responding to ARP requests for other IPs</title>
      <link>https://community.cisco.com/t5/network-security/firewall-starts-randomly-responding-to-arp-requests-for-other/m-p/1803026#M532750</link>
      <description>&lt;P&gt;I have my firewall on IP 192.168.0.1 (for example, real IP is a class C address).&amp;nbsp; I have a web server (Ubuntu 10.04, though this happened before with an 8.04 box as well) on ip 192.168.0.101.&amp;nbsp; Everything will be functioning fine, and I won't have any issues for a while.&amp;nbsp; Then, randomly I'll have problems getting to my web server, getting disconnected from SSH sessions.&amp;nbsp; I go to one of my linux boxes and do an "arping -b 192.168.0.101" and I will get&amp;nbsp; two responses, one from my firewall and one from the box, as illustrated below.&amp;nbsp; The only way to correct the issue that I've run into is to reload the firewall, which will then behave properly again until it randomly decides to start answering ARP requests on the other IP again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="mailto:nwiadmin@vm-test-lx:~$" target="_blank"&gt;nwiadmin@vm-test-lx:~$&lt;/A&gt; arping -b if-webdevint4-lx&lt;BR /&gt;WARNING: interface is ignored: Operation not permitted&lt;BR /&gt;ARPING 192.168.0.101 from 192.168.0.168 eth0&lt;BR /&gt;Unicast reply from 192.168.0.101 [xx:xx:xx:xx:xx:xx]&amp;nbsp; 2.309ms&lt;BR /&gt;Unicast reply from 192.168.0.101 [yy:yy:yy:yy:yy:yy]&amp;nbsp; 2.434ms&lt;BR /&gt;Unicast reply from 192.168.0.101 [xx:xx:xx:xx:xx:xx]&amp;nbsp; 2.280ms&lt;BR /&gt;Unicast reply from 192.168.0.101 [yy:yy:yy:yy:yy:yy]&amp;nbsp; 2.377ms&lt;BR /&gt;Unicast reply from 192.168.0.101 [xx:xx:xx:xx:xx:xx]&amp;nbsp; 2.129ms&lt;BR /&gt;Unicast reply from 192.168.0.101 [yy:yy:yy:yy:yy:yy]&amp;nbsp; 2.221ms&lt;BR /&gt;Unicast reply from 192.168.0.101 [xx:xx:xx:xx:xx:xx]&amp;nbsp; 1.839ms&lt;BR /&gt;Unicast reply from 192.168.0.101 [yy:yy:yy:yy:yy:yy]&amp;nbsp; 1.934ms&lt;BR /&gt;Sent 4 probes (4 broadcast(s))&lt;BR /&gt;Received 8 response(s)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Reloaded firewall&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="mailto:nwiadmin@vm-test-lx:~$" target="_blank"&gt;nwiadmin@vm-test-lx:~$&lt;/A&gt; arping -b if-webdevint4-lx&lt;BR /&gt;WARNING: interface is ignored: Operation not permitted&lt;BR /&gt;ARPING 192.168.0.101 from 192.168.0.168 eth0&lt;BR /&gt;Unicast reply from 192.168.0.101 [yy:yy:yy:yy:yy:yy]&amp;nbsp; 2.839ms&lt;BR /&gt;Unicast reply from 192.168.0.101 [yy:yy:yy:yy:yy:yy]&amp;nbsp; 1.935ms&lt;BR /&gt;Unicast reply from 192.168.0.101 [yy:yy:yy:yy:yy:yy]&amp;nbsp; 1.758ms&lt;BR /&gt;Unicast reply from 192.168.0.101 [yy:yy:yy:yy:yy:yy]&amp;nbsp; 2.733ms&lt;BR /&gt;Unicast reply from 192.168.0.101 [yy:yy:yy:yy:yy:yy]&amp;nbsp; 9.568ms&lt;BR /&gt;Unicast reply from 192.168.0.101 [yy:yy:yy:yy:yy:yy]&amp;nbsp; 1.931ms&lt;BR /&gt;Unicast reply from 192.168.0.101 [yy:yy:yy:yy:yy:yy]&amp;nbsp; 2.283ms&lt;BR /&gt;Unicast reply from 192.168.0.101 [yy:yy:yy:yy:yy:yy]&amp;nbsp; 1.756ms&lt;BR /&gt;Unicast reply from 192.168.0.101 [yy:yy:yy:yy:yy:yy]&amp;nbsp; 2.070ms&lt;BR /&gt;Sent 9 probes (9 broadcast(s))&lt;BR /&gt;Received 9 response(s)&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:15:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-starts-randomly-responding-to-arp-requests-for-other/m-p/1803026#M532750</guid>
      <dc:creator>rywatters</dc:creator>
