<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DMZ server access from inside using (public) DNS name in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dmz-server-access-from-inside-using-public-dns-name/m-p/1505239#M608338</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Denis,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for the reply. I went thru the DNS doctoring doc and 2 (simple) questions;-).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. The example in the doc stating : In this case, the client at 192.168.100.2 wants to use the &lt;STRONG&gt;server.example.com&lt;/STRONG&gt; URL to access the WWW server at 10.10.10.10. DNS services for the client are provided by the external DNS server at 172.22.1.161.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In my case the public DNS record for the server (ctrix.test.com) hosted by outside DNS, but the internal client DNS is our interal DNS (with pvt IP) and that DNS resolves to public IPs. In this case DNS doctoring works as well?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. I do not see the DNS inspection enabled at this time (ASA 5510 -7.2(4)) or not seeing any command applied which disabled the DNS. what would be the effect in enabling the DNS inspection- with the same procedure listed in the doc. The config has setting the 'message-length max 512'. It may be default value, but just wanted to check the config does not cause any issues.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TIA&lt;/P&gt;&lt;P&gt;MS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 23 Nov 2010 19:08:44 GMT</pubDate>
    <dc:creator>mvsheik123</dc:creator>
    <dc:date>2010-11-23T19:08:44Z</dc:date>
    <item>
      <title>DMZ server access from inside using (public) DNS name</title>
      <link>https://community.cisco.com/t5/network-security/dmz-server-access-from-inside-using-public-dns-name/m-p/1505234#M608333</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Citrix server is in DMZ (off of ASA) and its pvt ip being translated to public IP for external user connectivity . Everything works from outside (ex: http/s:haccess.xyz.com, ping to haccess.xyz.com etc) . Now, the internal user residing behind ASA and Nat'd thru ASA to hit internet also wants to access the server from internal PC using the DNS name: http/s:haccess.xyz.com. The DNS converts the http/s:haccess.xyz.com to public IP (70.34.20.X) and sending to internet when request initiate from Internal user. Using Private Ip to access the DMZ server from internal subnets works.How can I make this to work from internal as well without posing any security risk.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TIA&lt;/P&gt;&lt;P&gt;MS&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:59:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-server-access-from-inside-using-public-dns-name/m-p/1505234#M608333</guid>
      <dc:creator>mvsheik123</dc:creator>
      <dc:date>2019-03-11T18:59:28Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ server access from inside using (public) DNS name</title>
      <link>https://community.cisco.com/t5/network-security/dmz-server-access-from-inside-using-public-dns-name/m-p/1505235#M608334</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am having the same issues, see the information in my post it may assist or maybe we will get an answer later..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 24 Oct 2010 15:51:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-server-access-from-inside-using-public-dns-name/m-p/1505235#M608334</guid>
      <dc:creator>pskipton01</dc:creator>
      <dc:date>2010-10-24T15:51:50Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ server access from inside using (public) DNS name</title>
      <link>https://community.cisco.com/t5/network-security/dmz-server-access-from-inside-using-public-dns-name/m-p/1505236#M608335</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you can use dns doctoring&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 70.34.20.X y.y.y.y netmask 255.255.255.255 dns&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;full description&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00807968c8.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00807968c8.shtml&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 24 Oct 2010 19:09:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-server-access-from-inside-using-public-dns-name/m-p/1505236#M608335</guid>
      <dc:creator>Denis Spichkin</dc:creator>
      <dc:date>2010-10-24T19:09:53Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ server access from inside using (public) DNS name</title>
      <link>https://community.cisco.com/t5/network-security/dmz-server-access-from-inside-using-public-dns-name/m-p/1505237#M608336</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That works fine with prior to 8.3 or even further back but what would be required for 8.&lt;/P&gt;&lt;P&gt;3(1)???&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 24 Oct 2010 20:51:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-server-access-from-inside-using-public-dns-name/m-p/1505237#M608336</guid>
      <dc:creator>pskipton01</dc:creator>
      <dc:date>2010-10-24T20:51:07Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ server access from inside using (public) DNS name</title>
      <link>https://community.cisco.com/t5/network-security/dmz-server-access-from-inside-using-public-dns-name/m-p/1505238#M608337</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Perry,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Take a look at the post, we answered your Question already, if you have any doubts please feel free to post them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Oct 2010 05:13:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-server-access-from-inside-using-public-dns-name/m-p/1505238#M608337</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2010-10-25T05:13:31Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ server access from inside using (public) DNS name</title>
      <link>https://community.cisco.com/t5/network-security/dmz-server-access-from-inside-using-public-dns-name/m-p/1505239#M608338</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Denis,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for the reply. I went thru the DNS doctoring doc and 2 (simple) questions;-).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. The example in the doc stating : In this case, the client at 192.168.100.2 wants to use the &lt;STRONG&gt;server.example.com&lt;/STRONG&gt; URL to access the WWW server at 10.10.10.10. DNS services for the client are provided by the external DNS server at 172.22.1.161.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In my case the public DNS record for the server (ctrix.test.com) hosted by outside DNS, but the internal client DNS is our interal DNS (with pvt IP) and that DNS resolves to public IPs. In this case DNS doctoring works as well?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. I do not see the DNS inspection enabled at this time (ASA 5510 -7.2(4)) or not seeing any command applied which disabled the DNS. what would be the effect in enabling the DNS inspection- with the same procedure listed in the doc. The config has setting the 'message-length max 512'. It may be default value, but just wanted to check the config does not cause any issues.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TIA&lt;/P&gt;&lt;P&gt;MS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Nov 2010 19:08:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-server-access-from-inside-using-public-dns-name/m-p/1505239#M608338</guid>
      <dc:creator>mvsheik123</dc:creator>
      <dc:date>2010-11-23T19:08:44Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ server access from inside using (public) DNS name</title>
      <link>https://community.cisco.com/t5/network-security/dmz-server-access-from-inside-using-public-dns-name/m-p/1505240#M608339</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the static that you have for your server (DMZ, outside) instead of outside use Inside. The static statement would be the same. The example shown at the top of the service request was thought based on a DNS located on the outside world. In your case the DNS server is on the inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please add the same static that you have for the outside but instead of outside put the word Inside. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Nov 2010 19:32:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-server-access-from-inside-using-public-dns-name/m-p/1505240#M608339</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2010-11-23T19:32:11Z</dc:date>
    </item>
  </channel>
</rss>

