<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ProxyArp and remote access VPN. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/proxyarp-and-remote-access-vpn/m-p/3738759#M9125</link>
    <description>&lt;P&gt;Hi David,&lt;/P&gt;
&lt;P&gt;ASA uses proxy arp to respond to host that uses static nat on the same network or an arp request form IPs it is using for NAT but that are not assigned to any interface.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For example, your are connected to ISP with /28 or /27 subnet, from this pool two ip's will be used one for ASA outside interface&amp;nbsp; and the other for CPE. In this case remaining free IP's may be used for static nat to publish your services. When traffic arrives from internet to CPE to one of those free IP's, CPE will send an arp request to ASA because it is connected with the IP from same range. ASA will respond with proxy-arp and send the outside interface mac address, so CPE will forward the traffic to it&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In your case for remote access vpn proxy-arp is not necessary for the communication, traffic will check route-lookup to reach destination.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;-Abheesh&lt;/P&gt;</description>
    <pubDate>Sun, 04 Nov 2018 21:45:37 GMT</pubDate>
    <dc:creator>Abheesh Kumar</dc:creator>
    <dc:date>2018-11-04T21:45:37Z</dc:date>
    <item>
      <title>ProxyArp and remote access VPN.</title>
      <link>https://community.cisco.com/t5/network-security/proxyarp-and-remote-access-vpn/m-p/3737965#M9121</link>
      <description>&lt;P&gt;We have an ASA 5500 which has proxy Arp on by default. I need to remove this from the inside and DMZ interfaces but I'm concerned about the effect this will have on the remote access VPN users as there are a number of static NAT rules set up which allows access&amp;nbsp;to and from&amp;nbsp;the remote VPN connections and&amp;nbsp;the inside networks. They use original source and destination addresses. My understanding is we would loose all of these rules if we disable proxy ARP. I'm a novice where the&amp;nbsp;&amp;nbsp;ASA is concerned so I could do with some help.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Example:&lt;/P&gt;
&lt;P&gt;nat (inside,OUTSIDE) source static obj-172.16.0.0 obj-172.16.0.0 destination static obj-10.200.254.0-mask24 obj-10.200.254.0-mask24&lt;BR /&gt;nat (inside,OUTSIDE) source static obj-172.16.0.0 obj-172.16.0.0 destination static obj-10.200.253.0-mask24 obj-10.200.253.0-mask24&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:25:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/proxyarp-and-remote-access-vpn/m-p/3737965#M9121</guid>
      <dc:creator>david.wallace111</dc:creator>
      <dc:date>2020-02-21T16:25:54Z</dc:date>
    </item>
    <item>
      <title>Re: ProxyArp and remote access VPN.</title>
      <link>https://community.cisco.com/t5/network-security/proxyarp-and-remote-access-vpn/m-p/3738046#M9124</link>
      <description>Nope. With current config connectivity won't be broken. Nonat will still&lt;BR /&gt;take place and it will use route lookup instead of arp.&lt;BR /&gt;</description>
      <pubDate>Fri, 02 Nov 2018 15:36:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/proxyarp-and-remote-access-vpn/m-p/3738046#M9124</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2018-11-02T15:36:37Z</dc:date>
    </item>
    <item>
      <title>Re: ProxyArp and remote access VPN.</title>
      <link>https://community.cisco.com/t5/network-security/proxyarp-and-remote-access-vpn/m-p/3738759#M9125</link>
      <description>&lt;P&gt;Hi David,&lt;/P&gt;
&lt;P&gt;ASA uses proxy arp to respond to host that uses static nat on the same network or an arp request form IPs it is using for NAT but that are not assigned to any interface.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For example, your are connected to ISP with /28 or /27 subnet, from this pool two ip's will be used one for ASA outside interface&amp;nbsp; and the other for CPE. In this case remaining free IP's may be used for static nat to publish your services. When traffic arrives from internet to CPE to one of those free IP's, CPE will send an arp request to ASA because it is connected with the IP from same range. ASA will respond with proxy-arp and send the outside interface mac address, so CPE will forward the traffic to it&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In your case for remote access vpn proxy-arp is not necessary for the communication, traffic will check route-lookup to reach destination.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;-Abheesh&lt;/P&gt;</description>
      <pubDate>Sun, 04 Nov 2018 21:45:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/proxyarp-and-remote-access-vpn/m-p/3738759#M9125</guid>
      <dc:creator>Abheesh Kumar</dc:creator>
      <dc:date>2018-11-04T21:45:37Z</dc:date>
    </item>
  </channel>
</rss>

