<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DNS in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dns/m-p/1599101#M595630</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mike&lt;/P&gt;&lt;P&gt;Thanks for your input, I need one clarification, what ports are needed from outside to inside to enable Windows 2003 Server to resolve external DNS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Anthony&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 01 Jan 2011 10:19:00 GMT</pubDate>
    <dc:creator>anthony.dyne</dc:creator>
    <dc:date>2011-01-01T10:19:00Z</dc:date>
    <item>
      <title>DNS</title>
      <link>https://community.cisco.com/t5/network-security/dns/m-p/1599097#M595626</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What steps do I perform on ASA 5510 to enable LAN users to resolve external DNS, all intranet sites are resolved using local DNS Server running on Windows 2003 Server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Wishes&lt;/P&gt;&lt;P&gt;Anthony&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:29:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns/m-p/1599097#M595626</guid>
      <dc:creator>anthony.dyne</dc:creator>
      <dc:date>2019-03-11T19:29:17Z</dc:date>
    </item>
    <item>
      <title>Re: DNS</title>
      <link>https://community.cisco.com/t5/network-security/dns/m-p/1599098#M595627</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Anthony,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you clarify which traffic you're trying to allow through the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I understand your question you are trying to allow your internal Windows 2003 DNS server to resolve external domains with servers on the Internet so that it can provide those answers to your internal clients? If that's correct and your DNS server is setup properly, it should only be a matter of allowing outbound UDP/53 access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you post a sanitized copy of your config and let us know what IP address the DNS server uses, we can give you a more specific answer. In general though, you'll need to make sure the ASA has at least the following configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Translation: A NAT/PAT rule to translate the DNS server's internal/private IP to a publicly routable global IP&lt;/P&gt;&lt;P&gt;2. Route: A default route where all Internet-bound traffic will be sent&lt;/P&gt;&lt;P&gt;3. Permission: An access-list allowing outbound UDP/53 traffic (only if the security-level of the interface that protects the DNS server is lower than that of the Internet-facing interface)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Dec 2010 18:39:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns/m-p/1599098#M595627</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2010-12-31T18:39:51Z</dc:date>
    </item>
    <item>
      <title>Re: DNS</title>
      <link>https://community.cisco.com/t5/network-security/dns/m-p/1599099#M595628</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mike&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your understanding is correct. Allow internal Windows 2003 DNS server to resolve external domains through the ASA.&lt;/P&gt;&lt;P&gt;Windows 2003 DNS Server IP - 172.24.1.100&amp;nbsp; 255.255.255.0&lt;/P&gt;&lt;P&gt;ASA inside IP - 172.23.1.1&lt;/P&gt;&lt;P&gt;Switch IP - 172.23.1.2&lt;/P&gt;&lt;P&gt;We received 14 usable public ip address from service provider&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Its a new setup and soon will require also&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;MS Exchange SMTP gateway traffic to be allowed from inside and outside&lt;/LI&gt;&lt;LI&gt;OWA traffic from outside&lt;/LI&gt;&lt;LI&gt;Internet Browsing traffic from inside to outside&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Dec 2010 18:59:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns/m-p/1599099#M595628</guid>
      <dc:creator>anthony.dyne</dc:creator>
      <dc:date>2010-12-31T18:59:43Z</dc:date>
    </item>
    <item>
      <title>Re: DNS</title>
      <link>https://community.cisco.com/t5/network-security/dns/m-p/1599100#M595629</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Anthony,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for clarifying. In that case, you'll need a config similar to this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;Assumptions:&lt;/P&gt;&lt;P&gt;Internal interface that protects DNS server = inside&lt;/P&gt;&lt;P&gt;External/Internet-facing interface = outside&lt;/P&gt;&lt;P&gt;DNS Server's public IP = A.B.C.D&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) A.B.C.D 172.24.1.100 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp any host A.B.C.D eq smtp&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp any host A.B.C.D eq https&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 &lt;ISP router=""&gt;&lt;/ISP&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As for your 3rd requirement, you can use this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;nat (inside) 1 0 0&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Dec 2010 19:04:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns/m-p/1599100#M595629</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2010-12-31T19:04:18Z</dc:date>
    </item>
    <item>
      <title>Re: DNS</title>
      <link>https://community.cisco.com/t5/network-security/dns/m-p/1599101#M595630</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mike&lt;/P&gt;&lt;P&gt;Thanks for your input, I need one clarification, what ports are needed from outside to inside to enable Windows 2003 Server to resolve external DNS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Anthony&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 01 Jan 2011 10:19:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns/m-p/1599101#M595630</guid>
      <dc:creator>anthony.dyne</dc:creator>
      <dc:date>2011-01-01T10:19:00Z</dc:date>
    </item>
    <item>
      <title>Re: DNS</title>
      <link>https://community.cisco.com/t5/network-security/dns/m-p/1599102#M595631</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Anthony,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since your Windows 2003 Server will be initiating the connections (from inside -&amp;gt; outside), you won't need to open any ports for the return traffic in the outside -&amp;gt; inside direction. The ASA will see the outgoing request and open the necessary pinholes to allow the response from the external DNS server to come back into your network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That being said, if you have an inbound ACL on your inside interface, you would need to allow UDP/53 in this ACL. However, by default all traffic is allowed in the inside -&amp;gt; outside direction.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 01 Jan 2011 12:54:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns/m-p/1599102#M595631</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2011-01-01T12:54:57Z</dc:date>
    </item>
    <item>
      <title>Re: DNS</title>
      <link>https://community.cisco.com/t5/network-security/dns/m-p/1599103#M595632</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mike&lt;/P&gt;&lt;P&gt;Thanks for your help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_access_out permit udp&amp;nbsp; host 1.1.1.1 any eq 53 &lt;/P&gt;&lt;P&gt;Do i only need the above ACL to allow DNS resolution from inside to ouside when we have an inbound ACL on your inside interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 01 Jan 2011 19:13:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns/m-p/1599103#M595632</guid>
      <dc:creator>anthony.dyne</dc:creator>
      <dc:date>2011-01-01T19:13:27Z</dc:date>
    </item>
    <item>
      <title>Re: DNS</title>
      <link>https://community.cisco.com/t5/network-security/dns/m-p/1599104#M595634</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Anthony,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, you are correct.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 01 Jan 2011 19:37:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns/m-p/1599104#M595634</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2011-01-01T19:37:43Z</dc:date>
    </item>
  </channel>
</rss>

