<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ARP issue and PIX firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/arp-issue-and-pix-firewall/m-p/145727#M608448</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am sorry, the alias option I was refering to was the arp command....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ARP INSIDE n.n.n.n hhhh.hhhh.hhhh ALIAS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We were using this form because the firewall was not advertising the mac address of inside to the outside interface.   This worked fine until a default changed in a pix release.   Then we started seeing inside hosts with bogus arp tables and communications would come to a halt.  The servers would starting seeing the pix's mac address for the correct entries.  We also tried the sysopt noproxyarp if_name suggestion, but it did not work.   We have been running our configs with:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ARP INSIDE n.n.n.n hhhh.hhhh.hhhh &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;with no problems for about a year.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 11 Mar 2003 18:50:57 GMT</pubDate>
    <dc:creator>jspyker</dc:creator>
    <dc:date>2003-03-11T18:50:57Z</dc:date>
    <item>
      <title>ARP issue and PIX firewall</title>
      <link>https://community.cisco.com/t5/network-security/arp-issue-and-pix-firewall/m-p/145720#M608441</link>
      <description>&lt;P&gt;I have a PIX 515 that is doing static NAT translations (using static and alias entries).  I have one remote access server running Citrix.  We have had some issues connecting to that server internally.  I have found that when I ping it, 9 out of ten tries is times out after the first attempt.  When I do an "arp /a" from my workstation it comes back with the MAC address of the internal interface of my PIX.  If I try doing the ping and clear my arp cache manually, after ten or more tries is will successfully ping the right device - and then go right back to the PIX MAC address.  This setup is a pretty typical configuration for us.  What could be wrong?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 06:36:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/arp-issue-and-pix-firewall/m-p/145720#M608441</guid>
      <dc:creator>bevans</dc:creator>
      <dc:date>2020-02-21T06:36:43Z</dc:date>
    </item>
    <item>
      <title>Re: ARP issue and PIX firewall</title>
      <link>https://community.cisco.com/t5/network-security/arp-issue-and-pix-firewall/m-p/145721#M608442</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sounds like the PIX is answering the ARP requests for the Citrix servers' MAC address.  Turn off proxy ARP on the PIX on the inside interface with:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; sysopt noproxyarp inside&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Mar 2003 23:30:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/arp-issue-and-pix-firewall/m-p/145721#M608442</guid>
      <dc:creator>gfullage</dc:creator>
      <dc:date>2003-03-10T23:30:04Z</dc:date>
    </item>
    <item>
      <title>Re: ARP issue and PIX firewall</title>
      <link>https://community.cisco.com/t5/network-security/arp-issue-and-pix-firewall/m-p/145722#M608443</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If the Citrix is on the local subnet with the Pix's interface, then it should not be replying for this obviously.  Check inconsistent subnet masks which may cause hosts to think they some devices are on "different" subnets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BTW...It is common for the first attempt of a ping to fail due to an ARP request to learn the MAC if it wasn't in your host's cache.  I would not consider this a symptom of your problem.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Mar 2003 01:07:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/arp-issue-and-pix-firewall/m-p/145722#M608443</guid>
      <dc:creator>shannong</dc:creator>
      <dc:date>2003-03-11T01:07:39Z</dc:date>
    </item>
    <item>
      <title>Re: ARP issue and PIX firewall</title>
      <link>https://community.cisco.com/t5/network-security/arp-issue-and-pix-firewall/m-p/145723#M608444</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you both for your post.  I reviewed the command "ip proxy-arp."  Since it is a per interface command, I would issue "no ip proxy-arp" on the internal interface of my PIX?  I just wanted to verify that this is correct.  Also, might this have any negative side affects?  Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Mar 2003 13:39:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/arp-issue-and-pix-firewall/m-p/145723#M608444</guid>
      <dc:creator>bevans</dc:creator>
      <dc:date>2003-03-11T13:39:31Z</dc:date>
    </item>
    <item>
      <title>Re: ARP issue and PIX firewall</title>
      <link>https://community.cisco.com/t5/network-security/arp-issue-and-pix-firewall/m-p/145724#M608445</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Any chance you have used the arp command with the alias option? We ran into this same issue a year ago along with a hit on bug CSCdw57969 which was first fixed in versions 6.2(0.237) and 6.2(0.239).  The arp issue has not come back since the removal of the alias option and upgrading to 6.2(2).   Hope this helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Mar 2003 15:43:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/arp-issue-and-pix-firewall/m-p/145724#M608445</guid>
