<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic That looks to be DDNS updates in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/rule-needed-for-dns-in-firewall/m-p/2733515#M192608</link>
    <description>&lt;P&gt;That looks to be DDNS updates for internal clients, I'm guessing the ASA is also your DHCP server?&lt;/P&gt;&lt;P&gt;Clients generally try and update their DNS entry if configured to do so, this is so you know xyx.hostname resolves to it's current IP address received from DHCP. While this is somewhat important, it's unlikely to be related to your current issue as mentioned in this thread.&amp;nbsp;&lt;/P&gt;&lt;P&gt;To fix this issue you would have to do some debugging to find out why the dynamic update is failing on the ASA.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 20 Aug 2015 17:50:34 GMT</pubDate>
    <dc:creator>Anthony Brandelli</dc:creator>
    <dc:date>2015-08-20T17:50:34Z</dc:date>
    <item>
      <title>Rule needed for DNS in Firewall</title>
      <link>https://community.cisco.com/t5/network-security/rule-needed-for-dns-in-firewall/m-p/2733503#M192590</link>
      <description>&lt;P&gt;Hello all. I have a few VM's that aren't getting internet access and some of them are. Is there a rule that is needed in the firewall that allows internet connection for VM's?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:27:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rule-needed-for-dns-in-firewall/m-p/2733503#M192590</guid>
      <dc:creator>mweiner5641</dc:creator>
      <dc:date>2019-03-12T06:27:40Z</dc:date>
    </item>
    <item>
      <title>What type of device (ISR, ASA</title>
      <link>https://community.cisco.com/t5/network-security/rule-needed-for-dns-in-firewall/m-p/2733504#M192591</link>
      <description>&lt;P&gt;What type of device&amp;nbsp;(ISR, ASA, etc) is this? Have you done a packet capture to see if DNS replies aren't coming in response to the queries? What makes you think the firewall is the issue, or DNS for that matter?&lt;/P&gt;</description>
      <pubDate>Wed, 19 Aug 2015 18:06:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rule-needed-for-dns-in-firewall/m-p/2733504#M192591</guid>
      <dc:creator>Anthony Brandelli</dc:creator>
      <dc:date>2015-08-19T18:06:50Z</dc:date>
    </item>
    <item>
      <title>I am not sure. I have done</title>
      <link>https://community.cisco.com/t5/network-security/rule-needed-for-dns-in-firewall/m-p/2733505#M192592</link>
      <description>&lt;P&gt;I am not sure. I have done this configuration for DNS and IP address many times and I never had issues. I have some VM's working with internet and some aren't. I have done some work in the firewall but I can't say why half of internet and half don't.&lt;/P&gt;&lt;P&gt;We are using an ASA.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I haven't done any packet capturing&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Aug 2015 18:08:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rule-needed-for-dns-in-firewall/m-p/2733505#M192592</guid>
      <dc:creator>mweiner5641</dc:creator>
      <dc:date>2015-08-19T18:08:57Z</dc:date>
    </item>
    <item>
      <title>Let's start with some basic</title>
      <link>https://community.cisco.com/t5/network-security/rule-needed-for-dns-in-firewall/m-p/2733506#M192593</link>
      <description>&lt;P&gt;Let's start with some basic troubleshooting, if you know you block ICMP somewhere&amp;nbsp;then this may not be accurate, but I would say this is rare in a proper network.&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Can the VM ping it's own IP?&lt;/LI&gt;&lt;LI&gt;Can it ping it's gateway?&lt;/LI&gt;&lt;LI&gt;Can it ping the DNS servers?&lt;/LI&gt;&lt;LI&gt;Can it ping an internet destination, such as&amp;nbsp;8.8.8.8?&lt;/LI&gt;&lt;LI&gt;Can it ping google.com?&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Aug 2015 18:51:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rule-needed-for-dns-in-firewall/m-p/2733506#M192593</guid>
      <dc:creator>Anthony Brandelli</dc:creator>
      <dc:date>2015-08-19T18:51:49Z</dc:date>
    </item>
    <item>
      <title>VM can Ping itselfVM can ping</title>
      <link>https://community.cisco.com/t5/network-security/rule-needed-for-dns-in-firewall/m-p/2733507#M192594</link>
      <description>&lt;P&gt;VM can Ping itself&lt;/P&gt;&lt;P&gt;VM can ping gateway&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;VM cannot ping 8.8.8.8 / 8.8.4.4 and any other DNS servers&lt;/P&gt;&lt;P&gt;VM cannot ping google.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank for following up Anthony.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Aug 2015 18:55:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rule-needed-for-dns-in-firewall/m-p/2733507#M192594</guid>
      <dc:creator>mweiner5641</dc:creator>
      <dc:date>2015-08-19T18:55:45Z</dc:date>
    </item>
    <item>
      <title>Sounds like more problems</title>
      <link>https://community.cisco.com/t5/network-security/rule-needed-for-dns-in-firewall/m-p/2733508#M192595</link>
      <description>&lt;P&gt;Sounds like more problems than just DNS not working.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are all of these machines in the same subnet using the same gateway?&lt;/P&gt;</description>
      <pubDate>Wed, 19 Aug 2015 18:58:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rule-needed-for-dns-in-firewall/m-p/2733508#M192595</guid>
      <dc:creator>Anthony Brandelli</dc:creator>
      <dc:date>2015-08-19T18:58:47Z</dc:date>