      <dc:date>2019-03-11T21:15:51Z</dc:date>
    </item>
    <item>
      <title>Firewall starts randomly responding to ARP requests for other IP</title>
      <link>https://community.cisco.com/t5/network-security/firewall-starts-randomly-responding-to-arp-requests-for-other/m-p/1803027#M532754</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What happens on the firewall, due you see the arp entry there for the host??? If no can you assign a static arp to your server and monitor it for a while.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Aug 2011 17:25:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-starts-randomly-responding-to-arp-requests-for-other/m-p/1803027#M532754</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-08-23T17:25:30Z</dc:date>
    </item>
    <item>
      <title>Firewall starts randomly responding to ARP requests for other IP</title>
      <link>https://community.cisco.com/t5/network-security/firewall-starts-randomly-responding-to-arp-requests-for-other/m-p/1803028#M532759</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is a feature called proxy ARP on the ASA firewall that causes the ASA to respond for ARP request if it has a NAT configured. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Most likely this is caused by an static (inside,inside) with the same subnet twice, an outside NAT etc. Would you please paste your NAT configuration? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Other thing that you can do is to disable proxy arp on the inside interface to make the firewall stop doing that. Here is how you do it: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# sysopt noproxyarp inside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Aug 2011 17:26:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-starts-randomly-responding-to-arp-requests-for-other/m-p/1803028#M532759</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-08-23T17:26:38Z</dc:date>
    </item>
    <item>
      <title>Firewall starts randomly responding to ARP requests for other IP</title>
      <link>https://community.cisco.com/t5/network-security/firewall-starts-randomly-responding-to-arp-requests-for-other/m-p/1803029#M532763</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I just switched on sysopt noproxyarp inside as I really shouldn't need that sort of behavior, and I've got it documented if any other issues come up.&amp;nbsp; My NAT config is sanitized and included below, but is fairly messy.&amp;nbsp; I need time to clean up all my configs, but it's IT....&amp;nbsp; Never enough time.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (DMZ,any) source static obj-172.16.100.0 obj-172.16.100.0 destination static DM_INLINE_NETWORK_20 DM_INLINE_NETWORK_20&lt;/P&gt;&lt;P&gt;nat (outside,outside) source static obj-192.168.30.10 obj-192.168.30.10 destination static obj-192.168.15.0 obj-192.168.15.0&lt;/P&gt;&lt;P&gt;nat (inside,any) source static obj-192.168.0.0 obj-192.168.0.0 destination static obj-172.16.100.0 obj-172.16.100.0 unidirectional&lt;/P&gt;&lt;P&gt;nat (inside,any) source static obj-192.168.0.0 obj-192.168.0.0 destination static obj-192.168.11.0 obj-192.168.11.0&lt;/P&gt;&lt;P&gt;nat (inside,any) source static DM_INLINE_NETWORK_4 DM_INLINE_NETWORK_4 destination static obj-192.168.30.0 obj-192.168.30.0&lt;/P&gt;&lt;P&gt;nat (inside,any) source static DM_INLINE_NETWORK_2 DM_INLINE_NETWORK_2 destination static obj-192.168.30.0 obj-192.168.30.0 