<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Your mentioned ACL-line is in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dns-issue-open-port-53-udp/m-p/3050697#M144934</link>
    <description>&lt;P&gt;Your mentioned ACL-line is for allowing return-traffic for queries that are initiated from inside.&amp;nbsp;This line also allows DNS-queries from the internet into your network/to your router. But as you are running a statefull firewall (ip inspect), you don't need these ACL-lines.&lt;/P&gt;
&lt;P&gt;Can you show your complete dialer- and ACL/inspect-config to decide how to optimize that?&lt;/P&gt;</description>
    <pubDate>Wed, 19 Apr 2017 14:56:49 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2017-04-19T14:56:49Z</dc:date>
    <item>
      <title>DNS issue open port 53 udp</title>
      <link>https://community.cisco.com/t5/network-security/dns-issue-open-port-53-udp/m-p/3050696#M144933</link>
      <description>&lt;P&gt;Hi guys,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;i have an issue with my config and probably not understand the whole thing right. Perhaps someone is able to open my eyes .. Thanks in advance :&lt;/P&gt;
&lt;P&gt;So what is exactly the issue?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have a router 2821 and firewall active . Also i have an acl for outgoing traffic on Dialer Interface&amp;nbsp; "ip access group 200 in " where i allow&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list 200 permit udp any eq domain any&lt;/P&gt;
&lt;P&gt;also "ip inspect Firewall out "&amp;nbsp; for tcp , udp, ftp&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ok. Everything works fine as i have "ip dns server" globally enabled (as like a proxy for my internal net)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;But now the issue seems that my port 53 udp is open and everyone ( isp said this) could use this DNS for some attacks and so on.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If i disable the dns service - my internal network is not able to resolving anymore and sucks.&lt;/P&gt;
&lt;P&gt;So how it should work that everything which is need going out is working but in generally the port 53 udp is closed from outside?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;thanks for help&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:14:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-issue-open-port-53-udp/m-p/3050696#M144933</guid>
      <dc:creator>cyberurmel</dc:creator>
      <dc:date>2019-03-12T09:14:13Z</dc:date>
    </item>
    <item>
      <title>Your mentioned ACL-line is</title>
      <link>https://community.cisco.com/t5/network-security/dns-issue-open-port-53-udp/m-p/3050697#M144934</link>
      <description>&lt;P&gt;Your mentioned ACL-line is for allowing return-traffic for queries that are initiated from inside.&amp;nbsp;This line also allows DNS-queries from the internet into your network/to your router. But as you are running a statefull firewall (ip inspect), you don't need these ACL-lines.&lt;/P&gt;
&lt;P&gt;Can you show your complete dialer- and ACL/inspect-config to decide how to optimize that?&lt;/P&gt;</description>
      <pubDate>Wed, 19 Apr 2017 14:56:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-issue-open-port-53-udp/m-p/3050697#M144934</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2017-04-19T14:56:49Z</dc:date>
    </item>
    <item>
      <title>Hello Karsten,</title>
      <link>https://community.cisco.com/t5/network-security/dns-issue-open-port-53-udp/m-p/3050698#M144935</link>
      <description>&lt;P&gt;Hello Karsten,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;thanks..here we go : Meanwhile i read with dns view group and implemented that ..but that was after writing here and testing--port is still open in udp 53. Thats what i want to stop - nothing should be open for anyone outside .&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;greets&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ip inspect name xx tcp&lt;BR /&gt;ip inspect name xx udp&lt;BR /&gt;ip inspect name xx ftp&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;interface Dialer0&lt;BR /&gt;&amp;nbsp;description VDSL Einwahl Interface&lt;BR /&gt;&amp;nbsp;ip address negotiated&lt;BR /&gt;&amp;nbsp;ip access-group 200 in&lt;BR /&gt;&amp;nbsp;no ip redirects&lt;BR /&gt;&amp;nbsp;no ip unreachables&lt;BR /&gt;&amp;nbsp;no ip proxy-arp&lt;BR /&gt;&amp;nbsp;ip mtu 1492&lt;BR /&gt;&amp;nbsp;ip inspect xx out&lt;BR /&gt;&amp;nbsp;ip dns view-group dv1_secure-dns-proxy&lt;BR /&gt;&amp;nbsp;ip nat outside&lt;BR /&gt;&amp;nbsp;ip virtual-reassembly in&lt;BR /&gt;&amp;nbsp;encapsulation ppp&lt;BR /&gt;&amp;nbsp;dialer pool 1&lt;BR /&gt;&amp;nbsp;dialer-group 1&lt;BR /&gt;&amp;nbsp;no keepalive&lt;BR /&gt;login isp data&lt;BR /&gt;&amp;nbsp;ppp ipcp dns request&lt;BR /&gt;&amp;nbsp;ppp ipcp mask request&lt;BR /&gt;&amp;nbsp;ppp ipcp route default&lt;BR /&gt;&amp;nbsp;no cdp enable&lt;/P&gt;
