<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DNS not working from LAN and DMZ on Cisco 3105 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dns-not-working-from-lan-and-dmz-on-cisco-3105/m-p/4951433#M1105461</link>
    <description>&lt;P&gt;Run the command &lt;STRONG&gt;system support firewall-engine-debug&lt;/STRONG&gt; to filter on the endpoint IP address and confirm which firewall rule traffic is matching or if being denied.&lt;/P&gt;
&lt;P&gt;Or take a packet capture, filter on DNS from an endpoint IP address.&lt;/P&gt;</description>
    <pubDate>Tue, 31 Oct 2023 12:33:49 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2023-10-31T12:33:49Z</dc:date>
    <item>
      <title>DNS not working from LAN and DMZ on Cisco 3105</title>
      <link>https://community.cisco.com/t5/network-security/dns-not-working-from-lan-and-dmz-on-cisco-3105/m-p/4951204#M1105450</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;None of the zones are able to resolve DNS. I can ping 8.8.8.8 from LAN and DMZ but cannot ping google.com.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The DNS policy under policies &amp;gt; DNS is default&lt;/P&gt;&lt;P&gt;DNS server group under Objects &amp;gt; Object Management has all the ISP provided DNS servers&lt;/P&gt;&lt;P&gt;DNS under Devices &amp;gt; Platform settings has "&lt;SPAN&gt;Enable DNS name resolution by device" enabled and the server group added to it. "Interface Objects" has all the objects added to the list.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I can ping google.com from Devices &amp;gt; Threat Defense CLI&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;How can I ensure that the the DNS works from devices in LAN and DMZ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 31 Oct 2023 04:41:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-not-working-from-lan-and-dmz-on-cisco-3105/m-p/4951204#M1105450</guid>
      <dc:creator>Cisco3105</dc:creator>
      <dc:date>2023-10-31T04:41:49Z</dc:date>
    </item>
    <item>
      <title>Re: DNS not working from LAN and DMZ on Cisco 3105</title>
      <link>https://community.cisco.com/t5/network-security/dns-not-working-from-lan-and-dmz-on-cisco-3105/m-p/4951205#M1105451</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Keep in mind that troubleshooting network issues can be complex, and it's important to follow a systematic approach to isolate and resolve the problem. Be cautious when making &lt;A href="https://creativesolutionservices.com/" target="_self"&gt;web development&lt;/A&gt; changes to your network configuration, as improper adjustments can disrupt network services. If you're not confident in your ability to troubleshoot and resolve the issue, consider seeking the assistance of a network administrator or IT professional.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 04 Nov 2023 16:18:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-not-working-from-lan-and-dmz-on-cisco-3105/m-p/4951205#M1105451</guid>
      <dc:creator>markcummins713</dc:creator>
      <dc:date>2023-11-04T16:18:57Z</dc:date>
    </item>
    <item>
      <title>Re: DNS not working from LAN and DMZ on Cisco 3105</title>
      <link>https://community.cisco.com/t5/network-security/dns-not-working-from-lan-and-dmz-on-cisco-3105/m-p/4951274#M1105453</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/666108"&gt;@Cisco3105&lt;/a&gt; what DNS servers are the endpoint in the LAN/DMZ configured with? And is there an Access Control Policy rule to permit the endpoints to communicate with those DNS servers?&lt;/P&gt;
&lt;P&gt;From the CLI of the FTD you can run the command &lt;STRONG&gt;system support firewall-engine-debug&lt;/STRONG&gt; to filter on the endpoint IP address and confirm which firewall rule traffic is matching or if being denied.&lt;/P&gt;</description>
      <pubDate>Tue, 31 Oct 2023 08:01:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-not-working-from-lan-and-dmz-on-cisco-3105/m-p/4951274#M1105453</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-10-31T08:01:31Z</dc:date>
    </item>
    <item>
      <title>Re: DNS not working from LAN and DMZ on Cisco 3105</title>
      <link>https://community.cisco.com/t5/network-security/dns-not-working-from-lan-and-dmz-on-cisco-3105/m-p/4951427#M1105459</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How do I check which DNS servers are attached to the endpoints?&lt;BR /&gt;I migrated the config from ASA 5545x to 3105 thus assuming that the access control policy is in place&lt;/P&gt;&lt;P&gt;This is not in production yet this I can keep messing with it&lt;/P&gt;</description>
      <pubDate>Tue, 31 Oct 2023 12:28:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-not-working-from-lan-and-dmz-on-cisco-3105/m-p/4951427#M1105459</guid>
      <dc:creator>Cisco3105</dc:creator>
      <dc:date>2023-10-31T12:28:56Z</dc:date>
    </item>
    <item>
      <title>Re: DNS not working from LAN and DMZ on Cisco 3105</title>
      <link>https://community.cisco.com/t5/network-security/dns-not-working-from-lan-and-dmz-on-cisco-3105/m-p/4951433#M1105461</link>
      <description>&lt;P&gt;Run the command &lt;STRONG&gt;system support firewall-engine-debug&lt;/STRONG&gt; to filter on the endpoint IP address and confirm which firewall rule traffic is matching or if being denied.&lt;/P&gt;
&lt;P&gt;Or take a packet capture, filter on DNS from an endpoint IP address.&lt;/P&gt;</description>
      <pubDate>Tue, 31 Oct 2023 12:33:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-not-working-from-lan-and-dmz-on-cisco-3105/m-p/4951433#M1105461</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-10-31T12:33:49Z</dc:date>
