<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic DNS issues through PIX in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dns-issues-through-pix/m-p/1697485#M535794</link>
    <description>&lt;P&gt;This is my first time configuring a pix.&amp;nbsp; Once connected, I can ping through the pix using an ip address, but when it comes to connecting to alpha addresses, it fails.&amp;nbsp; Through the asdm logs, the pix does contact the DNS server.&amp;nbsp;&amp;nbsp; I assume it's a DNS issue, but I don't know what I'm missing.&amp;nbsp; Below is the config.&amp;nbsp; Any help would be appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;LAN--L2 Switch--Pix515--cable modem--isp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 8.0(4)&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt; hostname pix515&lt;/P&gt;&lt;P&gt; domain-name &lt;A href="http://hickman.com/" target="_blank"&gt;example.com&lt;/A&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; enable password &amp;lt;omitted&amp;gt; encrypted&lt;/P&gt;&lt;P&gt; passwd &amp;lt;omitted&amp;gt; encrypted&lt;/P&gt;&lt;P&gt; names&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt; interface Ethernet0&lt;/P&gt;&lt;P&gt;&amp;nbsp; nameif outside&lt;/P&gt;&lt;P&gt;&amp;nbsp; security-level 0&lt;/P&gt;&lt;P&gt;&amp;nbsp; ip address dhcp setroute&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt; interface Ethernet1&lt;/P&gt;&lt;P&gt;&amp;nbsp; nameif inside&lt;/P&gt;&lt;P&gt;&amp;nbsp; security-level 100&lt;/P&gt;&lt;P&gt;&amp;nbsp; ip address 10.0.0.1 255.255.255.0&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt; ftp mode passive&lt;/P&gt;&lt;P&gt; dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt;&amp;nbsp; domain-name &lt;A href="http://hickman.com/" target="_blank"&gt;example.com&lt;/A&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; access-list outside_access_in extended permit ip 10.0.0.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt; pager lines 24&lt;/P&gt;&lt;P&gt; logging enable&lt;/P&gt;&lt;P&gt; logging asdm informational&lt;/P&gt;&lt;P&gt; mtu outside 1500&lt;/P&gt;&lt;P&gt; mtu inside 1500&lt;/P&gt;&lt;P&gt; icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt; icmp permit any inside&lt;/P&gt;&lt;P&gt; asdm image flash:/asdm-61551.bin&lt;/P&gt;&lt;P&gt; no asdm history enable&lt;/P&gt;&lt;P&gt; arp timeout 14400&lt;/P&gt;&lt;P&gt; global (outside) 1 interface&lt;/P&gt;&lt;P&gt; nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt; access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt; timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt; timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt; timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt; timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt; timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt; dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt; http server enable&lt;/P&gt;&lt;P&gt; http 10.0.0.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt; no snmp-server location&lt;/P&gt;&lt;P&gt; no snmp-server contact&lt;/P&gt;&lt;P&gt; snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt; crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt; crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt; telnet timeout 5&lt;/P&gt;&lt;P&gt; ssh 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt; ssh timeout 5&lt;/P&gt;&lt;P&gt; console timeout 0&lt;/P&gt;&lt;P&gt; dhcpd address 10.0.0.20-10.0.0.254 inside&lt;/P&gt;&lt;P&gt; dhcpd dns x.x.x.x interface inside&lt;/P&gt;&lt;P&gt; dhcpd enable inside&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt; threat-detection basic-threat&lt;/P&gt;&lt;P&gt; threat-detection statistics port&lt;/P&gt;&lt;P&gt; threat-detection statistics protocol&lt;/P&gt;&lt;P&gt; threat-detection statistics access-list&lt;/P&gt;&lt;P&gt; no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt; ntp server x.x.x.x&lt;/P&gt;&lt;P&gt; username admin password &amp;lt;omitted&amp;gt; encrypted&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt; class-map inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; match default-inspection-traffic&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt; policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; parameters&lt;/P&gt;&lt;P&gt; message-length maximum server auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt; policy-map global_policy&lt;/P&gt;&lt;P&gt;&amp;nbsp; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt; inspect icmp&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt; service-policy global_policy global&lt;/P&gt;&lt;P&gt; prompt hostname context&lt;/P&gt;&lt;P&gt; Cryptochecksum:&lt;/P&gt;&lt;DIV id=":4r"&gt;806a71054e94151e2dfb454d7a089e52&lt;BR /&gt; : end&lt;/DIV&gt;</description>
