<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Possessed Firewall? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/possessed-firewall/m-p/3379415#M959717</link>
    <description>&lt;P&gt;So this was an interesting issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It appears the following NAT statement, used for L2L IPSEC NAT exemption, was causing my dilemma...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;nat (inside,outside) source static ALL_ADDRESS_SPACE ALL_ADDRESS_SPACE destination static OUTSIDE_ADC_TOLEDO_STAFF OUTSIDE_ADC_TOLEDO_STAFF.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The following resolved the issue...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;nat (inside,outside) source static ALL_ADDRESS_SPACE ALL_ADDRESS_SPACE destination static OUTSIDE_ADC_TOLEDO_STAFF OUTSIDE_ADC_TOLEDO_STAFF no-proxy-arp&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;(The reason for ALL_ADDRESS_SPACE) is because no split-tunnel at remote branch office).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What is quite strange is that this config worked fine in production for a very long time without any issues.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The link below provides more explanation.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/adaptive-security-appliance-asa-software/116154-qanda-ASA-00.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/adaptive-security-appliance-asa-software/116154-qanda-ASA-00.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thx&amp;nbsp;Marius Gunnerud&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 07 May 2018 16:38:59 GMT</pubDate>
    <dc:creator>mikedeyoung</dc:creator>
    <dc:date>2018-05-07T16:38:59Z</dc:date>
    <item>
      <title>Possessed Firewall?</title>
      <link>https://community.cisco.com/t5/network-security/possessed-firewall/m-p/3378339#M959587</link>
      <description>&lt;P&gt;So here's a really unusual problem for which I would love a logical explanation. Is my Firewall ASA software infected with Malware?!?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So a couple weeks ago my customer calls me complaining of a problem at the corp office. They have a Service-Provider (Frontier) broadband fiber internet connection coming in which cables to a Catalyst 3560 and out of the 3560 into Firewall_A and Firewall_B. Topology Looks like this...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Internet - 3560 - Firewall_A (MAC=d3:68, IP=.4)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;- Firewall_B (MAC=31:b7, IP=.6)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Firewall_A provides mobile Anyconnect VPN clients access to internal network. Firewall_B provides some server port-forwards and a branch office L2L IPSEC VPN access to interal corp network.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This topology has been in production for over a year. No problems up until a couple weeks ago.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So the complaint is that, intermittently, Firewall_A "stop working". After a power-cycle, it seems to work fine for a while and then it stops working again.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To make a very long story short, it turns out that when the Service-Provider Gateway (Juniper, MAC=f5:c7, IP=.1) sends out an ARP for the IP for Firewall_A, BOTH Firewall_A and Firewall_B reply. In cases where Firewall_B replies AFTER Firewall_A, the Service-Provider gateway caches an incorrect IP to MAC and traffic intended to reach Firewall_A gets delivered to Firewall_B.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The attached pic is a partial Wireshark screenshot of a capture showing Firewall_B responding to an ARP request for which it should &lt;STRONG&gt;NOT&lt;/STRONG&gt; be.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Section_A&lt;/STRONG&gt; = a successful ICMP Echo Request originated by a device out on Internet (x.x.x.160) reaching Firewall_A (x.x.x.4) and the Echo Reply.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Section_B&lt;/STRONG&gt; = the Service-Provider ARP intended to be answered by device with x.x.x.4 assigned and being answered by Firewall_A and Firewall_B!!!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Section_C&lt;/STRONG&gt; = failing ICMP Echo Request originated by device out on the Internet (x.x.x.160) because the desintation MAC is incorrect!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also attached is a config of Firewall_B and two screenshots showing the output of "show int" for Firewall_A and Firewall_B.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;*** Why is Firewall_B responding to ARP requests for which it does NOT have an interface configured for the IP in the ARP?!?!?! ***&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:42:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/possessed-firewall/m-p/3378339#M959587</guid>
      <dc:creator>mikedeyoung</dc:creator>
      <dc:date>2020-02-21T15:42:44Z</dc:date>
    </item>
    <item>
      <title>Re: Possessed Firewall?</title>
      <link>https://community.cisco.com/t5/network-security/possessed-firewall/m-p/3378467#M959588</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Could be proxy-arp on the asa causing the issue. Have you tried disabling proxy-arp on the outside interface of the firewalls?&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;John&lt;/P&gt;</description>
      <pubDate>Sat, 05 May 2018 01:06:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/possessed-firewall/m-p/3378467#M959588</guid>
      <dc:creator>johnd2310</dc:creator>
      <dc:date>2018-05-05T01:06:20Z</dc:date>
    </item>
    <item>
      <title>Re: Possessed Firewall?</title>
      <link>https://community.cisco.com/t5/network-security/possessed-firewall/m-p/3379100#M959715</link>
      <description>&lt;P&gt;Have you provided a full output of your running configuration?&lt;/P&gt;
&lt;P&gt;Check xlate also to see if you have an entry for the other firewall public IP there.&amp;nbsp; For proxy-arp to happen the ASA needs a NAT statement for that public IP.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Next time the issue happens, if you issue the command clear conn all, is the issue corrected?&lt;/P&gt;</description>
      <pubDate>Mon, 07 May 2018 07:05:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/possessed-firewall/m-p/3379100#M959715</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2018-05-07T07:05:03Z</dc:date>
    </item>
    <item>
      <title>Re: Possessed Firewall?</title>
      <link>https://community.cisco.com/t5/network-security/possessed-firewall/m-p/3379415#M959717</link>
      <description>&lt;P&gt;So this was an interesting issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It appears the following NAT statement, used for L2L IPSEC NAT exemption, was causing my dilemma...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;nat (inside,outside) source static ALL_ADDRESS_SPACE ALL_ADDRESS_SPACE destination static OUTSIDE_ADC_TOLEDO_STAFF OUTSIDE_ADC_TOLEDO_STAFF.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The following resolved the issue...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;nat (inside,outside) source static ALL_ADDRESS_SPACE ALL_ADDRESS_SPACE destination static OUTSIDE_ADC_TOLEDO_STAFF OUTSIDE_ADC_TOLEDO_STAFF no-proxy-arp&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;(The reason for ALL_ADDRESS_SPACE) is because no split-tunnel at remote branch office).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What is quite strange is that this config worked fine in production for a very long time without any issues.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The link below provides more explanation.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/adaptive-security-appliance-asa-software/116154-qanda-ASA-00.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/adaptive-security-appliance-asa-software/116154-qanda-ASA-00.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thx&amp;nbsp;Marius Gunnerud&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 07 May 2018 16:38:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/possessed-firewall/m-p/3379415#M959717</guid>
      <dc:creator>mikedeyoung</dc:creator>
      <dc:date>2018-05-07T16:38:59Z</dc:date>
    </item>
  </channel>
</rss>

