I could browse the web. My question is the fact that I don't own the 188.8.131.52 address, as that's Verizon's DNS server. To Verizon, would that look like 184.108.40.206 is querying their own DNS server? Am I, in effect, spoofing an address that they own, or am I really just forwarding the 53/udp traffic out TO 220.127.116.11 as my public address that's assigned to my ASA's outside interface? Just curious. (I didn't leave this in production.)
I asked Cisco TAC this same question on Saturday though, and they said that it couldn't be done. I'm just wondering if this is something that's safe to leave in place because it provided a VERY nice workaround. :)
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...