    </item>
    <item>
      <title>Re: DNS not working from LAN and DMZ on Cisco 3105</title>
      <link>https://community.cisco.com/t5/network-security/dns-not-working-from-lan-and-dmz-on-cisco-3105/m-p/4951436#M1105463</link>
      <description>&lt;P&gt;Have you configure DHCP relay under Devices -&amp;gt; Device Management -&amp;gt; Edit the FTD Device -&amp;gt; DHCP -&amp;gt; DHCPrelay.&amp;nbsp; You need to configure the DHCP servers tab as well as DHCP relay agent tab.&lt;/P&gt;</description>
      <pubDate>Tue, 31 Oct 2023 12:35:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-not-working-from-lan-and-dmz-on-cisco-3105/m-p/4951436#M1105463</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2023-10-31T12:35:55Z</dc:date>
    </item>
    <item>
      <title>Re: DNS not working from LAN and DMZ on Cisco 3105</title>
      <link>https://community.cisco.com/t5/network-security/dns-not-working-from-lan-and-dmz-on-cisco-3105/m-p/4951502#M1105469</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/319690"&gt;@Marius Gunnerud&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do I need to need to enable DHCP relay for name resolution? The FTD is only handing out DHCP addresses to Anyconnect clients.&lt;/P&gt;</description>
      <pubDate>Tue, 31 Oct 2023 14:24:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-not-working-from-lan-and-dmz-on-cisco-3105/m-p/4951502#M1105469</guid>
      <dc:creator>Cisco3105</dc:creator>
      <dc:date>2023-10-31T14:24:50Z</dc:date>
    </item>
    <item>
      <title>Re: DNS not working from LAN and DMZ on Cisco 3105</title>
      <link>https://community.cisco.com/t5/network-security/dns-not-working-from-lan-and-dmz-on-cisco-3105/m-p/4951523#M1105470</link>
      <description>&lt;P&gt;Sorry, thought I was answering a different post.&amp;nbsp; Just a few thoughts:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Have you allowed the DNS traffic in the access rules?&lt;/LI&gt;
&lt;LI&gt;Have you verified the DNS servers configured on the host machines?&lt;/LI&gt;
&lt;LI&gt;If you do an nslookup google.com 8.8.8.8 on a host machine does this return a result (assuming that DNS is allowed towards 8.8.8.8)?&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Tue, 31 Oct 2023 14:44:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-not-working-from-lan-and-dmz-on-cisco-3105/m-p/4951523#M1105470</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2023-10-31T14:44:30Z</dc:date>
    </item>
    <item>
      <title>Re: DNS not working from LAN and DMZ on Cisco 3105</title>
      <link>https://community.cisco.com/t5/network-security/dns-not-working-from-lan-and-dmz-on-cisco-3105/m-p/4951536#M1105471</link>
      <description>&lt;P&gt;DNS traffic is allowed in Access rule from any to any&lt;/P&gt;&lt;P&gt;Trusted DNS servers have been set&lt;/P&gt;&lt;P&gt;Nslookup works when I set the DNS to 8.8.8.8 but fails when I set it to the internal dns server&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have attached the topology for reference.&lt;/P&gt;</description>
      <pubDate>Tue, 31 Oct 2023 14:59:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-not-working-from-lan-and-dmz-on-cisco-3105/m-p/4951536#M1105471</guid>
      <dc:creator>Cisco3105</dc:creator>
      <dc:date>2023-10-31T14:59:58Z</dc:date>
    </item>
    <item>
      <title>Re: DNS not working from LAN and DMZ on Cisco 3105</title>
      <link>https://community.cisco.com/t5/network-security/dns-not-working-from-lan-and-dmz-on-cisco-3105/m-p/4951658#M1105478</link>
      <description>&lt;P&gt;So routing is done on the nexus switch? do you have DNS snooping enabled?&lt;/P&gt;
&lt;P&gt;are you able to lookup google.com on the DNS server itself?&lt;/P&gt;</description>
      <pubDate>Tue, 31 Oct 2023 19:14:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-not-working-from-lan-and-dmz-on-cisco-3105/m-p/4951658#M1105478</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2023-10-31T19:14:14Z</dc:date>
    </item>
    <item>
      <title>Re: DNS not working from LAN and DMZ on Cisco 3105</title>
      <link>https://community.cisco.com/t5/network-security/dns-not-working-from-lan-and-dmz-on-cisco-3105/m-p/4952064#M1105495</link>
      <description>&lt;P&gt;Yes, the routing is done on Nexus, DNS snooping isnt enabled. The current firewall is ASA 5545 and DNS works fine.&lt;/P&gt;&lt;P&gt;I am in the process of setting up an isolated network to test with the 3105, will keep you posted.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Nov 2023 14:51:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-not-working-from-lan-and-dmz-on-cisco-3105/m-p/4952064#M1105495</guid>
      <dc:creator>Cisco3105</dc:creator>
      <dc:date>2023-11-01T14:51:55Z</dc:date>
    </item>
    <item>
      <title>Re: DNS not working from LAN and DMZ on Cisco 3105</title>
      <link>https://community.cisco.com/t5/network-security/dns-not-working-from-lan-and-dmz-on-cisco-3105/m-p/4952284#M1105501</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/319690"&gt;@Marius Gunnerud&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here's the output from the packet tracker, the dns server does not get a reply but the trace logs dont show anything being blocked.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;   1: 20:20:21.581055       192.168.1.10.48746 &amp;gt; 8.8.8.8.53:  udp 28 
Phase: 1
Type: CAPTURE
Subtype: 
Result: ALLOW
Elapsed time: 11296 ns
Config:
Additional Information:
MAC Access list

