<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic That's what I don't in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dns-doctoring-on-asa-from-dmz/m-p/2635239#M197008</link>
    <description>&lt;P&gt;That's what I don't understand. The only public DMZ NAT that I have is dynamic to the outside interface.&lt;/P&gt;&lt;P&gt;nat (Public) 10 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;I don't have any other nat to the public DMZ interface.&lt;/P&gt;</description>
    <pubDate>Tue, 17 Feb 2015 21:42:35 GMT</pubDate>
    <dc:creator>Phil Bradley</dc:creator>
    <dc:date>2015-02-17T21:42:35Z</dc:date>
    <item>
      <title>DNS Doctoring on ASA from DMZ</title>
      <link>https://community.cisco.com/t5/network-security/dns-doctoring-on-asa-from-dmz/m-p/2635233#M197002</link>
      <description>&lt;P&gt;I have looked at the following article on DNS doctoring and while it makes sense, it doesn't cover my scenario.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportforums.cisco.com/document/145401/dns-doctoring-and-u-turning-asa-when-and-how-use-it" target="_blank"&gt;https://supportforums.cisco.com/document/145401/dns-doctoring-and-u-turning-asa-when-and-how-use-it&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Basically I have an exchange server that is in my inside network and I have a NAT on the exchange box to the outside currently. I also have a DMZ area for a wireless gust network defined on the ASA. When a smartphone connects to the guest wireless their exchange email stops syncing because U-turn is disabled on the firewall be default. Is it possible to use DNS doctoring on the Public DMZ to translate my exchange box to its inside address?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:30:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-doctoring-on-asa-from-dmz/m-p/2635233#M197002</guid>
      <dc:creator>Phil Bradley</dc:creator>
      <dc:date>2019-03-12T05:30:54Z</dc:date>
    </item>
    <item>
      <title>Yes it is. Try adding the</title>
      <link>https://community.cisco.com/t5/network-security/dns-doctoring-on-asa-from-dmz/m-p/2635234#M197003</link>
      <description>&lt;P&gt;Yes it is. Try adding the keyword &lt;EM&gt;dns &lt;/EM&gt;to the end of your NAT translation.&lt;/P&gt;</description>
      <pubDate>Tue, 17 Feb 2015 19:32:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-doctoring-on-asa-from-dmz/m-p/2635234#M197003</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2015-02-17T19:32:45Z</dc:date>
    </item>
    <item>
      <title>Ok, so I have the following</title>
      <link>https://community.cisco.com/t5/network-security/dns-doctoring-on-asa-from-dmz/m-p/2635235#M197004</link>
      <description>&lt;P&gt;Ok, so I have the following NAT's:&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface https 192.168.0.2 https netmask 255.255.255.255 dns&lt;/P&gt;&lt;P&gt;static (inside, public) 192.168.0.2 192.168.0.2 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The machines in the public DMZ still get the outside interface IP when looking up my exchange box. It's not doctoring the request from the public to the exchange box.&lt;/P&gt;</description>
      <pubDate>Tue, 17 Feb 2015 19:42:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-doctoring-on-asa-from-dmz/m-p/2635235#M197004</guid>
      <dc:creator>Phil Bradley</dc:creator>
      <dc:date>2015-02-17T19:42:50Z</dc:date>
    </item>
    <item>
      <title>Is 'public' your DMZ</title>
      <link>https://community.cisco.com/t5/network-security/dns-doctoring-on-asa-from-dmz/m-p/2635236#M197005</link>
      <description>&lt;P&gt;Is 'public' your DMZ interface? If so, you don't need&amp;nbsp;&lt;SPAN style="font-size: 14.3999996185303px;"&gt;static (inside, public) 192.168.0.2 192.168.0.2 netmask 255.255.255.255&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Feb 2015 21:17:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-doctoring-on-asa-from-dmz/m-p/2635236#M197005</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2015-02-17T21:17:46Z</dc:date>
    </item>
    <item>
      <title>That did it! So how does the</title>
      <link>https://community.cisco.com/t5/network-security/dns-doctoring-on-asa-from-dmz/m-p/2635237#M197006</link>
      <description>&lt;P&gt;That did it! So how does the public addresses get translated to the inside exchange box or do they?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Feb 2015 21:29:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-doctoring-on-asa-from-dmz/m-p/2635237#M197006</guid>
      <dc:creator>Phil Bradley</dc:creator>
      <dc:date>2015-02-17T21:29:35Z</dc:date>
    </item>
    <item>
      <title>Hi Phil, Lets assume that</title>
      <link>https://community.cisco.com/t5/network-security/dns-doctoring-on-asa-from-dmz/m-p/2635238#M197007</link>
      <description>&lt;P&gt;Hi Phil,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Lets assume that your outside interface ip address is: 9.9.9.9&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.3999996185303px;"&gt;static (inside, public) &lt;/SPAN&gt;9.9.9.9&lt;SPAN style="font-size: 14.3999996185303px;"&gt; 192.168.0.2 netmask 255.255.255.255&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.3999996185303px;"&gt;Hope this helps.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.3999996185303px;"&gt;thanks&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.3999996185303px;"&gt;Rizwan Rafeek.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Feb 2015 21:33:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-doctoring-on-asa-from-dmz/m-p/2635238#M197007</guid>
      <dc:creator>rizwanr74</dc:creator>
      <dc:date>2015-02-17T21:33:17Z</dc:date>
    </item>
    <item>
      <title>That's what I don't</title>
      <link>https://community.cisco.com/t5/network-security/dns-doctoring-on-asa-from-dmz/m-p/2635239#M197008</link>
      <description>&lt;P&gt;That's what I don't understand. The only public DMZ NAT that I have is dynamic to the outside interface.&lt;/P&gt;&lt;P&gt;nat (Public) 10 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;I don't have any other nat to the public DMZ interface.&lt;/P&gt;</description>
      <pubDate>Tue, 17 Feb 2015 21:42:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-doctoring-on-asa-from-dmz/m-p/2635239#M197008</guid>
      <dc:creator>Phil Bradley</dc:creator>
      <dc:date>2015-02-17T21:42:35Z</dc:date>
    </item>
    <item>
      <title>Traffic from the DNS gets</title>
      <link>https://community.cisco.com/t5/network-security/dns-doctoring-on-asa-from-dmz/m-p/2635240#M197009</link>
      <description>&lt;P&gt;Traffic from the DNS gets read by the ASA and would normally be routed out to the internet, but the ASA does a lookup and sees that there is a translation for it. It then looks up the NAT and routes it to the inside IP. Glad to hear it's working.&lt;/P&gt;</description>
      <pubDate>Tue, 17 Feb 2015 21:42:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-doctoring-on-asa-from-dmz/m-p/2635240#M197009</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2015-02-17T21:42:39Z</dc:date>
    </item>
    <item>
      <title>Ah, I see. So the NAT it is</title>
      <link>https://community.cisco.com/t5/network-security/dns-doctoring-on-asa-from-dmz/m-p/2635241#M197010</link>
      <description>&lt;P&gt;Ah, I see. So the NAT it is using is the one that has the DNS re-write now?&lt;/P&gt;</description>
      <pubDate>Tue, 17 Feb 2015 21:44:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-doctoring-on-asa-from-dmz/m-p/2635241#M197010</guid>
      <dc:creator>Phil Bradley</dc:creator>
      <dc:date>2015-02-17T21:44:39Z</dc:date>
    </item>
  </channel>
</rss>

