<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic thank u guys, i 've applied in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/guest-wireless-access-trough-firewall/m-p/2722404#M192361</link>
    <description>&lt;P&gt;thank u guys, i 've applied destination nat and it works , now my guest has external dns ip and able to access trough public ip of our servers.&lt;/P&gt;</description>
    <pubDate>Thu, 27 Aug 2015 14:50:13 GMT</pubDate>
    <dc:creator>Bekzod Fakhriddinov</dc:creator>
    <dc:date>2015-08-27T14:50:13Z</dc:date>
    <item>
      <title>Guest wireless access trough firewall</title>
      <link>https://community.cisco.com/t5/network-security/guest-wireless-access-trough-firewall/m-p/2722400#M192354</link>
      <description>&lt;P&gt;Hi guys. I have like this diagram and guest users must be able to go to some of the internal servers like email, etc .&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&amp;nbsp;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/2/3/6/73632-GuestASAVPN.jpg" /&gt;&lt;/P&gt;&lt;P&gt;1 questions is - Must&amp;nbsp; the guest users get it to email server (which is in internal network) only through Outside interface ?&lt;/P&gt;&lt;P&gt;right now I have opened specific ports and ip for access , but some security penetration test examiners don't like it and asked to allow guest access&amp;nbsp; only trough outside... which I can't do cause guest users has internal DNS ip and if I change dns ip to external they go out&amp;nbsp; trough the same Outside int and can't come back to internal network even when I have outside to inside nat rules. why i don't know...&lt;/P&gt;&lt;P&gt;2. why&amp;nbsp; user from guest wirelss (with external dns ip configured) can't go trough Outside int back to Internal network ? How can I fix it ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class="discussion-body"&gt;&lt;DIV class="field field-name-comment-body field-type-text-long field-label-hidden"&gt;&lt;DIV class="field-items"&gt;&lt;DIV class="field-item even"&gt;&lt;P&gt;sorry my friends , I noticed today for destination NAT i still go from Guest wireless interface to Inside(where are&amp;nbsp; my servers ) directly and guest ip translated to Inside ip--which doesn't re-solve security penetration test request&amp;nbsp; .&lt;/P&gt;&lt;P&gt;For DNS doctor option - if I do ping/nslookup of my webmail address its replying with it's own internal ip which is not good .&amp;nbsp; Is it possible to fix it ?&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:30:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/guest-wireless-access-trough-firewall/m-p/2722400#M192354</guid>
      <dc:creator>Bekzod Fakhriddinov</dc:creator>
      <dc:date>2019-03-12T06:30:06Z</dc:date>
    </item>
    <item>
      <title>Will ASA dns doctoring work?</title>
      <link>https://community.cisco.com/t5/network-security/guest-wireless-access-trough-firewall/m-p/2722401#M192356</link>
      <description>&lt;P&gt;Will ASA dns doctoring work?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/72273-dns-doctoring-3zones.html&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have to admit I am little confused in #1 with your pen testers... &amp;nbsp;Do they think it is ok for folks on the outside&amp;nbsp;to access the application but folks in wifi guest are not ok? &amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Aug 2015 22:42:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/guest-wireless-access-trough-firewall/m-p/2722401#M192356</guid>
      <dc:creator>Josh Sprang</dc:creator>
      <dc:date>2015-08-26T22:42:31Z</dc:date>
    </item>
    <item>
      <title>I have to admit I am little</title>
      <link>https://community.cisco.com/t5/network-security/guest-wireless-access-trough-firewall/m-p/2722402#M192358</link>
      <description>&lt;P&gt;&lt;EM&gt;I have to admit I am little confused in #1 with your pen testers... &amp;nbsp;Do they think it is ok for folks on the outside&amp;nbsp;to access the application but folks in wifi guest are not ok?&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;I totally agree.&lt;/P&gt;&lt;P&gt;As long as the guest interface is a lower security level&amp;nbsp;than the inside interface I can't understand what they are talking about.&lt;/P&gt;&lt;P&gt;Unless they just want to class the guest access as external access and want to consolidate all access on the outside interface.&lt;/P&gt;&lt;P&gt;But then to do that you will need to add extra configuration that isn't necessarily intuitive to read and the simpler you can keep the configuration the better I would have thought.&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Aug 2015 22:52:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/guest-wireless-access-trough-firewall/m-p/2722402#M192358</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-08-26T22:52:52Z</dc:date>
    </item>
    <item>
      <title>Nice to know I'm not alone</title>
      <link>https://community.cisco.com/t5/network-security/guest-wireless-access-trough-firewall/m-p/2722403#M192359</link>
      <description>&lt;P&gt;Nice to know I'm not alone with things like that &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;let me know if DNS doctoring works&lt;/P&gt;</description>
      <pubDate>Wed, 26 Aug 2015 23:13:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/guest-wireless-access-trough-firewall/m-p/2722403#M192359</guid>
      <dc:creator>Josh Sprang</dc:creator>
      <dc:date>2015-08-26T23:13:59Z</dc:date>
    </item>
    <item>
      <title>thank u guys, i 've applied</title>
      <link>https://community.cisco.com/t5/network-security/guest-wireless-access-trough-firewall/m-p/2722404#M192361</link>
      <description>&lt;P&gt;thank u guys, i 've applied destination nat and it works , now my guest has external dns ip and able to access trough public ip of our servers.&lt;/P&gt;</description>
      <pubDate>Thu, 27 Aug 2015 14:50:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/guest-wireless-access-trough-firewall/m-p/2722404#M192361</guid>
      <dc:creator>Bekzod Fakhriddinov</dc:creator>
      <dc:date>2015-08-27T14:50:13Z</dc:date>
    </item>
    <item>
      <title>sorry my friend , I noticed</title>
      <link>https://community.cisco.com/t5/network-security/guest-wireless-access-trough-firewall/m-p/2722405#M192367</link>
      <description>&lt;P&gt;sorry my friends , I noticed today for destination NAT i still go from Guest wireless interface to Inside(where are&amp;nbsp; my servers ) directly and guest ip translated to Inside ip--which doesn't re-solve security penetration test request&amp;nbsp; .&lt;/P&gt;&lt;P&gt;For DNS doctor option - if I do ping/nslookup of my webmail address its replying with it's own internal ip which is not good .&amp;nbsp; Is it possible to fix it ?&lt;/P&gt;</description>
      <pubDate>Fri, 28 Aug 2015 17:47:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/guest-wireless-access-trough-firewall/m-p/2722405#M192367</guid>
      <dc:creator>Bekzod Fakhriddinov</dc:creator>
      <dc:date>2015-08-28T17:47:32Z</dc:date>
    </item>
  </channel>
</rss>

