<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DNS Doctoring in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dns-doctoring/m-p/1442738#M637828</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes. Here is a sample. Have you enabled dns inspection and does the dns traffic go through this ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="1"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TH&gt;Before&lt;/TH&gt;&lt;TH&gt;ASA 8.3&lt;BR /&gt;&lt;/TH&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;STRONG&gt; DNS rewrite &lt;/STRONG&gt;&lt;P&gt;static (inside,outside) 172.20.1.10 192.168.100.10 netmask 255.255.255.255 dns&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;PRE&gt; object network obj-192.168.100.10&lt;BR /&gt;&amp;nbsp;&amp;nbsp; host 192.168.100.10&lt;BR /&gt;&amp;nbsp;&amp;nbsp; nat (inside,outside) static 172.20.1.10 dns&lt;BR /&gt;&lt;/PRE&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 09 Aug 2010 15:22:48 GMT</pubDate>
    <dc:creator>Kureli Sankar</dc:creator>
    <dc:date>2010-08-09T15:22:48Z</dc:date>
    <item>
      <title>DNS Doctoring</title>
      <link>https://community.cisco.com/t5/network-security/dns-doctoring/m-p/1442737#M637827</link>
      <description>&lt;P&gt;Does anyone know if DNS doctoring is supported in the newer 8.3 code?&amp;nbsp; It looks like you can append the dns keyword to a nat translation and if you inpsect DNS the ASA will "un-nat" the connection, according to some of the 8.3 cli documentation I've read, but it doesn't work for me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static COMM-USWEB_192.168.10.18 COMM-USWEB_21.21.24.24 dns&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bill&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:22:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-doctoring/m-p/1442737#M637827</guid>
      <dc:creator>WILLIAM STEGMAN</dc:creator>
      <dc:date>2019-03-11T18:22:44Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Doctoring</title>
      <link>https://community.cisco.com/t5/network-security/dns-doctoring/m-p/1442738#M637828</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes. Here is a sample. Have you enabled dns inspection and does the dns traffic go through this ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="1"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TH&gt;Before&lt;/TH&gt;&lt;TH&gt;ASA 8.3&lt;BR /&gt;&lt;/TH&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;STRONG&gt; DNS rewrite &lt;/STRONG&gt;&lt;P&gt;static (inside,outside) 172.20.1.10 192.168.100.10 netmask 255.255.255.255 dns&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;PRE&gt; object network obj-192.168.100.10&lt;BR /&gt;&amp;nbsp;&amp;nbsp; host 192.168.100.10&lt;BR /&gt;&amp;nbsp;&amp;nbsp; nat (inside,outside) static 172.20.1.10 dns&lt;BR /&gt;&lt;/PRE&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Aug 2010 15:22:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-doctoring/m-p/1442738#M637828</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-08-09T15:22:48Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Doctoring</title>
      <link>https://community.cisco.com/t5/network-security/dns-doctoring/m-p/1442739#M637829</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have DNS inspection occurring at the global policy, and the traffic should be running across the ASA.&amp;nbsp; I changed the dns keyword to include it in object nat, but no change.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network COMM-USWEB_192.168.10.18&lt;BR /&gt; nat (inside,outside) static 21.21.24.24 dns&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network COMM-USAIGWEB_192.168.10.18 &lt;BR /&gt; host 192.168.10.18&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Aug 2010 15:43:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-doctoring/m-p/1442739#M637829</guid>
      <dc:creator>WILLIAM STEGMAN</dc:creator>
      <dc:date>2010-08-09T15:43:33Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Doctoring</title>
      <link>https://community.cisco.com/t5/network-security/dns-doctoring/m-p/1442740#M637830</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Make sure the dns traffic is going through this ASA.&lt;/P&gt;&lt;P&gt;cap capin int inside match udp ho 192.168.10.18 any eq 53&lt;/P&gt;&lt;P&gt;cap capout interface outside match udp ho 21.21.24.24 any eq 53&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh cap capin&lt;/P&gt;&lt;P&gt;sh cap capout&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Aug 2010 16:44:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-doctoring/m-p/1442740#M637830</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-08-09T16:44:13Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Doctoring</title>
      <link>https://community.cisco.com/t5/network-security/dns-doctoring/m-p/1442741#M637831</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;it looks like the traffic is not crossing the asa.&amp;nbsp; I don't understand that though.&amp;nbsp; I have clients on the inside trying to access a web server that sits on the inside as well, but has no internal DNS entry.&amp;nbsp; So those clients use the internal DNS server, which forwards the request to the Internet and gives the public IP, but of course that's the traffic that is being denied by the ASA and is what DNS doctoring is supposed to fix.&amp;nbsp; Why wouldn't the DNS traffic be crossing the ASA?&amp;nbsp; My access list on the inside interface allows both tcp and udp dns.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Aug 2010 17:22:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-doctoring/m-p/1442741#M637831</guid>
      <dc:creator>WILLIAM STEGMAN</dc:creator>
      <dc:date>2010-08-09T17:22:24Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Doctoring</title>
      <link>https://community.cisco.com/t5/network-security/dns-doctoring/m-p/1442742#M637832</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I found the acl that was blocking it, on a router between the host and firewall, made a change and it's working now.&amp;nbsp; Thank you very much.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Aug 2010 17:38:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-doctoring/m-p/1442742#M637832</guid>
      <dc:creator>WILLIAM STEGMAN</dc:creator>
      <dc:date>2010-08-09T17:38:19Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Doctoring</title>
      <link>https://community.cisco.com/t5/network-security/dns-doctoring/m-p/1442743#M637834</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Very glad to hear.&amp;nbsp; Capture for the win - yet again !&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I shoud have given capture syntax for all other dns resoltuion. My bad.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cap capin int inside match udp any any eq 53&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cap capout int outside match udp any any eq 53&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh cap capin&lt;/P&gt;&lt;P&gt;sh cap capout&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Aug 2010 17:57:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dns-doctoring/m-p/1442743#M637834</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-08-09T17:57:37Z</dc:date>
    </item>
  </channel>
</rss>

