<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Diego,Yes. DNS query will in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/traffic-between-to-private-interfaces-via-nated-public-interface/m-p/2768157#M177700</link>
    <description>&lt;P&gt;Hi Diego,&lt;/P&gt;&lt;P&gt;Yes. DNS query will be between Internal2 and Outside.&amp;nbsp; For DNS query, Internal1 Interface will not come into picture. The whole point behind enabling DNS doctoring is that when a reply DNS packet for Internal2's DNS query, ASA changes the A-Record of DNS(changes it to private) as per the nat statement and the traffic would be able to reach website internally.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Akshay Rastogi&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 15 Oct 2015 19:48:54 GMT</pubDate>
    <dc:creator>Akshay Rastogi</dc:creator>
    <dc:date>2015-10-15T19:48:54Z</dc:date>
    <item>
      <title>traffic between to private interfaces via NATed public interface on ASA</title>
      <link>https://community.cisco.com/t5/network-security/traffic-between-to-private-interfaces-via-nated-public-interface/m-p/2768154#M177697</link>
      <description>&lt;P&gt;I have an ASA with three interfaces which I will call public, internal1 and internal2.&amp;nbsp; Security levels are 0 for public, 100 for internal1 and 90 for internal2.&amp;nbsp; I have a few hosts on internal1 that have static NAT using public interface and rules to allow TCP80, 443, etc.&lt;/P&gt;&lt;P&gt;The internal1 machines exposed ports and services work fine from the Internet.&amp;nbsp; However, they are not reachable from machines on internal2.&lt;/P&gt;&lt;P&gt;Below is some IP info that might make the setup easier to understand.&lt;/P&gt;&lt;P&gt;Machine on internal1 interface&lt;BR /&gt;private IP: 192.168.1.10 NAT to public IP 1.1.1.10&lt;/P&gt;&lt;P&gt;Machines on internal2 interface&lt;BR /&gt;private IPs: 192.168.11.XX PAT to public IP 1.1.1.20&lt;/P&gt;&lt;P&gt;ASA Interfaces&lt;BR /&gt;internal1:&amp;nbsp; 192.168.1.1&lt;BR /&gt;internal2:&amp;nbsp; 192.168.11.1&lt;BR /&gt;public:&amp;nbsp; 1.1.1.1&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;So the flow would be that a client on internal2 using 192.168.11.xx is PATed to 1.1.1.20 and sent out the public IP of the ASA but must then come right back into the ASA on the same interface and be allowed to access 1.1.1.10 web site which resides on the internal1 interface machine with IP 192.168.1.10.&lt;/P&gt;&lt;P&gt;A packet trace from the ASA confirms that this is what is happening and it confirms that the packet is allowed but yet it doesn't work.&lt;/P&gt;&lt;P&gt;I am open to a different configuration but the only requirement is that internal2 be treated as non-trusted network and not be allowed full access to internal1.&amp;nbsp; The unit is a 5515-X with 9.4.2.&lt;/P&gt;&lt;P&gt;Thanks,&lt;BR /&gt;Diego&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:45:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-between-to-private-interfaces-via-nated-public-interface/m-p/2768154#M177697</guid>
      <dc:creator>tato386</dc:creator>
      <dc:date>2019-03-12T06:45:15Z</dc:date>
    </item>
    <item>
      <title>Hi Diego,From the explanation</title>
      <link>https://community.cisco.com/t5/network-security/traffic-between-to-private-interfaces-via-nated-public-interface/m-p/2768155#M177698</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;&lt;SPAN style="font-family:arial,helvetica,sans-serif;"&gt;Hi Diego,&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;&lt;SPAN style="font-family:arial,helvetica,sans-serif;"&gt;From the explanation, i&amp;nbsp;could understand that the host from Internal2 want to access webserver on public IP which actually resides behind internal 1.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;&lt;SPAN style="font-family:arial,helvetica,sans-serif;"&gt;&lt;SPAN style="line-height: normal;"&gt;As it is dns doctoring scenario, you could try this :&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;&lt;SPAN style="font-family:arial,helvetica,sans-serif;"&gt;&lt;SPAN style="line-height: normal;"&gt;object network obj-192.168.1.10&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;&lt;SPAN style="font-family:arial,helvetica,sans-serif;"&gt;&lt;SPAN style="line-height: normal;"&gt;&amp;nbsp;host 192.168.1.10&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;&lt;SPAN style="font-family:arial,helvetica,sans-serif;"&gt;&lt;SPAN style="line-height: normal;"&gt;&amp;nbsp;nat (internal1,outside) static 1.1.1.10 dns&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;&lt;SPAN style="font-family:arial,helvetica,sans-serif;"&gt;&lt;SPAN style="line-height: normal;"&gt;object network obj-192.168.11.0&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;&lt;SPAN style="font-family:arial,helvetica,sans-serif;"&gt;&lt;SPAN style="line-height: normal;"&gt;&amp;nbsp;subnet 192.168.11.0 255.255.255.0&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;&lt;SPAN style="font-family:arial,helvetica,sans-serif;"&gt;&lt;SPAN style="line-height: normal;"&gt;&amp;nbsp;nat (internal2,outside ) dynamic 1.1.1.20&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;&lt;SPAN style="font-family:arial,helvetica,sans-serif;"&gt;Alternatively, you could try this with Destination nat.