<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA and DNS modifying in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-and-dns-modifying/m-p/687115#M426922</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you paste the config?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 31 Oct 2006 16:29:53 GMT</pubDate>
    <dc:creator>m-haddad</dc:creator>
    <dc:date>2006-10-31T16:29:53Z</dc:date>
    <item>
      <title>ASA and DNS modifying</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-dns-modifying/m-p/687114#M426921</link>
      <description>&lt;P&gt;I have an ASA5510 and have it configured with the STATIC NAT entries for Web servers in MY DMZ but when I add the DNS to the end of the STATIC rule it does not modify the DNS reply so that the nat'd address is sent to an outside client.  I have done this successfully with a PIX firewall running the same IOS.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 09:16:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-dns-modifying/m-p/687114#M426921</guid>
      <dc:creator>bob.bartlett</dc:creator>
      <dc:date>2020-02-21T09:16:46Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and DNS modifying</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-dns-modifying/m-p/687115#M426922</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you paste the config?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Oct 2006 16:29:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-dns-modifying/m-p/687115#M426922</guid>
      <dc:creator>m-haddad</dc:creator>
      <dc:date>2006-10-31T16:29:53Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and DNS modifying</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-dns-modifying/m-p/687116#M426923</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here you go:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 7.1(2)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 55.23.239.130 255.255.255.128&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif DMZ&lt;/P&gt;&lt;P&gt; security-level 30&lt;/P&gt;&lt;P&gt; ip address 10.10.30.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.10.20.129 255.255.255.128&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dns domain-lookup inside&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; name-server colonel&lt;/P&gt;&lt;P&gt; name-server judge&lt;/P&gt;&lt;P&gt; domain-name ISPRO.COM&lt;/P&gt;&lt;P&gt;access-list ASAOutside remark DNS access to outside DNS Servers&lt;/P&gt;&lt;P&gt;access-list ASAOutside extended permit udp any object-group Outside_DNS object-group DNS&lt;/P&gt;&lt;P&gt;access-list ASAOutside remark HTTP WEB ACCESS&lt;/P&gt;&lt;P&gt;access-list ASAOutside extended permit tcp any object-group WebSites object-group HTTP&lt;/P&gt;&lt;P&gt;access-list ASAOutside remark HTTPS WEB ACCESS&lt;/P&gt;&lt;P&gt;access-list ASAOutside extended permit tcp any object-group WebSites_SSL object-group HTTPS&lt;/P&gt;&lt;P&gt;static (DMZ,outside) 55.23.239.26 10.10.30.26 netmask 255.255.255.255 dns&lt;/P&gt;&lt;P&gt;access-group ASAOutside in interface outside&lt;/P&gt;&lt;P&gt;access-group ASADMZ in interface DMZ&lt;/P&gt;&lt;P&gt;access-group ASAInside in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Oct 2006 18:23:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-dns-modifying/m-p/687116#M426923</guid>
      <dc:creator>bob.bartlett</dc:creator>
      <dc:date>2006-10-31T18:23:43Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and DNS modifying</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-dns-modifying/m-p/687117#M426924</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The dns option on your static will only work if 'inspect dns' is on - I don't see your global service policy (or interface, for that matter) in the configuration to tell if it is on or not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--Jason&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate this message if helped resolve some or all of your issue!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Oct 2006 20:36:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-dns-modifying/m-p/687117#M426924</guid>
      <dc:creator>jgervia_2</dc:creator>
      <dc:date>2006-10-31T20:36:23Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and DNS modifying</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-dns-modifying/m-p/687118#M426925</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is the inspect policy the interfaces are on the previous printout&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map asa_global_fw_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect ftp &lt;/P&gt;&lt;P&gt;  inspect h323 ras &lt;/P&gt;&lt;P&gt;  inspect h323 h225 &lt;/P&gt;&lt;P&gt;  inspect tftp &lt;/P&gt;&lt;P&gt;  inspect sqlnet &lt;/P&gt;&lt;P&gt;  inspect mgcp &lt;/P&gt;&lt;P&gt;  inspect netbios &lt;/P&gt;&lt;P&gt;  inspect skinny &lt;/P&gt;&lt;P&gt;  inspect ils &lt;/P&gt;&lt;P&gt;  inspect icmp &lt;/P&gt;&lt;P&gt;  inspect sip &lt;/P&gt;&lt;P&gt;  inspect xdmcp &lt;/P&gt;&lt;P&gt;  inspect ctiqbe &lt;/P&gt;&lt;P&gt;  inspect dns maximum-length 1024&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Oct 2006 20:49:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-dns-modifying/m-p/687118#M426925</guid>
      <dc:creator>bob.bartlett</dc:creator>
      <dc:date>2006-10-31T20:49:31Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and DNS modifying</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-dns-modifying/m-p/687119#M426926</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You static should look like that:&lt;/P&gt;&lt;P&gt;static (DMZ,outside) udp 55.23.239.26 dns 10.10.30.26 dns netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know if it solves your problem,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Oct 2006 21:44:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-dns-modifying/m-p/687119#M426926</guid>
      <dc:creator>m-haddad</dc:creator>
      <dc:date>2006-10-31T21:44:30Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and DNS modifying</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-dns-modifying/m-p/687120#M426927</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;didn't help....&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Oct 2006 23:16:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-dns-modifying/m-p/687120#M426927</guid>
      <dc:creator>bob.bartlett</dc:creator>
      <dc:date>2006-10-31T23:16:33Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and DNS modifying</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-dns-modifying/m-p/687121#M426928</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can we get the complete config?  We're not getting the complete picture here.  Feel free to take out SNMP and change IP addresses to protect the innocent.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Nov 2006 00:42:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-dns-modifying/m-p/687121#M426928</guid>
      <dc:creator>jgervia_2</dc:creator>
      <dc:date>2006-11-01T00:42:47Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and DNS modifying</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-dns-modifying/m-p/687122#M426929</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi ...  I believe you are a bit confused as to the way the dns option works when used on a static sentence.  The dns option will allow an INSIDE host to received a DNS reply with the local IP address used on the translation .ie the real IP of your Web server. In that way your INSIDE host will comunicate direclty with the Web Server instead of trying to connect by using its Public Ip address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this helps  ...  please rate it if it does !!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Nov 2006 03:08:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-dns-modifying/m-p/687122#M426929</guid>