&lt;P&gt;Extended IP access list 200&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10 permit icmp any any administratively-prohibited &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 20 permit icmp any any echo-reply &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30 permit icmp any any packet-too-big&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 40 permit icmp any any time-exceeded&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 50 permit icmp any any unreachable &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 60 permit udp any eq domain any &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 65 permit tcp any eq domain any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 70 permit udp any eq 5060 any &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 79 permit udp host 130.149.17.8 eq ntp any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 80 permit udp host 192.53.103.104 eq ntp any &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 90 permit igmp host IPTV any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 100 permit icmp host IPTV&amp;nbsp; any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 110 permit igmp any 224.0.0.0 15.255.255.255&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 120 permit udp any gt 40000 any &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 130 deny ip any any (1845 matches)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Apr 2017 15:52:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-issue-open-port-53-udp/m-p/3050698#M144935</guid>
      <dc:creator>cyberurmel</dc:creator>
      <dc:date>2017-04-19T15:52:47Z</dc:date>
    </item>
    <item>
      <title>ok, here are some changes to</title>
      <link>https://community.cisco.com/t5/network-security/dns-issue-open-port-53-udp/m-p/3050699#M144936</link>
      <description>&lt;P&gt;ok, here are some changes to the firewall-setup:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;ip inspect name xx tcp&amp;nbsp;router-traffic&lt;BR /&gt;ip inspect name xx tcp&amp;nbsp;router-traffic&lt;BR /&gt;ip inspect name xx&amp;nbsp;icmp router-traffic&lt;BR /&gt;ip inspect name xx ftp&lt;/PRE&gt;
&lt;P&gt;With that you also inspect icmp (for pinging) and inspect traffic that is router-generated. With that you can remove the following lines from the ACL 200:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; 20 permit icmp any any echo-reply&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; 60 permit udp any eq domain any&amp;nbsp;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 65 permit tcp any eq domain any&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 70 permit udp any eq 5060 any&amp;nbsp;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 79 permit udp host 130.149.17.8 eq ntp any&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 80 permit udp host 192.53.103.104 eq ntp any&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;And I assume that the following line can also be remove:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;&lt;SPAN&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; 120 permit udp any gt 40000 any&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 19 Apr 2017 16:01:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-issue-open-port-53-udp/m-p/3050699#M144936</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2017-04-19T16:01:04Z</dc:date>
    </item>
    <item>
      <title>Hi Karsten,</title>
      <link>https://community.cisco.com/t5/network-security/dns-issue-open-port-53-udp/m-p/3050700#M144937</link>
      <description>&lt;P&gt;Hi Karsten,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;thanks a lot. I will check that..but let my ask please to understand :&lt;/P&gt;
&lt;P&gt;As i will change it from example tcp to tcp router-traffic as you mentioned or udp to udp router-traffic ..is then really the whole traffic&amp;nbsp; under inspection&amp;nbsp; or only the traffic which the router generates itself as a dns request (in my way) ? Thats a point where i havent understand yet. could you be so kind to verify or explain again? The difference between&lt;/P&gt;
&lt;P&gt;normal ip inspect name xx tcp and :&lt;/P&gt;
&lt;PRE class="prettyprint prettyprinted"&gt;&lt;SPAN class="pln"&gt;ip inspect name xx tcp&amp;nbsp;router&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;traffic&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;Thanks in advance&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Cyb&lt;/P&gt;</description>
      <pubDate>Thu, 20 Apr 2017 14:30:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-issue-open-port-53-udp/m-p/3050700#M144937</guid>
      <dc:creator>cyberurmel</dc:creator>
      <dc:date>2017-04-20T14:30:09Z</dc:date>
    </item>
    <item>
      <title>ip inspect name xx tcp</title>
      <link>https://community.cisco.com/t5/network-security/dns-issue-open-port-53-udp/m-p/3050701#M144938</link>
      <description>&lt;PRE class="prettyprint"&gt;ip inspect name xx tcp&lt;/PRE&gt;
