<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Forward DNS requests in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/forward-dns-requests/m-p/46403#M34111</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You know honestly it's not a "DNS Proxy" at all... I thought it would be transparent when I saw the name "DNS Proxy" too. They really ought to just name it flat out "Caching Only DNS Server," because that's essentially what it it (with some static entries permitted in order to do DNS doctoring)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 06 Jun 2013 14:58:24 GMT</pubDate>
    <dc:creator>ericgearhart</dc:creator>
    <dc:date>2013-06-06T14:58:24Z</dc:date>
    <item>
      <title>Forward DNS requests</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/forward-dns-requests/m-p/46395#M34103</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are looking for a way to forward All dns requests to internal DNS ip.&lt;/P&gt;&lt;P&gt;Either client changes its ip address to public dns addresses it should be forwarded to internal.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can we do that ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We don't want to write a deny rule for public Dns requests.&lt;/P&gt;&lt;P&gt;We don't want to enforce client's dns.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Jun 2013 06:32:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/forward-dns-requests/m-p/46395#M34103</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2013-06-06T06:32:50Z</dc:date>
    </item>
    <item>
      <title>Re: Forward DNS requests</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/forward-dns-requests/m-p/46396#M34104</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you configure a dns proxy it should work.&lt;/P&gt;&lt;P&gt;The only limit is dns proxy can only be apply to suer traffic not palo management interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;V.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Jun 2013 07:29:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/forward-dns-requests/m-p/46396#M34104</guid>
      <dc:creator>VinceM</dc:creator>
      <dc:date>2013-06-06T07:29:24Z</dc:date>
    </item>
    <item>
      <title>Re: Forward DNS requests</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/forward-dns-requests/m-p/46397#M34105</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That did not work.When you use dns proxy can you override client Dns config ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Jun 2013 13:50:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/forward-dns-requests/m-p/46397#M34105</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2013-06-06T13:50:16Z</dc:date>
    </item>
    <item>
      <title>Re: Forward DNS requests</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/forward-dns-requests/m-p/46398#M34106</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not changing the client DNS but proxify it.&lt;/P&gt;&lt;P&gt;Client send request for xxx.mydomain.com to 8.8.8.8 dns server&lt;/P&gt;&lt;P&gt;Arrive on the palo, palo proxy the request and forward to 172.16.10.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this is what you want ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;V.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Jun 2013 13:55:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/forward-dns-requests/m-p/46398#M34106</guid>
      <dc:creator>VinceM</dc:creator>
      <dc:date>2013-06-06T13:55:21Z</dc:date>
    </item>
    <item>
      <title>Re: Forward DNS requests</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/forward-dns-requests/m-p/46399#M34107</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;we tried that but didn't work&lt;/P&gt;&lt;P&gt;ex. you have Lan and Wan interface&lt;/P&gt;&lt;P&gt;in dns proxy how should we configure to do that ?&lt;/P&gt;&lt;P&gt;adding interface and type dns on left is enough ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Jun 2013 14:14:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/forward-dns-requests/m-p/46399#M34107</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2013-06-06T14:14:17Z</dc:date>
    </item>
    <item>
      <title>Re: Forward DNS requests</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/forward-dns-requests/m-p/46400#M34108</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;why not just add a destination NAT?&lt;/P&gt;&lt;P&gt;source: trust&lt;/P&gt;&lt;P&gt;destination: untrust&lt;/P&gt;&lt;P&gt;service: DNS&lt;/P&gt;&lt;P&gt;=&amp;gt; destination NAT to your DNS server&lt;/P&gt;&lt;P&gt;now all DNS requests to an external server are routed to your DNS server.&lt;/P&gt;&lt;P&gt;Just keep a look out for asymmetric routing.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Jun 2013 14:33:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/forward-dns-requests/m-p/46400#M34108</guid>
      <dc:creator>mr.linus</dc:creator>
      <dc:date>2013-06-06T14:33:31Z</dc:date>
    </item>
    <item>
      <title>Re: Forward DNS requests</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/forward-dns-requests/m-p/46401#M34109</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Come back to the office, take a palo and test. You're right, for dns proxy working, dns client have to be configured on palo's interface ip.&lt;/P&gt;&lt;P&gt;In my mind it should act as transparent dns proxy .... but no.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;take in consideration the LinusRaes solution, do your redirection through nat rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;V.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Jun 2013 14:42:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/forward-dns-requests/m-p/46401#M34109</guid>
      <dc:creator>VinceM</dc:creator>
      <dc:date>2013-06-06T14:42:27Z</dc:date>
    </item>
    <item>
      <title>Re: Forward DNS requests</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/forward-dns-requests/m-p/46402#M34110</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is not working for any ip.you cannot dest. NAT any ip to 1 ip&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Jun 2013 14:44:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/forward-dns-requests/m-p/46402#M34110</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2013-06-06T14:44:48Z</dc:date>
    </item>
    <item>
      <title>Re: Forward DNS requests</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/forward-dns-requests/m-p/46403#M34111</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You know honestly it's not a "DNS Proxy" at all... I thought it would be transparent when I saw the name "DNS Proxy" too. They really ought to just name it flat out "Caching Only DNS Server," because that's essentially what it it (with some static entries permitted in order to do DNS doctoring)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Jun 2013 14:58:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/forward-dns-requests/m-p/46403#M34111</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2013-06-06T14:58:24Z</dc:date>