    </item>
    <item>
      <title>Correct. VM's are using 10</title>
      <link>https://community.cisco.com/t5/network-security/rule-needed-for-dns-in-firewall/m-p/2733509#M192596</link>
      <description>&lt;P&gt;Correct. VM's are using 10.100.0.* internal on 255.255.255.0 subnet.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Aug 2015 19:00:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rule-needed-for-dns-in-firewall/m-p/2733509#M192596</guid>
      <dc:creator>mweiner5641</dc:creator>
      <dc:date>2015-08-19T19:00:18Z</dc:date>
    </item>
    <item>
      <title>Check that you have a default</title>
      <link>https://community.cisco.com/t5/network-security/rule-needed-for-dns-in-firewall/m-p/2733510#M192597</link>
      <description>&lt;P&gt;Check that you have a default route on the VMs to the gateway, "route print" on windows, "route -n" on linux. Probably unlikely but also make sure that VM firewalls aren't causing issues.&amp;nbsp;&lt;/P&gt;&lt;P&gt;After looking at the above it's more than likely&amp;nbsp;time to look at your ASA. Check your NAT config, check that there aren't ACLs outbound or inbound blocking traffic based on host.&lt;/P&gt;&lt;P&gt;I'm pretty light on ASA experience myself, but I'm sure there is config that defines what IPs are NATd, and I know there will be the ability to have ACLs in various places.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Aug 2015 19:17:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rule-needed-for-dns-in-firewall/m-p/2733510#M192597</guid>
      <dc:creator>Anthony Brandelli</dc:creator>
      <dc:date>2015-08-19T19:17:16Z</dc:date>
    </item>
    <item>
      <title>Ok well that gives me some</title>
      <link>https://community.cisco.com/t5/network-security/rule-needed-for-dns-in-firewall/m-p/2733511#M192598</link>
      <description>&lt;P&gt;Ok well that gives me some work to do.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you!!&lt;/P&gt;</description>
      <pubDate>Wed, 19 Aug 2015 19:19:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rule-needed-for-dns-in-firewall/m-p/2733511#M192598</guid>
      <dc:creator>mweiner5641</dc:creator>
      <dc:date>2015-08-19T19:19:29Z</dc:date>
    </item>
    <item>
      <title>Anthony, would this happen to</title>
      <link>https://community.cisco.com/t5/network-security/rule-needed-for-dns-in-firewall/m-p/2733512#M192601</link>
      <description>&lt;P&gt;Anthony, would this happen to be because the DNS LOOKUP is disabled on my interface?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Aug 2015 13:55:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rule-needed-for-dns-in-firewall/m-p/2733512#M192601</guid>
      <dc:creator>mweiner5641</dc:creator>
      <dc:date>2015-08-20T13:55:40Z</dc:date>
    </item>
    <item>
      <title>No I don't think so. To me it</title>
      <link>https://community.cisco.com/t5/network-security/rule-needed-for-dns-in-firewall/m-p/2733513#M192604</link>
      <description>&lt;P&gt;No I don't think so. To me it looks like internet destinations in general are unreachable.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Try doing a trace route from one of the VMs and see where it fails, I would suspect at the default gateway, again this generally relies on ICMP (or UDP for Linux).&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Aug 2015 14:39:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rule-needed-for-dns-in-firewall/m-p/2733513#M192604</guid>
      <dc:creator>Anthony Brandelli</dc:creator>
      <dc:date>2015-08-20T14:39:32Z</dc:date>
    </item>
    <item>
      <title>3Aug 20 201512:10:55331001   </title>
      <link>https://community.cisco.com/t5/network-security/rule-needed-for-dns-in-firewall/m-p/2733514#M192606</link>
      <description>&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;3&lt;/TD&gt;&lt;TD&gt;Aug 20 2015&lt;/TD&gt;&lt;TD&gt;12:10:55&lt;/TD&gt;&lt;TD&gt;331001&lt;/TD&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;Dynamic DNS Update for 'WIN-RLDT21C5G8V.' &amp;lt;=&amp;gt; 10.100.0.151 failed&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Where is that rule in the firewall? Or how do I add it?&lt;/P&gt;</description>
      <pubDate>Thu, 20 Aug 2015 16:11:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rule-needed-for-dns-in-firewall/m-p/2733514#M192606</guid>
      <dc:creator>mweiner5641</dc:creator>
      <dc:date>2015-08-20T16:11:52Z</dc:date>
    </item>
    <item>
      <title>That looks to be DDNS updates</title>
      <link>https://community.cisco.com/t5/network-security/rule-needed-for-dns-in-firewall/m-p/2733515#M192608</link>
      <description>&lt;P&gt;That looks to be DDNS updates for internal clients, I'm guessing the ASA is also your DHCP server?&lt;/P&gt;&lt;P&gt;Clients generally try and update their DNS entry if configured to do so, this is so you know xyx.hostname resolves to it's current IP address received from DHCP. While this is somewhat important, it's unlikely to be related to your current issue as mentioned in this thread.&amp;nbsp;&lt;/P&gt;&lt;P&gt;To fix this issue you would have to do some debugging to find out why the dynamic update is failing on the ASA.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Aug 2015 17:50:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rule-needed-for-dns-in-firewall/m-p/2733515#M192608</guid>
      <dc:creator>Anthony Brandelli</dc:creator>
      <dc:date>2015-08-20T17:50:34Z</dc:date>
    </item>
  </channel>
</rss>

