<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ACL for DNS Service in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/acl-for-dns-service/m-p/1553135#M610357</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have both of them already working like that.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PS: What did you use to buid your site? I liked the organization like folders.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 03 Oct 2010 04:44:33 GMT</pubDate>
    <dc:creator>argnetworking</dc:creator>
    <dc:date>2010-10-03T04:44:33Z</dc:date>
    <item>
      <title>ACL for DNS Service</title>
      <link>https://community.cisco.com/t5/network-security/acl-for-dns-service/m-p/1553125#M610333</link>
      <description>&lt;P&gt;&lt;/P&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-parent:"";
	mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
	mso-para-margin:0cm;
	mso-para-margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:10.0pt;
	font-family:"Times New Roman";
	mso-ansi-language:#0400;
	mso-fareast-language:#0400;
	mso-bidi-language:#0400;}
&lt;/style&gt;
&lt;![endif]--&gt;&lt;P&gt;&lt;SPAN lang="EN-US"&gt;Hello, I would like to know what is the recommended ACL to configure in a router, to give a public DNS service. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN-US"&gt;I know the basic, permit eq domain, deny special use IP address (10.0.0.0/8, 192.168.0.0/16, ...), block everything else....&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN-US"&gt;Do I need to open upper ports?, any ACL with established?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN-US"&gt;I would like suggestions to configure a solid ACL. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN-US"&gt;Thanks, &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN-US"&gt;Gonzalo&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:46:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-for-dns-service/m-p/1553125#M610333</guid>
      <dc:creator>argnetworking</dc:creator>
      <dc:date>2019-03-11T18:46:50Z</dc:date>
    </item>
    <item>
      <title>Re: ACL for DNS Service</title>
      <link>https://community.cisco.com/t5/network-security/acl-for-dns-service/m-p/1553126#M610334</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you mean allowing the internal network to contact an external DNS server?&lt;/P&gt;&lt;P&gt;If so, just need to open UDP domain on the ACL applied to the inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i.e&lt;/P&gt;&lt;P&gt;Internal network 10.1.1.0/24&lt;/P&gt;&lt;P&gt;External DNS 4.2.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list INSIDE permit udp 10.1.1.0/24 host 4.2.2.2 eq 53&lt;/P&gt;&lt;P&gt;access-group INSIDE in interface INSIDE&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above ACL will only allow outbound DNS requests to port 53 on UDP to 4.2.2.2 from the internal LAN.&lt;/P&gt;&lt;P&gt;Remember that every other outbound traffic that needs to get out should be permitted on that ACL as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Sep 2010 21:04:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-for-dns-service/m-p/1553126#M610334</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-09-28T21:04:00Z</dc:date>
    </item>
    <item>
      <title>Re: ACL for DNS Service</title>
      <link>https://community.cisco.com/t5/network-security/acl-for-dns-service/m-p/1553127#M610335</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;no, I have to allow external users to get to the DNS (public DNS) behind a cisco router.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Sep 2010 21:38:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-for-dns-service/m-p/1553127#M610335</guid>
      <dc:creator>argnetworking</dc:creator>
      <dc:date>2010-09-28T21:38:08Z</dc:date>
    </item>
    <item>
      <title>Re: ACL for DNS Service</title>
      <link>https://community.cisco.com/t5/network-security/acl-for-dns-service/m-p/1553128#M610336</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To allow external users to access an internal DNS, you do something like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended OUTSIDE&lt;/P&gt;&lt;P&gt;&amp;nbsp; permit udp any host x.x.x.x eq 53&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface fasx/x&lt;/P&gt;&lt;P&gt;&amp;nbsp; ip access-group OUTSIDE in&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above ACL only permits inbound DNS traffic on port 53 to host x.x.x.x (which is going to be the public IP assigned to the DNS server).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now,&lt;/P&gt;&lt;P&gt;Referring to the ACL, you should specify all other traffic that should be permitted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Normally what you do on an IOS router is to configure some sort of stateful behavior (like an ASA), to avoid having to open all ports in that ACL.&lt;/P&gt;&lt;P&gt;Easiest way is to use CBAC to permit the return traffic of the outside connections (and you only worry about permitting traffic that it's initiated from the outside world coming in).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Recommended way is Zone-Based Firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Sep 2010 21:50:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-for-dns-service/m-p/1553128#M610336</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-09-28T21:50:15Z</dc:date>
    </item>
    <item>
      <title>Re: ACL for DNS Service</title>
      <link>https://community.cisco.com/t5/network-security/acl-for-dns-service/m-p/1553129#M610337</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-parent:"";
	mso-padding-alt:0in 5.4pt 0in 5.4pt;
	mso-para-margin:0in;
	mso-para-margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:10.0pt;
	font-family:"Times New Roman";
	mso-ansi-language:#0400;
	mso-fareast-language:#0400;
	mso-bidi-language:#0400;}
&lt;/style&gt;
&lt;![endif]--&gt;&lt;P&gt;Federico,&lt;/P&gt;&lt;P&gt;Thanks for the replay, I have a working ACL but is too open. I would like to do it again and that is why I’m asking for recommendations. I inherited the configuration and I’m trying to do it the right way.&lt;/P&gt;&lt;P&gt;I can not apply any sort of stateful firewall because it is a DNS that has a lot of hits , and the CPU goes to the roof. So, my intention is to open only the necessary ports on the ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Gonzalo&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Sep 2010 02:31:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-for-dns-service/m-p/1553129#M610337</guid>
