<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I figured it out. Took a in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/hairpinning-on-asa-5525-running-9-1-5/m-p/2579333#M197925</link>
    <description>&lt;P&gt;I figured it out. Took a couple tries, but here's the result which now works. Users in 172.16.1.0/24 can access hosts in the inside subnet (10.1.1.0/24) by using the externally resolved DNS name or blah.mycompany,com.&lt;/P&gt;&lt;P&gt;Here's the line:&lt;/P&gt;&lt;P&gt;nat (citrix,inside) source static citrix-network citrix-network destination static web01.mycompany.com web01.local no-proxy-arp&lt;/P&gt;&lt;P&gt;breakdown of objects:&lt;/P&gt;&lt;P&gt;citrix-network = 172.16.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;web01.mycompany.com = 205.50.xx.50&lt;/P&gt;&lt;P&gt;web01.local = 10.1.1.50&lt;/P&gt;&lt;P&gt;Hope this helps someone.&lt;/P&gt;</description>
    <pubDate>Wed, 14 Jan 2015 22:45:18 GMT</pubDate>
    <dc:creator>kerryjcox</dc:creator>
    <dc:date>2015-01-14T22:45:18Z</dc:date>
    <item>
      <title>Hairpinning on ASA 5525 running 9.1(5)</title>
      <link>https://community.cisco.com/t5/network-security/hairpinning-on-asa-5525-running-9-1-5/m-p/2579332#M197924</link>
      <description>&lt;P&gt;I am spinning up a new VDI environment in another subnet behind our ASA 5525. There are currently three internal subnets:&lt;/P&gt;&lt;P&gt;inside 10.1.1.0 /24 security 100&lt;/P&gt;&lt;P&gt;dmz 192.168.1.0 /24 security 50&lt;/P&gt;&lt;P&gt;citrix 172.16.1.0 /24 security 100&lt;/P&gt;&lt;P&gt;I have Citrix users connecting into the 172.16.1.0 /24 subnet who then need to access items in the 10.1.1.0 /24 subnet. DNS lookups for blah.mycompany.com resolve to the outside IP for the hosts in the inside network, i.e. they try to connect to blah.mycompany.com and though they can ping the host at 10.1.1.50 from 172.16.1.100 (and reverse), the DNS query points them to 206.53.xx.50. &amp;nbsp;So, they end up trying to hairpin.&lt;/P&gt;&lt;P&gt;Is there an easy way to define users in the 172.16.1.0 /24 subnet to access hosts in 10.1.1.0 /24 by using mycompany.com and have it not be NAT'ed?&lt;/P&gt;&lt;P&gt;I have already enabled "same-security-traffic permit intra-interface". Just wondering the best way to allow users to connect directly using external DNS resolution via the firewall.&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:20:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hairpinning-on-asa-5525-running-9-1-5/m-p/2579332#M197924</guid>
      <dc:creator>kerryjcox</dc:creator>
      <dc:date>2019-03-12T05:20:45Z</dc:date>
    </item>
    <item>
      <title>I figured it out. Took a</title>
      <link>https://community.cisco.com/t5/network-security/hairpinning-on-asa-5525-running-9-1-5/m-p/2579333#M197925</link>
      <description>&lt;P&gt;I figured it out. Took a couple tries, but here's the result which now works. Users in 172.16.1.0/24 can access hosts in the inside subnet (10.1.1.0/24) by using the externally resolved DNS name or blah.mycompany,com.&lt;/P&gt;&lt;P&gt;Here's the line:&lt;/P&gt;&lt;P&gt;nat (citrix,inside) source static citrix-network citrix-network destination static web01.mycompany.com web01.local no-proxy-arp&lt;/P&gt;&lt;P&gt;breakdown of objects:&lt;/P&gt;&lt;P&gt;citrix-network = 172.16.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;web01.mycompany.com = 205.50.xx.50&lt;/P&gt;&lt;P&gt;web01.local = 10.1.1.50&lt;/P&gt;&lt;P&gt;Hope this helps someone.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jan 2015 22:45:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hairpinning-on-asa-5525-running-9-1-5/m-p/2579333#M197925</guid>
      <dc:creator>kerryjcox</dc:creator>
      <dc:date>2015-01-14T22:45:18Z</dc:date>
    </item>
    <item>
      <title>Perhaps there could have been</title>
      <link>https://community.cisco.com/t5/network-security/hairpinning-on-asa-5525-running-9-1-5/m-p/2579334#M197926</link>
      <description>&lt;P&gt;Perhaps there could have been an easier way. Probably you have an object-nat like the following:&lt;/P&gt;

&lt;PRE&gt;
object network web01.local
 host 10.1.1.50
 nat (inside,outside) static 205.50.xx.50&lt;/PRE&gt;

&lt;P&gt;This just has to be changed to&lt;/P&gt;

&lt;PRE&gt;
object network web01.local
 host 10.1.1.50
 nat (inside,outside) static 205.50.xx.50 &lt;STRONG&gt;dns&lt;/STRONG&gt;&lt;/PRE&gt;

&lt;P&gt;And the "same-security-trafic" command is not relevant here.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jan 2015 23:10:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hairpinning-on-asa-5525-running-9-1-5/m-p/2579334#M197926</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2015-01-14T23:10:46Z</dc:date>
    </item>
    <item>
      <title>Karsten,Yes, I tried your way</title>
      <link>https://community.cisco.com/t5/network-security/hairpinning-on-asa-5525-running-9-1-5/m-p/2579335#M197927</link>
      <description>&lt;P&gt;Karsten,&lt;/P&gt;&lt;P&gt;Yes, I tried your way, but it did not affect the users in the citrix subnet or 172.16.1.0/24. Had the users been in the same subnet, then it would have been relevant. I did try&amp;nbsp;using the "Translate DNS replies" option, but that was no good for users in a separate subnet.&lt;/P&gt;&lt;P&gt;Thanks much, however. This has given much to absorb and to use elsewhere.&lt;/P&gt;&lt;P&gt;Kerry&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jan 2015 23:14:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hairpinning-on-asa-5525-running-9-1-5/m-p/2579335#M197927</guid>
      <dc:creator>kerryjcox</dc:creator>
      <dc:date>2015-01-14T23:14:07Z</dc:date>
    </item>
  </channel>
</rss>

