<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Disecting ACL that allows DNS name resolution in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/disecting-acl-that-allows-dns-name-resolution/m-p/1139672#M877415</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think I left out a detail... I have this on an IOS (router).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No ASA. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 27 Jan 2009 19:28:26 GMT</pubDate>
    <dc:creator>insccisco</dc:creator>
    <dc:date>2009-01-27T19:28:26Z</dc:date>
    <item>
      <title>Disecting ACL that allows DNS name resolution</title>
      <link>https://community.cisco.com/t5/network-security/disecting-acl-that-allows-dns-name-resolution/m-p/1139670#M877413</link>
      <description>&lt;P&gt;Can you guys please help me understand why the line&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;permit udp any eq domain host 65.65.65.44&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;which is part of the ACL applied to the outside interface in the IN direction allows my internal users to properly browse the internet sites by name?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I dont have this statement, my internal users can't resolve anything by name. We use public DNS servers in our PC's tcp/ip settings like 4.2.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm confused because everything outbound is allowed in my network and I know that when we browse to a site, for example google.com, the internal host places a DNS query to its DNS server, in this case 4.2.2.2 which is a public DNS server. So, the internal host sends out this query to port 53 to the public DNS, and because it is an outbound traffic, it is allowed and thus should not be asking for that statement to work... this is why Im confused. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, as far as I understand, returned traffic for a connection that originated o nthe inside is also allowed by this statement&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;permit tcp any any established&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is why I even get more confused but there must be something I am missing with regards to DNS resolution.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help or links that can help me understand this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks in advance&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 14:40:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disecting-acl-that-allows-dns-name-resolution/m-p/1139670#M877413</guid>
      <dc:creator>insccisco</dc:creator>
      <dc:date>2019-03-11T14:40:06Z</dc:date>
    </item>
    <item>
      <title>Re: Disecting ACL that allows DNS name resolution</title>
      <link>https://community.cisco.com/t5/network-security/disecting-acl-that-allows-dns-name-resolution/m-p/1139671#M877414</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Sir,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, the ASA is a stateful device for traffic that is originated from the trusted network, to the untrusted network.&lt;/P&gt;&lt;P&gt;The ASA perform inspection of this traffic to permit the return traffic to come back in(reflexive ACL).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please try the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect dns&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this does not works, please send me the log message that you are getting.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Jan 2009 20:58:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disecting-acl-that-allows-dns-name-resolution/m-p/1139671#M877414</guid>
      <dc:creator>torchris</dc:creator>
      <dc:date>2009-01-26T20:58:08Z</dc:date>
    </item>
    <item>
      <title>Re: Disecting ACL that allows DNS name resolution</title>
      <link>https://community.cisco.com/t5/network-security/disecting-acl-that-allows-dns-name-resolution/m-p/1139672#M877415</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think I left out a detail... I have this on an IOS (router).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No ASA. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Jan 2009 19:28:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disecting-acl-that-allows-dns-name-resolution/m-p/1139672#M877415</guid>
      <dc:creator>insccisco</dc:creator>
      <dc:date>2009-01-27T19:28:26Z</dc:date>
    </item>
  </channel>
</rss>

