<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA Mac address problem in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-mac-address-problem/m-p/1598656#M568271</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't understand your statement: "... if you are not NATing anything to the inside subnet, you can disable&amp;nbsp; proxy arp on the ASA inside interface so the ASA is not ARPing on behalf&amp;nbsp; of host itself."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What do you mean "so that the ASA is not ARPing for the&lt;EM&gt;&lt;STRONG&gt; host itself&lt;/STRONG&gt;&lt;/EM&gt;"?&amp;nbsp; What host are you referring to?&amp;nbsp; The ASA itself?&amp;nbsp; f there are no static NATs defined on the inside interface, then the ASA will not perform proxy ARP from the inside interface to the inside network, unless there is a explicitly defined static ARP entry in the configuation file.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm still trying to understand why someone would want to disable proxy ARP on an interface.&amp;nbsp; My understanding is that the ASA will only perform a proxy ARP on an interface under 2 conditions: (1) There is a static NAT assigned on that interface and it will proxy ARP on behald of the static NAT global address, or (2) There is a static ARP entry for an address on the interface.&amp;nbsp; The only reason I could see for disabling proxy ARP would be to hide a static NAT such that only adjacent routers with an explicit static route&amp;nbsp; would know to direct packets destined for xxx.yyy.zzz.214 (static NAT Addr)&amp;nbsp; to xxx.yyy.zzz.217 (ASA interface address hosting the static NAT).&amp;nbsp; I must be overlooking something.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 27 Apr 2011 00:21:05 GMT</pubDate>
    <dc:creator>chill</dc:creator>
    <dc:date>2011-04-27T00:21:05Z</dc:date>
    <item>
      <title>ASA Mac address problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-mac-address-problem/m-p/1598651#M568259</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have ASA setup between the core switch and the border internet router.&lt;/P&gt;&lt;P&gt;When we do "show arp" aon the core, there are many IP address (some used, some don't exist) corresponding to the MAC address of the ASA inside interface.&lt;/P&gt;&lt;P&gt;how could we do to identify the source of the problem and how can we fix it ?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:42:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-mac-address-problem/m-p/1598651#M568259</guid>
      <dc:creator>harinirina</dc:creator>
      <dc:date>2019-03-11T19:42:53Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Mac address problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-mac-address-problem/m-p/1598652#M568260</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you are seeing MAC Address of the ASA inside interface for multiple addresses, that means that the ASA is performing proxy arp on the inside interface.&lt;/P&gt;&lt;P&gt;Normally proxy arp is enabled on the outside interface because you might be NATing private server address to different public ip addresses which is virtual on the ASA, therefore, proxy arp needs to be enabled on the outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, are you NATing anything to the inside subnet, if you are not NATing anything to the inside subnet, you can disable proxy arp on the ASA inside interface so the ASA is not ARPing on behalf of host itself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To check if ASA is ARPing for the inside interface:&lt;/P&gt;&lt;P&gt;show run all | inc sysopt&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are seeing "no sysopt noproxyarp inside", that means proxy arp is enabled on the inside interface. To disable it: "sysopt noproxyarp inside". Then perform "clear arp" on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that answers your question.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Feb 2011 17:31:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-mac-address-problem/m-p/1598652#M568260</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-02-01T17:31:10Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Mac address problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-mac-address-problem/m-p/1598653#M568263</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have private IP address on the inside which are accessed by public IP address from the outside. So, in this case, do we need proxy arp on the inside interface or not?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;we checked with "show run all | inc sysopt", here is the output&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no sysopt connection timewait&lt;BR /&gt;sysopt connection&amp;nbsp; tcpmss 1380&lt;BR /&gt;sysopt connection tcpmss minimum 0&lt;BR /&gt;sysopt connection&amp;nbsp; permit-vpn&lt;BR /&gt;sysopt connection reclassify-vpn&lt;BR /&gt;no sysopt connection&amp;nbsp; preserve-vpn-flows&lt;BR /&gt;no sysopt radius ignore-secret&lt;BR /&gt;no sysopt noproxyarp&amp;nbsp; inside&lt;BR /&gt;no sysopt noproxyarp outside&lt;BR /&gt;no sysopt noproxyarp dmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We disabled proxy arp on inside interface with "sysopt noproxyarp inside" and did clear both on the asa and the switch. We have MAC address of the ASA inside interface for multiple IP addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA runs IOS ver 8.3, it's the first time we use this version.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you give more advice?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Feb 2011 07:08:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-mac-address-problem/m-p/1598653#M568263</guid>
      <dc:creator>harinirina</dc:creator>
      <dc:date>2011-02-02T07:08:11Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Mac address problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-mac-address-problem/m-p/1598654#M568266</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry for my last post.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There was a mistake.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it's working fine after desabling proxy arp on interface inside with "sysopt noproxyarp inside".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks Jennifer, your answer is always extremely helpful.&lt;/P&gt;&lt;P&gt;Thanks a lot.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Feb 2011 08:48:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-mac-address-problem/m-p/1598654#M568266</guid>
      <dc:creator>harinirina</dc:creator>
      <dc:date>2011-02-02T08:48:16Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Mac address problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-mac-address-problem/m-p/1598655#M568268</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great to hear, and thanks for the rating.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Feb 2011 10:58:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-mac-address-problem/m-p/1598655#M568268</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-02-02T10:58:06Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Mac address problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-mac-address-problem/m-p/1598656#M568271</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't understand your statement: "... if you are not NATing anything to the inside subnet, you can disable&amp;nbsp; proxy arp on the ASA inside interface so the ASA is not ARPing on behalf&amp;nbsp; of host itself."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What do you mean "so that the ASA is not ARPing for the&lt;EM&gt;&lt;STRONG&gt; host itself&lt;/STRONG&gt;&lt;/EM&gt;"?&amp;nbsp; What host are you referring to?&amp;nbsp; The ASA itself?&amp;nbsp; f there are no static NATs defined on the inside interface, then the ASA will not perform proxy ARP from the inside interface to the inside network, unless there is a explicitly defined static ARP entry in the configuation file.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm still trying to understand why someone would want to disable proxy ARP on an interface.&amp;nbsp; My understanding is that the ASA will only perform a proxy ARP on an interface under 2 conditions: (1) There is a static NAT assigned on that interface and it will proxy ARP on behald of the static NAT global address, or (2) There is a static ARP entry for an address on the interface.&amp;nbsp; The only reason I could see for disabling proxy ARP would be to hide a static NAT such that only adjacent routers with an explicit static route&amp;nbsp; would know to direct packets destined for xxx.yyy.zzz.214 (static NAT Addr)&amp;nbsp; to xxx.yyy.zzz.217 (ASA interface address hosting the static NAT).&amp;nbsp; I must be overlooking something.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Apr 2011 00:21:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-mac-address-problem/m-p/1598656#M568271</guid>
      <dc:creator>chill</dc:creator>
      <dc:date>2011-04-27T00:21:05Z</dc:date>
    </item>
  </channel>
</rss>

