12-14-2016 12:59 PM - edited 03-12-2019 01:39 AM
I'm trying to figure out what I need to allow through to get our servers in the DMZ to talk to the DNS Server. Here is the config for my DMZ ACL:
access-list DMZ-In extended permit ip object 10.104.1.0 object DC1
access-list DMZ-In extended permit icmp any any
access-list DMZ-In extended deny ip any 10.104.0.0 255.255.0.0
access-list DMZ-In extended permit ip any any
I've got it set right now to allow all traffic from the 10.104.1.0 network to DC1, and of course DNS will resolve. But I would like to tighten that so no one could use that server to pivot into the rest of our network. The commands I thought would do the trick were:
access-list DMZ-In extended permit udp object 10.104.1.0 eq domain object DC1 eq domain
access-list DMZ-In extended permit tcp object 10.104.1.0 eq domain object DC1 eq domain
I've tried any combination of the two and they don't seem to work. Also worth noting, I confirmed the port used for DNS was 53 and when you put the number in for the ACL, it just converts it to domain. Do you guys have any ideas? Thanks in advance.
Solved! Go to Solution.
12-14-2016 01:24 PM
Hi Brian,
Give the following a go;
access-list DMZ-In extended permit udp object 10.104.1.0 object DC1 eq domain
access-list DMZ-In extended permit tcp object 10.104.1.0 object DC1 eq domain
Your traffic will not be source port domain but will be for the destination.
12-14-2016 01:24 PM
Hi Brian,
Give the following a go;
access-list DMZ-In extended permit udp object 10.104.1.0 object DC1 eq domain
access-list DMZ-In extended permit tcp object 10.104.1.0 object DC1 eq domain
Your traffic will not be source port domain but will be for the destination.
12-14-2016 01:29 PM
Nice and simple, thanks for the tip!
12-14-2016 01:33 PM
Your welcome.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide