|
Post by harold on Apr 30, 2018 22:50:30 GMT
On my network, DHCP serves a DNS address of 10.0.0.1 to users, which is the firewall. This sends DNS queries to the OpenDNS servers I have configured. However, users can set their own DNS addresses and it bypasses what I have configured. I need to configure things so users cannot bypass my DNS configuration. I realize I can set a firewall rule to BLOCK any port 53 which is not 10.0.0.1 but I had rather redirect any port 53 traffic which is not 10.0.0.1 to 10.0.0.1. It looks as if I can do that through inbound NAT to the LAN, but it looks as if it redirects ALL port 53 traffic, even traffic already set to 10.0.0.1. Is this correct? Is there a better way?
|
|
|
Post by Lee Sharp on Apr 30, 2018 23:13:29 GMT
I have never found a way to do this I really like. And inbound NAT rules are from the outside in, not the inside out. The best way I hove found it to block it, or use the traffic shaper to shape it to 1K. 
|
|
|
Post by harold on May 1, 2018 13:56:17 GMT
Thanks for the response, I'm going to go with the BLOCK option and see how that works.
|
|
|
Post by TC on May 11, 2018 16:43:58 GMT
You could try port forwarding/mapping all port 53 tcp/udp traffic back to your dns servers.
|
|