I have a job to upgrade ASA to customer. (From 8.6 > 9.6..)
I saw in ASA version 9.0.2(and earlier) in section of DNS Inspection command they didn't have "tcp-inspection".
policy-map type inspect dns preset_dns_map
parameters
message-length maximum client auto
message-length maximum 512
But after I upgrade it to 9.6.3 thay have "no tcp-inspection" command show up.
policy-map type inspect dns preset_dns_map
parameters
message-length maximum client auto
message-length maximum 512
no tcp-inspection
This ASA is act like a firewall of server farm(so I think it's may have a DNS Server in INSIDE, that may need to use TCP), Is it should configure "tcp-inspection" on DNS inspect paremeters ?
Before, I had been implement ASA for other site, I saw it have "no tcp-inspection" too, and DNS server of that site is work fine.
PS:: From configuration guide, version 9.6 says in Defaults for DNS Inspection "DNS over TCP inspection is disabled.". But in version 9.0 and 8.6 they didn't say anything.
Today, DNS should be allowed to run over both UDP and TCP. Many Admins didn‘t adopt this yet, but blocking TCP for DNS is considered a misconfiguration.
If you allow TCP-transport, you should also apply security-measures for DNS for this transport.
What to do:
Thank you for your very clear explanation Karsten.
Can I ask you more for my more clear ?
If there is no DNS over TCP, this command should have no effect at all.
If there is is DNS over TCP but it is not configured, then there is no impact of functionality, but limited security for DNS.
So. For my understanding now.
Am I right in understand?
After configuring it it will have an impact if there are protocol-anomalies or DNS-based attacks. After implementing it I would take a close look if everything runs right. especially if you run an outdated DNS-resolver. Early implementations of DNS over TCP were not that solid. With up-to-date operating systems there should be no problem with tcp-inspection.