<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/redirect-dns/m-p/2929063#M148196</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Ah, I misunderstood your question.&lt;/P&gt;
&lt;P&gt;Would it be possible for you to restrict access to all public DNS server with the exception of your internal DNS server for forward lookup requests, and point all your clients/servers at your local server directly;&lt;/P&gt;
&lt;P&gt;1. Manual configuration&lt;/P&gt;
&lt;P&gt;2. DHCP scope configuration&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I do not recall a feature or configuration that would enable this functionality.&lt;/P&gt;</description>
    <pubDate>Tue, 27 Dec 2016 00:23:37 GMT</pubDate>
    <dc:creator>mattjones03</dc:creator>
    <dc:date>2016-12-27T00:23:37Z</dc:date>
    <item>
      <title>Redirect DNS</title>
      <link>https://community.cisco.com/t5/network-security/redirect-dns/m-p/2929060#M148193</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;This is my goal: Inside users send DNS request onto any public DNS (Google, Comcast etc.) I want to catch it and redirect to my local DNS server. Let's say 192.168.99.12&lt;/P&gt;
&lt;P&gt;I have ASA with code 9.6&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:42:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/redirect-dns/m-p/2929060#M148193</guid>
      <dc:creator>filip00011</dc:creator>
      <dc:date>2019-03-12T08:42:36Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/redirect-dns/m-p/2929061#M148194</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;The feature you require is "DNS rewrite" / "DNS Doctoring". Here is a Cisco document with example configuration;&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/115753-dns-doctoring-asa-config.html&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Dec 2016 00:03:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/redirect-dns/m-p/2929061#M148194</guid>
      <dc:creator>mattjones03</dc:creator>
      <dc:date>2016-12-27T00:03:52Z</dc:date>
    </item>
    <item>
      <title>I'm sorry, but I think that</title>
      <link>https://community.cisco.com/t5/network-security/redirect-dns/m-p/2929062#M148195</link>
      <description>&lt;P&gt;I'm sorry, but I think that it&amp;nbsp;is not what I need.&lt;/P&gt;
&lt;P&gt;I want to catch all the DNS queries, which are going&amp;nbsp;outside&amp;nbsp;and send them to my local DNS server.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Dec 2016 00:09:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/redirect-dns/m-p/2929062#M148195</guid>
      <dc:creator>filip00011</dc:creator>
      <dc:date>2016-12-27T00:09:15Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/redirect-dns/m-p/2929063#M148196</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Ah, I misunderstood your question.&lt;/P&gt;
&lt;P&gt;Would it be possible for you to restrict access to all public DNS server with the exception of your internal DNS server for forward lookup requests, and point all your clients/servers at your local server directly;&lt;/P&gt;
&lt;P&gt;1. Manual configuration&lt;/P&gt;
&lt;P&gt;2. DHCP scope configuration&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I do not recall a feature or configuration that would enable this functionality.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Dec 2016 00:23:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/redirect-dns/m-p/2929063#M148196</guid>
      <dc:creator>mattjones03</dc:creator>
      <dc:date>2016-12-27T00:23:37Z</dc:date>
    </item>
    <item>
      <title>It is possible via NAT, but I</title>
      <link>https://community.cisco.com/t5/network-security/redirect-dns/m-p/2929064#M148197</link>
      <description>&lt;P&gt;It is possible via NAT, but I can't somehow figure out correct syntax.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Doesn't work:&lt;/P&gt;
&lt;P&gt;object network DNS&lt;BR /&gt;&amp;nbsp;host 192.168.99.12&lt;BR /&gt;object network all&lt;BR /&gt;subnert 0.0.0.0 0.0.0.0&lt;BR /&gt;object network DNS&lt;BR /&gt;&amp;nbsp;nat (outside,inside) static all service udp domain domain&lt;/P&gt;</description>
      <pubDate>Tue, 27 Dec 2016 00:43:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/redirect-dns/m-p/2929064#M148197</guid>
      <dc:creator>filip00011</dc:creator>
      <dc:date>2016-12-27T00:43:01Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/redirect-dns/m-p/2929065#M148198</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I don't see this working, as that would most likely break other DNS NATs you may have in place.&lt;/P&gt;
&lt;P&gt;As mentioned, I'm unaware of a native feature on the ASA that would enforce this, however you may want to consider the Cisco ASA CX module depending on the particular ASA you are running.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Dec 2016 10:17:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/redirect-dns/m-p/2929065#M148198</guid>
      <dc:creator>mattjones03</dc:creator>
      <dc:date>2016-12-27T10:17:55Z</dc:date>
    </item>
    <item>
      <title>Hello,</title>
      <link>https://community.cisco.com/t5/network-security/redirect-dns/m-p/2929066#M148199</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Not an ideal scenario where we end up configuring destination nat for single ip to a subnet of 0.0.0.0/0 and also since this would be a u-turning scenario.&lt;/P&gt;
&lt;P&gt;But we can try if that is needed. Please try this in a downtime.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;object network DNS&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #800000;"&gt;&amp;nbsp;host 192.168.99.12&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #800000;"&gt;object network all&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #800000;"&gt;subnert 0.0.0.0 0.0.0.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;hostname(config)# object service dns-real&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;hostname(config-service-object)# service udp destination eq 53&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;hostname(config)# object service&amp;nbsp;dns_mapped&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;hostname(config-service-object)# service udp destination eq&amp;nbsp;53&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;nat (inside,inside) 1 source dynamic any interface destination static all DNS service dns-mapped dns-real&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;same-security-traffic permit intra-interface&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;HTH&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;-&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;AJ&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P class="pExT_ExampleTable"&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Dec 2016 12:11:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/redirect-dns/m-p/2929066#M148199</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2016-12-27T12:11:05Z</dc:date>
    </item>
  </channel>
</rss>

