Destination NAT with DNS Rewrite Reverse Use Cases
Table of Contents
Expand all | Collapse all
-
- Tap Interfaces
-
- Layer 2 and Layer 3 Packets over a Virtual Wire
- Port Speeds of Virtual Wire Interfaces
- LLDP over a Virtual Wire
- Aggregated Interfaces for a Virtual Wire
- Virtual Wire Support of High Availability
- Zone Protection for a Virtual Wire Interface
- VLAN-Tagged Traffic
- Virtual Wire Subinterfaces
- Configure Virtual Wires
- Configure an Aggregate Interface Group
- Configure Bonjour Reflector for Network Segmentation
- Use Interface Management Profiles to Restrict Access
-
- DNS Overview
- DNS Proxy Object
- DNS Server Profile
- Multi-Tenant DNS Deployments
- Configure a DNS Proxy Object
- Configure a DNS Server Profile
- Use Case 1: Firewall Requires DNS Resolution
- Use Case 2: ISP Tenant Uses DNS Proxy to Handle DNS Resolution for Security Policies, Reporting, and Services within its Virtual System
- Use Case 3: Firewall Acts as DNS Proxy Between Client and Server
- DNS Proxy Rule and FQDN Matching
-
- NAT Rule Capacities
- Dynamic IP and Port NAT Oversubscription
- Dataplane NAT Memory Statistics
-
- Translate Internal Client IP Addresses to Your Public IP Address (Source DIPP NAT)
- Enable Clients on the Internal Network to Access your Public Servers (Destination U-Turn NAT)
- Enable Bi-Directional Address Translation for Your Public-Facing Servers (Static Source NAT)
- Configure Destination NAT with DNS Rewrite
- Configure Destination NAT Using Dynamic IP Addresses
- Modify the Oversubscription Rate for DIPP NAT
- Reserve Dynamic IP NAT Addresses
- Disable NAT for a Specific Host or Interface
-
- Network Packet Broker Overview
- How Network Packet Broker Works
- Prepare to Deploy Network Packet Broker
- Configure Transparent Bridge Security Chains
- Configure Routed Layer 3 Security Chains
- Network Packet Broker HA Support
- User Interface Changes for Network Packet Broker
- Limitations of Network Packet Broker
- Troubleshoot Network Packet Broker
-
- Enable Advanced Routing
- Logical Router Overview
- Configure a Logical Router
- Create a Static Route
- Configure BGP on an Advanced Routing Engine
- Create BGP Routing Profiles
- Create Filters for the Advanced Routing Engine
- Configure OSPFv2 on an Advanced Routing Engine
- Create OSPF Routing Profiles
- Configure OSPFv3 on an Advanced Routing Engine
- Create OSPFv3 Routing Profiles
- Configure RIPv2 on an Advanced Routing Engine
- Create RIPv2 Routing Profiles
- Create BFD Profiles
- Configure IPv4 Multicast
- Create Multicast Routing Profiles
- Create an IPv4 MRoute
Destination NAT with DNS Rewrite Reverse Use Cases
Use cases for destination NAT with DNS rewrite in the
reverse direction.
The following use cases illustrate destination NAT
with DNS rewrite enabled in the
reverse
direction.
The difference between these two use cases is simply whether the
DNS client, DNS server, and destination server are on the public
or internal side of the firewall. In either case, the DNS client
is on the opposite side of the firewall from its ultimate destination
server. (If your DNS client and its ultimate destination server
are on the same side of the firewall, consider Destination NAT with DNS Rewrite Forward Use Cases 3 and 4.)Use case 1 illustrates the DNS client on the public side of the
firewall, while the DNS server and the ultimate destination server
are both on the internal side. This case requires DNS rewrite in
the reverse direction. The DNS client queries for the IP address
of red.com. Based on the NAT rule, the firewall translates the query
(originally going to public address 1.1.2.1) to internal address
192.168.2.1. The DNS server responds that red.com has IP address
192.168.2.10. The rule includes
Enable DNS Rewrite - reverse
and
the DNS response of 192.168.2.10 matches the destination Translated
Address of 192.168.2.0/24 in the rule, so the firewall translates
the DNS response using the reverse
translation
that the rule uses. The rule says translate 1.1.2.0/24 to 192.168.2.0/24,
so the firewall rewrites the DNS response of 192.168.2.10 to 1.1.2.10. The
DNS client receives the response and sends to 1.1.2.10, which the
rule translates to 192.168.2.10 to reach server red.com.Use case 1 summary: DNS client and destination server are on
opposite sides of the firewall. The DNS server provides an address
that matches the translated destination address in the NAT rule,
so translate the DNS response using the
reverse
translation
of the NAT rule.
Use case 2 illustrates the DNS client on the internal side of
the firewall, while the DNS server and the ultimate destination
server are both on the public side. This case requires DNS rewrite
in the reverse direction. The DNS client queries for the IP address
of red.com. Based on the NAT rule, the firewall translates the query
(originally going to internal address 192.168.2.1) to the public
address 1.1.2.1. The DNS server responds that red.com has IP address
1.1.2.10. The rule includes
Enable DNS Rewrite - reverse
and
the DNS response of 1.1.2.10 matches the destination Translated
Address of 1.1.2.0/24 in the rule, so the firewall translates the
DNS response using the reverse
translation
that the rule uses. The rule says translate 192.168.2.0/24 to 1.1.2.0/24,
so the firewall rewrites the DNS response 1.1.2.10 to 192.168.2.10.
The DNS client receives the response and sends to 192.168.2.10,
which the rule translates to 1.1.2.10 to reach server red.com.Use case 2 summary is the same as Use case 1 summary: DNS client
and destination server are on opposite sides of the firewall. The
DNS server provides an address that matches the translated destination
address in the NAT rule, so translate the DNS response using the
reverse
translation
of the NAT rule.
To implement DNS rewrite, Configure Destination NAT with DNS Rewrite.