Configure a DNS Proxy Object
Table of Contents
Expand all | Collapse all
-
- Tap Interfaces
-
- Layer 2 and Layer 3 Packets over a Virtual Wire
- Port Speeds of Virtual Wire Interfaces
- LLDP over a Virtual Wire
- Aggregated Interfaces for a Virtual Wire
- Virtual Wire Support of High Availability
- Zone Protection for a Virtual Wire Interface
- VLAN-Tagged Traffic
- Virtual Wire Subinterfaces
- Configure Virtual Wires
- Configure an Aggregate Interface Group
- Configure Bonjour Reflector for Network Segmentation
- Use Interface Management Profiles to Restrict Access
-
- DNS Overview
- DNS Proxy Object
- DNS Server Profile
- Multi-Tenant DNS Deployments
- Configure a DNS Proxy Object
- Configure a DNS Server Profile
- Use Case 1: Firewall Requires DNS Resolution
- Use Case 2: ISP Tenant Uses DNS Proxy to Handle DNS Resolution for Security Policies, Reporting, and Services within its Virtual System
- Use Case 3: Firewall Acts as DNS Proxy Between Client and Server
- DNS Proxy Rule and FQDN Matching
-
- NAT Rule Capacities
- Dynamic IP and Port NAT Oversubscription
- Dataplane NAT Memory Statistics
-
- Translate Internal Client IP Addresses to Your Public IP Address (Source DIPP NAT)
- Enable Clients on the Internal Network to Access your Public Servers (Destination U-Turn NAT)
- Enable Bi-Directional Address Translation for Your Public-Facing Servers (Static Source NAT)
- Configure Destination NAT with DNS Rewrite
- Configure Destination NAT Using Dynamic IP Addresses
- Modify the Oversubscription Rate for DIPP NAT
- Reserve Dynamic IP NAT Addresses
- Disable NAT for a Specific Host or Interface
-
- Network Packet Broker Overview
- How Network Packet Broker Works
- Prepare to Deploy Network Packet Broker
- Configure Transparent Bridge Security Chains
- Configure Routed Layer 3 Security Chains
- Network Packet Broker HA Support
- User Interface Changes for Network Packet Broker
- Limitations of Network Packet Broker
- Troubleshoot Network Packet Broker
-
- Enable Advanced Routing
- Logical Router Overview
- Configure a Logical Router
- Create a Static Route
- Configure BGP on an Advanced Routing Engine
- Create BGP Routing Profiles
- Create Filters for the Advanced Routing Engine
- Configure OSPFv2 on an Advanced Routing Engine
- Create OSPF Routing Profiles
- Configure OSPFv3 on an Advanced Routing Engine
- Create OSPFv3 Routing Profiles
- Configure RIPv2 on an Advanced Routing Engine
- Create RIPv2 Routing Profiles
- Create BFD Profiles
- Configure IPv4 Multicast
- Create Multicast Routing Profiles
- Create an IPv4 MRoute
Configure a DNS Proxy Object
If your firewall is to act as a DNS proxy,
perform this task to configure a DNS
Proxy Object. The proxy object can either be shared among
all virtual systems or applied to a specific virtual system.
When the firewall is enabled to act as
a DNS proxy, evasion signatures that detected crafted HTTP or TLS
requests can alert to instances where a client connects to a domain
other than the domains specified in the original DNS query. As a
best practice, Enable Evasion Signatures after
configuring DNS proxy to trigger an alert if crafted requests are
detected.
- Configure the basic settings for a DNS Proxy object.
- SelectandNetworkDNS ProxyAdda new object.
- Verify thatEnableis selected.
- Enter aNamefor the object.
- ForLocation, select the virtual system to which the object applies. If you selectShared, you must specify at least aPrimaryDNS server address, and optionally aSecondaryaddress.
- If you selected a virtual system, forServer Profile, select a DNS Server profile or else clickDNS Server Profileto configure a new profile. See Configure a DNS Server Profile.
- For Inheritance Source, select a source from which to inherit default DNS server settings. The default isNone.
- ForInterface, clickAddand specify the interfaces to which the DNS Proxy object applies.
- If you use the DNS Proxy object for performing DNS lookups, an interface is required. The firewall will listen for DNS requests on this interface, and then proxy them.
- If you use the DNS Proxy object for a service route, the interface is optional.
- (Optional) Specify DNS Proxy rules.
- On theDNS Proxy Rulestab,AddaNamefor the rule.
- Turn on caching of domains resolved by this mappingif you want the firewall to cache the resolved domains.
- ForDomain Name,Addone or more domains, one entry per row, to which the firewall compares FQDN queries. If a query matches one of the domains in the rule, the query is sent to one of the following servers to be resolved (depending on what you configured in the prior step):
- ThePrimaryorSecondaryDNS Server directly specified for this proxy object.
- ThePrimaryorSecondaryDNS Server specified in the DNS Server profile for this proxy object.
DNS Proxy Rule and FQDN Matching describes how the firewall matches domain names in an FQDN to a DNS proxy rule. If no match is found, default DNS servers resolve the query. - Do one of the following, depending on what you set theLocationto:
- If you chose a virtual system, select aDNS Server profile.
- If you choseShared, enter aPrimaryand optionally aSecondaryaddress.
- ClickOK.
- (Optional) Supply the DNS Proxy with static FQDN-to-address entries. Static DNS entries allow the firewall to resolve the FQDN to an IP address without sending a query to the DNS server.
- On theStatic Entriestab,AddaName.
- Enter the Fully Qualified Domain Name (FQDN).
- ForAddress,Addthe IP address to which the FQDN should be mapped.You can provide additional IP addresses for an entry. The firewall will provide all of the IP addresses in its DNS response and the client chooses which address to use.
- ClickOK.
- Enable caching and configure other advanced settings for the DNS Proxy.
- On theAdvancedtab, selectTCP Queriesto enable DNS queries using TCP.
- Max Pending Requests—Enter the maximum number of concurrent, pending TCP DNS requests that the firewall will support (range is 64-256; default is 64).
- ForUDP Queries Retries, enter:
- Interval (sec)—The length of time (in seconds) after which another request is sent if no response has been received (range is 1 to 30; default is 2).
- Attempts—The maximum number of UDP query attempts (excluding the first attempt) after which the next DNS server is queried (range is 1 to 30; default is 5.)
- SelectCacheto enable the firewall to cache FQDN-to-address mappings that it learns. You must enableCache(enabled by default) if this DNS proxy object is used for queries that the firewall generates (that is, under, or underDeviceSetupServicesDNSand you select a virtual system andDeviceVirtual Systems.GeneralDNS Proxy
- SelectEnable TTLto limit the length of time the firewall caches DNS resolution entries for the proxy object. Disabled by default.
- EnterTime to Live (sec), the number of seconds after which all cached entries for the proxy object are removed. After the entries are removed, new DNS requests must be resolved and cached again. Range is 60-86,400. There is no default TTL; entries remain until the firewall runs out of cache memory.
- Cache EDNS Responses—You must enable this setting if this DNS proxy object is used for queries that the firewall generates (that is, under, or underDeviceSetupServicesDNSand you select a virtual system andDeviceVirtual Systems.GeneralDNS Proxy
- Commit your changes.ClickOKandCommit.