<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Hello; in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firewall-blocking-dns-resolution/m-p/3174086#M133210</link>
    <description>&lt;P&gt;If you want to resolve internal DNS names you need to give the clients an internal DNS server among their DHCP options.&lt;/P&gt;</description>
    <pubDate>Tue, 22 Aug 2017 16:27:01 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2017-08-22T16:27:01Z</dc:date>
    <item>
      <title>Firewall Blocking Dns Resolution</title>
      <link>https://community.cisco.com/t5/network-security/firewall-blocking-dns-resolution/m-p/3095942#M133207</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I just configured an ASA 5516 at one of our client's office, It is below the edge router (not directly connected to the internet). I created three zones (LAN, OUTSIDE AND SERVERS). The OUTSIDE interface is connected to the edge router and the LAN interface goes to the user, The SERVER interface is connected the servers.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;There are VPNs connected to the Router going to Branches, After configurations, All was well and I could reach every bit of the network but when I try to remote desktop the servers using their domain names, they fail but remote desktop with IPs accepts.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;That happened when I put the dns 8.8.8.8 for internet resolutions among the dns IPs in the dhcp parameters but all works well when I remove it and when I remove it, the clients cant get to the internet.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please advise on how to resolve this.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:50:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-blocking-dns-resolution/m-p/3095942#M133207</guid>
      <dc:creator>tonyk0001</dc:creator>
      <dc:date>2019-03-12T09:50:12Z</dc:date>
    </item>
    <item>
      <title>Hello; </title>
      <link>https://community.cisco.com/t5/network-security/firewall-blocking-dns-resolution/m-p/3095943#M133208</link>
      <description>&lt;P&gt;Hello;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I think the issue relies on the fact that the DNS server on 8.8.8.8 replies with the Public IP. If you are doing the RDP from the inside, it is going to fail no matter if the RDP server is on the Server interface or in the inside.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can easily solve this doing the following:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;nat (Server, LAN) source static &amp;lt;Object_Private&amp;gt; &amp;lt;Object_Public&amp;gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Let me know if you have any questions.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Mike.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Aug 2017 19:30:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-blocking-dns-resolution/m-p/3095943#M133208</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2017-08-17T19:30:39Z</dc:date>
    </item>
    <item>
      <title>Re: Hello;</title>
      <link>https://community.cisco.com/t5/network-security/firewall-blocking-dns-resolution/m-p/3174034#M133209</link>
      <description>&lt;P&gt;Hi Mike,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I dnt want to do NAT&amp;nbsp;like that I actually did No Nat. Without the Firewall.. The users are getting the internet dns from the ISP since they have a PPPOE connection to the ISP but when I introduce the Firewall... They able to ping the internet but cant browse.... How do I resolve that because I dont want to include the isp dns 8.8.8.8 or 4.2.2.2 in the dchp options... Kindly advise&lt;/P&gt;</description>
      <pubDate>Tue, 22 Aug 2017 14:57:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-blocking-dns-resolution/m-p/3174034#M133209</guid>
      <dc:creator>tonyk0001</dc:creator>
      <dc:date>2017-08-22T14:57:06Z</dc:date>
    </item>
    <item>
      <title>Re: Hello;</title>
      <link>https://community.cisco.com/t5/network-security/firewall-blocking-dns-resolution/m-p/3174086#M133210</link>
      <description>&lt;P&gt;If you want to resolve internal DNS names you need to give the clients an internal DNS server among their DHCP options.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Aug 2017 16:27:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-blocking-dns-resolution/m-p/3174086#M133210</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-08-22T16:27:01Z</dc:date>
    </item>
    <item>
      <title>Re: Hello;</title>
      <link>https://community.cisco.com/t5/network-security/firewall-blocking-dns-resolution/m-p/3174095#M133212</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for that but that is what I did but unfortunately when I do that, The clients cant browse but dns resolution works.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The issue arises when I introduce another dns 8.8.8.8 or 4.2.2.2 for the internet browsing (without removing the Internal DNS ofcos).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Before the ASA the clients would browse the internet without introducing the 8.8.8.8 or 4.2.2.2 in the dhcp because they would get the Internet IP parameters through dhcp (pppoe) but now they are unable.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tony&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Aug 2017 16:34:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-blocking-dns-resolution/m-p/3174095#M133212</guid>
      <dc:creator>tonyk0001</dc:creator>
      <dc:date>2017-08-22T16:34:07Z</dc:date>
    </item>
    <item>
      <title>Re: Hello;</title>
      <link>https://community.cisco.com/t5/network-security/firewall-blocking-dns-resolution/m-p/3174328#M133214</link>
      <description>&lt;P&gt;Is the internal DNS server that you attempted to add setup correctly with a forwarder setting to resolve non-local FQDNs?&lt;/P&gt;</description>
      <pubDate>Wed, 23 Aug 2017 02:32:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-blocking-dns-resolution/m-p/3174328#M133214</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-08-23T02:32:24Z</dc:date>
    </item>
    <item>
      <title>Re: Hello;</title>
      <link>https://community.cisco.com/t5/network-security/firewall-blocking-dns-resolution/m-p/3174391#M133215</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;No it is only for local FQDNs, the non local FQDNs are to be handled by the ISP dns, which they negotiaote since they use PPPOE on the router to get to the internet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tony&lt;/P&gt;</description>
      <pubDate>Wed, 23 Aug 2017 06:53:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-blocking-dns-resolution/m-p/3174391#M133215</guid>
      <dc:creator>tonyk0001</dc:creator>
      <dc:date>2017-08-23T06:53:22Z</dc:date>
    </item>
  </channel>
</rss>

