11-02-2018 07:01 AM - edited 02-21-2020 08:25 AM
We have an ASA 5500 which has proxy Arp on by default. I need to remove this from the inside and DMZ interfaces but I'm concerned about the effect this will have on the remote access VPN users as there are a number of static NAT rules set up which allows access to and from the remote VPN connections and the inside networks. They use original source and destination addresses. My understanding is we would loose all of these rules if we disable proxy ARP. I'm a novice where the ASA is concerned so I could do with some help.
Example:
nat (inside,OUTSIDE) source static obj-172.16.0.0 obj-172.16.0.0 destination static obj-10.200.254.0-mask24 obj-10.200.254.0-mask24
nat (inside,OUTSIDE) source static obj-172.16.0.0 obj-172.16.0.0 destination static obj-10.200.253.0-mask24 obj-10.200.253.0-mask24
11-02-2018 08:36 AM
11-04-2018 01:45 PM
Hi David,
ASA uses proxy arp to respond to host that uses static nat on the same network or an arp request form IPs it is using for NAT but that are not assigned to any interface.
For example, your are connected to ISP with /28 or /27 subnet, from this pool two ip's will be used one for ASA outside interface and the other for CPE. In this case remaining free IP's may be used for static nat to publish your services. When traffic arrives from internet to CPE to one of those free IP's, CPE will send an arp request to ASA because it is connected with the IP from same range. ASA will respond with proxy-arp and send the outside interface mac address, so CPE will forward the traffic to it
In your case for remote access vpn proxy-arp is not necessary for the communication, traffic will check route-lookup to reach destination.
HTH
-Abheesh
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide