<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic DNS internal ASA5500 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dns-internal-asa5500/m-p/2154510#M357097</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;perfect. That is working. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks Markus&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 07 Feb 2013 10:48:56 GMT</pubDate>
    <dc:creator>MaDe</dc:creator>
    <dc:date>2013-02-07T10:48:56Z</dc:date>
    <item>
      <title>DNS internal ASA5500</title>
      <link>https://community.cisco.com/t5/network-security/dns-internal-asa5500/m-p/2154506#M357093</link>
      <description>&lt;P&gt;Good day all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;short question....&lt;BR /&gt;I setup a new ASA for our branch office everything is working fine. But I have a little problem with the ASA.&lt;BR /&gt;I try to configure that my ASA in the branch office can resolve internal host to IP. Problem is that our internal DNS servers located in a different location and DNS is working over a VPN. This is working for the branch office client but not for the ASA.&lt;/P&gt;&lt;P&gt;Have somone an Idea or is it by design....?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks Markus&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:56:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-internal-asa5500/m-p/2154506#M357093</guid>
      <dc:creator>MaDe</dc:creator>
      <dc:date>2019-03-12T00:56:26Z</dc:date>
    </item>
    <item>
      <title>DNS internal ASA5500</title>
      <link>https://community.cisco.com/t5/network-security/dns-internal-asa5500/m-p/2154507#M357094</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The reason why it's not working is most probably because the ASA route the dns packet via its outside interface, hence the source IP is the ASA outside interface, while your VPN crypto ACL does not include the ASA outside interface, hence it's failing via the VPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To fix the issue, you can include the branch office ASA outside interface into the crypto ACL as the source ip towards the remote LAN, and mirror image ACL on the remote crypto ACL as well.&lt;/P&gt;&lt;P&gt;You would also need to configure NAT exemption on the remote server to NAT exemption between the remote LAN towards the branch office ASA outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Feb 2013 05:24:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-internal-asa5500/m-p/2154507#M357094</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2013-02-06T05:24:53Z</dc:date>
    </item>
    <item>
      <title>DNS internal ASA5500</title>
      <link>https://community.cisco.com/t5/network-security/dns-internal-asa5500/m-p/2154508#M357095</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jennifer,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for your response. So for beginners.... I have to create the crypto like this scheme&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;branch_asa crypto acl &lt;BR /&gt;src: 192.168.0.0 --- dst: 192.168.1.0&lt;/P&gt;&lt;P&gt;src: 1.1.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;remote_asa crypto acl &lt;/P&gt;&lt;P&gt;src: 192.168.1.0 --- dst: 192.168.0.0&lt;/P&gt;&lt;P&gt;src: 2.2.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Markus&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Feb 2013 14:56:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-internal-asa5500/m-p/2154508#M357095</guid>
      <dc:creator>MaDe</dc:creator>
      <dc:date>2013-02-06T14:56:00Z</dc:date>
    </item>
    <item>
      <title>DNS internal ASA5500</title>
      <link>https://community.cisco.com/t5/network-security/dns-internal-asa5500/m-p/2154509#M357096</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Example:&lt;/P&gt;&lt;P&gt;if your branch ASA outside interface is 1.1.1.1, and the remote LAN is 192.168.1.0/24, then:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;branch ASA:&lt;/P&gt;&lt;P&gt;crypto ACL: permit ip host 1.1.1.1 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;remote ASA:&lt;/P&gt;&lt;P&gt;crypto ACL: permit ip 192.168.1.0 255.255.255.0 host 1.1.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the above is in addition to crypto ACL that you already have in place.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And on the remote ASA:&lt;/P&gt;&lt;P&gt;your NAT exempt will be the same as your crypto ACL&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Feb 2013 01:58:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-internal-asa5500/m-p/2154509#M357096</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2013-02-07T01:58:02Z</dc:date>
    </item>
    <item>
      <title>DNS internal ASA5500</title>
      <link>https://community.cisco.com/t5/network-security/dns-internal-asa5500/m-p/2154510#M357097</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;perfect. That is working. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks Markus&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Feb 2013 10:48:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-internal-asa5500/m-p/2154510#M357097</guid>
      <dc:creator>MaDe</dc:creator>
      <dc:date>2013-02-07T10:48:56Z</dc:date>
    </item>
    <item>
      <title>DNS internal ASA5500</title>
      <link>https://community.cisco.com/t5/network-security/dns-internal-asa5500/m-p/2154511#M357098</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Excellent, thanks for the update.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Feb 2013 11:59:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-internal-asa5500/m-p/2154511#M357098</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2013-02-07T11:59:43Z</dc:date>
    </item>
  </channel>
</rss>

