<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DNS-INSPECTION DROPS PACKETS in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dns-inspection-drops-packets/m-p/1572099#M599394</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The service request number is 615913549, we are seeing this issue with 'Abraham Hernandez (abhernan)'. He is helping us with this proyect.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 10 Nov 2010 18:40:13 GMT</pubDate>
    <dc:creator>Leonardo Fernando Monzon Luis</dc:creator>
    <dc:date>2010-11-10T18:40:13Z</dc:date>
    <item>
      <title>DNS-INSPECTION DROPS PACKETS</title>
      <link>https://community.cisco.com/t5/network-security/dns-inspection-drops-packets/m-p/1572093#M599388</link>
      <description>&lt;P&gt;Hi guys, I really appreciate somebody could help me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have an ASA 5520 Version 8.0(4) in my network with default inspection, suddenly many users where having RPC errors when they arrive to work and turn on their computers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The users told us that they had changed their DNS configs, so we call the system guy&amp;nbsp; in that site and told us that they have update their Active directory servers to a windows 2008 R2, so we troubleshoot a little and we found that when we remove dns_preset_dns_map, the error dissapear. Could &lt;BR /&gt;somebody have any idea about this???&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map IPS&lt;BR /&gt; match any&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt; class IPS&lt;BR /&gt;&amp;nbsp; ips inline fail-open&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is really a big problem because we have about 70 ASA with the same default inspection and there´s no problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If somebody could help, i would appreciate&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:03:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-inspection-drops-packets/m-p/1572093#M599388</guid>
      <dc:creator>Leonardo Fernando Monzon Luis</dc:creator>
      <dc:date>2019-03-11T19:03:43Z</dc:date>
    </item>
    <item>
      <title>Re: DNS-INSPECTION DROPS PACKETS</title>
      <link>https://community.cisco.com/t5/network-security/dns-inspection-drops-packets/m-p/1572094#M599389</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello!!!!!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think I know the issue, Can you ask your Server administrator if they are using secure DNS? This will make the packet larger than the one configure by default.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can increase the packet lenght&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# policy-map type inspect dns preset_dns_map&lt;BR /&gt;ciscoasa(config-pmap)#&amp;nbsp; parameters&lt;BR /&gt;ciscoasa(config-pmap-p)# message-length maximum &lt;VALUE&gt;&lt;/VALUE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In version 8.2 or later you can put it as auto, but for this version you will have to set it manually.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Nov 2010 19:09:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-inspection-drops-packets/m-p/1572094#M599389</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2010-11-02T19:09:44Z</dc:date>
    </item>
    <item>
      <title>Re: DNS-INSPECTION DROPS PACKETS</title>
      <link>https://community.cisco.com/t5/network-security/dns-inspection-drops-packets/m-p/1572095#M599390</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks for the reply, i would ask for this information, but i really don´t have any idea why just in one ASA this problem appears and in the rest of them seems to be ok, anyway i don´t want to dissmiss anything of this update you are advising me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think this is the update you have in mind.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;For enterprises operating Microsoft Server infrastructure, there are specific things needed in place before May 5&lt;SUP&gt;th&lt;/SUP&gt;.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Windows Server 2008 and Windows Server 2008 R2 will support the new&amp;nbsp; DNSSEC implementation, but only if it is implemented.&amp;nbsp; It is an optional&amp;nbsp; choice during installation (see Microsoft’s “&lt;A href="http://www.microsoft.com/downloads/details.aspx?FamilyID=7a005a14-f740-4689-8c43-9952b5c3d36f&amp;amp;displaylang=en"&gt;DNSSEC Deployment Guide&lt;/A&gt;,” published in October 2009).&lt;/P&gt;&lt;P&gt;There is only limited support for DNSSEC in Windows Server 2003 DNS.&amp;nbsp; Under the new DNSSEC, Windows 2003 can act as a &lt;EM&gt;secondary&lt;/EM&gt; DNS server for an existing DNSSEC compliant zone.&amp;nbsp; Windows Server 2003&amp;nbsp; will cache the new, larger records but not perform cryptography,&amp;nbsp; authentication, or verification.&amp;nbsp; Only Windows Server 2008&amp;nbsp; implementations with DNSSEC implemented will provide full DNSSEC&amp;nbsp; support. For more information refer to the following Microsoft items:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;“&lt;A href="http://technet.microsoft.com/en-us/library/cc728328%28WS.10%29.aspx"&gt;Using DNS Security Extensions (DNSSEC)&lt;/A&gt;”&lt;/LI&gt;&lt;LI&gt;“&lt;A href="http://technet.microsoft.com/en-us/library/cc755343%28WS.10%29.aspx"&gt;DNSSEC overview&lt;/A&gt;”&lt;/LI&gt;&lt;LI&gt;“&lt;A href="http://www.microsoft.com/downloads/details.aspx?FamilyID=7a005a14-f740-4689-8c43-9952b5c3d36f&amp;amp;displaylang=en"&gt;DNSSEC Deployment Guide&lt;/A&gt;”&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;There are other possible breakpoints for the DNSSEC response – namely&amp;nbsp; firewalls.&amp;nbsp; Older firewalls, and some newer ones, will drop UDP port 53&amp;nbsp; (DNS response) traffic larger than 512b by default.&amp;nbsp; For example, Cisco&amp;nbsp; PIX / ASA will not support DNSSEC through DNS inspection on versions&amp;nbsp; before 8.2.2.&amp;nbsp;&amp;nbsp; Therefore,&amp;nbsp; IT leaders will have to disable DNS&amp;nbsp; inspection (not recommended) or if possible, migrate to &lt;STRONG&gt;ASA 8.2.2 or higher&lt;/STRONG&gt;. SOHO routers may also be problematic if they proxy DNS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Nov 2010 19:29:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-inspection-drops-packets/m-p/1572095#M599390</guid>