&lt;P&gt;The router will only inspect traffic that flows *through* the router, but not traffic that is generated by the router.&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;&lt;SPAN&gt;ip inspect name xx tcp router-traffic&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;SPAN&gt;The router will inspect both traffic that flows through the router *and* traffic that is generated by the router.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;BTW: cyberurmel&amp;nbsp;...&amp;nbsp;the friend of cyberwawa?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;EDIT: corrected syntax ... &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Apr 2017 17:00:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-issue-open-port-53-udp/m-p/3050701#M144938</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2017-04-20T17:00:57Z</dc:date>
    </item>
    <item>
      <title>Hello Karsten ,,</title>
      <link>https://community.cisco.com/t5/network-security/dns-issue-open-port-53-udp/m-p/3050702#M144940</link>
      <description>&lt;P&gt;Hello Karsten ,,&lt;/P&gt;
&lt;P&gt;thanks a lot..&lt;/P&gt;
&lt;P&gt;but in your explanation you wrote the same syntax &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; could you be so kind to adjust that for understanding??&lt;/P&gt;
&lt;P&gt;That would be great..&lt;/P&gt;
&lt;P&gt;As i changed that for udp to udp router-traffic ..the port 53 udp is still open .. is this a risk for attackers or did i something wrong ? I got a information from ISP with open 53 port so i should be save to that.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;No, sorry cyberwawa is not known by me.&lt;/P&gt;
&lt;P&gt;greets&lt;/P&gt;
&lt;P&gt;Cyb&lt;/P&gt;</description>
      <pubDate>Thu, 20 Apr 2017 17:00:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-issue-open-port-53-udp/m-p/3050702#M144940</guid>
      <dc:creator>cyberurmel</dc:creator>
      <dc:date>2017-04-20T17:00:58Z</dc:date>
    </item>
    <item>
      <title>(syntax corrected)</title>
      <link>https://community.cisco.com/t5/network-security/dns-issue-open-port-53-udp/m-p/3050703#M144942</link>
      <description>&lt;P&gt;(syntax corrected)&lt;/P&gt;
&lt;P&gt;Have you removed the ACL-lines that&amp;nbsp;allowed the DNS-traffic&amp;nbsp;in? That also&amp;nbsp;needs to be done.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Apr 2017 17:08:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-issue-open-port-53-udp/m-p/3050703#M144942</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2017-04-20T17:08:15Z</dc:date>
    </item>
    <item>
      <title>Hi Karsten,</title>
      <link>https://community.cisco.com/t5/network-security/dns-issue-open-port-53-udp/m-p/3050704#M144943</link>
      <description>&lt;P&gt;Hi Karsten,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;thanks again. Yes i removed all domain relevated out of acl. Nevertheless at this site &lt;A href="https://support.nightlydev.org/tcp-udp-port-scan" title="Scanner"&gt;https://support.nightlydev.org/tcp-udp-port-scan &lt;/A&gt;&lt;/P&gt;
&lt;P&gt;my port 53 is open for udp ?? TCP is closed.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;i am just a bit confused why ....&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Best Regards&lt;BR /&gt;Cyb&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Apr 2017 20:06:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-issue-open-port-53-udp/m-p/3050704#M144943</guid>
      <dc:creator>cyberurmel</dc:creator>
      <dc:date>2017-04-20T20:06:14Z</dc:date>
    </item>
    <item>
      <title>Can you show the resulting</title>
      <link>https://community.cisco.com/t5/network-security/dns-issue-open-port-53-udp/m-p/3050705#M144944</link>
      <description>&lt;P&gt;Can you show the resulting config?&lt;/P&gt;
&lt;P&gt;And you activated your DNS-view on the dialer. Typically these are&amp;nbsp;used on the interface where the DNS-querie originates which is typically a LAN-interface.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Apr 2017 21:02:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-issue-open-port-53-udp/m-p/3050705#M144944</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2017-04-20T21:02:53Z</dc:date>
    </item>
    <item>
      <title>Hi Karsten,</title>
      <link>https://community.cisco.com/t5/network-security/dns-issue-open-port-53-udp/m-p/3050706#M144945</link>
      <description>&lt;P&gt;Hi Karsten,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;here my config due to the topic:&lt;/P&gt;
