DNS无法通过VPN解析

网络工程 虚拟专用网 防火墙 dns
2022-02-04 12:38:52

正在寻找一些我似乎无法解决的 Office VPN 帮助...

我正在尝试通过 DC ASA 5506-x VPN 从家用 PC 远程桌面到工作 PC。我只能使用 IP 地址或 FQDN 连接到工作 PC,但无法解析主机名。

![network]( https://pasteboard.co/[![networkdiagram][1]

硬件/软件型号:

  • Windows Server 2012 R2 标准托管 DNS 服务器版本 6.3.9600.17238
  • DC Cisco 5506-x 防火墙托管 VPN
  • DC Cisco 5506-x 防火墙 Cisco asdm 映像 asdm-7101.bin
  • DC Cisco 5506-x 防火墙引导系统 asa982-20-lfbff-k8.spa

主机名和 Intranet 站点都在办公室完美解析,只是当我们通过 VPN 连接时它不起作用。我玩过我们的防火墙,并确保它的 DNS 服务器配置为我们的 Windows 服务器的 IP 地址,但这些都不起作用。

我的问题是,如何解决 DNS 问题?通过 VPN 连接时如何让 DNS 解析?

: Hardware:   ASA5506, 4096 MB RAM, CPU Atom C2000 series 1250 MHz, 1 CPU (4 cores)
:
ASA Version 9.8(2)20
!
no mac-address auto
ip local pool DC_REMOTE_VPN_POOL 10.111.10.50-10.111.10.100 mask 255.255.255.0

!
boot system disk0:/asa982-20-lfbff-k8.SPA
boot system disk0:/asa961-lfbff-k8.SPA

dns domain-lookup inside
dns server-group DefaultDNS
 name-server 10.111.1.1 inside 
object network obj_any
 subnet 0.0.0.0 0.0.0.0
object-group network DC_REMOTE_VPN
 network-object 10.111.10.0 255.255.255.0
object-group network INT
 network-object 10.111.0.0 255.255.0.0
object-group network OFF_INT_NETS
 network-object 10.110.0.0 255.255.0.0
object-group network OFF_REMOTE_VPN_NETS
 network-object 10.110.10.0 255.255.255.0
access-list outside_access_in extended permit icmp any any echo-reply
access-list outside_access_in extended permit icmp any any unreachable
access-list outside_access_in extended permit icmp any any time-exceeded
access-list outside_access_in extended permit icmp any any parameter-problem
access-list DC_REMOTE_VPN_splitTunnelAcl standard permit 10.111.1.0 255.255.255.0
access-list DC_REMOTE_VPN_splitTunnelAcl standard permit 10.111.9.0 255.255.255.0
access-list DC_REMOTE_VPN_splitTunnelAcl standard permit 10.111.3.0 255.255.255.0
access-list DC_REMOTE_VPN_splitTunnelAcl standard permit 10.112.0.0 255.255.0.0
access-list DC_REMOTE_VPN_splitTunnelAcl standard permit 10.111.0.0 255.255.0.0
access-list DC_REMOTE_VPN_splitTunnelAcl standard permit 10.110.0.0 255.255.0.0
access-list AnyConnect_Client_Local_Print extended deny ip any4 any4
access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq lpd
access-list AnyConnect_Client_Local_Print remark IPP: Internet Printing Protocol
access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq 631
access-list AnyConnect_Client_Local_Print remark Windows' printing port
access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq 9100
access-list AnyConnect_Client_Local_Print remark mDNS: multicast DNS protocol
access-list AnyConnect_Client_Local_Print extended permit udp any4 host 224.0.0.251 eq 5353
access-list AnyConnect_Client_Local_Print remark LLMNR: Link Local Multicast Name Resolution protocol
access-list AnyConnect_Client_Local_Print extended permit udp any4 host 224.0.0.252 eq 5355
access-list AnyConnect_Client_Local_Print remark TCP/NetBIOS protocol
access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq 137
access-list AnyConnect_Client_Local_Print extended permit udp any4 any4 eq netbios-ns
mtu outside 1500
mtu inside 1500
mtu firepower_MGT 1500
no failover
no monitor-interface service-module
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-7101.bin
no asdm history enable
arp timeout 14400
no arp permit-nonconnected
arp rate-limit 16384
nat (any,any) source static DC_REMOTE_VPN_NETS DC_REMOTE_VPN_NETS destination static OFF_INT_NETS OFF_INT_NETS no-proxy-arp
nat (inside,outside) source static DC_INT_NETS DC_INT_NETS destination static DC_REMOTE_VPN_NETS DC_REMOTE_VPN_NETS no-proxy-arp
nat (inside,outside) source static DC_INT_NETS DC_INT_NETS destination static OFF_INT_NETS OFF_INT_NETS no-proxy-arp
nat (inside,outside) source static DC_INT_NETS DC_INT_NETS destination static OFF_REMOTE_VPN_NETS OFF_REMOTE_VPN_NETS no-proxy-arp
!
object network obj_any
 nat (inside,outside) dynamic interface
!
nat (inside,firepower_MGT) after-auto source dynamic any interface
access-group outside_access_in in interface outside
route inside 10.110.0.0 255.255.0.0 10.111.9.201 10 track 1
route inside 10.111.0.0 255.255.0.0 10.111.9.201 1
route inside 172.16.1.0 255.255.255.252 10.111.9.201 1
user-identity default-domain LOCAL
aaa authentication ssh console LOCAL
aaa authentication http console LOCAL
aaa authentication telnet console LOCAL
aaa authentication login-history
snmp-server enable traps entity config-change
sla monitor 172
 type echo protocol ipIcmpEcho 172.16.1.2 interface inside
 num-packets 5
 timeout 10000
 frequency 30
sla monitor schedule 172 life forever start-time now
service sw-reset-button
crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-SHA esp-aes-256 esp-sha-hmac
crypto ipsec ikev2 ipsec-proposal ikev2-ESP-AES256-SHA1
 protocol esp encryption aes-256
 protocol esp integrity sha-1
crypto ipsec security-association pmtu-aging infinite
crypto dynamic-map DC_REMOTE_VPN_dyn_map 20 set ikev1 transform-set ESP-3DES-MD5
crypto map vpn 10 match address VPN2OFF
crypto map vpn 10 set pfs
crypto map vpn 10 set peer 103.241.91.91 103.241.91.112
crypto map vpn 10 set ikev1 transform-set ESP-3DES-MD5
crypto map vpn 65535 ipsec-isakmp dynamic DC_REMOTE_VPN_dyn_map
crypto map vpn interface outside
crypto ca trustpoint _SmartCallHome_ServerCA
 no validation-usage
 crl configure
crypto ca trustpool policy
crypto ikev2 policy 20
 encryption aes-256
 integrity sha
 group 14
 prf sha
 lifetime seconds 86400
crypto ikev2 enable outside
crypto ikev1 enable outside
crypto ikev1 policy 10
 authentication pre-share
 encryption 3des
 hash md5
 group 2
 lifetime 86400
crypto ikev1 policy 20
 authentication pre-share
 encryption aes-256
 hash sha
 group 5
 lifetime 86400
!
track 1 rtr 172 reachability
telnet timeout 5

