25-19
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 25 Configuring Application Layer Protocol Inspection
DNS Inspection
3.
The security appliance receives the DNS reply and submits it to the DNS application inspection
engine.
4.
The DNS application inspection engine does the following:
a.
Searches for any NAT rule to undo the translation of the embedded A-record address
“[outside]:209.165.200.5”. In this example, it finds the following static configuration:
static (dmz,outside) 209.165.200.225 192.168.100.10 dns
b.
Uses the static rule to rewrite the A-record as follows because the
dns
option is included:
[outside]:209.165.200.225 --> [dmz]:192.168.100.10
Note
If the
dns
option were not included with the
static
command, DNS Rewrite would not
be performed and other processing for the packet continues.
c.
Searches for any NAT to translate the web server address, [dmz]:192.168.100.10, when
communicating with the inside web client.
No NAT rule is applicable, so application inspection completes.
If a NAT rule (nat or static) were applicable, the
dns
option must also be specified. If the
dns
option were not specified, the A-record rewrite in step
b
would be reverted and other processing
for the packet continues.
5.
The security appliance sends the HTTP request to server.example.com on the DMZ interface.
Configuring DNS Rewrite with Three NAT Zones
To enable the NAT policies for the scenario in
Figure 25-2
, perform the following steps:
Step 1
Create a static translation for the web server on the DMZ network, as follows:
hostname(config)#
static (
dmz
,
outside
)
mapped-address real-address
dns
where the arguments are as follows:
•
dmz
—The name of the DMZ interface of the security appliance.
•
outside
—The name of the outside interface of the security appliance.
•
mapped-address
—The translated IP address of the web server.
•
real-address
—The real IP address of the web server.
Step 2
Create an access list that permits traffic to the port that the web server listens to for HTTP requests.
hostname(config)#
access-list
acl-name
extended permit tcp any host
mapped-address
eq
port
where the arguments are as follows:
acl-name
—The name you give the access list.
mapped-address
—The translated IP address of the web server.
port
—The TCP port that the web server listens to for HTTP requests.
Step 3
Apply the access list created in
Step 2
to the outside interface. To do so, use the
access-group
command,
as follows:
hostname(config)#
access-group
acl-name
in interface
outside
Содержание 500 Series
Страница 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Страница 45: ...P A R T 1 Getting Started and General Information ...
Страница 46: ......
Страница 277: ...P A R T 2 Configuring the Firewall ...
Страница 278: ......
Страница 354: ...17 38 Cisco Security Appliance Command Line Configuration Guide OL 12172 03 Chapter 17 Configuring NAT NAT Examples ...
Страница 561: ...P A R T 3 Configuring VPN ...
Страница 562: ......
Страница 891: ...P A R T 4 System Administration ...
Страница 892: ......
Страница 975: ...P A R T 5 Reference ...
Страница 976: ......