<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic DNS Doctoring Question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dns-doctoring-question/m-p/2280782#M345338</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;First off the NAT statement for 192.168.40.40 is not configured for DNS doctoring.&amp;nbsp; Add the &lt;STRONG&gt;dns &lt;/STRONG&gt;keyword at the end of the statement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) X.66 192.168.40.40 netmask 255.255.255.255&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 09 Aug 2013 06:55:38 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2013-08-09T06:55:38Z</dc:date>
    <item>
      <title>DNS Doctoring Question</title>
      <link>https://community.cisco.com/t5/network-security/dns-doctoring-question/m-p/2280776#M345322</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are using an ASA5100 on 8.2(5).&amp;nbsp; I'm trying to look at granting access to our internal webserver to those connected to our guest network using an external DNS server.&amp;nbsp; I've enabled DNS inspection but can't seem to get the doctoring setup going for our device.&amp;nbsp; We are using three of the four interfaces as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;outside interface (connected to our ISP with a public IP)&lt;/P&gt;&lt;P&gt;inside interface (172.20.1.2 connected to our 3750 Gig1/0/2 with IP 172.20.1.1)&lt;/P&gt;&lt;P&gt;guest_inet interface (10.2.1.1 connected to 3750 Gig2/0/2 tagged VLAN 999)&lt;/P&gt;&lt;P&gt;The 3750 device connects to our local 192.168.x.x network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Wireless guests are in the 10.2.1.0/24 subnet and use an external DNS.&amp;nbsp; External clients are able to resolve our web server to the public IP address 63.236.246.66 and NAT successfully directs them to the internal address 192.168.40.40.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've enabled the DNS doctoring option on the static NAT entry on the inside interface but that didn't have an effect when running a dig hostname on a client connected to the guest subnet.&amp;nbsp; Do I need to put in a different NAT entry on the guest_inet interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:20:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-doctoring-question/m-p/2280776#M345322</guid>
      <dc:creator>rsaeks</dc:creator>
      <dc:date>2019-03-12T02:20:29Z</dc:date>
    </item>
    <item>
      <title>DNS Doctoring Question</title>
      <link>https://community.cisco.com/t5/network-security/dns-doctoring-question/m-p/2280777#M345326</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did you add an ACL inbound on the Guest interface permitting 10.2.1.0/24 access to 192.168.40.40?&amp;nbsp; Keep in mind that DNS doctoring substitutes the public IP of the server with the private IP so the host will be sending traffic to the private IP of the server.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Aug 2013 07:38:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-doctoring-question/m-p/2280777#M345326</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2013-08-02T07:38:58Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Doctoring Question</title>
      <link>https://community.cisco.com/t5/network-security/dns-doctoring-question/m-p/2280778#M345333</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Make sure a host in the guest subnet can access the web server locally in the first place. This can be done by using Identity NAT from the guest_inet interface to the interface that subnet 192.168.40.0 is located. Once verified, you can then test the access using the web server's public address. I am not sure if you want to add an ACL or not and this depends on the security level of the guest subnet interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DNS Rewrite (or Doctoring) is working by replacing the web server's public IP with its private IP in the DNS reply using the information found in the static NAT command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;AM&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Aug 2013 12:29:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-doctoring-question/m-p/2280778#M345333</guid>
      <dc:creator>turbo_engine26</dc:creator>
      <dc:date>2013-08-02T12:29:25Z</dc:date>
    </item>
    <item>
      <title>DNS Doctoring Question</title>
      <link>https://community.cisco.com/t5/network-security/dns-doctoring-question/m-p/2280779#M345334</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've put in a rule to allow access.&amp;nbsp; When running a packettrace command from the guest_inet interface with source 10.2.1.165 to 192.168.40.40 it displays the following with a packet dropped action:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt; match ip inside 192.168.0.0 255.255.0.0 guest_inet any &lt;/P&gt;&lt;P&gt;dynamic translation to pool 1 (No matching global) &lt;/P&gt;&lt;P&gt;translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Aug 2013 17:01:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-doctoring-question/m-p/2280779#M345334</guid>
      <dc:creator>rsaeks</dc:creator>
      <dc:date>2013-08-05T17:01:58Z</dc:date>
    </item>
    <item>
      <title>DNS Doctoring Question</title>
      <link>https://community.cisco.com/t5/network-security/dns-doctoring-question/m-p/2280780#M345335</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Could you please post the full output of the packet tracer including the command used.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also include a full configuration of the ASA (change public IPs and any other sensitive information such as passwords and usernames if required)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Aug 2013 07:08:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-doctoring-question/m-p/2280780#M345335</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2013-08-06T07:08:36Z</dc:date>
    </item>
    <item>
      <title>DNS Doctoring Question</title>