dhcpd auto_config outside
!
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
ntp server 10.111.1.1
ntp server 203.129.68.14
ssl cipher default low
ssl cipher tlsv1 low
ssl cipher tlsv1.1 low
ssl cipher tlsv1.2 low
ssl cipher dtlsv1 low
group-policy DC_REMOTE_VPN internal
group-policy DC_REMOTE_VPN attributes
 dns-server value 10.111.1.1
 vpn-tunnel-protocol ikev1
 split-tunnel-policy tunnelspecified
 split-tunnel-network-list value DC_REMOTE_VPN_splitTunnelAcl
 default-domain value test.local
 split-tunnel-all-dns enable
dynamic-access-policy-record DfltAccessPolicy
tunnel-group DC_REMOTE_VPN type remote-access
tunnel-group DC_REMOTE_VPN general-attributes
 address-pool DC_REMOTE_VPN_POOL
 authentication-server-group ADC01 LOCAL
 default-group-policy DC_REMOTE_VPN
tunnel-group DC_REMOTE_VPN ipsec-attributes
 ikev1 pre-shared-key *****
tunnel-group 103.241.91.91 type ipsec-l2l
tunnel-group 103.241.91.91 ipsec-attributes
 ikev1 pre-shared-key *****
tunnel-group 103.241.91.112 type ipsec-l2l
tunnel-group 103.241.91.112 ipsec-attributes
 ikev1 pre-shared-key *****
!
class-map inspection_default
 match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
 parameters
  message-length maximum client auto
  message-length maximum 512
  no tcp-inspection
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map
  inspect ftp
  inspect h323 h225
  inspect h323 ras
  inspect rsh
  inspect rtsp
  inspect esmtp
  inspect sqlnet
  inspect skinny
  inspect sunrpc
  inspect xdmcp
  inspect sip
  inspect netbios
  inspect tftp
  inspect ip-options
0个回答
没有发现任何回复~