I know I can DENY all outbound DNS traffic to port 53 tcp/udp and then just add an allow for our vendor's DNS servers. However, my vendor recommends redirecting all DNS traffic - which does sound like a more elegant solution if the FortiOS can handle it.
Does anyone have any suggestions on how the following might be done on a Fortigate? If relevant, we run a mix of 5.2/5.4, primarily the FG-60 series (D,E).
Snippet from my vendor's docs (DNSFilter):
Using iptables, the most common firewall on Linux systems, the rules in a config file look like this:*natOr, using the command line to add the rules:
:PREROUTING ACCEPT [2:143]
:INPUT ACCEPT [2:143]
:OUTPUT ACCEPT [0:0]<br>:POSTROUTING ACCEPT [2:134]
-A OUTPUT -p udp -m udp --dport 53 -j DNAT --to-destination 103.247.36.36:53
-A OUTPUT -p tcp -m tcp --dport 53 -j DNAT --to-destination 103.247.36.36:53
iptables -t nat -A OUTPUT -p udp --dport 53 -j DNAT --to 103.247.36.36:53
iptables -t nat -A OUTPUT -p tcp --dport 53 -j DNAT --to 103.247.36.36:53
Thanks!
Scott, this is possible with a VIP. All DNS traffic destined for any external IP is remapped to a single DNS server you define, seamless to the user. See the config below to get this to work. This was tested on 6.0.2 and 5.6.x, you will have to test on your older firewall firmware revisions. Just swap out my interface names with the ones you utilize. I believe you can adjust the VIP extinf setting to "any" if you need to apply the VIP policy to multiple internal interfaces.
config system interface edit "wifi-tunnel" set vdom "root" set ip 10.66.66.254 255.255.255.0 next end config firewall vip edit "dns-vip" set type load-balance set src-filter "10.66.66.0/24" set extip 0.0.0.0-239.255.255.255 set extintf "wifi-tunnel" set service "DNS" set arp-reply disable set mappedip "4.2.2.2" next end config firewall policy edit 9 set srcintf "wifi-tunnel" set dstintf "wan1" set srcaddr "internal-net" set dstaddr "dns-vip" set action accept set schedule "always" set service "DNS" set nat enable next edit 8 set srcintf "wifi-tunnel" set dstintf "wan1" set srcaddr "internal-net" set dstaddr "all" set action accept set schedule "always" set service "ALL" set nat enable next end
tony69murray@gmail.com hello im new here and im actually trying to stop my android from beind dns redirected i found thesr files on my sytem which led me to this site where I found information on dns filtering im really stressed out and i need a little help to fix this a little please can someone contact me and maybe tell me things to help me out please i dont know why they chose me to redirect my dns. Im just an old unemployed army vetran who was homeless for ten years so im nobody important and i have no money so why was my phone chosen. i apreciate any good advice please
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1736 | |
1107 | |
752 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.