    <pubDate>Mon, 11 Mar 2019 20:59:57 GMT</pubDate>
    <dc:creator>timh</dc:creator>
    <dc:date>2019-03-11T20:59:57Z</dc:date>
    <item>
      <title>DNS issues through PIX</title>
      <link>https://community.cisco.com/t5/network-security/dns-issues-through-pix/m-p/1697485#M535794</link>
      <description>&lt;P&gt;This is my first time configuring a pix.&amp;nbsp; Once connected, I can ping through the pix using an ip address, but when it comes to connecting to alpha addresses, it fails.&amp;nbsp; Through the asdm logs, the pix does contact the DNS server.&amp;nbsp;&amp;nbsp; I assume it's a DNS issue, but I don't know what I'm missing.&amp;nbsp; Below is the config.&amp;nbsp; Any help would be appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;LAN--L2 Switch--Pix515--cable modem--isp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 8.0(4)&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt; hostname pix515&lt;/P&gt;&lt;P&gt; domain-name &lt;A href="http://hickman.com/" target="_blank"&gt;example.com&lt;/A&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; enable password &amp;lt;omitted&amp;gt; encrypted&lt;/P&gt;&lt;P&gt; passwd &amp;lt;omitted&amp;gt; encrypted&lt;/P&gt;&lt;P&gt; names&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt; interface Ethernet0&lt;/P&gt;&lt;P&gt;&amp;nbsp; nameif outside&lt;/P&gt;&lt;P&gt;&amp;nbsp; security-level 0&lt;/P&gt;&lt;P&gt;&amp;nbsp; ip address dhcp setroute&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt; interface Ethernet1&lt;/P&gt;&lt;P&gt;&amp;nbsp; nameif inside&lt;/P&gt;&lt;P&gt;&amp;nbsp; security-level 100&lt;/P&gt;&lt;P&gt;&amp;nbsp; ip address 10.0.0.1 255.255.255.0&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt; ftp mode passive&lt;/P&gt;&lt;P&gt; dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt;&amp;nbsp; domain-name &lt;A href="http://hickman.com/" target="_blank"&gt;example.com&lt;/A&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; access-list outside_access_in extended permit ip 10.0.0.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt; pager lines 24&lt;/P&gt;&lt;P&gt; logging enable&lt;/P&gt;&lt;P&gt; logging asdm informational&lt;/P&gt;&lt;P&gt; mtu outside 1500&lt;/P&gt;&lt;P&gt; mtu inside 1500&lt;/P&gt;&lt;P&gt; icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt; icmp permit any inside&lt;/P&gt;&lt;P&gt; asdm image flash:/asdm-61551.bin&lt;/P&gt;&lt;P&gt; no asdm history enable&lt;/P&gt;&lt;P&gt; arp timeout 14400&lt;/P&gt;&lt;P&gt; global (outside) 1 interface&lt;/P&gt;&lt;P&gt; nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt; access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt; timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt; timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt; timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt; timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt; timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt; dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt; http server enable&lt;/P&gt;&lt;P&gt; http 10.0.0.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt; no snmp-server location&lt;/P&gt;&lt;P&gt; no snmp-server contact&lt;/P&gt;&lt;P&gt; snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt; crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt; crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt; telnet timeout 5&lt;/P&gt;&lt;P&gt; ssh 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt; ssh timeout 5&lt;/P&gt;&lt;P&gt; console timeout 0&lt;/P&gt;&lt;P&gt; dhcpd address 10.0.0.20-10.0.0.254 inside&lt;/P&gt;&lt;P&gt; dhcpd dns x.x.x.x interface inside&lt;/P&gt;&lt;P&gt; dhcpd enable inside&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt; threat-detection basic-threat&lt;/P&gt;&lt;P&gt; threat-detection statistics port&lt;/P&gt;&lt;P&gt; threat-detection statistics protocol&lt;/P&gt;&lt;P&gt; threat-detection statistics access-list&lt;/P&gt;&lt;P&gt; no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt; ntp server x.x.x.x&lt;/P&gt;&lt;P&gt; username admin password &amp;lt;omitted&amp;gt; encrypted&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt; class-map inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; match default-inspection-traffic&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt; policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; parameters&lt;/P&gt;&lt;P&gt; message-length maximum server auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt; policy-map global_policy&lt;/P&gt;&lt;P&gt;&amp;nbsp; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt; inspect icmp&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt; service-policy global_policy global&lt;/P&gt;&lt;P&gt; prompt hostname context&lt;/P&gt;&lt;P&gt; Cryptochecksum:&lt;/P&gt;&lt;DIV id=":4r"&gt;806a71054e94151e2dfb454d7a089e52&lt;BR /&gt; : end&lt;/DIV&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:59:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-issues-through-pix/m-p/1697485#M535794</guid>
