<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Well, we can do that but it in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dns-doctoring-ish/m-p/3059054#M135761</link>
    <description>&lt;P&gt;Well, we can do that but it would not be conditional. &lt;EM&gt;&lt;STRONG&gt;It will redirect all the requests going to external dns server to internal dns server.&lt;/STRONG&gt;&lt;/EM&gt; We will have to create a static NAT something like:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;nat (inside,inside) source dynamic any interface destination static obj-1.1.1.1 obj-2.2.2.2&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;where obj-1.1.1.1 is the internal dns server ip address&lt;/P&gt;
&lt;P&gt;obj-2.2.2.2 is the external dns server ip address&lt;/P&gt;
&lt;P&gt;we are creating this dummy nat entry so that when traffic comes to inside interface for 2.2.2.2(external dns server), the source gets translated to inside interface and destination gets unNATED to 1.1.1.1(internal dns server. The reason for PATing the source address is to ensure that reply packet comes to ASA and there is no asymetric routing. Since this is UDP traffic, I believe it should work without the source NAT as well but try it with source first if there is no issue.&lt;/P&gt;
&lt;P&gt;**try to add this NAT at line 1. We would want to make sure that this takes preference.&lt;/P&gt;
&lt;P&gt;also, add below command to allow u-turn:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;same-security-traffic permit intra-interface&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;-AJ&lt;/P&gt;</description>
    <pubDate>Tue, 09 May 2017 16:23:06 GMT</pubDate>
    <dc:creator>Ajay Saini</dc:creator>
    <dc:date>2017-05-09T16:23:06Z</dc:date>
    <item>
      <title>DNS Doctoring..ish</title>
      <link>https://community.cisco.com/t5/network-security/dns-doctoring-ish/m-p/3059051#M135758</link>
      <description>&lt;P&gt;I am looking to achieve the following -&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Internal Client with Internal address but Public DNS server.&lt;/P&gt;
&lt;P&gt;The default GW of Internal client is an ASA.&lt;/P&gt;
&lt;P&gt;Is there a way for the ASA to "Intercept"&amp;nbsp;the DNS lookup of a certain FQDN (e.g Guest.company.com) which is only resolvable via my internal dns servers and forward this request to one of these servers?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;DNS doctoring seems to look at return IP addresses from public DNS servers and then do some magic based on that. I need to have the ASA recognise a FQDN within an initial DNS request and send that request to an Internal server.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:20:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-doctoring-ish/m-p/3059051#M135758</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2019-03-12T09:20:07Z</dc:date>
    </item>
    <item>
      <title>Hello,</title>
      <link>https://community.cisco.com/t5/network-security/dns-doctoring-ish/m-p/3059052#M135759</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;you question is not clear. Could you please give an example with ip addresses and that would make it more clear. Like who is client(source), where is web server(public ip and real ip) and where is the dns server etc,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;-AJ&lt;/P&gt;</description>
      <pubDate>Tue, 09 May 2017 16:00:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-doctoring-ish/m-p/3059052#M135759</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2017-05-09T16:00:16Z</dc:date>
    </item>
    <item>
      <title>Scenario I would be using</title>
      <link>https://community.cisco.com/t5/network-security/dns-doctoring-ish/m-p/3059053#M135760</link>
      <description>&lt;P&gt;Scenario I would be using this - (ISE/CWA)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Client connects to Guest SSID&lt;/P&gt;
&lt;P&gt;Client receives Public DNS Servers as part of its DHCP config.&lt;/P&gt;
&lt;P&gt;As part of my ISE policy, client will ultimately receive a CWA URL which is only resolvable by my Internal DNS servers&lt;/P&gt;
&lt;P&gt;Client will do a DNS lookup for that URL&amp;nbsp;which will be sent to the clients Public DNS servers (this traffic will traverse the ASA as it is the clients GW)&lt;/P&gt;
&lt;P&gt;I want the ASA to be able to intercept this DNS request before it goes outside and to direct it to my Internal DNS.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I know there I can use IP in the CWA redirect but this is something I prefer not to do. I would like to achieve the above if possible.&lt;/P&gt;</description>
      <pubDate>Tue, 09 May 2017 16:10:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-doctoring-ish/m-p/3059053#M135760</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2017-05-09T16:10:06Z</dc:date>