Phase: 2
Type: ACCESS-LIST
Subtype: 
Result: ALLOW
Elapsed time: 11296 ns
Config:
Implicit Rule
Additional Information:
MAC Access list

Phase: 3
Type: INPUT-ROUTE-LOOKUP
Subtype: Resolve Egress Interface
Result: ALLOW
Elapsed time: 3530 ns
Config:
Additional Information:
Found next-hop 38.140.221.81 using egress ifc  wan(vrfid:0)

Phase: 4
Type: OBJECT_GROUP_SEARCH
Subtype: 
Result: ALLOW
Elapsed time: 0 ns
Config:
Additional Information:
 Source Object Group Match Count:       4
 Destination Object Group Match Count:  1
 Object Group Search:                   0

Phase: 5
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Elapsed time: 0 ns
Config:
access-group CSM_FW_ACL_ global
access-list CSM_FW_ACL_ advanced permit udp object-group DNSServers any object-group DNS_over_UDP rule-id 268436488 
access-list CSM_FW_ACL_ remark rule-id 268436488: ACCESS POLICY: FTD-Mig-ACP-1694711294 - Mandatory
access-list CSM_FW_ACL_ remark rule-id 268436488: L7 RULE: Allow-From-DNS-Servers
object-group network DNSServers(hitcnt=1392, id=4026531841)
 network-object object DNSServer2(hitcnt=22)
 network-object object DNSServer1(hitcnt=1370)
 network-object object DNSServer3(hitcnt=0)
object-group service DNS_over_UDP udp
 port-object eq domain
Additional Information:
 This packet will be sent to snort for additional processing where a verdict will be reached

