<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Accessing Inside Resources From Inside Using Outside DNS IP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/accessing-inside-resources-from-inside-using-outside-dns-ip/m-p/1640339#M559399</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for your assistance and your patience!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Wolf&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 21 Mar 2011 20:45:26 GMT</pubDate>
    <dc:creator>pootboy69</dc:creator>
    <dc:date>2011-03-21T20:45:26Z</dc:date>
    <item>
      <title>Accessing Inside Resources From Inside Using Outside DNS IP</title>
      <link>https://community.cisco.com/t5/network-security/accessing-inside-resources-from-inside-using-outside-dns-ip/m-p/1640331#M559389</link>
      <description>&lt;P&gt;Users and systems on the 10.10.30.0/24 network cannot get directly to ourcompany.com using the dns lookup of IP because that IP is on the outside interface of the ASA and everything on 10.10.30.0/24 has to go through the ASA to get back in, but it does not appear that the ASA supports such a configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. How do I configure the ASA to allow traffic to return inbound when originating from an inside source IP?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. How do I allow server1.ourcompany.com, which is inside the network, to translate to the inside IP, rather than the public IP of the egress interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. Is there another solution?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:10:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-inside-resources-from-inside-using-outside-dns-ip/m-p/1640331#M559389</guid>
      <dc:creator>pootboy69</dc:creator>
      <dc:date>2019-03-11T20:10:11Z</dc:date>
    </item>
    <item>
      <title>Re: Accessing Inside Resources From Inside Using Outside DNS IP</title>
      <link>https://community.cisco.com/t5/network-security/accessing-inside-resources-from-inside-using-outside-dns-ip/m-p/1640332#M559390</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think that you're looking for DNS Doctoring or DNS rewrite.&lt;/P&gt;&lt;P&gt;The ASA allows translation for DNS responses so that you can access the device from the inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example if you have:&lt;/P&gt;&lt;P&gt;static (in,out) 2.2.2.2 1.1.1.1 dns&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above static allows from outside to access 2.2.2.2 (ASA redirects to 1.1.1.1 on the inside).&lt;/P&gt;&lt;P&gt;But it also allows a DNS translation so that when the outside DNS replies with IP 2.2.2.2 (outside IP), the ASA translates the DNS response to 1.1.1.1 (so the inside host knows that it can reach the server with its real IP 1.1.1.1).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Mar 2011 19:27:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-inside-resources-from-inside-using-outside-dns-ip/m-p/1640332#M559390</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2011-03-21T19:27:08Z</dc:date>
    </item>
    <item>
      <title>Re: Accessing Inside Resources From Inside Using Outside DNS IP</title>
      <link>https://community.cisco.com/t5/network-security/accessing-inside-resources-from-inside-using-outside-dns-ip/m-p/1640333#M559391</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I see the DNS doctoring technique, but how does that manage to translate ANY mycompany.com destination requests from inside to translate to a corresponding server inside? Does thes always have to be a one-on-one NAT, for a specific inside server? We have numerous servers inside that have DNS listing. What are the security risks of DNS doctoring? Thanx!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Mar 2011 19:47:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-inside-resources-from-inside-using-outside-dns-ip/m-p/1640333#M559391</guid>
      <dc:creator>pootboy69</dc:creator>
      <dc:date>2011-03-21T19:47:31Z</dc:date>
    </item>
    <item>
      <title>Re: Accessing Inside Resources From Inside Using Outside DNS IP</title>
      <link>https://community.cisco.com/t5/network-security/accessing-inside-resources-from-inside-using-outside-dns-ip/m-p/1640334#M559392</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm not sure if you can do something like:&lt;/P&gt;&lt;P&gt;static (in,out) 2.2.2.0 1.1.1.0 netmask 255.255.255.0 dns&lt;/P&gt;&lt;P&gt;To do DNS rewrite to the entire subnet, otherwise is for every server specifically.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Security risks?&lt;/P&gt;&lt;P&gt;I don't think so, the ASA is just translating the DNS response to the real IP when sending the DNS packet to the inside host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Mar 2011 19:50:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-inside-resources-from-inside-using-outside-dns-ip/m-p/1640334#M559392</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2011-03-21T19:50:52Z</dc:date>
