<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic object-group network Private in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-hairpin-dns-rewrite/m-p/2487009#M268165</link>
    <description>&lt;P&gt;object-group network Private-Addresses&lt;BR /&gt;&amp;nbsp;network-object 10.0.0.0 255.0.0.0&lt;BR /&gt;&amp;nbsp;network-object 172.16.0.0 255.240.0.0&lt;BR /&gt;&amp;nbsp;network-object 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;nat (inside,inside) source dynamic Private-Addresses interface destination static [PUBLIC-ADDRESS-OBJECT][[PRIVATE-ADDRESS-OBJECT]&lt;/P&gt;&lt;P&gt;you need to create a group for private addresses and put this NAT above the NAT that services your external users. This worked for me anyway. The bit that I struggled with is that you need to change the source address to be that of the inside interface of your FW. Otherwise your webserver will return the traffic directly to the source, bypassing the firewall. The firewall will deny subsequent packets sent to the web server unless you allow tcp state bypass.&lt;/P&gt;&lt;P&gt;Good luck&lt;/P&gt;</description>
    <pubDate>Fri, 21 Mar 2014 11:23:59 GMT</pubDate>
    <dc:creator>Tormod Macleod</dc:creator>
    <dc:date>2014-03-21T11:23:59Z</dc:date>
    <item>
      <title>NAT Hairpin / DNS Rewrite</title>
      <link>https://community.cisco.com/t5/network-security/nat-hairpin-dns-rewrite/m-p/2487006#M268162</link>
      <description>&lt;PRE&gt;
ASA Version 8.4(3)

interface Ethernet0/0
 nameif outside
 security-level 0
 ip address 8.8.8.148 255.255.255.240
!

interface Ethernet0/3
 nameif inside
 security-level 100
 ip address 192.168.200.253 255.255.255.0
!

same-security-traffic permit intra-interface

object network External-Face-IP
 host 8.8.8.158

object network Network-London
 subnet 192.168.200.0 255.255.255.0

object network External-www.domain.com
 host 8.8.8.152

object network &lt;A href="https://community.cisco.com/www.domain.com" target="_blank"&gt;www.domain.com&lt;/A&gt;
 host 192.168.200.66

access-list outside_access_in extended permit tcp any object &lt;A href="https://community.cisco.com/www.domain.com" target="_blank"&gt;www.domain.com&lt;/A&gt; eq www 

nat (outside,inside) source static any any destination static any any destination static External-www.domain.com &lt;A href="https://community.cisco.com/www.domain.com" target="_blank"&gt;www.domain.com&lt;/A&gt;
&lt;/PRE&gt;

&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;I'm having difficulty configuring a NAT Hairpin (I believe is called this) on my Cisco ASA 5510.&lt;/P&gt;
&lt;P&gt;I have a website "&lt;A href="http://www.domain.com%22/" title="Link: http://www.domain.com%22" target="_blank"&gt;&lt;U&gt;&lt;FONT color="#0066cc"&gt;www.domain.com"&lt;/FONT&gt;&lt;/U&gt;&lt;/A&gt;; hosted on a server on our internal network. Externally people can access the website no problem but when attempting to access it internally, the website never resolves. I believe this is because the websites is on the same external ip subnet as the external face ip and the ASA needs to realise this and redirect to the internal ip address.&lt;/P&gt;
&lt;P&gt;Can someone please take a look at my config about and suggest what I have done wrong?&lt;/P&gt;
&lt;P&gt;UPDATE:&lt;/P&gt;
&lt;P&gt;I guess what I am after is this:&lt;/P&gt;
&lt;P&gt;&lt;A href="http://www.techrepublic.com/blog/data-center/cisco-asa-and-dns-pain-is-there-a-doctor-in-the-house/#" title="Link: http://www.techrepublic.com/blog/data-center/cisco-asa-and-dns-pain-is-there-a-doctor-in-the-house/#" target="_blank"&gt;&lt;U&gt;&lt;FONT color="#0066cc"&gt;http://www.techrepublic.com/blog/data-center/cisco-asa-and-dns-pain-is-there-a-doctor-in-the-house/#&lt;/FONT&gt;&lt;/U&gt;&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;BUT with up-to-date syntax as the above link syntax&amp;nbsp;doesn't seem to work for me.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Many thanks,&lt;/P&gt;
&lt;P&gt;Tarran&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:58:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-hairpin-dns-rewrite/m-p/2487006#M268162</guid>
      <dc:creator>Tarran</dc:creator>
      <dc:date>2019-03-12T03:58:39Z</dc:date>
    </item>
    <item>
      <title>Hello,</title>
      <link>https://community.cisco.com/t5/network-security/nat-hairpin-dns-rewrite/m-p/2487007#M268163</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here's what you need:&lt;/P&gt;
&lt;P&gt;same-security permit intra-interface&lt;/P&gt;

