- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
How to block bypass DNS settings
Dear All,
I have a question that I configured an Internet policy in the FortiGate firewall with allowing all services. I want to block DNS bypass. Is it possible to block only DNS service? I happy to make different policy for my DNS server but don't want to make another policy for my client systems.
Regards,
Deepak Kumar
- Labels:
-
Next Generation Firewall
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I'd create a rule just above the previous one to block dns traffic . Did you try that?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thanks, I can do it but is it possible the In the single Policy I will allow all services except the DNS?
Regards,
Deepak Kumar
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I don't get what's wrong with another policy, denying UDP/53?
I can think of another option though : app control profile to block DNS traffic in your "one" policy (and allowing the rest of the applications).
Regards,
Michael
________________________________
From: Deepak Kumar, Network Admin via Firewall:
Sent: Monday, March 5, 2018 8:53:50 AM
To: firewall@lists.fusecommunity.fortinet.com
Subject: [Firewall:] - RE: How to block bypass DNS settings
Thanks, I can do it but is it possible the In the single Policy I will allow all services except the DNS?
Regards,
Deepak Kumar
-----End Original Message-----
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi,
there is no reason to avoid to configure any deny policy but it is for basic Idea.
Regards,
Deepak Kumar
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
IMHO an explicit DENY policy is not only effective but openly documents your intention, namely that only the internal DNS is to be used. Besides, if you enable logging you could pinpoint the hosts which still are not using the (DHCP supplied) internal DNS.
Transparency is one of the foundations of security.