    </item>
    <item>
      <title>Re: Accessing Inside Resources From Inside Using Outside DNS IP</title>
      <link>https://community.cisco.com/t5/network-security/accessing-inside-resources-from-inside-using-outside-dns-ip/m-p/1640335#M559394</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So, what I'm hearing you say is that this static "(in,out) 2.2.2.2 1.1.1.1 dns" NAT will ONLY be used if the public DNS server translates the the request to server1.mycompany.com from the inside network and sends it to the specific IP on the inside.&lt;/P&gt;&lt;P&gt;In this ASA, 2.2.2.2 has the global pool for the interface. Other access on this outside address is controlled by port translation. I just don't want to risk screwing up any of the normal permissions. You'll have to pardon me as I'm just beginning to use these systems.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Mar 2011 20:13:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-inside-resources-from-inside-using-outside-dns-ip/m-p/1640335#M559394</guid>
      <dc:creator>pootboy69</dc:creator>
      <dc:date>2011-03-21T20:13:10Z</dc:date>
    </item>
    <item>
      <title>Re: Accessing Inside Resources From Inside Using Outside DNS IP</title>
      <link>https://community.cisco.com/t5/network-security/accessing-inside-resources-from-inside-using-outside-dns-ip/m-p/1640336#M559396</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What this command does:&lt;/P&gt;&lt;P&gt;static (in,out) 2.2.2.2 1.1.1.1 dns&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Inside host sends a DNS packet asking how to get to yourcompany.com&lt;/P&gt;&lt;P&gt;2. The inside host is configured to ask an external DNS server (outside the ASA).&lt;/P&gt;&lt;P&gt;3. The DNS request goes through the ASA and reaches the external DNS server&lt;/P&gt;&lt;P&gt;4. The DNS replies (as is configured) with the public IP of yourcompany.com (let's say 2.2.2.2)&lt;/P&gt;&lt;P&gt;5. The DNS packet (containing the mapping 2.2.2.2 to yourcompany.com) arrives at the outside interface of the ASA&lt;/P&gt;&lt;P&gt;6. The ASA will normally just forward this packet to the inside host that send the request, but since the static NAT has the ''dns'' keyword it will translate that DNS response from 2.2.2.2 to 1.1.1.1 &lt;/P&gt;&lt;P&gt;7. The inside host then knows that it can reach yourcompany.com by sending the packets to 1.1.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you remove the ''dns'' keyword what happens is that the inside host will attempt to reach yourcompany.com using IP 2.2.2.2 (because that's what it received on the unmodified DNS response.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it's more clear.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Mar 2011 20:19:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-inside-resources-from-inside-using-outside-dns-ip/m-p/1640336#M559396</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2011-03-21T20:19:19Z</dc:date>
    </item>
    <item>
      <title>Re: Accessing Inside Resources From Inside Using Outside DNS IP</title>
      <link>https://community.cisco.com/t5/network-security/accessing-inside-resources-from-inside-using-outside-dns-ip/m-p/1640337#M559397</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;One last question, I think: can the static NAT be set up asymmetrically, i.e., can I do something like static (in,out) 2.2.2.2 1.1.1.0? we have several servers inside that we'd like that have DNS entries that point them to the single outside address, but use PAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Wolf&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Mar 2011 20:36:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-inside-resources-from-inside-using-outside-dns-ip/m-p/1640337#M559397</guid>
      <dc:creator>pootboy69</dc:creator>
      <dc:date>2011-03-21T20:36:01Z</dc:date>
    </item>
    <item>
      <title>Re: Accessing Inside Resources From Inside Using Outside DNS IP</title>
      <link>https://community.cisco.com/t5/network-security/accessing-inside-resources-from-inside-using-outside-dns-ip/m-p/1640338#M559398</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You cannot statically NAT a subnet to a single IP address.&lt;/P&gt;&lt;P&gt;Unless you have one-to-one static NAT, you cannot access the servers from the outside anyway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another alternative is to have an ''inside'' DNS server that serves the DNS queries from the inside network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Mar 2011 20:39:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-inside-resources-from-inside-using-outside-dns-ip/m-p/1640338#M559398</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2011-03-21T20:39:20Z</dc:date>
