This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Firewall blocking DNS queries out to the Internet from internal server

Greetings,

I have an internal DNS server - 172.16.0.200 (a defined host within the UTM)

I have a firewall rule setup to allow that host -> DNS -> Any

The UTM is running in bridge mode, behind another firewall.

It's dropping the DNS traffic at the UTM:

18:28:52 Default DROP UDP  
172.16.0.200 : 56589
205.251.198.254 : 53
 
len=69 ttl=128 tos=0x00 srcmac= dstmac=
18:28:56 Default DROP UDP  
172.16.0.200 : 56589
205.251.192.123 : 53
 
len=80 ttl=128 tos=0x00 srcmac= dstmac=
18:28:59 Default DROP UDP  
172.16.0.200 : 56589
205.251.195.212 : 53
 
len=80 ttl=128 tos=0x00 srcmac= dstmac=
18:28:59 Default DROP UDP  
172.16.0.200 : 56589
205.251.197.29 : 53
 
len=69 ttl=128 tos=0x00 srcmac= dstmac=
18:29:12 Default DROP UDP  
172.16.0.200 : 55239
205.251.192.123 : 53
 
len=69 ttl=128 tos=0x00 srcmac= dstmac=

If I enable the Internal (Network) -> DNS -> Any rule, it works

My goal is to only allow my internal DNS server to resolve addresses for my network, so I really don't want to allow Internal (Network).

Any thoughts would be greatly appreciated.

This is my first time posting, so please be patient if I may have forgotten some necessary information.

Thank you and best regards.



This thread was automatically locked due to age.
Parents Reply Children