dnscrypt
To enable DNScrypt to encrypt connections between the device and Cisco Umbrella, use the dnscrypt command in DNS inspection policy map parameters configuration mode. To disable DNScrypt, use the no form of this command.
dnscrypt
no dnscrypt
Syntax Description
This command has no arguments or keywords.
Command Default
DNScrypt is disabled.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode |
Firewall Mode |
Security Context |
|||
---|---|---|---|---|---|
Routed |
Transparent |
Single |
Multiple |
||
Context |
System |
||||
Parameters configuration |
|
|
|
|
— |
Command History
Release |
Modification |
---|---|
9.10(1) |
This command was added. |
Usage Guidelines
Use this command when configuring a DNS inspection policy map.
Enabling DNScrypt starts the key-exchange thread with the Umbrella resolver. The key-exchange thread performs the handshake with the resolver every hour and updates the device with a new secret key.
Because DNScrypt uses UDP/443, you must ensure that the class map used for DNS inspection includes that port. Note that the default inspection class already includes UDP/443 for DNS inspection.
Examples
The following example enables Umbrella using the default policy, and also enables DNScrypt, in the default inspection policy map used in global DNS inspection. The global DNS inspection already applies to UDP/443.
ciscoasa(config)# policy-map type inspect dns preset_dns_map
ciscoasa(config-pmap)# parameters
ciscoasa(config-pmap-p)# umbrella
ciscoasa(config-pmap-p)# dnscrypt