I started to inform how Cisco ASA, Cisco PIX and Cisco FWSM firewall appliance secure their domain from DNS traffic. What is possible, what can I transport over DNS without increased drop probability. I question myself what DNS flags can be touched without any flaw.

I must admit that I'm no Cisco expert - not at all. If I look at the configuration possibilities I have to say "wow":

class-map inspection_default
     match default-inspection-traffic
policy-map type inspect dns preset_dns_map
message-length maximum 512
id-mismatch count 10 duration 2 action log
match header-flag RD
policy-map global_policy
      class inspection_default
              inspect dns preset_dns_map
service-policy global_policy global

What administrator knows DNS at this level? I mean that are no default values (I think so), that are the recommendation of the official Cisco webpage. Let me pick the message-length option: this means that no DNS request/reply larger as 512 byte can be received! Today in a world of EDNS0, DNSSEC and several AAAA answers in one packet this limit can trigger erroneous function. Especially because the "configuration error" will show up rarely.