<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: inspect dns in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/inspect-dns/m-p/4057848#M1068652</link>
    <description>&lt;P&gt;ASA point of view :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;DNS Inspection&lt;/H2&gt;
&lt;P&gt;DNS inspection on the ASA is enabled by default and performs a number of different functions that many people might not even recognize. When enabled, DNS inspection makes the life of the ASA administrator much easier and keeps the relationship with the DNS administrators and the internal user base much happier. Functions that it provides include the following:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Translates DNS record information based on the configuration of the NAT commands&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;alias&lt;/STRONG&gt;,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;static&lt;/STRONG&gt;, and&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;nat&lt;/STRONG&gt;; this is referred to often as&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;DNS rewrite&lt;/EM&gt;. This translation affects only DNS A records and does not affect DNS PTR records.&lt;/LI&gt;
&lt;LI&gt;Enforces a maximum DNS message length. (The default is 512 bytes.)&lt;/LI&gt;
&lt;LI&gt;Enforces the domain name length of 255 bytes.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;DNS inspection can also be used to control the behavior of the ASA based on a number of different traffic-matching criteria.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Not sure what is the reason you would like to disable, until you see any reason here.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The ASA keeps a connection table for UDP connections to dynamically allow connections initiated from the inside to get a reply from the outside without getting blocked by the ASA. This is the nature of a stateful firewall. - if you disable, you need to have explicit ACL rules available for the DNS queries.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 02 Apr 2020 17:36:55 GMT</pubDate>
    <dc:creator>balaji.bandi</dc:creator>
    <dc:date>2020-04-02T17:36:55Z</dc:date>
    <item>
      <title>inspect dns</title>
      <link>https://community.cisco.com/t5/network-security/inspect-dns/m-p/4057794#M1068646</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;is there any impact of disabling&amp;nbsp; dns inspection on asa&amp;nbsp; or in what scenarios we have to remove&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;policy-map global_policy&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;class inspection_default&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;no inspect dns&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Apr 2020 16:33:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inspect-dns/m-p/4057794#M1068646</guid>
      <dc:creator>kp-tkr2014</dc:creator>
      <dc:date>2020-04-02T16:33:28Z</dc:date>
    </item>
    <item>
      <title>Re: inspect dns</title>
      <link>https://community.cisco.com/t5/network-security/inspect-dns/m-p/4057848#M1068652</link>
      <description>&lt;P&gt;ASA point of view :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;DNS Inspection&lt;/H2&gt;
&lt;P&gt;DNS inspection on the ASA is enabled by default and performs a number of different functions that many people might not even recognize. When enabled, DNS inspection makes the life of the ASA administrator much easier and keeps the relationship with the DNS administrators and the internal user base much happier. Functions that it provides include the following:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Translates DNS record information based on the configuration of the NAT commands&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;alias&lt;/STRONG&gt;,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;static&lt;/STRONG&gt;, and&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;nat&lt;/STRONG&gt;; this is referred to often as&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;DNS rewrite&lt;/EM&gt;. This translation affects only DNS A records and does not affect DNS PTR records.&lt;/LI&gt;
&lt;LI&gt;Enforces a maximum DNS message length. (The default is 512 bytes.)&lt;/LI&gt;
&lt;LI&gt;Enforces the domain name length of 255 bytes.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;DNS inspection can also be used to control the behavior of the ASA based on a number of different traffic-matching criteria.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Not sure what is the reason you would like to disable, until you see any reason here.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The ASA keeps a connection table for UDP connections to dynamically allow connections initiated from the inside to get a reply from the outside without getting blocked by the ASA. This is the nature of a stateful firewall. - if you disable, you need to have explicit ACL rules available for the DNS queries.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Apr 2020 17:36:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inspect-dns/m-p/4057848#M1068652</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2020-04-02T17:36:55Z</dc:date>
    </item>
    <item>
      <title>Re: inspect dns</title>
      <link>https://community.cisco.com/t5/network-security/inspect-dns/m-p/4057864#M1068654</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;" The ASA keeps a connection table for UDP connections to dynamically allow connections initiated from the inside to get a reply from the outside without getting blocked by the ASA. This is the nature of a stateful firewall. - if you disable, you need to have explicit ACL rules available for the DNS queries "&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;you mean if a client 10.0.2.10 is trying to access 8.8.8.8&amp;nbsp; then we need an acl if we disable dns inspection&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the reason I am trying to disable&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;I&amp;nbsp;&amp;nbsp;have a dns filter&amp;nbsp; policy in fg firewall ,&amp;nbsp; it sends the&amp;nbsp; dns query to fortigate sdns server to get the category&amp;nbsp; of the dns requested .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;topology&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I captured the traffic on asa using asdm ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Traffic capture settings&lt;/P&gt;&lt;P&gt;Interface OUTSIDE&lt;/P&gt;&lt;P&gt;Outside&amp;nbsp;source&amp;nbsp; 45.75.200.89 (fortigate sdns ip)&lt;/P&gt;&lt;P&gt;Destination&amp;nbsp;:0 0 0 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the fortigate interface ip is 172.16.10.1&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat configured for fortigate internet access&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat (Inside,Outside) after-auto source dynamic 172.16.10.0 1.1.2.8&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;captured egress inside&amp;nbsp; traffic&amp;nbsp; attached&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;dns reply giving some error&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;does it mean the issue from asa ?,&lt;/P&gt;&lt;P&gt;is it the rightway of capturing or do we need to do anything ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;Thanks&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Apr 2020 18:08:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inspect-dns/m-p/4057864#M1068654</guid>