&lt;PRE&gt;
nat (inside,inside) source static any any destination static External-www.domain.com www.domain.com&lt;/PRE&gt;

&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Felipe.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;Remember to rate useful posts.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Mar 2014 23:56:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-hairpin-dns-rewrite/m-p/2487007#M268163</guid>
      <dc:creator>lcambron</dc:creator>
      <dc:date>2014-03-20T23:56:30Z</dc:date>
    </item>
    <item>
      <title>Hi Tarran,</title>
      <link>https://community.cisco.com/t5/network-security/nat-hairpin-dns-rewrite/m-p/2487008#M268164</link>
      <description>&lt;P&gt;Hi Tarran,&lt;/P&gt;
&lt;P&gt;Felipe presented is a perfectly acceptable solution for hairpinning throught the ASA. You mentioned an article for DNS doctoring. The correct syntax for 8.3+ is as follows using auto NAT:&lt;/P&gt;

&lt;PRE&gt;
object network &lt;A href="https://community.cisco.com/www.domain.com" target="_blank"&gt;www.domain.com&lt;/A&gt;
 host 192.168.200.66
 nat (inside,outside) static 8.8.8.152 dns&lt;/PRE&gt;

&lt;P&gt;or using manual NAT, as you have in your config:&lt;/P&gt;

&lt;PRE&gt;
nat (inside,outside) source static External-www.domain.com dns&lt;/PRE&gt;

&lt;P&gt;And while those are both great solutions, I have found that using split-horizon DNS is a much better solution most of the time.&lt;/P&gt;
&lt;P&gt;With split-horizon DNS, you create a DNS zone on your internal DNS server that contains the necessary records for your public DNS zone, only using private IP addresses where necessary.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For example, I have a domain of awesome.com. Normally, when I resolve &lt;A href="https://community.cisco.com/www.awesome.com" target="_blank"&gt;www.awesome.com&lt;/A&gt;, it goes out to my public DNS server and returns 8.8.8.152. If I implement split-dns, my internal DNS server will resolve the same FQDN, but will resolve it to 192.168.200.66.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Split-horizon DNS typically gives you a lot more control over your DNS and doesn't force you to use akward configurations on your firewall.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Mike&lt;/P&gt;</description>
      <pubDate>Fri, 21 Mar 2014 02:29:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-hairpin-dns-rewrite/m-p/2487008#M268164</guid>
      <dc:creator>Mike Williams</dc:creator>
      <dc:date>2014-03-21T02:29:14Z</dc:date>
    </item>
    <item>
      <title>object-group network Private</title>
      <link>https://community.cisco.com/t5/network-security/nat-hairpin-dns-rewrite/m-p/2487009#M268165</link>
      <description>&lt;P&gt;object-group network Private-Addresses&lt;BR /&gt;&amp;nbsp;network-object 10.0.0.0 255.0.0.0&lt;BR /&gt;&amp;nbsp;network-object 172.16.0.0 255.240.0.0&lt;BR /&gt;&amp;nbsp;network-object 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;nat (inside,inside) source dynamic Private-Addresses interface destination static [PUBLIC-ADDRESS-OBJECT][[PRIVATE-ADDRESS-OBJECT]&lt;/P&gt;&lt;P&gt;you need to create a group for private addresses and put this NAT above the NAT that services your external users. This worked for me anyway. The bit that I struggled with is that you need to change the source address to be that of the inside interface of your FW. Otherwise your webserver will return the traffic directly to the source, bypassing the firewall. The firewall will deny subsequent packets sent to the web server unless you allow tcp state bypass.&lt;/P&gt;&lt;P&gt;Good luck&lt;/P&gt;</description>
      <pubDate>Fri, 21 Mar 2014 11:23:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-hairpin-dns-rewrite/m-p/2487009#M268165</guid>
      <dc:creator>Tormod Macleod</dc:creator>
      <dc:date>2014-03-21T11:23:59Z</dc:date>
    </item>
    <item>
      <title>Thank you everyone for your</title>
      <link>https://community.cisco.com/t5/network-security/nat-hairpin-dns-rewrite/m-p/2487010#M268166</link>
      <description>&lt;P&gt;Thank you everyone for your help. I tried everyone's manual NAT suggestions but the one that worked for me was TormodMacleod:&lt;/P&gt;

&lt;PRE&gt;
nat (inside,inside) source dynamic Network-London interface destination static External-www.domain.com &lt;A href="https://community.cisco.com/www.domain.com" target="_blank"&gt;www.domain.com&lt;/A&gt;
&lt;/PRE&gt;

&lt;P&gt;Thanks again everyone - truly appreciated.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Mar 2014 09:43:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-hairpin-dns-rewrite/m-p/2487010#M268166</guid>
      <dc:creator>Tarran</dc:creator>
      <dc:date>2014-03-24T09:43:39Z</dc:date>
    </item>
  </channel>
</rss>

