Cybersecurity Forum

This forum is for all security enthusiasts to discuss Fortinet's latest & evolving technologies and to connect & network with peers in the cybersecurity hemisphere. Share and learn on a broad range of topics like best practices, use cases, integrations and more. For support specific questions/resources, please visit the Support Forum or the Knowledge Base.

DeepKuma2
Contributor

How to block bypass DNS settings

Dear All, 

I have a question that I configured an Internet policy in the FortiGate firewall with allowing all services. I want to block DNS bypass. Is it possible to block only DNS service? I happy to make different policy for my DNS server but don't want to make another policy for my client systems. 

 

Regards,

Deepak Kumar

Deepak Kumar First Option General Trading LLC Dubai
Deepak Kumar First Option General Trading LLC Dubai
5 REPLIES 5
MichaelBazy
New Contributor III

I'd create a rule just above the previous one to block dns traffic . Did you try that?

DeepKuma2
Contributor

Thanks, I can do it but is it possible the In the single Policy I will allow all services except the DNS?

 

Regards,

Deepak Kumar

Deepak Kumar First Option General Trading LLC Dubai
Deepak Kumar First Option General Trading LLC Dubai
MichaelBazy

I don't think you can negate a service in a policy. Technically you "could" try to specify all services but UDP/53, but the policy would look massive in the number of objects. Also don't forget any services!

I don't get what's wrong with another policy, denying UDP/53?

I can think of another option though : app control profile to block DNS traffic in your "one" policy (and allowing the rest of the applications).

Regards,

Michael

________________________________
From: Deepak Kumar, Network Admin via Firewall:
Sent: Monday, March 5, 2018 8:53:50 AM
To: firewall@lists.fusecommunity.fortinet.com
Subject: [Firewall:] - RE: How to block bypass DNS settings


Thanks, I can do it but is it possible the In the single Policy I will allow all services except the DNS?



Regards,

Deepak Kumar

-----End Original Message-----
DeepKuma2

Hi, 

there is no reason to avoid to configure any deny policy but it is for basic Idea.

Regards,

Deepak Kumar

Deepak Kumar First Option General Trading LLC Dubai
Deepak Kumar First Option General Trading LLC Dubai
DrWolfgangBeneicke1

IMHO an explicit DENY policy is not only effective but openly documents your intention, namely that only the internal DNS is to be used. Besides, if you enable logging you could pinpoint the hosts which still are not using the (DHCP supplied) internal DNS.

Transparency is one of the foundations of security.