      <dc:creator>Fernando_Meza</dc:creator>
      <dc:date>2006-11-01T03:08:56Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and DNS modifying</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-dns-modifying/m-p/687123#M426930</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi bob,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Do you mean DNS aliasing. For example,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;alias (DMZ) Global_ip DMZ_IP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know your feedback coz it seems I did misunderstood your request,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Nov 2006 16:59:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-dns-modifying/m-p/687123#M426930</guid>
      <dc:creator>m-haddad</dc:creator>
      <dc:date>2006-11-01T16:59:31Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and DNS modifying</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-dns-modifying/m-p/687124#M426931</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi all i have a similar situation. i have a webserver in my inside network and there is no local dns server in our network.people in the inside network query the internet dns server for the resolution of the web server in the inside of the pix. say the public ip is 1.1.1.1 and the private ip of the server is 10.1.1.1/24. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in my static nat i have configured &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 1.1.1.1 10.1.1.1 dns netmask 255.255.255.255. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;will the dns doctoring work here. can someone pls help. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sebastan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Nov 2006 17:04:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-dns-modifying/m-p/687124#M426931</guid>
      <dc:creator>sebastan_bach</dc:creator>
      <dc:date>2006-11-01T17:04:42Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and DNS modifying</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-dns-modifying/m-p/687125#M426932</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes the DNS doctoring/Aliasing would work for you. Any request sent to the public address will be redirected to the internal DNS address.&lt;/P&gt;&lt;P&gt;Your alias command should look like that&lt;/P&gt;&lt;P&gt;Alias (Inside) 1.1.1.1 10.1.1.1 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Nov 2006 20:19:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-dns-modifying/m-p/687125#M426932</guid>
      <dc:creator>m-haddad</dc:creator>
      <dc:date>2006-11-01T20:19:14Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and DNS modifying</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-dns-modifying/m-p/687126#M426933</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI I believe   ..  what you need is&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 1.1.1.1 10.1.1.1  netmask 255.255.255.255 dns&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DNS reply from teh External Web server will be rewriten and you internal host will connect directly to the internal IP of your Web server assuming you have allowed access from Inside hosts to it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps  .. please rate it if it does !!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Nov 2006 23:22:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-dns-modifying/m-p/687126#M426933</guid>
      <dc:creator>Fernando_Meza</dc:creator>
      <dc:date>2006-11-01T23:22:06Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and DNS modifying</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-dns-modifying/m-p/687127#M426934</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Everyone has missed the crucial element of this person's post.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This person doesn't need to know how to get the DNS portion working... they clearly have it correct according to the documentation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/customer/products/ps6120/products_configuration_guide_chapter09186a008054c4ea.html#wp1042753" target="_blank"&gt;http://www.cisco.com/en/US/customer/products/ps6120/products_configuration_guide_chapter09186a008054c4ea.html#wp1042753&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem here, which is a problem I have just run into, is that it's not working 100%.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With this command:&lt;/P&gt;&lt;P&gt;static (inside,outside) 209.165.201.10 10.1.3.14 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;dns&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can do an nslookup of mydomain.com and it will resolve to 10.1.3.14, which is the desired effect. But a ping will resolve to mydomain.com will resolve to 209.165.201.10, and loading mydomain.com into a web browser will not resolve to the correct 10.x address. However, if I load the 10.x address into the browser manually, it works fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So the DNS keyword on the static command is the correct solution according to the docs, however it does not function as it should.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One thing to note is that the docs state that either the client or the DNS server must be on the same interface as the web server. So a client on "inside", a web server on "DMZ", and a DNS on "outside" will not work. Which is how it should work. That would be the desired effect for anyone who doesn't run their own DNS servers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So for the above example, with three host in three separate networks, the alias command did solve the problem, however it breaks the ASDM. While I'm not a fan of the ASDM, our customers are, and it's a feature they've paid to have, they should have the ability to use it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Nov 2006 20:36:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-dns-modifying/m-p/687127#M426934</guid>
      <dc:creator>Anthony Holloway</dc:creator>
      <dc:date>2006-11-28T20:36:20Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and DNS modifying</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-dns-modifying/m-p/687128#M426935</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bob, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me ask you a few questions:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- where are your DNS servers?&lt;/P&gt;&lt;P&gt;-who is trying to access the webservers? Hosts from the inside or from the same interface (DMZ)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For DNS doctoring to work, the request/reply must traverse the firewall, otherwise the packet won't get fixed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So for example if the hosts are located in the  DMZ you must have your static configured with the DNS keyword. The when a client makes a request to go to mysite.com, the request will go out to the external DNS servers and will come back with the public address configure on the static, at that moment, the firewall will "open" the packet and replace that information with the private IP address of the server. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the clients are located on the Inside interface you will need to configure Destination NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (dmz,outside) x y&lt;/P&gt;&lt;P&gt;static (dmz, inside) x y&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Franco Zamora&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Nov 2006 05:21:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-dns-modifying/m-p/687128#M426935</guid>
      <dc:creator>fzamora</dc:creator>
      <dc:date>2006-11-29T05:21:25Z</dc:date>
    </item>
  </channel>
</rss>