    </item>
    <item>
      <title>Re: Accessing Inside Resources From Inside Using Outside DNS IP</title>
      <link>https://community.cisco.com/t5/network-security/accessing-inside-resources-from-inside-using-outside-dns-ip/m-p/1640339#M559399</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for your assistance and your patience!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Wolf&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Mar 2011 20:45:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-inside-resources-from-inside-using-outside-dns-ip/m-p/1640339#M559399</guid>
      <dc:creator>pootboy69</dc:creator>
      <dc:date>2011-03-21T20:45:26Z</dc:date>
    </item>
    <item>
      <title>Re: Accessing Inside Resources From Inside Using Outside DNS IP</title>
      <link>https://community.cisco.com/t5/network-security/accessing-inside-resources-from-inside-using-outside-dns-ip/m-p/1640340#M559400</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Wolf,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just wanted to point out a few things:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Asymmetric static nat is not possible since both ip addresses share the same netmask&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. For dns doctoring to work you need to enable "inspect dns" in the policy map.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. An alternative to DNS doctoring is to use hairpinning of traffic on the inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Configuration:&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;static (inside,inside) &lt;PUBLIC ip="" as="" in="" dns=""&gt; &lt;PRIV ip=""&gt;&lt;/PRIV&gt;&lt;/PUBLIC&gt;&lt;/P&gt;&lt;P&gt;nat (inside) x 0 0 (should be present already in your config)&lt;/P&gt;&lt;P&gt;global (inside) x interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So now traffic destined to the public ip is unnated to its private ip, and sent out the inside interface to the webserver on its private ip.&lt;/P&gt;&lt;P&gt;global (inside) is required to prevent asymmetric routing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Comparitively, I think both DNS doctoring and Hairpinning would require the same number of static nats configured, and i think DNS doctoring would be less CPU intensive to the ASA. But I just thought I would mention hairpinning, as your initial question seemed to be something along the lines of how it works.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Mar 2011 20:52:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-inside-resources-from-inside-using-outside-dns-ip/m-p/1640340#M559400</guid>
      <dc:creator>Shrikant Sundaresh</dc:creator>
      <dc:date>2011-03-21T20:52:45Z</dc:date>
    </item>
    <item>
      <title>Re: Accessing Inside Resources From Inside Using Outside DNS IP</title>
      <link>https://community.cisco.com/t5/network-security/accessing-inside-resources-from-inside-using-outside-dns-ip/m-p/1640341#M559401</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK, I suppose that will have to do. Can I enter several public/private pairs&lt;/P&gt;&lt;P&gt;(static (inside,inside) &lt;PUBLIC ip="" as="" in="" dns=""&gt; &lt;PRIV ip=""&gt;) in the configuration,&lt;/PRIV&gt;&lt;/PUBLIC&gt;&lt;/P&gt;&lt;P&gt;each with different outside and inside IP addresses?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Mar 2011 18:47:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-inside-resources-from-inside-using-outside-dns-ip/m-p/1640341#M559401</guid>
      <dc:creator>pootboy69</dc:creator>
      <dc:date>2011-03-22T18:47:29Z</dc:date>
    </item>
    <item>
      <title>Re: Accessing Inside Resources From Inside Using Outside DNS IP</title>
      <link>https://community.cisco.com/t5/network-security/accessing-inside-resources-from-inside-using-outside-dns-ip/m-p/1640342#M559402</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi wolf,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes you can have multiple static nats with the "dns" keyword at the end.&lt;/P&gt;&lt;P&gt;Make sure inspect dns is enabled for dns doctoring to work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Shrikant&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Mar 2011 18:53:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-inside-resources-from-inside-using-outside-dns-ip/m-p/1640342#M559402</guid>
      <dc:creator>Shrikant Sundaresh</dc:creator>
      <dc:date>2011-03-22T18:53:50Z</dc:date>
    </item>
  </channel>
</rss>

