<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DNS Doctoring in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dns-doctoring/m-p/1653915#M604332</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;when the host 10.10.1.10 want to go on inside it will translates to&amp;nbsp; 82.178.25.133 and it will route according to the destination in the&amp;nbsp; routing table,&amp;nbsp; But this IP (82.178.25.133) is not know by the inside&amp;nbsp; host so when the inside host&amp;nbsp; replies back it will reply according to&amp;nbsp; its default gateway that &lt;STRONG style="color: #ff0000;"&gt;must&lt;/STRONG&gt; be firewall if it is a different deafult gateway than communication will not be established.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="min-height: 8pt; height: 8pt; padding: 0px;"&gt;&amp;lt;&amp;lt;&amp;lt; this is correct. Inside host must send the reply to 82.178.25.133 to the inside interface of this ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And&amp;nbsp; In the same way when the users come from inside with IP 10.10.3.12 to&amp;nbsp; reach 10.10.1.10, firewall will translates to 82.178.25.133 and it will&amp;nbsp; send to DMZ interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;lt;&amp;lt;&amp;lt;&amp;lt; No, if the inside host use 10.10.1.10 as destination IP, it won't be translated by "static (DMZ,Inside) 82.178.25.133 10.10.1.10 netmask 255.255.255.255", that's why I asked what destination IP you were using and you could try to use 82.178.25.133 if not using it.&lt;/P&gt;&lt;P&gt;If the inside host use 82.178.25.133 as the destination, it will be translated to 10.10.1.10 and sent to DMZ.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 01 Mar 2011 21:35:03 GMT</pubDate>
    <dc:creator>Yudong Wu</dc:creator>
    <dc:date>2011-03-01T21:35:03Z</dc:date>
    <item>
      <title>DNS Doctoring</title>
      <link>https://community.cisco.com/t5/network-security/dns-doctoring/m-p/1653908#M604325</link>
      <description>&lt;P&gt;Hello Friends,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a Web Server in DMZ on my ASA,Internal users were not able to access the web server by hostname so i went through the link below to configure DNS Doctoring.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00807968c8.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00807968c8.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When i configured DNS keyword in Static Nat statement for Web Server it was not working&amp;nbsp; BUT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When i configured&amp;nbsp; Destination NAT as per the alternate solution given in the link it worked fine for me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now the issue is i m not able to do the remote desktop to my web server from inside, in the logs it show me&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"portmap translation creation failed for tcp src inside:10.10.3.12/58945 dst DMZ:10.10.1.10/80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Internal users who&amp;nbsp; wants to access the DMZ,, for them i have configured the below static statement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,DMZ) 10.10.35.0 10.10.35.0 netmask 255.255.255.192.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Still in the logs i m getting the above error.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please suggest where i m going wrong.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:59:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-doctoring/m-p/1653908#M604325</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2019-03-11T19:59:10Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Doctoring</title>
      <link>https://community.cisco.com/t5/network-security/dns-doctoring/m-p/1653909#M604326</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;can you post all nat configuration here?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The following error tells that ASA could not create NAT for inside IP 10.10.3.12 to DMZ 10.10.1.10,&lt;/P&gt;&lt;P&gt;portmap translation creation failed for tcp src inside:10.10.3.12/58945 dst DMZ:10.10.1.10/80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have related NAT config to translate source IP 10.10.3.12 when it access DMZ network?&lt;/P&gt;&lt;P&gt;"static (inside,DMZ) 10.10.35.0 10.10.35.0 netmask 255.255.255.192" is translating source net 10.10.35.0 to itself but it won't do anything for 10.10.3.12.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Mar 2011 17:32:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-doctoring/m-p/1653909#M604326</guid>
      <dc:creator>Yudong Wu</dc:creator>
      <dc:date>2011-03-01T17:32:50Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Doctoring</title>