      <dc:creator>kp-tkr2014</dc:creator>
      <dc:date>2020-04-02T18:08:14Z</dc:date>
    </item>
    <item>
      <title>Re: inspect dns</title>
      <link>https://community.cisco.com/t5/network-security/inspect-dns/m-p/4057893#M1068657</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; I've never had a reason to an of my customer to disable DNS inspection. Usually DNS inspection is removed because of a bug, or because it drops DNS requests and we don't know how to investigate and change the layer7 default settings for DNS inspection. Perform packet captures on the ingress and egress points of the ASA for DNS traffic (comparing the DNS live traffic with the default DNS inspection settings, could give the best hint on what parameters to change in order to fix it).&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;If you remove DNS inspection, DNS is UDP, DNS does not create secondary channels, so DNS will still work, the ASA will just treat the connection as UDP. This is, however, not recommended.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cristian Matei.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Apr 2020 18:52:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inspect-dns/m-p/4057893#M1068657</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2020-04-02T18:52:51Z</dc:date>
    </item>
    <item>
      <title>Re: inspect dns</title>
      <link>https://community.cisco.com/t5/network-security/inspect-dns/m-p/4057918#M1068658</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/295226"&gt;@Cristian Matei&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the reply .&amp;nbsp;&lt;/P&gt;&lt;P&gt;What you mean by secondary channel . I have attached a packet capture&amp;nbsp; in my previous post ,&amp;nbsp; the dns query type is&amp;nbsp; TXT record&amp;nbsp; and the query response is giving server failure error . So i&amp;nbsp; was doubting asa doing something&amp;nbsp;&lt;/P&gt;&lt;P&gt;How to check asa drops certain traffic ?&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Apr 2020 19:29:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inspect-dns/m-p/4057918#M1068658</guid>
      <dc:creator>kp-tkr2014</dc:creator>
      <dc:date>2020-04-02T19:29:35Z</dc:date>
    </item>
    <item>
      <title>Re: inspect dns</title>
      <link>https://community.cisco.com/t5/network-security/inspect-dns/m-p/4058402#M1068695</link>
      <description>&lt;P&gt;&lt;SPAN&gt;you mean if a client 10.0.2.10 is trying to access 8.8.8.8&amp;nbsp; then we need an acl if we disable dns inspection&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Yes you need ACL for the DNS to get Queried to 8.8.8.8 - if you have implicity deny rules in place , until you doing NAT here. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Looked at your capture not give enough iunformation instead server falure, not sure what query you doing there.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;best thing try nslookup and see you able to get queries from DNS Server, after disabling the DNS inspection.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Apr 2020 14:20:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inspect-dns/m-p/4058402#M1068695</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2020-04-03T14:20:19Z</dc:date>
    </item>
    <item>
      <title>Re: inspect dns</title>
      <link>https://community.cisco.com/t5/network-security/inspect-dns/m-p/4058529#M1068703</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/286878"&gt;@balaji.bandi&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"&lt;SPAN&gt;Yes you need ACL for the DNS to get Queried to 8.8.8.8 - if you have implicity deny rules in place , until you doing NAT here."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I am sorry I did not get this part , it would be great if you give an example&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Apr 2020 16:52:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inspect-dns/m-p/4058529#M1068703</guid>
      <dc:creator>kp-tkr2014</dc:creator>
      <dc:date>2020-04-03T16:52:55Z</dc:date>
    </item>
    <item>
      <title>Re: inspect dns</title>
      <link>https://community.cisco.com/t5/network-security/inspect-dns/m-p/4058551#M1068704</link>
      <description>&lt;P&gt;what i was trying to explain was :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;from your PC , when you do nslookup are you able to get query back for the DNS Resoltuin for cisco.com or google.com ?&lt;/P&gt;
&lt;P&gt;if yes, then there is NAT or ACL rules in place to get your DNS Query from inside to outside.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if that fails, FW by default denies,&amp;nbsp; so my suggestion you required to allow a ACL rules for the DNS queries to send to outside.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;we are not sure, how is your network, i have seen in that post you also have Fortigate ? also ASA&amp;nbsp; FW ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Apr 2020 17:20:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inspect-dns/m-p/4058551#M1068704</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2020-04-03T17:20:30Z</dc:date>
    </item>
    <item>
      <title>Re: inspect dns</title>
      <link>https://community.cisco.com/t5/network-security/inspect-dns/m-p/4058600#M1068708</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;if yes, then there is NAT or ACL rules in place to get your DNS Query from inside to outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;yes I have dynamic nat there in place&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When you&amp;nbsp; nat or&amp;nbsp; acl query&amp;nbsp; , how does it that possible without NAT&amp;nbsp; if the DNS server is reachable only via&amp;nbsp; &amp;nbsp;public IP (8.8.8.8)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;the fortigate interface ip is 172.16.10.1&lt;BR /&gt;nat configured for fortigate internet access&lt;BR /&gt;nat (Inside,Outside) after-auto source dynamic 172.16.10.0 1.1.2.8&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;fortigate is in router mode so it sends all traffic to internet to asa&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Apr 2020 18:10:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inspect-dns/m-p/4058600#M1068708</guid>
      <dc:creator>kp-tkr2014</dc:creator>
      <dc:date>2020-04-03T18:10:42Z</dc:date>
    </item>
  </channel>
</rss>