    </item>
    <item>
      <title>Well, we can do that but it</title>
      <link>https://community.cisco.com/t5/network-security/dns-doctoring-ish/m-p/3059054#M135761</link>
      <description>&lt;P&gt;Well, we can do that but it would not be conditional. &lt;EM&gt;&lt;STRONG&gt;It will redirect all the requests going to external dns server to internal dns server.&lt;/STRONG&gt;&lt;/EM&gt; We will have to create a static NAT something like:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;nat (inside,inside) source dynamic any interface destination static obj-1.1.1.1 obj-2.2.2.2&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;where obj-1.1.1.1 is the internal dns server ip address&lt;/P&gt;
&lt;P&gt;obj-2.2.2.2 is the external dns server ip address&lt;/P&gt;
&lt;P&gt;we are creating this dummy nat entry so that when traffic comes to inside interface for 2.2.2.2(external dns server), the source gets translated to inside interface and destination gets unNATED to 1.1.1.1(internal dns server. The reason for PATing the source address is to ensure that reply packet comes to ASA and there is no asymetric routing. Since this is UDP traffic, I believe it should work without the source NAT as well but try it with source first if there is no issue.&lt;/P&gt;
&lt;P&gt;**try to add this NAT at line 1. We would want to make sure that this takes preference.&lt;/P&gt;
&lt;P&gt;also, add below command to allow u-turn:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;same-security-traffic permit intra-interface&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;-AJ&lt;/P&gt;</description>
      <pubDate>Tue, 09 May 2017 16:23:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-doctoring-ish/m-p/3059054#M135761</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2017-05-09T16:23:06Z</dc:date>
    </item>
    <item>
      <title>When you create CWA</title>
      <link>https://community.cisco.com/t5/network-security/dns-doctoring-ish/m-p/3059055#M135763</link>
      <description>&lt;P&gt;When you create CWA authorization policy there is a option to assign static IP/Host name/FQDN, You can send IP of your PSN server or Load balancer. So client will get an IP in URL in place of domain name.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Attach is the screenshot.&lt;/P&gt;</description>
      <pubDate>Tue, 09 May 2017 17:44:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-doctoring-ish/m-p/3059055#M135763</guid>
      <dc:creator>Ashish Jhaldiyal</dc:creator>
      <dc:date>2017-05-09T17:44:04Z</dc:date>
    </item>
    <item>
      <title>If you have SourceFire module</title>
      <link>https://community.cisco.com/t5/network-security/dns-doctoring-ish/m-p/3059056#M135765</link>
      <description>&lt;P&gt;If you have SourceFire module on your ASA firewall you can use an option called Sinkhole and achieve this.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/firepower/601/configuration/guide/fpmc-config-guide-v601/fpmc-config-guide-v601_chapter_01011101.html#concept_FFB4BE7AF2914BAD9CFF278BCCBC523C&lt;/P&gt;</description>
      <pubDate>Tue, 09 May 2017 18:09:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-doctoring-ish/m-p/3059056#M135765</guid>
      <dc:creator>Ashish Jhaldiyal</dc:creator>
      <dc:date>2017-05-09T18:09:54Z</dc:date>
    </item>
    <item>
      <title>Hi Grant,</title>
      <link>https://community.cisco.com/t5/network-security/dns-doctoring-ish/m-p/3059057#M135767</link>
      <description>&lt;P&gt;Hi Grant,&lt;/P&gt;
&lt;P&gt;i solved this issue in this way :&lt;/P&gt;
&lt;P&gt;My CWA&amp;nbsp;url is somethng like &lt;EM&gt;guest@mycomain.com&lt;/EM&gt; so i asked my isp to publish this DNS record&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;to a public ip address, obviously from my own public addresses, let's say this address is 1.1.1.1. So guest users obtaining public DNS servers are now resolving&amp;nbsp;&lt;EM&gt;guest@mycomain.com&amp;nbsp;&lt;/EM&gt;with ip 1.1.1.1 but G&lt;/SPAN&gt;&lt;SPAN&gt;uest page is not really published so is not reachable from outside, and is is somwething we want to do!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Then i configured DNS doctoring as per this link :&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;https://supportforums.cisco.com/document/145401/dns-doctoring-and-u-turning-asa-when-and-how-use-it&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;and all is fine!&lt;/P&gt;
&lt;P&gt;You can also use public ip addresses not directly connected to your ASA firewall.&lt;/P&gt;
&lt;P&gt;Hope this helps,&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 17 May 2017 07:18:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-doctoring-ish/m-p/3059057#M135767</guid>
      <dc:creator>alessandro.s</dc:creator>
      <dc:date>2017-05-17T07:18:10Z</dc:date>
    </item>
  </channel>
</rss>