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;&lt;SPAN style="font-family:arial,helvetica,sans-serif;"&gt;You could try the below type of configuration:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;&lt;SPAN style="font-family:arial,helvetica,sans-serif;"&gt;nat (internal2,internal1) source dynamic&amp;nbsp;&amp;lt;&lt;SPAN style="line-height: normal;"&gt;object for&amp;nbsp;192.168.11.x&amp;nbsp;&amp;gt; interface&amp;nbsp;destination static &amp;lt;object-1.1.1.10&amp;gt; &amp;lt;object-192.168.1.10&amp;gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;&lt;SPAN style="font-family:arial,helvetica,sans-serif;"&gt;access-list test permit ip any any&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;&lt;SPAN style="font-family:arial,helvetica,sans-serif;"&gt;access-group test in interface internal2&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;&lt;SPAN style="font-family:arial,helvetica,sans-serif;"&gt;You could go through the link below :&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/72273-dns-doctoring-3zones.html#anc12&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;&lt;SPAN style="font-family:arial,helvetica,sans-serif;"&gt;Regards,&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;&lt;SPAN style="font-family:arial,helvetica,sans-serif;"&gt;Akshay Rastogi&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Oct 2015 18:55:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-between-to-private-interfaces-via-nated-public-interface/m-p/2768155#M177698</guid>
      <dc:creator>Akshay Rastogi</dc:creator>
      <dc:date>2015-10-15T18:55:15Z</dc:date>
    </item>
    <item>
      <title>Hello Akshay,The DNS</title>
      <link>https://community.cisco.com/t5/network-security/traffic-between-to-private-interfaces-via-nated-public-interface/m-p/2768156#M177699</link>
      <description>&lt;P&gt;Hello Akshay,&lt;/P&gt;&lt;P&gt;The DNS doctoring idea is interesting but I am not sure it will work in my scenario.&amp;nbsp; It seems like you want the internal2 machines to get the private IP of the server when they query DNS.&amp;nbsp; However they use a public DNS server so DNS queries will be between int_outside and internal2.&amp;nbsp; If I turn on DNS&amp;nbsp;doctoring it seems like it will only&amp;nbsp;apply for DNS crossing between int_outside and internal1, no?&lt;/P&gt;&lt;P&gt;Rgds,&lt;/P&gt;&lt;P&gt;Diego&lt;/P&gt;</description>
      <pubDate>Thu, 15 Oct 2015 19:19:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-between-to-private-interfaces-via-nated-public-interface/m-p/2768156#M177699</guid>
      <dc:creator>tato386</dc:creator>
      <dc:date>2015-10-15T19:19:38Z</dc:date>
    </item>
    <item>
      <title>Hi Diego,Yes. DNS query will</title>
      <link>https://community.cisco.com/t5/network-security/traffic-between-to-private-interfaces-via-nated-public-interface/m-p/2768157#M177700</link>
      <description>&lt;P&gt;Hi Diego,&lt;/P&gt;&lt;P&gt;Yes. DNS query will be between Internal2 and Outside.&amp;nbsp; For DNS query, Internal1 Interface will not come into picture. The whole point behind enabling DNS doctoring is that when a reply DNS packet for Internal2's DNS query, ASA changes the A-Record of DNS(changes it to private) as per the nat statement and the traffic would be able to reach website internally.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Akshay Rastogi&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Oct 2015 19:48:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-between-to-private-interfaces-via-nated-public-interface/m-p/2768157#M177700</guid>
      <dc:creator>Akshay Rastogi</dc:creator>
      <dc:date>2015-10-15T19:48:54Z</dc:date>
    </item>
    <item>
      <title>OK, I will give it a shot and</title>
      <link>https://community.cisco.com/t5/network-security/traffic-between-to-private-interfaces-via-nated-public-interface/m-p/2768158#M177701</link>
      <description>&lt;P&gt;OK, I will give it a shot and let you know.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 15 Oct 2015 19:52:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-between-to-private-interfaces-via-nated-public-interface/m-p/2768158#M177701</guid>
      <dc:creator>tato386</dc:creator>
      <dc:date>2015-10-15T19:52:17Z</dc:date>
    </item>
    <item>
      <title>Akshay,I was finally able to</title>
      <link>https://community.cisco.com/t5/network-security/traffic-between-to-private-interfaces-via-nated-public-interface/m-p/2768159#M177702</link>
      <description>&lt;P&gt;Akshay,&lt;/P&gt;&lt;P&gt;I was finally able to get this to work.&amp;nbsp; It took three changes:&lt;/P&gt;&lt;P&gt;1) DNS doctoring as per your recommendation to get internal2 machines to see the private ip of internal1 machines&lt;/P&gt;&lt;P&gt;2) Identity NAT for internal1 private subnet to internal2 private subnet&lt;/P&gt;&lt;P&gt;3) Change the implicit rule on internal1 and internal2 interfaces to be allow any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you very much for your help.&lt;/P&gt;&lt;P&gt;Rgds.&lt;/P&gt;&lt;P&gt;Diego&lt;/P&gt;</description>
      <pubDate>Fri, 16 Oct 2015 21:03:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-between-to-private-interfaces-via-nated-public-interface/m-p/2768159#M177702</guid>
      <dc:creator>tato386</dc:creator>
      <dc:date>2015-10-16T21:03:36Z</dc:date>
    </item>
  </channel>
</rss>