&lt;P&gt;ip inspect name xx tcp&lt;BR /&gt;ip inspect name xx udp router-traffic&lt;BR /&gt;ip inspect name xx&amp;nbsp; ftp&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;interface Dialer0&lt;BR /&gt;&amp;nbsp;description VDSL Einwahl Interface&lt;BR /&gt;&amp;nbsp;ip address negotiated&lt;BR /&gt;&amp;nbsp;ip access-group 200 in&lt;BR /&gt;&amp;nbsp;no ip redirects&lt;BR /&gt;&amp;nbsp;no ip unreachables&lt;BR /&gt;&amp;nbsp;no ip proxy-arp&lt;BR /&gt;&amp;nbsp;ip mtu 1492&lt;BR /&gt;&amp;nbsp;ip inspect xx out&lt;BR /&gt;&amp;nbsp;ip dns view-group dv1_secure-dns-proxy&lt;BR /&gt;&amp;nbsp;ip nat outside&lt;BR /&gt;&amp;nbsp;ip virtual-reassembly in&lt;BR /&gt;&amp;nbsp;encapsulation ppp&lt;BR /&gt;&amp;nbsp;dialer pool 1&lt;BR /&gt;&amp;nbsp;dialer-group 1&lt;BR /&gt;&amp;nbsp;no keepalive&lt;BR /&gt;&amp;nbsp;login ISP&lt;BR /&gt;&amp;nbsp;ppp ipcp dns request&lt;BR /&gt;&amp;nbsp;ppp ipcp mask request&lt;BR /&gt;&amp;nbsp;ppp ipcp route default&lt;BR /&gt;&amp;nbsp;no cdp enable&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;access-list 200 permit icmp any any administratively-prohibited&lt;BR /&gt;access-list 200 permit icmp any any echo-reply&lt;BR /&gt;access-list 200 permit icmp any any packet-too-big&lt;BR /&gt;access-list 200 permit icmp any any time-exceeded&lt;BR /&gt;access-list 200 permit icmp any any unreachable&lt;BR /&gt;access-list 200 permit udp any eq 5060 any&lt;BR /&gt;access-list 200 permit udp host 130.149.17.8 eq ntp any&lt;BR /&gt;access-list 200 permit udp host 192.53.103.104 eq ntp any&lt;BR /&gt;access-list 200 permit igmp host 10.246.63.254 any&lt;BR /&gt;access-list 200 permit icmp host 10.246.63.254 any&lt;BR /&gt;access-list 200 permit igmp any 224.0.0.0 15.255.255.255&lt;BR /&gt;access-list 200 permit udp any gt 40000 any&lt;BR /&gt;access-list 200 deny&amp;nbsp;&amp;nbsp; ip any any&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;What exactly do you mean with the DNS view.. ? Do you think its wrong on the Dialer as its should be to the interface to my LAN?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Get another info from ISP due to open port 53.. How can i close this for incoming requests?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks a lot for your help&lt;/P&gt;
&lt;P&gt;greets&lt;/P&gt;</description>
      <pubDate>Fri, 21 Apr 2017 13:52:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-issue-open-port-53-udp/m-p/3050706#M144945</guid>
      <dc:creator>cyberurmel</dc:creator>
      <dc:date>2017-04-21T13:52:28Z</dc:date>
    </item>
    <item>
      <title>With the stateful firewall in</title>
      <link>https://community.cisco.com/t5/network-security/dns-issue-open-port-53-udp/m-p/3050707#M144946</link>
      <description>&lt;P&gt;With the stateful firewall in place you don't need the following rules any more:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;&lt;SPAN&gt;access-list 200 permit icmp any any echo-reply&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;access-list 200 permit udp any eq 5060 any&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;access-list 200 permit udp host 130.149.17.8 eq ntp any&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;access-list 200 permit udp host 192.53.103.104 eq ntp any&lt;BR /&gt;access-list 200 permit igmp host 10.246.63.254 any&lt;BR /&gt;&lt;SPAN&gt;access-list 200 permit icmp host 10.246.63.254 any&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;access-list 200 permit igmp any 224.0.0.0 15.255.255.255&lt;/SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;This one could also be related to incoming DNS as it allows any UDP with source-port greater 40000:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;&lt;SPAN&gt;access-list 200 permit udp any gt 40000 any&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;SPAN&gt;Perhaps it's also this line on the dialer that causes the problem:&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;&lt;SPAN&gt;ip dns view-group dv1_secure-dns-proxy&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;SPAN&gt;I have never used it that way and assume that it could have side-affects. Try removing it also.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Apr 2017 14:39:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-issue-open-port-53-udp/m-p/3050707#M144946</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2017-04-21T14:39:04Z</dc:date>
    </item>
    <item>
      <title>Hi Karsten,</title>
      <link>https://community.cisco.com/t5/network-security/dns-issue-open-port-53-udp/m-p/3050708#M144947</link>
      <description>&lt;P&gt;Hi Karsten,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;i deleated all relevant now . Dialer the dns view and almost everything in my acl 200.&lt;/P&gt;
&lt;P&gt;But by testing the port 53 udp :&lt;/P&gt;
&lt;P&gt;53/udp open|filtered domain&lt;/P&gt;
&lt;P&gt;how i can be sure for 100 % that the dns is not responding to requests from outside?? I dont want to get letters from lawyers that my ip is responsible for ddos or something like that.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks a lot for your help.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;greets&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 22 Apr 2017 10:25:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-issue-open-port-53-udp/m-p/3050708#M144947</guid>
      <dc:creator>cyberurmel</dc:creator>
      <dc:date>2017-04-22T10:25:58Z</dc:date>
    </item>
  </channel>
</rss>