    </item>
    <item>
      <title>Re: Forward DNS requests</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/forward-dns-requests/m-p/46404#M34112</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;
&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;This is not working for any ip.you cannot dest. NAT any ip to 1 ip&lt;/SPAN&gt;&lt;/P&gt;
&lt;/PRE&gt;&lt;P&gt;ahhh, that's right, I forgot. If i recall correctly Juniper can do this &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Jun 2013 14:59:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/forward-dns-requests/m-p/46404#M34112</guid>
      <dc:creator>mr.linus</dc:creator>
      <dc:date>2013-06-06T14:59:22Z</dc:date>
    </item>
    <item>
      <title>Re: Forward DNS requests</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/forward-dns-requests/m-p/46405#M34113</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I tested but it did not work&lt;/P&gt;&lt;P&gt;there is ony 1 nat rule and 1 security rule in test lab&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Jun 2013 15:02:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/forward-dns-requests/m-p/46405#M34113</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2013-06-06T15:02:25Z</dc:date>
    </item>
    <item>
      <title>Re: Forward DNS requests</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/forward-dns-requests/m-p/46406#M34114</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It is necessary to face the facts, it should be not possible, otherwise you have to install a transparent proxy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;V.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Jun 2013 19:06:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/forward-dns-requests/m-p/46406#M34114</guid>
      <dc:creator>VinceM</dc:creator>
      <dc:date>2013-06-06T19:06:27Z</dc:date>
    </item>
    <item>
      <title>Re: Forward DNS requests</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/forward-dns-requests/m-p/46407#M34115</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;sometimes there are solutions that we can't remember &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;Thanks for answers all.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Jun 2013 19:11:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/forward-dns-requests/m-p/46407#M34115</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2013-06-06T19:11:14Z</dc:date>
    </item>
    <item>
      <title>Re: Forward DNS requests</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/forward-dns-requests/m-p/46408#M34116</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Doesnt PANOS 5.0 contain a dns-proxy where you can rewrite dns-queries passing through so they are forced to a dns-server of your choice?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Jun 2013 18:51:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/forward-dns-requests/m-p/46408#M34116</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-06-07T18:51:21Z</dc:date>
    </item>
    <item>
      <title>Re: Forward DNS requests</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/forward-dns-requests/m-p/46409#M34117</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class="T_Text" style="color: #000000; font-family: 'Microsoft Sans Serif'; font-size: 10pt; margin: 0px 0px 3pt;"&gt;According to the Docs:&lt;/P&gt;&lt;P class="T_Text" style="color: #000000; font-family: 'Microsoft Sans Serif'; font-size: 10pt; margin: 0px 0px 3pt;"&gt;&lt;A name="1443689"&gt;For all DNS queries that are directed to an interface IP address, the firewall supports the &lt;/A&gt;selective directing of queries to different DNS servers &lt;STRONG&gt;based on full or partial domain names&lt;/STRONG&gt;. TCP or UDP DNS queries are sent through the configured interface. UDP queries fail over to TCP when a DNS query answer is too long for a single UDP packet.&lt;/P&gt;&lt;P class="T_Text" style="color: #000000; font-family: 'Microsoft Sans Serif'; font-size: 10pt; margin: 0px 0px 3pt;"&gt;&lt;A name="1468416"&gt;If the domain name is not found in the DNS proxy cache, the domain name is searched for a &lt;/A&gt;match based on configuration of the entries in the specific DNS proxy object (on the interface on which the DNS query arrived) and forwarded to a name server based on the match results. If no match is found, the default name servers are used. Static entries and caching are also supported.&lt;/P&gt;&lt;P class="T_Text" style="color: #000000; font-family: 'Microsoft Sans Serif'; font-size: 10pt; margin: 0px 0px 3pt;"&gt;&lt;/P&gt;&lt;P class="T_Text" style="color: #000000; font-family: 'Microsoft Sans Serif'; font-size: 10pt; margin: 0px 0px 3pt;"&gt;It would be interesting to try.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Jun 2013 19:23:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/forward-dns-requests/m-p/46409#M34117</guid>
      <dc:creator>craymond</dc:creator>
      <dc:date>2013-06-07T19:23:26Z</dc:date>
    </item>
    <item>
      <title>Re: Forward DNS requests</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/forward-dns-requests/m-p/46410#M34118</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, except from DNS-proxy another way to accomplish this is using U-turn NAT configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Source Zone: Trust-Zone&lt;/P&gt;&lt;P&gt;Dest Zone: Untrust-Zone &lt;/P&gt;&lt;P&gt;service: dns (53tcp +53udp)&lt;/P&gt;&lt;P&gt;Source : Your internal network&lt;/P&gt;&lt;P&gt;Dest: External Dns server IP (ie 8.8.8.8 google)&lt;/P&gt;&lt;P&gt;Source translate: dynamic-ip-port (PAT) of your internal firewall interface&lt;/P&gt;&lt;P&gt;Dest translate: Your internal DNS server IP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also you need a permit security policy from Trust-Zone to Trust-Zone&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The drawback that you need a NAT entry for every external dns server, but if you verify which ones is mostly used I think that 10 rules could match 90% of your dns external requests. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Jun 2013 08:16:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/forward-dns-requests/m-p/46410#M34118</guid>
      <dc:creator>NGS_SOC</dc:creator>
      <dc:date>2013-06-08T08:16:15Z</dc:date>
    </item>
    <item>
      <title>Re: Forward DNS requests</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/forward-dns-requests/m-p/46411#M34119</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That solution is talked before.There are many Dns public and 1 rule for every ip is not good.&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Jun 2013 08:36:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/forward-dns-requests/m-p/46411#M34119</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2013-06-08T08:36:18Z</dc:date>
    </item>
  </channel>
</rss>