      <link>https://community.cisco.com/t5/network-security/dns-doctoring/m-p/1653910#M604327</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did a mistake in writing it is&amp;nbsp; static (inside,DMZ) 10.10.3.0 10.10.3.0 netmask 255.255.255.192.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (DMZ,outside) 82.178.25.133 10.10.1.10 netmask 255.255.255.255 dns&amp;nbsp;&amp;nbsp; &amp;lt;-------------&amp;nbsp; It did'nt worked by this statement&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (DMZ,Inside) 82.178.25.133 10.10.1.10 netmask 255.255.255.255&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;-------------&amp;nbsp; It&amp;nbsp; worked by this statement&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now the issue is users from this subnet 10.10.3.0 try to access DMZ Web server through remote desktop they are not able to access they get portmap translation creation failed for tcp src inside:10.10.3.12/58945 dst DMZ:10.10.1.10/80 though i have a static statement,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One very interesting when i remove the destination NAT command static (DMZ,Inside) 82.178.25.133 10.10.1.10 netmask 255.255.255.255 ,users are able to access remote desktop to Web server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Mar 2011 19:00:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-doctoring/m-p/1653910#M604327</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2011-03-01T19:00:45Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Doctoring</title>
      <link>https://community.cisco.com/t5/network-security/dns-doctoring/m-p/1653911#M604328</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is my thought. Since I don't have your full NAT configuration here, it might not be accurate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. regarding "static (DMZ,outside) 82.178.25.133 10.10.1.10 netmask 255.255.255.255 dns" not working&lt;/P&gt;&lt;P&gt;- did you try "clear xlate" after you made the above change?&lt;/P&gt;&lt;P&gt;- If you could post your full NAT configuration, I would like to see if there is any NAT configuration that can bypass the this static NAT rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. static (DMZ,Inside) 82.178.25.133 10.10.1.10 netmask 255.255.255.255 works but break remote desktop access.&lt;/P&gt;&lt;P&gt;- Do your remote desktop session use 82.178.25.133 to access webserver? if not, can you try that?&lt;/P&gt;&lt;P&gt;- You might add the following nat bypass to see if it works.&lt;/P&gt;&lt;P&gt;access-list nonat-to-dmz permit ip 10.10.3.0 255.255.255.192 host 10.10.1.10&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat-to-dmz&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Mar 2011 19:33:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-doctoring/m-p/1653911#M604328</guid>
      <dc:creator>Yudong Wu</dc:creator>
      <dc:date>2011-03-01T19:33:16Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Doctoring</title>
      <link>https://community.cisco.com/t5/network-security/dns-doctoring/m-p/1653912#M604329</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Yudong,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is no BIg static list for Nat statements only these 3 of them,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;. regarding "static (DMZ,outside) 82.178.25.133 10.10.1.10 netmask 255.255.255.255 dns" not working&lt;/P&gt;&lt;P&gt;- did you try "clear xlate" after you made the above change? &lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;YES I DID&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- If you could post your full NAT configuration, I would like to see if&amp;nbsp; there is any NAT configuration that can bypass the this static NAT rule.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;HOW ????&lt;/SPAN&gt; pls suggest&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Do your remote desktop session use 82.178.25.133 to access webserver? if not, can you try that?&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;I did'nt tried,I will let u know tomorrow.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- You might add the following nat bypass to see if it works.&lt;/P&gt;&lt;P&gt;access-list nonat-to-dmz permit ip 10.10.3.0 255.255.255.192 host 10.10.1.10&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat-to-dmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;I thought about this but i want it make it work without nat0&lt;/SPAN&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (DMZ,Inside) 82.178.25.133 10.10.1.10 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;Can u explain me this static natting statement,????&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Mar 2011 19:54:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-doctoring/m-p/1653912#M604329</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2011-03-01T19:54:32Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Doctoring</title>