unidirectional&lt;/P&gt;&lt;P&gt;nat (inside,any) source static DM_INLINE_NETWORK_5 DM_INLINE_NETWORK_5 destination static obj-192.168.30.0 obj-192.168.30.0 unidirectional&lt;/P&gt;&lt;P&gt;nat (inside,any) source static DM_INLINE_NETWORK_6 DM_INLINE_NETWORK_6 destination static obj-192.168.10.0 obj-192.168.10.0&lt;/P&gt;&lt;P&gt;nat (inside,any) source static DM_INLINE_NETWORK_7 DM_INLINE_NETWORK_7 destination static obj-192.168.11.0 obj-192.168.11.0&lt;/P&gt;&lt;P&gt;nat (inside,any) source static DM_INLINE_NETWORK_3 DM_INLINE_NETWORK_3 destination static obj-192.168.30.0 obj-192.168.30.0 unidirectional&lt;/P&gt;&lt;P&gt;nat (inside,any) source static DM_INLINE_NETWORK_1 DM_INLINE_NETWORK_1 destination static obj-192.168.13.0 obj-192.168.13.0 unidirectional&lt;/P&gt;&lt;P&gt;nat (inside,any) source static DM_INLINE_NETWORK_9 DM_INLINE_NETWORK_9 destination static obj-192.168.13.0 obj-192.168.13.0 unidirectional&lt;/P&gt;&lt;P&gt;nat (inside,any) source static DM_INLINE_NETWORK_10 DM_INLINE_NETWORK_10 destination static obj-192.168.13.0 obj-192.168.13.0 unidirectional&lt;/P&gt;&lt;P&gt;nat (inside,any) source static DM_INLINE_NETWORK_12 DM_INLINE_NETWORK_12 destination static k192.168.14.0 k192.168.14.0&lt;/P&gt;&lt;P&gt;nat (inside,any) source static obj-172.16.100.0 obj-172.16.100.0 destination static obj-192.168.0.192 obj-192.168.0.192 unidirectional&lt;/P&gt;&lt;P&gt;nat (inside,any) source static obj-192.168.0.0 obj-192.168.0.0 destination static obj-192.168.0.192 obj-192.168.0.192 unidirectional&lt;/P&gt;&lt;P&gt;nat (inside,any) source static DM_INLINE_NETWORK_13 DM_INLINE_NETWORK_13 destination static k192.168.14.0 k192.168.14.0&lt;/P&gt;&lt;P&gt;nat (inside,any) source static obj-192.168.10.0 obj-192.168.10.0 destination static DM_INLINE_NETWORK_11 DM_INLINE_NETWORK_11&lt;/P&gt;&lt;P&gt;nat (inside,any) source static DM_INLINE_NETWORK_14 DM_INLINE_NETWORK_14 destination static saLAN saLAN unidirectional&lt;/P&gt;&lt;P&gt;nat (inside,any) source static saLAN saLAN unidirectional&lt;/P&gt;&lt;P&gt;nat (inside,any) source static obj-192.168.12.0 obj-192.168.12.0 unidirectional&lt;/P&gt;&lt;P&gt;nat (inside,any) source static DM_INLINE_NETWORK_16 DM_INLINE_NETWORK_16 destination static scLAN scLAN unidirectional&lt;/P&gt;&lt;P&gt;nat (inside,any) source static scLAN scLAN destination static obj-172.16.100.0 obj-172.16.100.0 unidirectional&lt;/P&gt;&lt;P&gt;nat (inside,any) source static obj-172.16.100.0 obj-172.16.100.0 destination static obj-192.168.15.0 obj-192.168.15.0 unidirectional&lt;/P&gt;&lt;P&gt;nat (inside,any) source static obj-192.168.15.0 obj-192.168.15.0 destination static obj-172.16.100.0 obj-172.16.100.0 unidirectional&lt;/P&gt;&lt;P&gt;nat (inside,any) source static DM_INLINE_NETWORK_15 DM_INLINE_NETWORK_15 destination static obj-10.14.58.0 obj-10.14.58.0 unidirectional&lt;/P&gt;&lt;P&gt;nat (inside,any) source static obj-10.14.58.0 obj-10.14.58.0 destination static obj-172.16.100.0 obj-172.16.100.0 unidirectional&lt;/P&gt;&lt;P&gt;nat (inside,any) source static obj-192.168.0.0 obj-192.168.0.0 destination static obj-192.168.0.0 obj-192.168.0.0&lt;/P&gt;&lt;P&gt;nat (inside,any) source static DM_INLINE_NETWORK_17 DM_INLINE_NETWORK_17 destination static lao2 lao2&lt;/P&gt;&lt;P&gt;nat (inside,any) source static DM_INLINE_NETWORK_18 DM_INLINE_NETWORK_18 destination static inl inl&lt;/P&gt;&lt;P&gt;nat (inside,inside) source static obj-192.168.15.0 obj-192.168.15.0 