This is fancy NAT question for yal and most people don't have to do this, but my network is very restrictive!
Internet works fine for all devices and I have PAT on my firewall already.
I want to do this before it hits my firewall, which is on my local router that this machine sits at.
To get postage rate updates, this Postage-Machine-10.2.2.251 goes to 184.108.40.206 for DNS.Somewhere in the programming which I can't control, it uses DNS-PUBLIC-220.127.116.11.
My company firewall blocks all public DNS and they said no to opening it up for this and told me to NAT it. So I want to NAT the destination DNS-PUBLIC-18.104.22.168 to my internal DNS-PRIVATE-10.10.10.1 for this 1 SOURCE-POSTAGE-MACHINE-10.2.2.251
I only want to do this to 1 SOURCE-POSTAGE-MACHINE-10.2.2.251 only and not all source.
Source (postage machine): 10.2.2.251
Destination:22.214.171.124 UDP-53 --> NAT to 10.10.10.1 UDP-53
I thought of this, but the thing is that the below allows any source to go to 126.96.36.199 to be NATed. I only want 1 ip 10.2.2.251 to be able to do this NAT, not all source. This is how I would do it, but I'm just missing on how I would restrict it to this 1 source ip instead of applying it to all source ip.
Hello Your host machine has the same ip address as you nat routers inside lan facing interface?
As for the dns, your pc will use google dns anyway so you dont need a static nat outside entry for that, A simple static inside nat entry should work fine as long as it doesn't conflict wth the rts lan facing interface ip.
My devices can access internet and works and is being PAT at the firewall, my firewall blocks all public DNS, the company does not allow public DNS. So I want to NAT this destination public DNS-188.8.131.52 to my private DNS-10.10.10.1 before it hits the firewall. This only effects this 1 postage machine 10.2.2.251, that has a public DNS-184.108.40.206 hard coded into their programming which no one can change.
Cisco IOS-XE 17.3.1 – Catalyst Switching Updates
Table of Contents
Hardware Additions since IOS-XE 17.2.1
Key Summary Features
Platform and Infra Features
High Availability Features
Routing / MPLS / VPN Features
Hi Everyone,I have 2 queries1. After we configure the IPSec VPN in a Cisco Router, how do we identify and check that the traffic is flowing through the tunnel? Are there any commands and ways to find it out?2. What are some of t...
Cisco Champion Radio · S7|E29 Increase Visibility and Enhance Security with Cisco AI Endpoint Analytics
Cisco is on a journey to making networking smarter with artificial intelligence and machine learning. The latest stop in this journey, Cisco AI...
Community Live video- Introduction to Smart Licensing on Catalyst Switches
(Live event - formerly known as Webcast- Thursday 30 July, 2020 at 10 am Pacific/ 1 pm Eastern / 7 pm Paris)
This event had place on Thursday 30th, July 2020 at 10hrs PDT&nb...