I'm having trouble understanding why some recently added NAT rules did NOT Proxy ARP on our outside ISP interface as I expected it to.
I'd setup some NAT rules both using a bidirectional outbound rule NAT'd to an outside interface address (new one, not the existing one that was assigned) and an incoming only NAT rule mapping a new outside address to an internal one. In both cases, neither worked until I added the IP Address used in the NAT rule to the Interface that had that subnet assigned to it.
My expectation was that since the subnet was mapped to the interface, the firewall would know what interface that address belonged to and Proxy ARP that address on that interface. Instead, I needed to add that address as a /32 on the outside interface.
If Proxy ARP is a feature (which it appears it is), why is it necessary to actually assign the interface the address explicitly?
What I have now is our Ethernet interface with a boatload of IP's assigned which just seems odd based on my previous experience with other firewalls.
Is there a better more recognized way to do this on the Palo Alto Firewalls?
(Most of this came about due to a recent migration from an ASA so its been a somewhat accelerated learning experience.)
Thanks in advance for the help. The forums here have been invaluable and I appreciate those that are able to assist.
... View more