      <dc:creator>argnetworking</dc:creator>
      <dc:date>2010-09-29T02:31:55Z</dc:date>
    </item>
    <item>
      <title>Re: ACL for DNS Service</title>
      <link>https://community.cisco.com/t5/network-security/acl-for-dns-service/m-p/1553130#M610340</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Check this link for the most current public facing ACL we use. It matches the DISA standard so it should be pretty secure. You will have to tweak a couple of things like allowing BGP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.packetpros.com/cisco_kb/DIACAP_ACL.html"&gt;http://www.packetpros.com/cisco_kb/DIACAP_ACL.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Sep 2010 14:23:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-for-dns-service/m-p/1553130#M610340</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2010-09-29T14:23:57Z</dc:date>
    </item>
    <item>
      <title>Re: ACL for DNS Service</title>
      <link>https://community.cisco.com/t5/network-security/acl-for-dns-service/m-p/1553131#M610342</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-parent:"";
	mso-padding-alt:0in 5.4pt 0in 5.4pt;
	mso-para-margin:0in;
	mso-para-margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:10.0pt;
	font-family:"Times New Roman";
	mso-ansi-language:#0400;
	mso-fareast-language:#0400;
	mso-bidi-language:#0400;}
&lt;/style&gt;
&lt;![endif]--&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;Collin, thanks a lot, it is great, that it is exactly one of the parts I was looking for. Now I only need to know if there are any other recommendations on specific ACLs for DNS service.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;Gonzalo&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Sep 2010 21:30:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-for-dns-service/m-p/1553131#M610342</guid>
      <dc:creator>argnetworking</dc:creator>
      <dc:date>2010-09-29T21:30:58Z</dc:date>
    </item>
    <item>
      <title>Re: ACL for DNS Service</title>
      <link>https://community.cisco.com/t5/network-security/acl-for-dns-service/m-p/1553132#M610346</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you doing any DNS transfers or are they simply look ups?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Sep 2010 13:37:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-for-dns-service/m-p/1553132#M610346</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2010-09-30T13:37:39Z</dc:date>
    </item>
    <item>
      <title>Re: ACL for DNS Service</title>
      <link>https://community.cisco.com/t5/network-security/acl-for-dns-service/m-p/1553133#M610350</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Both, transfers and look ups?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Sep 2010 14:09:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-for-dns-service/m-p/1553133#M610350</guid>
      <dc:creator>argnetworking</dc:creator>
      <dc:date>2010-09-30T14:09:50Z</dc:date>
    </item>
    <item>
      <title>Re: ACL for DNS Service</title>
      <link>https://community.cisco.com/t5/network-security/acl-for-dns-service/m-p/1553134#M610353</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For transfers from another DNS server to yours (make sure this is correct, can be very dangerous) -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; permit tcp host [remote dns server] host [your dns servers public IP] eq 53&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For external people querying your DNS servers for dns lookups -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-family: courier new,courier;"&gt;permit udp any host [your dns server public IP] eq 53&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Sep 2010 14:22:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-for-dns-service/m-p/1553134#M610353</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2010-09-30T14:22:15Z</dc:date>
    </item>
    <item>
      <title>Re: ACL for DNS Service</title>
      <link>https://community.cisco.com/t5/network-security/acl-for-dns-service/m-p/1553135#M610357</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have both of them already working like that.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PS: What did you use to buid your site? I liked the organization like folders.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 03 Oct 2010 04:44:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-for-dns-service/m-p/1553135#M610357</guid>
      <dc:creator>argnetworking</dc:creator>
      <dc:date>2010-10-03T04:44:33Z</dc:date>
    </item>
    <item>
      <title>Re: ACL for DNS Service</title>
      <link>https://community.cisco.com/t5/network-security/acl-for-dns-service/m-p/1553136#M610358</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It's call Tigra Tree Menu-&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.softcomplex.com/products/tigra_tree_menu/"&gt;http://www.softcomplex.com/products/tigra_tree_menu/&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Oct 2010 13:21:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-for-dns-service/m-p/1553136#M610358</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2010-10-05T13:21:55Z</dc:date>
    </item>
    <item>
      <title>Re: ACL for DNS Service</title>
      <link>https://community.cisco.com/t5/network-security/acl-for-dns-service/m-p/4731132#M1095571</link>
      <description>&lt;P&gt;hello i have similar Q, i need all users/PC int the net int diffrent site and vlans have access only&amp;nbsp; to the internal DNS server&lt;/P&gt;&lt;P&gt;i have 3 routers one main&amp;nbsp; the other 2 connect&amp;nbsp; to the main router.&lt;/P&gt;&lt;P&gt;what i need to do?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Dec 2022 18:13:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-for-dns-service/m-p/4731132#M1095571</guid>
      <dc:creator>RoeeM</dc:creator>
      <dc:date>2022-12-01T18:13:55Z</dc:date>
    </item>
  </channel>
</rss>

