Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
ORIGINAL: rwpatterson Welcome to the forums. One way to do it (very brute force, but it should work) would be to create virtual IPs for those external DNS servers, and point then to your DNS servers. You know 8.8.8.8 and 8.8.4.4 are Google servers. A VIP policy would take that traffic and send it to your DNS server without them knowing. The only issue here is that you would have to do this with every public DNS server out there. (at least the common ones) Not ideal, but doable. This is my first thought without thinking too deeply. There' s more than likely a couple other ways to get this done as well.Hi Bob, I ' m getting in your technique but it does not work for me, maybe I wrong somewhere. Do you mean creating a virtual IP with settings: external interface: LAN (internal), External IP: 8.8.8.8, Mapped IP: my local DNS IP, no port forwarding; then creating a firewall policy to refer that virtual IP?
PCNSE
NSE
StrongSwan
ORIGINAL: emnoc And simpler can' t you just creat a fwpolicy that block DNS request to anything except your local server(s).If the DNS server is hard coded, wouldn' t that then fail? You can have the Windows IP stack DHCP assign an IP address, but still override the DNS servers. You would still need to tell the end users what to do. (In my opinion...) Not sure if DNS needs the server specified, or if anything that works on port 53 would do.
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
NSE4/FMG-VM64/FortiAnalyzer-VM/6.0 (FWF30E/FW92D/FGT200D/FGT101E/FGT81E)/ FAP220B/221C
NSE4/FMG-VM64/FortiAnalyzer-VM/6.0 (FWF30E/FW92D/FGT200D/FGT101E/FGT81E)/ FAP220B/221C
PCNSE
NSE
StrongSwan
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
My sentiments as well. I [would] block all DNS servers except those used by the institution.I heartily agree. The example I have used was only a temp solution, and was in place for a few hours until the ISP got their act together and fixed their DNS. (Which they didn' t and the long term solution was to install a local DNS server and directed their DNS quires to my company' s own DNS server.) Another good point about locking down DNS is that it prevents individuals from proxying web traffic and/or other non-DNS traffic through that port -- something we have discovered at some of our remote site, were doing.
NSE4/FMG-VM64/FortiAnalyzer-VM/6.0 (FWF30E/FW92D/FGT200D/FGT101E/FGT81E)/ FAP220B/221C
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1713 | |
1093 | |
752 | |
447 | |
231 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.