cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
5269
Views
0
Helpful
13
Replies

Proxy ARP Question

ankurs2008
Level 1
Level 1

Hi halijenn / experts

What will happen if on the outside of ASA , Proxy ARP is disabled .I know that with the Static and Global configured , the firewall will Proxy ARP (with its own MAC on behalf of Inside Public servers ) when a packet is coming from Outside world to inside .

Please go through below link which will tell to disable the Proxy ARP in certain scenario

http://www.ciscotaccc.com/kaidara-advisor/security/showcase?case=K93807342

Request to please explain the exact packet flow when the Proxy ARP disabled

1 Accepted Solution

Accepted Solutions

Ankur,

Yes the destination MAC will be ASA's inside mac but that doesn't mean the ASA is proxy arping for google's IP address.

The layer 3 device on the inside may receive this packet destined to google from the inside PC and may look in its routing table and may find the ASA's IP as its default gateway and forward the packet onto the ASA.

Unless you change google's ip address with this command

static (outside,inside) 10.10.10.1 76.x.x.x

then the inside interface will proxy arp for 10.10.10.1 and you need to issue http://10.10.10.1 to load google.com on the inside PC.

Makes sense?

Now, if you turn off proxy arp then, the PC will not be able to load google.com by issuing http://10.10.10.1. You would have hard code a static arp on the inside router mapping 10.10.10.1 to ASA's inside interface MAC address.

-KS

View solution in original post

13 Replies 13

Nagaraja Thanthry
Cisco Employee
Cisco Employee

Hello Ankur,

Typically you do not disable proxy-arp on the outside interface as when you

configure NAT rules, the outside interface need to proxy-arp for all the

addresses it is hosting. If the firewall does not proxy-arp for those

addresses and the hosted addresses fall in the same subnet as the

routers/ASA's interface, then router will ARP for the IP and will not get

any response. Eventually, router will drop the packet. Alternatively, if the

number of NAT entries is minimal, you could turn-off the proxy-ARP on the

outside interface and then configure static ARP entry on the outside

interface for all the translated addresses:

arp outside alias

This will ensure that the firewall will respond to those ARP requests with

the configured MAC which is its own MAC.

Hope this helps.

Regards,

NT

Hi NT

Thanks for detailed explaination !

1. As per your statement " This will ensure that the firewall will respond to those ARP requests with the configured MAC which is its own MAC "

Consider that the Proxy ARP is disabled on outside . Here what you mean to say is that i need to put the Translated address (of internal server) and the corresponding MAC (internal server machine MAC) in the ASA ? Right ?

2. I know that "global" , will also do Proxy ARP .Eg: when inside user access internet etc . However i have seen examples where we need to disable the

proxyarp for inside (eg: when we are configuring U Turning from inside to inside ) .Hence in that case , wont the internet connectivity get hampered . If not , can u explain me how ?

1. As per your statement " This will ensure that the firewall will respond to those ARP requests with the configured MAC which is its own MAC "

Consider that the Proxy ARP is disabled on outside . Here what you mean to say is that i need to put the Translated address (of internal server) and the corresponding MAC (internal server machine MAC) in the ASA ? Right ?

Ankur,

What NT is trying to say is that for example if you have a static line like this.

192.168.1.1----(a.a.a)ASA(b.b.b)---router---internet

static(i,o) 1.1.1.1 192.168.1.1 net 255.255.255.255

1.1.1.1 - is the translated address.  People in the internet will access the website on the 192.168.1.1 host using the 1.1.1.1 correct?

Now, since 1.1.1.1 is the global address, ASA will proxy arp for it. Meaning it will let the router know to send packets destined to 1.1.1.1 to its MAC address b.b.b which is the ASA's outside interface mac address.  When you look in the router's arp cache you will see the mapping.

1.1.1.1 =====> b.b.b

2. I know that "global" , will also do Proxy ARP .Eg: when inside user access internet etc . However i have seen examples where we need to disable the

proxyarp for inside (eg: when we are configuring U Turning from inside to inside ) .Hence in that case , wont the internet connectivity get hampered . If not , can u explain me how ?

The only time when you want proxy arp turned off is the condition that you mentioned above.

static (i,i) 192.168.2.0 192.168.2.0 net 255.255.255.0

Now 192.168.2.0 is the global address for which the ASA will proxy arp and start saying everyone send me packets to anyone who belongs to 192.168.2.0/24 network.

Now, it will make hosts in the 192.168.2.0/24 network talking among themselves.  They will all have the ASA's MAC address even to talk among themselves.

This is incorrect so, you need to turn off proxy arp on the inside interface so the hosts can learn each other's mac address properly.

I hope this is clear.

-KS

Hi kusankar,

Thanks for replying

1. What i mean to say over here is that if Proxy ARP is turned off on the Outside interface , we need to manually enter the ARP entries (as NT said )

Hence while configuring static ARP entry on the outside interface for all the translated addresses , do i need to put the MAC of ASA external interface for those translated addresses ?

2. I know regarding the Hairpinning for inside to inside , however my question was whether the traffic for the internet (inside to outside) keep on flowing correctly or not , as you know that the Firewall will Proxy ARP for the destination and when it will see " sysopt noproxyarp inside " configured , it may not do the Proxy ARP .

1. What i mean to say over here is that if Proxy ARP is turned off on the Outside interface , we need to manually enter the ARP entries (as NT said )

Hence while configuring static ARP entry on the outside interface for all the translated addresses , do i need to put the MAC of ASA external interface for those translated addresses ?

YES. You need to manually configure a static arp on the router for the translated address pointing to the ASA's outside interface MAC. Follow the toplogy in my previous post. I even included the mac address on that post.

2. I know regarding the Hairpinning for inside to inside , however my question was whether the traffic for the internet (inside to outside) keep on flowing correctly or not , as you know that the Firewall will Proxy ARP for the destination and when it will see " sysopt noproxyarp inside " configured , it may not do the Proxy ARP .

For the ASA to relay the response traffic, it doesn't have to proxy arp.  It will just arp and the host that has the IP address will respond with its mac address and the ASA will send the packet to that host if directly connected to the same subnet otherwise the ASA will just send the packet to the inside layer 3 device and it will do what it is supposed to, to send the packet to the correct host.

-KS

Hi kusankar

thanks for replying again , i am replying to your answers as follows

1) I agree that we need to manually configure a static arp on the router for the translated address , pointing to the ASA's outside interface MAC.Other than that do we need to configure anything on the ASA as well ? Why i am asking this is , NT has mentioned previously , the following .can u please elaborate on the same ?

"Alternatively, if the number of NAT entries is minimal, you could turn-off the proxy-ARP on the outside interface and then configure static ARP entry on the outside interface for all the translated addresses:"

arp outside alias

Here i just want to understand the part highlighted in bold , if this needs to be configured on ASA and how , also it would be helpful if you can give example of arp outside alias

2) I believe that my question is not clear over here . What i want to ask is whether the internet traffic will get hampered or not (inside to outside ) , if i have configured "sysopt noproxyarp inside " .The reason for this is that when the inside user 192.168.1.1 will try to send a packet to www.google.com , the inside MAC of the ASA will do proxy ARP for the destination www.google.com (we can see the same in the packet captures as well) .If Proxy ARP is

disabled , why wouldnt this traffic get hampered ?

I believe NT meant to say

configure static ARP entry on the outside ROUTER for all the translated addresses pointing to the ASA's outside interface.

Regarding your second question, I don't understand why the ASA would proxy arp for google.com? The ASA will proxy arp for all the addresses it owns (global and static).

I am lost here. What does the nat statement look like? Are you basing this question off of outside nat that you have configured?

For each interface, list the sourc and destination IP address. Write them down and see how the ASA will process it.

-KS


Hi kusankar

Continuing with your last post , can you please tell me that for the Outbound traffic (consider i am browsing google.com) , what will be the Destination MAC Address for the google.com Public IP in the Packet captures taken on the ASA . I believe it will be the inside interface MAC of the ASA . This is what i exactly mean to say . Please share your thoughts .

Ankur,

Yes the destination MAC will be ASA's inside mac but that doesn't mean the ASA is proxy arping for google's IP address.

The layer 3 device on the inside may receive this packet destined to google from the inside PC and may look in its routing table and may find the ASA's IP as its default gateway and forward the packet onto the ASA.

Unless you change google's ip address with this command

static (outside,inside) 10.10.10.1 76.x.x.x

then the inside interface will proxy arp for 10.10.10.1 and you need to issue http://10.10.10.1 to load google.com on the inside PC.

Makes sense?

Now, if you turn off proxy arp then, the PC will not be able to load google.com by issuing http://10.10.10.1. You would have hard code a static arp on the inside router mapping 10.10.10.1 to ASA's inside interface MAC address.

-KS

Excellent explanation kusankar !!! Also let me know when is global used for proxyarp ?

Hi kusankar ,

Please let me know when is global used for proxyarp ?

Ankur,

The firewall by default will proxy arp for all the IP addresses that it owns.

nat (inside) 1 10.10.10.0 255.255.255.0

global (outside) 1 2.2.2.2

or

static (in,out) 2.2.2.3 10.10.10.2

Here the firewall will proxy arp on the outside interface for both 2.2.2.2 and 2.2.2.3 with its outside interface mac.

It is the same with other interfaces as well.

-KS

Hi ankur,

 

I need to configure inbound and an outbound NAT.

for eg inbound NAT 1.1.1.1 which will be translated to 10.10.10.10

and for outbound NAT 10.10.10.10 which should be translated to 1.1.1.1

now I need to add a proxy ARP )(ie:2.2.2.2-outside interface IP) which MAC address I need to add it on the proxy mac address and on which device firepower or on the firewalls ?

Thanks

Ram

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card