<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic DNS Proxy Configuration with VPN in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/dns-proxy-configuration-with-vpn/m-p/258496#M73302</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm trying to route to some internal domain controllers for domain local DNS, and public DNS servers for everything else. This seems reasonably straight-forward except that when I specify the internal network IPs of the Domain DNS servers, they timeout all requests for domain DNS when looking up via the Palo DNS proxy. All other DNS resolves via the Palo DNS proxy OK.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I create a public IP for our domain DNS servers and point the DNS Proxy domain lookups to the public IP of those DNS servers, the Domain DNS resolves as does all other DNS..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From the console, the host is able to ping the internal IP of the DNS servers and the DNS servers do not have a firewall, so will talk to anyone.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The network segment in question (containing the DNS servers) is behind a VPN that is being managed by the Palo Alto as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've also created a security/zone policy that says that any zones except the external fibre interface are allowed outbound access to the VPN zone for any service, however it still times out.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm unsure how to even replicate this timeout from the Palo Alto console as I can't determine which interface the DNS Proxy makes its requests from&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This guide was followed:&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClHfCAK" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClHfCAK&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 24 Apr 2019 06:57:12 GMT</pubDate>
    <dc:creator>Envisian</dc:creator>
    <dc:date>2019-04-24T06:57:12Z</dc:date>
    <item>
      <title>DNS Proxy Configuration with VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-proxy-configuration-with-vpn/m-p/258496#M73302</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm trying to route to some internal domain controllers for domain local DNS, and public DNS servers for everything else. This seems reasonably straight-forward except that when I specify the internal network IPs of the Domain DNS servers, they timeout all requests for domain DNS when looking up via the Palo DNS proxy. All other DNS resolves via the Palo DNS proxy OK.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I create a public IP for our domain DNS servers and point the DNS Proxy domain lookups to the public IP of those DNS servers, the Domain DNS resolves as does all other DNS..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From the console, the host is able to ping the internal IP of the DNS servers and the DNS servers do not have a firewall, so will talk to anyone.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The network segment in question (containing the DNS servers) is behind a VPN that is being managed by the Palo Alto as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've also created a security/zone policy that says that any zones except the external fibre interface are allowed outbound access to the VPN zone for any service, however it still times out.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm unsure how to even replicate this timeout from the Palo Alto console as I can't determine which interface the DNS Proxy makes its requests from&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This guide was followed:&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClHfCAK" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClHfCAK&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Apr 2019 06:57:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-proxy-configuration-with-vpn/m-p/258496#M73302</guid>
      <dc:creator>Envisian</dc:creator>
      <dc:date>2019-04-24T06:57:12Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Proxy Configuration with VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-proxy-configuration-with-vpn/m-p/259622#M73600</link>
      <description>&lt;P&gt;hen you ping the dns server from the firewall, are you sourcing the ping from the interface the dnsproxy is attached to or without source (mgmt interface)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;is it possible a nat rule is between the dnsproxy interface and the vpn tunnel, or a security policy above your allow all that's still interfering?&lt;/P&gt;</description>
      <pubDate>Thu, 02 May 2019 13:31:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-proxy-configuration-with-vpn/m-p/259622#M73600</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2019-05-02T13:31:28Z</dc:date>
    </item>
  </channel>
</rss>