      <dc:creator>jspyker</dc:creator>
      <dc:date>2003-03-11T15:43:32Z</dc:date>
    </item>
    <item>
      <title>Re: ARP issue and PIX firewall</title>
      <link>https://community.cisco.com/t5/network-security/arp-issue-and-pix-firewall/m-p/145725#M608446</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for your post.  We are using static entries for one-to-one nat.  Dont we need to use the alias command with that?  Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Mar 2003 15:53:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/arp-issue-and-pix-firewall/m-p/145725#M608446</guid>
      <dc:creator>bevans</dc:creator>
      <dc:date>2003-03-11T15:53:52Z</dc:date>
    </item>
    <item>
      <title>Re: ARP issue and PIX firewall</title>
      <link>https://community.cisco.com/t5/network-security/arp-issue-and-pix-firewall/m-p/145726#M608447</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It seems that you have the routers "ip proxy-arp" command confused with the Pix.  As posted above, the pix would use the command "sysopt noproxyarp inside".  You could turn off proxy-arp, but this shouldn't be happening actually.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What version are you running?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And you have no alias commands.....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you post the static command you're using for the Citrix server?  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Mar 2003 16:58:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/arp-issue-and-pix-firewall/m-p/145726#M608447</guid>
      <dc:creator>shannong</dc:creator>
      <dc:date>2003-03-11T16:58:52Z</dc:date>
    </item>
    <item>
      <title>Re: ARP issue and PIX firewall</title>
      <link>https://community.cisco.com/t5/network-security/arp-issue-and-pix-firewall/m-p/145727#M608448</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am sorry, the alias option I was refering to was the arp command....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ARP INSIDE n.n.n.n hhhh.hhhh.hhhh ALIAS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We were using this form because the firewall was not advertising the mac address of inside to the outside interface.   This worked fine until a default changed in a pix release.   Then we started seeing inside hosts with bogus arp tables and communications would come to a halt.  The servers would starting seeing the pix's mac address for the correct entries.  We also tried the sysopt noproxyarp if_name suggestion, but it did not work.   We have been running our configs with:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ARP INSIDE n.n.n.n hhhh.hhhh.hhhh &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;with no problems for about a year.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Mar 2003 18:50:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/arp-issue-and-pix-firewall/m-p/145727#M608448</guid>
      <dc:creator>jspyker</dc:creator>
      <dc:date>2003-03-11T18:50:57Z</dc:date>
    </item>
    <item>
      <title>Re: ARP issue and PIX firewall</title>
      <link>https://community.cisco.com/t5/network-security/arp-issue-and-pix-firewall/m-p/145728#M608449</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Shannong,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our PIX is running 6.1(2).  An example static entry:&lt;/P&gt;&lt;P&gt;static (inside,outside) 100.20.50.9 10.10.1.22 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For that I also have an alias entry:&lt;/P&gt;&lt;P&gt;alias (inside) 10.10.1.22 100.20.50.9 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is the alias entry necessary?  Thanks again!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Mar 2003 20:08:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/arp-issue-and-pix-firewall/m-p/145728#M608449</guid>
      <dc:creator>bevans</dc:creator>
      <dc:date>2003-03-11T20:08:57Z</dc:date>
    </item>
    <item>
      <title>Re: ARP issue and PIX firewall</title>
      <link>https://community.cisco.com/t5/network-security/arp-issue-and-pix-firewall/m-p/145729#M608450</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't know if the alias entry is necessary, but it is probably the source of your problem.  Why are you using the alias entry?  Is the DNS for the public IP of the citrix server externally hosts and you want to "doctor" it?  Are you doing destination NAT?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Mar 2003 00:56:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/arp-issue-and-pix-firewall/m-p/145729#M608450</guid>
      <dc:creator>shannong</dc:creator>
      <dc:date>2003-03-12T00:56:42Z</dc:date>
    </item>
    <item>
      <title>Re: ARP issue and PIX firewall</title>
      <link>https://community.cisco.com/t5/network-security/arp-issue-and-pix-firewall/m-p/145730#M608451</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you everyone for your posts. The problem has been resolved using by adding the config entry "sysopt noproxyarp inside."  Thank you again for your time.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Mar 2003 13:19:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/arp-issue-and-pix-firewall/m-p/145730#M608451</guid>
      <dc:creator>bevans</dc:creator>
      <dc:date>2003-03-12T13:19:28Z</dc:date>
    </item>
  </channel>
</rss>