      <dc:creator>Leonardo Fernando Monzon Luis</dc:creator>
      <dc:date>2010-11-02T19:29:01Z</dc:date>
    </item>
    <item>
      <title>Re: DNS-INSPECTION DROPS PACKETS</title>
      <link>https://community.cisco.com/t5/network-security/dns-inspection-drops-packets/m-p/1572096#M599391</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You got it!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Clients on inside networks with ASA version lower than 8.2.2 will have problems. ASA version 8.2.2 or higher have the DNS map as auto.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps and let me know the results.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Nov 2010 23:18:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-inspection-drops-packets/m-p/1572096#M599391</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2010-11-02T23:18:50Z</dc:date>
    </item>
    <item>
      <title>Re: DNS-INSPECTION DROPS PACKETS</title>
      <link>https://community.cisco.com/t5/network-security/dns-inspection-drops-packets/m-p/1572097#M599392</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, sorry for not answering this discussion earlier, we had upgraded to version 8.2(3) in our ASA, but the problem with the computers stills. We opened a TAC case and they are helping us.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I´ll update this discussion if we have some updates from cisco.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Nov 2010 17:16:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-inspection-drops-packets/m-p/1572097#M599392</guid>
      <dc:creator>Leonardo Fernando Monzon Luis</dc:creator>
      <dc:date>2010-11-10T17:16:06Z</dc:date>
    </item>
    <item>
      <title>Re: DNS-INSPECTION DROPS PACKETS</title>
      <link>https://community.cisco.com/t5/network-security/dns-inspection-drops-packets/m-p/1572098#M599393</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Luis,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can I have the service request number, Ill take a look at it with the engineer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Nov 2010 18:22:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-inspection-drops-packets/m-p/1572098#M599393</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2010-11-10T18:22:27Z</dc:date>
    </item>
    <item>
      <title>Re: DNS-INSPECTION DROPS PACKETS</title>
      <link>https://community.cisco.com/t5/network-security/dns-inspection-drops-packets/m-p/1572099#M599394</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The service request number is 615913549, we are seeing this issue with 'Abraham Hernandez (abhernan)'. He is helping us with this proyect.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Nov 2010 18:40:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-inspection-drops-packets/m-p/1572099#M599394</guid>
      <dc:creator>Leonardo Fernando Monzon Luis</dc:creator>
      <dc:date>2010-11-10T18:40:13Z</dc:date>
    </item>
    <item>
      <title>Re: DNS-INSPECTION DROPS PACKETS</title>
      <link>https://community.cisco.com/t5/network-security/dns-inspection-drops-packets/m-p/1572100#M599395</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;sorry for not replying earlier, Cisco TAC send us some commands to do some test with our computers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Tabla normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-qformat:yes;
	mso-style-parent:"";
	mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
	mso-para-margin:0cm;
	mso-para-margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-ascii-font-family:Calibri;
	mso-ascii-theme-font:minor-latin;
	mso-fareast-font-family:"Times New Roman";
	mso-fareast-theme-font:minor-fareast;
	mso-hansi-font-family:Calibri;
	mso-hansi-theme-font:minor-latin;
	mso-bidi-font-family:"Times New Roman";
	mso-bidi-theme-font:minor-bidi;}
&lt;/style&gt;
&lt;![endif]--&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="font-size: 10pt;"&gt;enable &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="font-size: 10pt;"&gt;config terminal&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;policy-map type inspect dns preset_dns_map&lt;/SPAN&gt;&lt;SPAN lang="EN-US"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;parameters&lt;/SPAN&gt;&lt;SPAN lang="EN-US"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp; message-length maximum 512&lt;/SPAN&gt;&lt;SPAN lang="EN-US"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp; no dns-guard&lt;/SPAN&gt;&lt;SPAN lang="EN-US"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp; no id-mismatch&lt;/SPAN&gt;&lt;SPAN lang="EN-US"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; no id-randomization&lt;/P&gt;&lt;P class="MsoPlainText" style="margin: 0cm 0cm 0.0001pt;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp; no protocol-enforcement&lt;/SPAN&gt;&lt;SPAN lang="EN-US"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoPlainText" style="margin: 0cm 0cm 0.0001pt;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp; end&lt;/SPAN&gt;&lt;SPAN lang="EN-US"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I will reply the results,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Dec 2010 17:39:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-inspection-drops-packets/m-p/1572100#M599395</guid>
      <dc:creator>Leonardo Fernando Monzon Luis</dc:creator>
      <dc:date>2010-12-01T17:39:38Z</dc:date>
    </item>
  </channel>
</rss>