      <link>https://community.cisco.com/t5/network-security/dns-doctoring/m-p/1653913#M604330</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;- If you could post your full NAT configuration, I would like to see&amp;nbsp; if&amp;nbsp; there is any NAT configuration that can bypass the this static NAT&amp;nbsp; rule.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;HOW ????&lt;/SPAN&gt; pls suggest&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt;&amp;gt; I just wonder if you have any policy static NAT or nat 0 configuration which might bypass this dns static nat entry. I am just curious about why it won't work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (DMZ,Inside) 82.178.25.133 10.10.1.10 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;Can u explain me this static natting statement,????&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt;&amp;gt; the above nat will tranlsate the destination IP from 82.178.25.133 to 10.10.1.10 when user in inside network try to reach 82.178.25.133. In the direction from DMZ to inside, it will NAT source IP 10.10.1.10 to 82.178.25.133 as well.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Mar 2011 20:28:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-doctoring/m-p/1653913#M604330</guid>
      <dc:creator>Yudong Wu</dc:creator>
      <dc:date>2011-03-01T20:28:17Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Doctoring</title>
      <link>https://community.cisco.com/t5/network-security/dns-doctoring/m-p/1653914#M604331</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just wonder if you have any policy static NAT or nat 0 configuration&amp;nbsp; which might bypass this dns static nat entry. I am just curious about&amp;nbsp; why it won't work.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;Believe me there is no such policy statement only just simple statement going from inside to dmz i.e&amp;nbsp; identity NAT 10.10.3.0 10.10.3.0 netmask 255.255.255.255&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;and DMZ to outside&amp;nbsp; static statement for Web server&lt;/SPAN&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;static (Inside,outside) 82.178.25.133 10.10.1.10 netmask 255.255.255.255&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above statement translates the host from inside 10.10.1.10 to 82.178.25.133 when it goes to internet when the whole world knows.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And the same when any request comes to 82.178.25.133 from internet it will hit firewall and firewall will translate to this private 10.10.1.10 IP.which firewall knows according to route specified in the route table.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But in the below secnario&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (DMZ,Inside) 82.178.25.133 10.10.1.10 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;when the host 10.10.1.10 want to go on inside it will translates to 82.178.25.133 and it will route according to the destination in the routing table,&amp;nbsp; But this IP (82.178.25.133) is not know by the inside host so when the inside host&amp;nbsp; replies back it will reply according to its default gateway that &lt;STRONG style="color: #ff0000; "&gt;must&lt;/STRONG&gt; be firewall if it is a different deafult gateway than communication will not be established.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And In the same way when the users come from inside with IP 10.10.3.12 to reach 10.10.1.10, firewall will translates to 82.178.25.133 and it will send to DMZ interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Correct me if i m wrong ???&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Mar 2011 21:10:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-doctoring/m-p/1653914#M604331</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2011-03-01T21:10:06Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Doctoring</title>
      <link>https://community.cisco.com/t5/network-security/dns-doctoring/m-p/1653915#M604332</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;when the host 10.10.1.10 want to go on inside it will translates to&amp;nbsp; 82.178.25.133 and it will route according to the destination in the&amp;nbsp; routing table,&amp;nbsp; But this IP (82.178.25.133) is not know by the inside&amp;nbsp; host so when the inside host&amp;nbsp; replies back it will reply according to&amp;nbsp; its default gateway that &lt;STRONG style="color: #ff0000;"&gt;must&lt;/STRONG&gt; be firewall if it is a different deafult gateway than communication will not be established.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="min-height: 8pt; height: 8pt; padding: 0px;"&gt;&amp;lt;&amp;lt;&amp;lt; this is correct. Inside host must send the reply to 82.178.25.133 to the inside interface of this ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And&amp;nbsp; In the same way when the users come from inside with IP 10.10.3.12 to&amp;nbsp; reach 10.10.1.10, firewall will translates to 82.178.25.133 and it will&amp;nbsp; send to DMZ interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;lt;&amp;lt;&amp;lt;&amp;lt; No, if the inside host use 10.10.1.10 as destination IP, it won't be translated by "static (DMZ,Inside) 82.178.25.133 10.10.1.10 netmask 255.255.255.255", that's why I asked what destination IP you were using and you could try to use 82.178.25.133 if not using it.&lt;/P&gt;&lt;P&gt;If the inside host use 82.178.25.133 as the destination, it will be translated to 10.10.1.10 and sent to DMZ.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Mar 2011 21:35:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-doctoring/m-p/1653915#M604332</guid>
      <dc:creator>Yudong Wu</dc:creator>
      <dc:date>2011-03-01T21:35:03Z</dc:date>
    </item>
  </channel>
</rss>

