<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic DNS Doctoring - network range in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dns-doctoring-network-range/m-p/1970212#M401608</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bro&lt;/P&gt;&lt;P&gt;This is not possible. Let me explain why.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Firstly, it should be static (inside,dmz) not the other way around, unless of course you're doing a 2-way NAT which is not your case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The statement static (inside,dmz) 10.10.10.0 20.20.20.0 netmask 255.255.255.0 means you're doing IP TRANSLATION, which is not what you're doing either.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only reason you use DNS Doctoring, is so that LAN users are able to see the internal web servers as a private address (the real address) when the DNS client is on LAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00807968c8.shtml#intro"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00807968c8.shtml#intro&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;P/S: if you think this comment is useful, please do rate them nicely &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 26 Jul 2012 16:40:41 GMT</pubDate>
    <dc:creator>Ramraj Sivagnanam Sivajanam</dc:creator>
    <dc:date>2012-07-26T16:40:41Z</dc:date>
    <item>
      <title>DNS Doctoring - network range</title>
      <link>https://community.cisco.com/t5/network-security/dns-doctoring-network-range/m-p/1970211#M401607</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I find plenty of examples of host configurations, like...&lt;/P&gt;&lt;P&gt;static (dmz,inside) X.X.X.X Y.Y.Y.Y netmask 255.255.255.255 dns&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can I also configure it for networks, like...&lt;/P&gt;&lt;P&gt;static (dmz,inside) X.X.X.X Y.Y.Y.Y netmask 255.255.255.0 dns&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reason to deploy the network method would be when I don't know all the internal servers being targeted by clients.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks you for helping me&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: #222222; font-family: arial, sans-serif; font-size: 13.333333969116211px; text-align: -webkit-auto; background-color: #ffffff;"&gt; &lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:34:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-doctoring-network-range/m-p/1970211#M401607</guid>
      <dc:creator>Walter1972_2</dc:creator>
      <dc:date>2019-03-11T23:34:55Z</dc:date>
    </item>
    <item>
      <title>DNS Doctoring - network range</title>
      <link>https://community.cisco.com/t5/network-security/dns-doctoring-network-range/m-p/1970212#M401608</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bro&lt;/P&gt;&lt;P&gt;This is not possible. Let me explain why.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Firstly, it should be static (inside,dmz) not the other way around, unless of course you're doing a 2-way NAT which is not your case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The statement static (inside,dmz) 10.10.10.0 20.20.20.0 netmask 255.255.255.0 means you're doing IP TRANSLATION, which is not what you're doing either.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only reason you use DNS Doctoring, is so that LAN users are able to see the internal web servers as a private address (the real address) when the DNS client is on LAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00807968c8.shtml#intro"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00807968c8.shtml#intro&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;P/S: if you think this comment is useful, please do rate them nicely &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Jul 2012 16:40:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-doctoring-network-range/m-p/1970212#M401608</guid>
      <dc:creator>Ramraj Sivagnanam Sivajanam</dc:creator>
      <dc:date>2012-07-26T16:40:41Z</dc:date>
    </item>
  </channel>
</rss>