destination static obj-172.16.100.0 obj-172.16.100.0 unidirectional&lt;/P&gt;&lt;P&gt;nat (inside,inside) source static obj-192.168.15.0 obj-192.168.15.0 destination static obj-192.168.30.0 obj-192.168.30.0 unidirectional&lt;/P&gt;&lt;P&gt;nat (inside,inside) source static obj-192.168.30.0 obj-192.168.30.0 destination static obj-192.168.15.0 obj-192.168.15.0 unidirectional&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static obj-192.168.0.35 obj-x.x138.226 service obj-tcp-source-eq-80 obj-tcp-source-eq-80&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static obj-192.168.0.35 obj-x.x138.226 service obj-tcp-source-eq-52230 obj-tcp-source-eq-52230&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static obj-192.168.0.30 obj-x.x138.227 service obj-tcp-source-eq-80 obj-tcp-source-eq-80&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static obj-192.168.0.19 obj-x.x138.228 service obj-tcp-source-eq-443 obj-tcp-source-eq-443&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static obj-192.168.0.19 obj-x.x138.228 service obj-tcp-source-eq-80 obj-tcp-source-eq-80&lt;/P&gt;&lt;P&gt;nat (DMZ,outside) source static obj-172.16.100.8 obj-x.x138.231 service obj-tcp-source-eq-80 obj-tcp-source-eq-80&lt;/P&gt;&lt;P&gt;nat (DMZ,outside) source static obj-172.16.100.8 obj-x.x138.231 service obj-tcp-source-eq-22 obj-tcp-source-eq-22&lt;/P&gt;&lt;P&gt;nat (DMZ,outside) source static obj-172.16.100.0 obj-172.16.100.0 destination static obj-192.168.10.0 obj-192.168.10.0 unidirectional&lt;/P&gt;&lt;P&gt;nat (DMZ,outside) source static obj-172.16.100.0 obj-172.16.100.0 destination static obj-192.168.11.0 obj-192.168.11.0 unidirectional&lt;/P&gt;&lt;P&gt;nat (DMZ,outside) source static obj-172.16.100.0 obj-172.16.100.0 destination static obj-192.168.0.0 obj-192.168.0.0 unidirectional&lt;/P&gt;&lt;P&gt;nat (DMZ,outside) source static obj-172.16.100.0 obj-172.16.100.0 destination static obj-192.168.30.0 obj-192.168.30.0 unidirectional&lt;/P&gt;&lt;P&gt;nat (DMZ,outside) source static obj-172.16.100.0 obj-172.16.100.0 destination static obj-192.168.13.0 obj-192.168.13.0 unidirectional&lt;/P&gt;&lt;P&gt;nat (DMZ,outside) source static obj-192.168.0.0 obj-192.168.0.0 destination static obj-192.168.0.220 obj-192.168.0.220 unidirectional&lt;/P&gt;&lt;P&gt;nat (DMZ,outside) source static obj-172.16.100.0 obj-172.16.100.0 destination static obj-192.168.0.220 obj-192.168.0.220 unidirectional&lt;/P&gt;&lt;P&gt;nat (DMZ,outside) source static obj-172.16.100.0 obj-172.16.100.0 destination static k192.168.14.0 k192.168.14.0&lt;/P&gt;&lt;P&gt;nat (DMZ,outside) source static obj-172.16.100.0 obj-172.16.100.0 destination static obj-192.168.12.0 obj-192.168.12.0 unidirectional&lt;/P&gt;&lt;P&gt;nat (DMZ,outside) source static obj-172.16.100.0 obj-172.16.100.0 destination static obj-10.14.58.0 obj-10.14.58.0 unidirectional&lt;/P&gt;&lt;P&gt;nat (DMZ,outside) source static obj-172.16.100.0 obj-172.16.100.0 destination static lao2 lao2 unidirectional&lt;/P&gt;&lt;P&gt;nat (outside,DMZ) source static inl inl destination static obj-172.16.100.0 obj-172.16.100.0&lt;/P&gt;&lt;P&gt;nat (DMZ,outside) source static obj-172.16.100.0 obj-172.16.100.0 destination static inl inl&lt;/P&gt;&lt;P&gt;nat (DMZ,DMZ) source static obj-172.16.100.0 obj-172.16.100.0 destination static obj-192.168.10.0 obj-192.168.10.0 unidirectional&lt;/P&gt;&lt;P&gt;nat (DMZ,DMZ) source static obj-172.16.100.0 obj-172.16.100.0 destination static