      <link>https://community.cisco.com/t5/network-security/dns-doctoring-question/m-p/2280781#M345336</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is our config with some items masked / removed:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "sh run"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.2(5) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname GCS-FW-INTERNET&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;no names&lt;/P&gt;&lt;P&gt;name X.199 WiFi_Guest&lt;/P&gt;&lt;P&gt;name 192.168.48.55 GSSPRES01&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address X.6 255.255.255.240 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.20.1.2 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif dmz&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 10.1.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; nameif guest_inet&lt;/P&gt;&lt;P&gt; security-level 10&lt;/P&gt;&lt;P&gt; ip address 10.2.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa825-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone CST -6&lt;/P&gt;&lt;P&gt;clock summer-time CDT recurring&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name glencoeschools.org&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list internet_in extended permit tcp any host X.65 eq www &lt;/P&gt;&lt;P&gt;access-list internet_in extended permit tcp any host X.66 eq www &lt;/P&gt;&lt;P&gt;access-list internet_in extended permit tcp any host X.69 eq www &lt;/P&gt;&lt;P&gt;access-list internet_in extended permit tcp any host X.70 eq www &lt;/P&gt;&lt;P&gt;access-list internet_in extended permit tcp any host X.71 eq www &lt;/P&gt;&lt;P&gt;access-list internet_in extended permit tcp any host X.72 eq www &lt;/P&gt;&lt;P&gt;access-list internet_in extended permit tcp any host X.73 eq www &lt;/P&gt;&lt;P&gt;access-list internet_in extended permit tcp any host X.74 eq www &lt;/P&gt;&lt;P&gt;access-list internet_in extended permit tcp any host X.75 eq www &lt;/P&gt;&lt;P&gt;access-list internet_in extended permit tcp any host X.76 eq www &lt;/P&gt;&lt;P&gt;access-list internet_in extended permit tcp any host X.76 eq https &lt;/P&gt;&lt;P&gt;access-list internet_in extended permit tcp any host X.80 eq www &lt;/P&gt;&lt;P&gt;access-list internet_in extended permit tcp any host X.81 eq www &lt;/P&gt;&lt;P&gt;access-list internet_in extended permit ip 192.168.0.0 255.255.0.0 192.168.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list internet_in extended permit ip 192.168.0.0 255.255.0.0 172.20.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list internet_in extended permit ip 172.16.48.0 255.255.255.0 192.168.40.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list internet_in extended permit ip 172.16.48.0 255.255.255.240 192.168.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list internet_in extended permit ip host X.145 192.168.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list internet_in extended permit tcp 10.2.1.0 255.255.255.0 any eq domain inactive &lt;/P&gt;&lt;P&gt;access-list internet_in extended permit tcp any 10.2.1.0 255.255.255.0 eq domain inactive &lt;/P&gt;&lt;P&gt;access-list internet_in extended permit icmp any any inactive &lt;/P&gt;&lt;P&gt;access-list internet_in extended permit ip host X.210 192.168.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list internet_in extended permit ip host X.9 192.168.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list internet_in extended permit ip 172.16.56.0 255.255.255.0 192.168.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list internet_in extended permit ip host X.218 192.168.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip any 172.20.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.0.0 255.255.0.0 192.168.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.0.0 255.255.0.0 172.16.40.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.0.0 255.255.0.0 172.16.48.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.0.0 255.255.0.0 172.16.56.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.0.0 255.255.0.0 X.144 255.255.255.240 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.0.0 255.255.0.0 host X.156 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.0.0 255.255.0.0 172.20.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.0.0 255.255.0.0 host X.145 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.0.0 255.255.0.0 host X.210 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.0.0 255.255.0.0 host X.249 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.0.0 255.255.0.0 host X.218 &lt;/P&gt;&lt;P&gt;access-list outside_cryptomap extended permit ip any 172.20.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_access_out extended deny tcp any any eq 82 &lt;/P&gt;&lt;P&gt;access-list outside_access_out extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list Glencoe standard permit 192.168.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list guest_inet_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging buffer-size 1040000&lt;/P&gt;&lt;P&gt;logging monitor debugging&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;logging asdm notifications&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu dmz 1500&lt;/P&gt;&lt;P&gt;mtu guest_inet 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;ip local pool VPN_Pool 172.20.1.10-172.20.1.254 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-649-103.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (inside) 1 172.16.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;nat (guest_inet) 1 10.2.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp X.65 www 192.168.40.36 www netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 6.78 https 192.168.40.8 https netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) X.66 192.168.40.40 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) X.73 192.168.40.44 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) X.74 192.168.40.46 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) X.76 192.168.40.38 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) X.71 192.168.40.42 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) X.70 192.168.40.41 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) X.72 192.168.40.43 netmask 255.255.255.255 dns &lt;/P&gt;&lt;P&gt;access-group internet_in in interface outside&lt;/P&gt;&lt;P&gt;access-group outside_access_out out interface outside&lt;/P&gt;&lt;P&gt;access-group guest_inet_access_in in interface guest_inet&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;router eigrp 7159&lt;/P&gt;&lt;P&gt; no auto-summary&lt;/P&gt;&lt;P&gt; network X.144 255.255.255.240&lt;/P&gt;&lt;P&gt; network 172.20.