How dns application inspection works, How dns rewrite works – Cisco ASA 5505 User Manual

Page 878

Advertising
background image

43-2

Cisco ASA 5500 Series Configuration Guide using the CLI

Chapter 43 Configuring Inspection of Basic Internet Protocols

DNS Inspection

Configuring a DNS Inspection Policy Map for Additional Inspection Control, page 43-7

Verifying and Monitoring DNS Inspection, page 43-10

How DNS Application Inspection Works

The ASA tears down the DNS session associated with a DNS query as soon as the DNS reply is
forwarded by the ASA. The ASA also monitors the message exchange to ensure that the ID of the DNS
reply matches the ID of the DNS query.

When DNS inspection is enabled, which is the default, the ASA performs the following additional tasks:

Translates the DNS record based on the configuration completed using the alias, static and nat
commands (DNS Rewrite). Translation only applies to the A-record in the DNS reply; therefore,
DNS Rewrite does not affect reverse lookups, which request the PTR record.

Note

DNS Rewrite is not applicable for PAT because multiple PAT rules are applicable for each
A-record and the PAT rule to use is ambiguous.

Enforces the maximum DNS message length (the default is 512 bytes and the maximum length is
65535 bytes). The ASA performs reassembly as needed to verify that the packet length is less than
the maximum length configured. The ASA drops the packet if it exceeds the maximum length.

Note

If you enter the inspect dns command without the maximum-length option, DNS packet size
is not checked

Enforces a domain-name length of 255 bytes and a label length of 63 bytes.

Verifies the integrity of the domain-name referred to by the pointer if compression pointers are
encountered in the DNS message.

Checks to see if a compression pointer loop exists.

A single connection is created for multiple DNS sessions, as long as they are between the same two
hosts, and the sessions have the same 5-tuple (source/destination IP address, source/destination port, and
protocol). DNS identification is tracked by app_id, and the idle timer for each app_id runs
independently.

Because the app_id expires independently, a legitimate DNS response can only pass through the ASA
within a limited period of time and there is no resource build-up. However, if you enter the show conn
command, you will see the idle timer of a DNS connection being reset by a new DNS session. This is
due to the nature of the shared DNS connection and is by design.

How DNS Rewrite Works

When DNS inspection is enabled, DNS rewrite provides full support for NAT of DNS messages
originating from any interface.

If a client on an inside network requests DNS resolution of an inside address from a DNS server on an
outside interface, the DNS A-record is translated correctly. If the DNS inspection engine is disabled, the
A-record is not translated.

As long as DNS inspection remains enabled, you can configure DNS rewrite using the alias, static, or
nat commands.

Advertising