Phase: 6
Type: CONN-SETTINGS
Subtype: 
Result: ALLOW
Elapsed time: 0 ns
Config:
class-map class-default
 match any
policy-map global_policy
 class class-default
  set connection advanced-options UM_STATIC_TCP_MAP
service-policy global_policy global
Additional Information:

Phase: 7
Type: NAT
Subtype: per-session
Result: ALLOW
Elapsed time: 0 ns
Config:
Additional Information:

Phase: 8
Type: IP-OPTIONS
Subtype: 
Result: ALLOW
Elapsed time: 0 ns
Config:
Additional Information:

Phase: 9
Type: INSPECT
Subtype: np-inspect
Result: ALLOW
Elapsed time: 9178 ns
Config:
class-map inspection_default
 match default-inspection-traffic
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map 
service-policy global_policy global
Additional Information:

Phase: 10
Type: NAT
Subtype: per-session
Result: ALLOW
Elapsed time: 7766 ns
Config:
Additional Information:

Phase: 11
Type: IP-OPTIONS
Subtype: 
Result: ALLOW
Elapsed time: 0 ns
Config:
Additional Information:

Phase: 12
Type: FLOW-CREATION
Subtype: 
Result: ALLOW
Elapsed time: 4236 ns
Config:
Additional Information:
New flow created with id 1229380, packet dispatched to next module

Phase: 13
Type: EXTERNAL-INSPECT
Subtype: 
Result: ALLOW
Elapsed time: 6354 ns
Config:
Additional Information:
Application: 'SNORT Inspect'

Phase: 14
Type: SNORT
Subtype: appid
Result: ALLOW
Elapsed time: 83433 ns
Config:
Additional Information:
service: DNS(617), client: DNS(617), payload: (0), misc: (0)

Phase: 15
Type: SNORT
Subtype: SI-DNS
Result: ALLOW
Elapsed time: 8091 ns
Config:
DNS policy 862867808, Allow
Additional Information:
Matched domain google.com, action Allow

Phase: 16
Type: SNORT
Subtype: firewall
Result: ALLOW
Elapsed time: 32306 ns
Config:
Network 0, Inspection 0, Detection 0, Rule ID 268436488
Additional Information:
Starting rule matching, zone 1 -&amp;gt; 8, geo 0 -&amp;gt; 0, vlan 0, src sgt: 0, src sgt type: unknown, dst sgt: 0, dst sgt type: unknown, user 9999997, urls , hosts google.com, no xff
Matched rule ids 268436488 - Allow

Phase: 17
Type: INPUT-ROUTE-LOOKUP-FROM-OUTPUT-ROUTE-LOOKUP
Subtype: Resolve Preferred Egress interface
Result: ALLOW
Elapsed time: 2824 ns
Config:
Additional Information:
Found next-hop 38.140.221.81 using egress ifc  wan(vrfid:0)

Phase: 18
Type: ADJACENCY-LOOKUP
Subtype: Resolve Nexthop IP address to MAC
Result: ALLOW
Elapsed time: 353 ns
Config:
Additional Information:
Found adjacency entry for Next-hop 38.140.221.81 on interface  wan
Adjacency :Active
MAC address e0ac.f127.b0ae hits 203 reference 29