obj-192.168.11.0 obj-192.168.11.0 unidirectional&lt;/P&gt;&lt;P&gt;nat (DMZ,DMZ) source static obj-172.16.100.0 obj-172.16.100.0 destination static obj-192.168.0.0 obj-192.168.0.0 unidirectional&lt;/P&gt;&lt;P&gt;nat (DMZ,DMZ) source static obj-172.16.100.0 obj-172.16.100.0 destination static obj-192.168.30.0 obj-192.168.30.0 unidirectional&lt;/P&gt;&lt;P&gt;nat (DMZ,DMZ) source static obj-172.16.100.0 obj-172.16.100.0 destination static obj-192.168.13.0 obj-192.168.13.0 unidirectional&lt;/P&gt;&lt;P&gt;nat (DMZ,DMZ) source static obj-192.168.0.0 obj-192.168.0.0 destination static obj-192.168.0.220 obj-192.168.0.220 unidirectional&lt;/P&gt;&lt;P&gt;nat (DMZ,DMZ) source static obj-172.16.100.0 obj-172.16.100.0 destination static obj-192.168.0.220 obj-192.168.0.220 unidirectional&lt;/P&gt;&lt;P&gt;nat (DMZ,DMZ) source static obj-172.16.100.0 obj-172.16.100.0 destination static k192.168.14.0 k192.168.14.0&lt;/P&gt;&lt;P&gt;nat (DMZ,DMZ) source static obj-172.16.100.0 obj-172.16.100.0 destination static obj-192.168.12.0 obj-192.168.12.0 unidirectional&lt;/P&gt;&lt;P&gt;nat (DMZ,DMZ) source static obj-172.16.100.0 obj-172.16.100.0 destination static obj-10.14.58.0 obj-10.14.58.0 unidirectional&lt;/P&gt;&lt;P&gt;nat (DMZ,DMZ) source static obj-172.16.100.0 obj-172.16.100.0 destination static lao2 lao2 unidirectional&lt;/P&gt;&lt;P&gt;nat (DMZ,DMZ) source static obj-172.16.100.0 obj-172.16.100.0 destination static inl inl&lt;/P&gt;&lt;P&gt;nat (DMZ,inside) source static obj-172.16.100.0 obj-172.16.100.0 destination static obj-192.168.15.0 obj-192.168.15.0 unidirectional&lt;/P&gt;&lt;P&gt;nat (DMZ,DMZ) source static obj-172.16.100.0 obj-172.16.100.0 destination static obj-192.168.15.0 obj-192.168.15.0 unidirectional&lt;/P&gt;&lt;P&gt;nat (inside,any) source static obj-192.168.0.0 obj-192.168.0.0 destination static obj-192.168.30.0 obj-192.168.30.0&lt;/P&gt;&lt;P&gt;nat (inside,any) source static DM_INLINE_NETWORK_8 DM_INLINE_NETWORK_8 destination static obj-192.168.12.0 obj-192.168.12.0&lt;/P&gt;&lt;P&gt;nat (inside,any) source static DM_INLINE_NETWORK_19 DM_INLINE_NETWORK_19 destination static inl inl&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static obj-192.168.0.19 obj-x.x138.228 service tcp6001 tcp6001&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static obj-192.168.0.59 obj-x.x138.229&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static obj-192.168.0.75 obj-x.x138.232&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static obj-192.168.0.72 obj-x.x138.230 service obj-tcp-source-eq-80 obj-tcp-source-eq-80&lt;/P&gt;&lt;P&gt;nat (DMZ,outside) source static obj-172.16.100.0 obj-172.16.100.0 destination static DM_INLINE_NETWORK_25 DM_INLINE_NETWORK_25&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network obj-192.168.0.13&lt;/P&gt;&lt;P&gt; nat (inside,outside) static x.x143.37&lt;/P&gt;&lt;P&gt;object network obj-192.168.0.250&lt;/P&gt;&lt;P&gt; nat (inside,outside) static x.x143.42&lt;/P&gt;&lt;P&gt;object network obj-192.168.0.253&lt;/P&gt;&lt;P&gt; nat (inside,outside) static x.x143.56&lt;/P&gt;&lt;P&gt;object network obj-192.168.0.28&lt;/P&gt;&lt;P&gt; nat (inside,outside) static x.x143.45&lt;/P&gt;&lt;P&gt;object network obj-192.168.0.149&lt;/P&gt;&lt;P&gt; nat (inside,outside) static x.x143.52&lt;/P&gt;&lt;P&gt;object network obj-192.168.0.252&lt;/P&gt;&lt;P&gt; nat (inside,outside) static x.x143.57&lt;/P&gt;&lt;P&gt;object network obj-192.168.0.77&lt;/P&gt;&lt;P&gt; nat (inside,outside) static x.x143.53&lt;/P&gt;&lt;P&gt;object network obj-192.168.0.22&lt;/P&gt;&lt;P&gt; nat (inside,outside) static x.x143.54&lt;/P&gt;&lt;P&gt;object network obj-192.168.0.63&lt;/P&gt;&lt;P&gt; nat (inside,outside) static x.x143.41&lt;/P&gt;&lt;P&gt;object network obj-192.168.0.141&lt;/P&gt;&lt;P&gt; nat (inside,outside) static x.x143.58&lt;/P&gt;&lt;P&gt;object network obj-192.168.0.80&lt;/P&gt;&lt;P&gt; nat (inside,outside) static x.x143.44&lt;/P&gt;&lt;P&gt;object network obj-192.168.0.31&lt;/P&gt;&lt;P&gt; nat (inside,outside) static x.x143.43&lt;/P&gt;&lt;P&gt;object network obj-192.168.0.125&lt;/P&gt;&lt;P&gt; nat (inside,outside) static x.x143.39&lt;/P&gt;&lt;P&gt;object network obj-192.168.0.171&lt;/P&gt;&lt;P&gt; nat (inside,outside) static x.x143.59&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; nat (inside,outside) dynamic x.x143.35&lt;/P&gt;&lt;P&gt;object network obj_any-01&lt;/P&gt;&lt;P&gt; nat (DMZ,outside) dynamic x.x143.35&lt;/P&gt;&lt;P&gt;object network obj-172.16.100.7&lt;/P&gt;&lt;P&gt; nat (DMZ,outside) static x.x143.46&lt;/P&gt;&lt;P&gt;object network obj-172.16.100.13&lt;/P&gt;&lt;P&gt; nat (DMZ,outside) static x.x143.50&lt;/P&gt;&lt;P&gt;object network obj-172.16.100.10&lt;/P&gt;&lt;P&gt; nat (DMZ,outside) static x.x143.55&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Aug 2011 17:41:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-starts-randomly-responding-to-arp-requests-for-other/m-p/1803029#M532763</guid>
      <dc:creator>rywatters</dc:creator>
      <dc:date>2011-08-23T17:41:41Z</dc:date>
    </item>
    <item>
      <title>Firewall starts randomly responding to ARP requests for other IP</title>
      <link>https://community.cisco.com/t5/network-security/firewall-starts-randomly-responding-to-arp-requests-for-other/m-p/1803030#M532773</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Lots of Nats there... some of them have objects so I can really tell which one will cause the failure, however if you dont need the behavior on the inside, you should not have any problems from now on. Let me know if something comes up. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Aug 2011 17:47:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-starts-randomly-responding-to-arp-requests-for-other/m-p/1803030#M532773</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-08-23T17:47:30Z</dc:date>
    </item>
    <item>
      <title>Firewall starts randomly responding to ARP requests for other IP</title>
      <link>https://community.cisco.com/t5/network-security/firewall-starts-randomly-responding-to-arp-requests-for-other/m-p/1803031#M532776</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Finally found everything over the weekend.&amp;nbsp; I use WebVPN and AnyConnect with our ASA firewall.&amp;nbsp; Found that a user was getting connected on AnyConnect but was having problems getting to anything.&amp;nbsp; Their address getting assigned to them was the same as the address the server was pulling, so when the server was set up the address wasn't pulled from the DHCP pool like it should have been.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Aug 2011 19:10:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-starts-randomly-responding-to-arp-requests-for-other/m-p/1803031#M532776</guid>
      <dc:creator>rywatters</dc:creator>
      <dc:date>2011-08-29T19:10:32Z</dc:date>
    </item>
  </channel>
</rss>

