<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic External DNS Question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/external-dns-question/m-p/2783452#M160034</link>
    <description>&lt;P&gt;We control our external DNS to the internet, and currently they sit outside of the firewall on public IPs. It's time to upgrade and I want to bring them inside the ASA and NAT them.&lt;/P&gt;
&lt;P&gt;Maybe I'm looking at this too hard, but is it as simple as NAT'ing the existing public IPs to the new internal servers in the DMZ and allowing port 53 traffic through?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 07:14:20 GMT</pubDate>
    <dc:creator>robert.russom</dc:creator>
    <dc:date>2019-03-12T07:14:20Z</dc:date>
    <item>
      <title>External DNS Question</title>
      <link>https://community.cisco.com/t5/network-security/external-dns-question/m-p/2783452#M160034</link>
      <description>&lt;P&gt;We control our external DNS to the internet, and currently they sit outside of the firewall on public IPs. It's time to upgrade and I want to bring them inside the ASA and NAT them.&lt;/P&gt;
&lt;P&gt;Maybe I'm looking at this too hard, but is it as simple as NAT'ing the existing public IPs to the new internal servers in the DMZ and allowing port 53 traffic through?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:14:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/external-dns-question/m-p/2783452#M160034</guid>
      <dc:creator>robert.russom</dc:creator>
      <dc:date>2019-03-12T07:14:20Z</dc:date>
    </item>
    <item>
      <title>Sounds about right.</title>
      <link>https://community.cisco.com/t5/network-security/external-dns-question/m-p/2783453#M160035</link>
      <description>&lt;P&gt;Sounds about right.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Feb 2016 17:08:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/external-dns-question/m-p/2783453#M160035</guid>
      <dc:creator>jj27</dc:creator>
      <dc:date>2016-02-03T17:08:46Z</dc:date>
    </item>
    <item>
      <title>In addition to Johnson's</title>
      <link>https://community.cisco.com/t5/network-security/external-dns-question/m-p/2783454#M160036</link>
      <description>&lt;P&gt;In addition to Johnson's comment, couple of other notes..&lt;/P&gt;
&lt;P&gt;1. As these servers need to initiate DNS queries to Internet, make sure to allow DNS traffic only to Internet from DMZ (sourced from server pvt IPs).&lt;/P&gt;
&lt;P&gt;2. You may be aware of this but you need to allow both tcp &amp;amp; udp for DNS traffic.&lt;/P&gt;
&lt;P&gt;3. Make sure to block any connection initiated from these servers to your Internal IPs (using ACLs on DMZ).&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;hth&lt;/P&gt;
&lt;P&gt;MS&lt;/P&gt;</description>
      <pubDate>Thu, 04 Feb 2016 03:26:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/external-dns-question/m-p/2783454#M160036</guid>
      <dc:creator>mvsheik123</dc:creator>
      <dc:date>2016-02-04T03:26:24Z</dc:date>
    </item>
    <item>
      <title>Thanks all!</title>
      <link>https://community.cisco.com/t5/network-security/external-dns-question/m-p/2783455#M160037</link>
      <description>&lt;P&gt;Thanks all!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;#3... I still need to allow port 53 to/from my DCs for DNS forwarding, correct?&lt;/P&gt;</description>
      <pubDate>Thu, 04 Feb 2016 15:18:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/external-dns-question/m-p/2783455#M160037</guid>
      <dc:creator>robert.russom</dc:creator>
      <dc:date>2016-02-04T15:18:13Z</dc:date>
    </item>
    <item>
      <title>Hi Robert,</title>
      <link>https://community.cisco.com/t5/network-security/external-dns-question/m-p/2783456#M160038</link>
      <description>&lt;P&gt;Hi Robert,&lt;/P&gt;
&lt;P&gt;If your DCs are inside and using DMZ servers as forwarders, I don't see a need to open any ports. If your ASA version is pre 8.3 , you need static (Inside, DMZ) DCIP DCIP mask x.x.x.x and for 8.3 and after- the communication allowed by config.&lt;/P&gt;
&lt;P&gt;hth&lt;/P&gt;
&lt;P&gt;MS&lt;/P&gt;</description>
      <pubDate>Tue, 09 Feb 2016 03:45:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/external-dns-question/m-p/2783456#M160038</guid>
      <dc:creator>mvsheik123</dc:creator>
      <dc:date>2016-02-09T03:45:27Z</dc:date>
    </item>
    <item>
      <title>Thanks guys!  I got the crud</title>
      <link>https://community.cisco.com/t5/network-security/external-dns-question/m-p/2783457#M160039</link>
      <description>&lt;P&gt;Thanks guys!&amp;nbsp; I got the crud and forgot to come back on here and update.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Feb 2016 19:08:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/external-dns-question/m-p/2783457#M160039</guid>
      <dc:creator>robert.russom</dc:creator>
      <dc:date>2016-02-12T19:08:20Z</dc:date>
    </item>
  </channel>
</rss>