Result:
input-interface: lan(vrfid:0)
input-status: up
input-line-status: up
output-interface: wan(vrfid:0)
output-status: up
output-line-status: up
Action: allow
Time Taken: 180663 ns&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Nov 2023 22:34:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-not-working-from-lan-and-dmz-on-cisco-3105/m-p/4952284#M1105501</guid>
      <dc:creator>Cisco3105</dc:creator>
      <dc:date>2023-11-01T22:34:21Z</dc:date>
    </item>
    <item>
      <title>Re: DNS not working from LAN and DMZ on Cisco 3105</title>
      <link>https://community.cisco.com/t5/network-security/dns-not-working-from-lan-and-dmz-on-cisco-3105/m-p/4952289#M1105502</link>
      <description>&lt;UL&gt;
&lt;LI&gt;is the WAN interface the correct interface for reaching the internet?&amp;nbsp; I see no NAT being implemented on the traffic in the packet-tracer output.&lt;/LI&gt;
&lt;LI&gt;are there any other firewalls in the path between the FTD and internet?&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;set up a capture on both the lan and wan interfaces for this traffic and then see if you see both requests and replies in the output.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Nov 2023 22:57:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-not-working-from-lan-and-dmz-on-cisco-3105/m-p/4952289#M1105502</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2023-11-01T22:57:42Z</dc:date>
    </item>
    <item>
      <title>Re: DNS not working from LAN and DMZ on Cisco 3105</title>
      <link>https://community.cisco.com/t5/network-security/dns-not-working-from-lan-and-dmz-on-cisco-3105/m-p/4952810#M1105548</link>
      <description>&lt;P&gt;The test I conducted today&lt;/P&gt;&lt;P&gt;1. The DMZ interface IP on the FTD is 10.11.11.1/24 and a computer in the zone is 10.11.11.2/24. I ran &lt;STRONG&gt;nslookup google.com 8.8.8.8&lt;/STRONG&gt; and got a reply&lt;/P&gt;&lt;P&gt;2. The LAN interface IP on the FTD is 10.10.10.9/30 and the nexus switch is directly connected to the FTD with the IP 10.10.10.10/30. The actual LAN subnet inside the office is 192.168.1.0/24&lt;/P&gt;&lt;P&gt;The computer IP address is 192.168.1.100. I ran&amp;nbsp;&lt;STRONG&gt;nslookup google.com 8.8.8.8&lt;/STRONG&gt; and got &lt;STRONG&gt;request timed out&lt;/STRONG&gt; error&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Nov 2023 18:52:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-not-working-from-lan-and-dmz-on-cisco-3105/m-p/4952810#M1105548</guid>
      <dc:creator>Cisco3105</dc:creator>
      <dc:date>2023-11-02T18:52:01Z</dc:date>
    </item>
    <item>
      <title>Re: DNS not working from LAN and DMZ on Cisco 3105</title>
      <link>https://community.cisco.com/t5/network-security/dns-not-working-from-lan-and-dmz-on-cisco-3105/m-p/4952861#M1105549</link>
      <description>&lt;P&gt;Have you added a static route in your FTD from nexus to FTD?&lt;/P&gt;&lt;P&gt;like this&amp;nbsp;route LAN 192.168.1.0 255.255.255.0 10.10.10.10 1&lt;/P&gt;&lt;P&gt;how about your NAT?&lt;/P&gt;</description>
      <pubDate>Thu, 02 Nov 2023 20:42:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-not-working-from-lan-and-dmz-on-cisco-3105/m-p/4952861#M1105549</guid>
      <dc:creator>Herald Sison</dc:creator>
      <dc:date>2023-11-02T20:42:15Z</dc:date>
    </item>
    <item>
      <title>Re: DNS not working from LAN and DMZ on Cisco 3105</title>
      <link>https://community.cisco.com/t5/network-security/dns-not-working-from-lan-and-dmz-on-cisco-3105/m-p/4953617#M1105577</link>
      <description>&lt;P&gt;from Nexus do traceroute check if the packet hit FTD or not ?&lt;BR /&gt;&lt;BR /&gt;Thanks A Lot &lt;BR /&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sat, 04 Nov 2023 16:30:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-not-working-from-lan-and-dmz-on-cisco-3105/m-p/4953617#M1105577</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-11-04T16:30:24Z</dc:date>
    </item>
    <item>
      <title>Re: DNS not working from LAN and DMZ on Cisco 3105</title>
      <link>https://community.cisco.com/t5/network-security/dns-not-working-from-lan-and-dmz-on-cisco-3105/m-p/4954278#M1105605</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/319690"&gt;@Marius Gunnerud&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The migration ignored a few NAT rules and that caused the issue. I did thorough check between the ASA and the FTD and found the missing NAT rules. Added them to the FTD and name resolution started working.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Nov 2023 14:52:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-not-working-from-lan-and-dmz-on-cisco-3105/m-p/4954278#M1105605</guid>
      <dc:creator>Cisco3105</dc:creator>
      <dc:date>2023-11-06T14:52:34Z</dc:date>
    </item>
  </channel>
</rss>

