<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic DNS traffic allowed for one server but dropped for another in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/dns-traffic-allowed-for-one-server-but-dropped-for-another/m-p/68599#M39990</link>
    <description>&lt;P&gt;I have a perplexing problem with allowing DNS traffic from internal to the internet on our new PA-3020 running 7.0.3.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have 2 DNS servers in our datacentre on the same subnet that perform queries to a couple of external DNS servers provided by our telco.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a rule allowing traffic from the 2 IP's (Internal Zone) for our DNS servers out to the internet (any) on UDP port 53&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;One server is successfully using this rule but the other server bypasses the rule and gets blocked by the explicit deny at the bottom. The traffic log shows the correct port (53) but the application is "not-applicable". I've tried the following "application/service" settings but there is no change to the issue:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Application: any &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Service UDP 53&lt;/P&gt;
&lt;P&gt;Application: dns &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Service: application-default&lt;/P&gt;
&lt;P&gt;Application: dns &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Service UDP 53&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I've done packet captures on the server that's not working and the destination port for the traffic is UDP 53 so I'm at a real loss to know why this is happening. Can anyone assist me here please?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;</description>
    <pubDate>Wed, 25 Nov 2015 02:36:32 GMT</pubDate>
    <dc:creator>Mitre10</dc:creator>
    <dc:date>2015-11-25T02:36:32Z</dc:date>
    <item>
      <title>DNS traffic allowed for one server but dropped for another</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-traffic-allowed-for-one-server-but-dropped-for-another/m-p/68599#M39990</link>
      <description>&lt;P&gt;I have a perplexing problem with allowing DNS traffic from internal to the internet on our new PA-3020 running 7.0.3.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have 2 DNS servers in our datacentre on the same subnet that perform queries to a couple of external DNS servers provided by our telco.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a rule allowing traffic from the 2 IP's (Internal Zone) for our DNS servers out to the internet (any) on UDP port 53&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;One server is successfully using this rule but the other server bypasses the rule and gets blocked by the explicit deny at the bottom. The traffic log shows the correct port (53) but the application is "not-applicable". I've tried the following "application/service" settings but there is no change to the issue:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Application: any &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Service UDP 53&lt;/P&gt;
&lt;P&gt;Application: dns &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Service: application-default&lt;/P&gt;
&lt;P&gt;Application: dns &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Service UDP 53&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I've done packet captures on the server that's not working and the destination port for the traffic is UDP 53 so I'm at a real loss to know why this is happening. Can anyone assist me here please?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Wed, 25 Nov 2015 02:36:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-traffic-allowed-for-one-server-but-dropped-for-another/m-p/68599#M39990</guid>
      <dc:creator>Mitre10</dc:creator>
      <dc:date>2015-11-25T02:36:32Z</dc:date>
    </item>
    <item>
      <title>Re: DNS traffic allowed for one server but dropped for another</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-traffic-allowed-for-one-server-but-dropped-for-another/m-p/68600#M39991</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If the application is not-applicable, it means the firewall didn't even bother trying to identify the application because no rule with the protocol/port matched the packet. Are you sure the blocked traffic is not TCP? DNS can be UDP or TCP, so you should just use application default in the case of DNS. Alternatively, add another service for TCP port 53.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Benjamin&lt;/P&gt;</description>
      <pubDate>Wed, 25 Nov 2015 05:12:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-traffic-allowed-for-one-server-but-dropped-for-another/m-p/68600#M39991</guid>
      <dc:creator>BenjAudy.MTL</dc:creator>
      <dc:date>2015-11-25T05:12:16Z</dc:date>
    </item>
  </channel>
</rss>