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network 192.168.40.0 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 X.145 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa authentication telnet console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.40.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;snmp-server host inside 192.168.40.200 community ***** version 2c&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics&lt;/P&gt;&lt;P&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:8ef56df1de9dd36f9dcff934d746ff65&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Packet Tracer is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;GCS-FW-INTERNET# packet-tracer input guest_inet tcp 10.2.1.90 1069 192.168.40.40 http&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 192.168.40.0&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group guest_inet_access_in in interface guest_inet&lt;/P&gt;&lt;P&gt;access-list guest_inet_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (guest_inet) 1 10.2.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip guest_inet 10.2.1.0 255.255.255.0 outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (X.146 [Interface PAT])&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 70348, untranslate_hits = 3530&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside 192.168.0.0 255.255.0.0 guest_inet any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (No matching global)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: guest_inet&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since it is a long post: I'm trying to have a device on our guest wireless subnet (10.2.1.0/24) access one of our webservers at 192.168.40.40&amp;nbsp; I'm pretty confidant once the syntax is setup for allowing this one host I can change it to match the others.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks everyone for the info so far!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Aug 2013 04:06:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-doctoring-question/m-p/2280781#M345336</guid>
      <dc:creator>rsaeks</dc:creator>
      <dc:date>2013-08-09T04:06:56Z</dc:date>
    </item>
    <item>
      <title>DNS Doctoring Question</title>
      <link>https://community.cisco.com/t5/network-security/dns-doctoring-question/m-p/2280782#M345338</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;First off the NAT statement for 192.168.40.40 is not configured for DNS doctoring.&amp;nbsp; Add the &lt;STRONG&gt;dns &lt;/STRONG&gt;keyword at the end of the statement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) X.66 192.168.40.40 netmask 255.255.255.255&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Aug 2013 06:55:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-doctoring-question/m-p/2280782#M345338</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2013-08-09T06:55:38Z</dc:date>
    </item>
    <item>
      <title>DNS Doctoring Question</title>
      <link>https://community.cisco.com/t5/network-security/dns-doctoring-question/m-p/2280783#M345341</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I added the dns statement to the NAT line (sorry about grabbing the old config without it in place) and still have the same issue.&amp;nbsp; When I run a nslooklup or dig on host I still receive the public IP address.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Aug 2013 19:10:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-doctoring-question/m-p/2280783#M345341</guid>
      <dc:creator>rsaeks</dc:creator>
      <dc:date>2013-08-09T19:10:16Z</dc:date>
    </item>
    <item>
      <title>DNS Doctoring Question</title>
      <link>https://community.cisco.com/t5/network-security/dns-doctoring-question/m-p/2280784#M345343</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hmmm, that is odd.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well to get this working you could nat the from the guest interface to the inside interface...it is not DNS doctoring but it should also work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (guest_inet,inside) X.73 192.168.40.44 netmask 255.255.255.255 &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Aug 2013 22:34:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-doctoring-question/m-p/2280784#M345343</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2013-08-09T22:34:58Z</dc:date>
    </item>
    <item>
      <title>DNS Doctoring Question</title>
      <link>https://community.cisco.com/t5/network-security/dns-doctoring-question/m-p/2280785#M345346</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can't see the DNS inspection enabled in the "global_policy" policy map. You must activate DNS inspection prior configuring DNS doctoring. Please use the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;parameters&lt;/P&gt;&lt;P&gt;message-length maximum client auto&lt;/P&gt;&lt;P&gt;message-length maximum 512&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;AM&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 10 Aug 2013 18:25:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-doctoring-question/m-p/2280785#M345346</guid>
      <dc:creator>turbo_engine26</dc:creator>
      <dc:date>2013-08-10T18:25:20Z</dc:date>
    </item>
    <item>
      <title>DNS Doctoring Question</title>
      <link>https://community.cisco.com/t5/network-security/dns-doctoring-question/m-p/2280786#M345349</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;After some time on the phone with TAC we found the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Even through the DNS doctoring configuration was set, it was not being honored.&amp;nbsp; We added the guest_inet subnet to the outside NAT pool:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (guest_inet) 1 10.2.1.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Created static NAT entries for each server using:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,guest_inet) PUBLIC_IP PRIVATE_IP netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once that was done all was good.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Aug 2013 02:19:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-doctoring-question/m-p/2280786#M345349</guid>
      <dc:creator>rsaeks</dc:creator>
      <dc:date>2013-08-15T02:19:07Z</dc:date>
    </item>
  </channel>
</rss>

