<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic outbound web request to internally hosted (natted server) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/outbound-web-request-to-internally-hosted-natted-server/m-p/2337092#M343777</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your reponse. I am testing DNS Rewrite as a result of your suggestion. This appear to meet requirements and is preferred over your second suggestion as it does not require maintenance of additional NAT rules to control the internal redirection (in event of DNS changes). &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 02 Sep 2013 16:35:52 GMT</pubDate>
    <dc:creator>ajenks</dc:creator>
    <dc:date>2013-09-02T16:35:52Z</dc:date>
    <item>
      <title>outbound web request to internally hosted (natted server)</title>
      <link>https://community.cisco.com/t5/network-security/outbound-web-request-to-internally-hosted-natted-server/m-p/2337090#M343765</link>
      <description>&lt;P&gt;Hi, I've got an issue with hairpining traffic on the ASA, it's a bit different to the usual VPN in/out query, not sure of the best way to approach this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[example names/IPs used]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;a)Web server hosted in dmz. External DNS resolves &lt;A href="http://www.example.com" rel="nofollow" target="_blank"&gt;www.example.com&lt;/A&gt; to 8.8.8.10, ASA NATs 8.8.8.10 (outside) to 192.168.1.10 (DMZ)&lt;/P&gt;&lt;P&gt;b)Outbound web request (from internal network client) 10.0.0.1 is natted to source 8.8.8.9 (outside) - doesn't use a proxy and uses external DNS.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Web browsing to externally hosted sites works fine (as you'd expect), inbound web requests from foreign addresses works fine. When internal client browses to &lt;A href="http://www.example.com" rel="nofollow" target="_blank"&gt;www.example.com&lt;/A&gt;, request fails.&lt;/P&gt;&lt;P&gt;I assume this is because the outbound request is Natted to originate from 8.8.8.9 and destined for 8.8.8.10 which is on the same interface on the ASA.&lt;/P&gt;&lt;P&gt;As the client is not using a proxy I cannot manipulate or redirect the request at this level.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What would be the best way to address this issue? Would I create some kind of NAT exception/configuration like :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;source=10.0.0.x destination=8.8.8.10 NAT to source=10.0.0.x destination=192.168.1.10? meaning I would have multiple NAT rules (for multiple internally hosted servers) or is there a better way of doing this (given I am working with the outside interface which will include public traffic)?&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:32:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outbound-web-request-to-internally-hosted-natted-server/m-p/2337090#M343765</guid>
      <dc:creator>ajenks</dc:creator>
      <dc:date>2019-03-12T02:32:09Z</dc:date>
    </item>
    <item>
      <title>outweb web request to internally hosted (natted server)</title>
      <link>https://community.cisco.com/t5/network-security/outbound-web-request-to-internally-hosted-natted-server/m-p/2337091#M343772</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So inside hosts are trying to access &lt;A href="https://community.cisco.com/www.example.com" target="_blank"&gt;www.example.com&lt;/A&gt; using an external DNS.&amp;nbsp; is the 8.8.8.10 address being fully NATed to the 192.168.1.10 address or is PAT being used (only specific ports being NATed).&amp;nbsp; the reason I ask is that an option would be to use DNS doctoring but this is not supported when using PAT.&amp;nbsp; this is done by adding the &lt;STRONG&gt;dns &lt;/STRONG&gt;keyword at the end of the NAT statement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What version ASA are you running?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another option would be to NAT the 8.8.8.10 to 192.168.1.10 from the inside to the DMZ.&amp;nbsp; NAT exemption will not work as that just prevents NATing from taking place.&amp;nbsp; You would need to NAT traffic destined for 8.8.8.10 on the inside interface to the DMZ.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Both options are good options, but if possible I would go with the first option.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 01 Sep 2013 20:29:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outbound-web-request-to-internally-hosted-natted-server/m-p/2337091#M343772</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2013-09-01T20:29:22Z</dc:date>
    </item>
    <item>
      <title>outbound web request to internally hosted (natted server)</title>
      <link>https://community.cisco.com/t5/network-security/outbound-web-request-to-internally-hosted-natted-server/m-p/2337092#M343777</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your reponse. I am testing DNS Rewrite as a result of your suggestion. This appear to meet requirements and is preferred over your second suggestion as it does not require maintenance of additional NAT rules to control the internal redirection (in event of DNS changes). &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Sep 2013 16:35:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outbound-web-request-to-internally-hosted-natted-server/m-p/2337092#M343777</guid>
      <dc:creator>ajenks</dc:creator>
      <dc:date>2013-09-02T16:35:52Z</dc:date>
    </item>
  </channel>
</rss>