      <dc:creator>timh</dc:creator>
      <dc:date>2019-03-11T20:59:57Z</dc:date>
    </item>
    <item>
      <title>DNS issues through PIX</title>
      <link>https://community.cisco.com/t5/network-security/dns-issues-through-pix/m-p/1697486#M535795</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1) Where are you trying to ping to and from? Pls share IP Address and DNS name that you try to ping.&lt;/P&gt;&lt;P&gt;2) Where is the DNS server and what is the DNS server IP Address?&lt;/P&gt;&lt;P&gt;3) If you are doing "nslookup" to the hostname, and DNS server does it use and what does it resolve to?&lt;/P&gt;&lt;P&gt;4) Lastly, If the ASDM logs can see DNS request that means the initial request is going through, what about the DNS reply? Does the ASA see the DNS reply? You can check that with packet capture on the ASA interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 17 Jul 2011 23:39:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-issues-through-pix/m-p/1697486#M535795</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-07-17T23:39:09Z</dc:date>
    </item>
    <item>
      <title>DNS issues through PIX</title>
      <link>https://community.cisco.com/t5/network-security/dns-issues-through-pix/m-p/1697487#M535796</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your reply&amp;nbsp; Hopefully this will answer questions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1)&amp;nbsp; the successful ping was from a PC on the LAN to an external ip (one used by my work)&lt;/P&gt;&lt;P&gt;2)&amp;nbsp; the DNS server is my ISP's DNS server 63.13.16.30 (which was included on the "dhcpd dns x.x.x.x interface inside" command above)&lt;/P&gt;&lt;P&gt;3)&amp;nbsp; my "test" was to go to a web page from the same PC that could sucessfully ping to the outside world.&lt;/P&gt;&lt;P&gt;4)&amp;nbsp; maybe this will be different, but asdm can see the "built" &amp;amp; "teardown" of connection to the DNS server (63.13.16.30).&amp;nbsp; The packet capture will need to be done later, since I will have to take down my current network that is currently in use.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Jul 2011 00:01:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-issues-through-pix/m-p/1697487#M535796</guid>
      <dc:creator>timh</dc:creator>
      <dc:date>2011-07-18T00:01:02Z</dc:date>
    </item>
    <item>
      <title>DNS issues through PIX</title>
      <link>https://community.cisco.com/t5/network-security/dns-issues-through-pix/m-p/1697488#M535797</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tim,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Instead of opening a browser, try opening a command window on your PC and trynig nslookup for a URL, like google.com. Also, try changing the DNS server to 4.2.2.2 and see if it works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Jul 2011 19:57:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-issues-through-pix/m-p/1697488#M535797</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2011-07-28T19:57:35Z</dc:date>
    </item>
    <item>
      <title>DNS issues through PIX</title>
      <link>https://community.cisco.com/t5/network-security/dns-issues-through-pix/m-p/1697489#M535798</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello Tim&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So lets see if I understood your question. You want to ping a website by the URL right?&lt;/P&gt;&lt;P&gt;You said your DNS its on the outside (ISP)&lt;/P&gt;&lt;P&gt;So try this two commands and let me know how it goes?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dns domain-lookup outside&lt;/P&gt;&lt;P&gt;dns name-server 4.2.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Jul 2011 23:54:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-issues-through-pix/m-p/1697489#M535798</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-07-28T23:54:03Z</dc:date>
    </item>
  </channel>
</rss>

