<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Allowing a dyn dns to my access list in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/allowing-a-dyn-dns-to-my-access-list/m-p/2426812#M269844</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, but upgrading to 8.4(2) will, unfortunately, change a lot of your configurations related to NAT in particular.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Reference this document to get a heads-up on what else will be required.&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-12690"&gt;https://supportforums.cisco.com/docs/DOC-12690&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;An alternative and arguably better solution to your problem is just creating a Remote Access VPN for him on the ASA, then his IP won't matter, unless I am misunderstanding how this person connects.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 12 Feb 2014 23:00:52 GMT</pubDate>
    <dc:creator>jpeterson6</dc:creator>
    <dc:date>2014-02-12T23:00:52Z</dc:date>
    <item>
      <title>Allowing a dyn dns to my access list</title>
      <link>https://community.cisco.com/t5/network-security/allowing-a-dyn-dns-to-my-access-list/m-p/2426809#M269838</link>
      <description>&lt;P&gt;Hi all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I allow a remote user access to our network based on his static ip which he is about to loose. We have configured a dyn dns address for his changing public IP that i would like to add to our cisco.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking at ASDM how is it possible to allow a dyn dns address to the access list and for the ASA to update accordingly?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:44:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-a-dyn-dns-to-my-access-list/m-p/2426809#M269838</guid>
      <dc:creator>Locayta123</dc:creator>
      <dc:date>2019-03-12T03:44:09Z</dc:date>
    </item>
    <item>
      <title>Allowing a dyn dns to my access list</title>
      <link>https://community.cisco.com/t5/network-security/allowing-a-dyn-dns-to-my-access-list/m-p/2426810#M269840</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have ASA running 8.4(2) or newer software you can use FQDN in the ACL rules to allow connections based on the DNS name rather than the IP address&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In this setup you will have to&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Configure DNS servers that the ASA can use to make DNS queries&lt;/LI&gt;&lt;LI&gt;Enable DNS lookups on the ASAs interface through which the DNS queries should be sent&lt;/LI&gt;&lt;LI&gt;Configure an &lt;STRONG&gt;"object network &lt;NAME&gt;" &lt;/NAME&gt;&lt;/STRONG&gt;and &lt;STRONG&gt;"fqdn customer.dnsname.com"&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;Use the created &lt;STRONG&gt;"object" &lt;/STRONG&gt;in the ACL rule&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example configuration could be for example (unless I remember something wrong)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;dns domain-lookup outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;dns server-group DefaultDNS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; name-server 8.8.8.8&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network GOOGLE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; fqdn www.google.com&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN permit tcp object GOOGLE host &lt;DESTINATION ip=""&gt; eq 80&lt;/DESTINATION&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group OUTSIDE-IN in interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I would imagine that if your software is not the above mentioned or newer you wont be able to allow connections according to FQDN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Feb 2014 16:23:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-a-dyn-dns-to-my-access-list/m-p/2426810#M269840</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-02-11T16:23:57Z</dc:date>
    </item>
    <item>
      <title>Allowing a dyn dns to my access list</title>
      <link>https://community.cisco.com/t5/network-security/allowing-a-dyn-dns-to-my-access-list/m-p/2426811#M269842</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great post, thanks for the detail.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm currently running:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco Adaptive Security Appliance Software Version 7.2(5) &lt;/P&gt;&lt;P&gt;Device Manager Version 5.2(5)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;WIll i need to upgrade my appliance for this to work?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Feb 2014 16:33:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-a-dyn-dns-to-my-access-list/m-p/2426811#M269842</guid>
      <dc:creator>Locayta123</dc:creator>
      <dc:date>2014-02-11T16:33:59Z</dc:date>
    </item>
    <item>
      <title>Allowing a dyn dns to my access list</title>
      <link>https://community.cisco.com/t5/network-security/allowing-a-dyn-dns-to-my-access-list/m-p/2426812#M269844</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, but upgrading to 8.4(2) will, unfortunately, change a lot of your configurations related to NAT in particular.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Reference this document to get a heads-up on what else will be required.&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-12690"&gt;https://supportforums.cisco.com/docs/DOC-12690&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;An alternative and arguably better solution to your problem is just creating a Remote Access VPN for him on the ASA, then his IP won't matter, unless I am misunderstanding how this person connects.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Feb 2014 23:00:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-a-dyn-dns-to-my-access-list/m-p/2426812#M269844</guid>
      <dc:creator>jpeterson6</dc:creator>
      <dc:date>2014-02-12T23:00:52Z</dc:date>
    </item>
  </channel>
</rss>

