<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DNS Block and Notification on Specific Networks in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/dns-block-and-notification-on-specific-networks/m-p/282655#M76113</link>
    <description>&lt;P&gt;Just a thought... would the entire operation be smoother if you just forwarded all DNS requests to your internal boxes via NAT policies...?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 14 Aug 2019 06:20:23 GMT</pubDate>
    <dc:creator>Mick_Ball</dc:creator>
    <dc:date>2019-08-14T06:20:23Z</dc:date>
    <item>
      <title>DNS Block and Notification on Specific Networks</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-block-and-notification-on-specific-networks/m-p/282502#M76099</link>
      <description>&lt;P&gt;Greetings all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm toning down some of our NAC enforcement in favor of trying to find other ways to secure the network (lots of users on BYOD don't like to install a 3rd party client to monitor their device).&amp;nbsp; One of the things we were doing was to check for proper DNS settings.&amp;nbsp; We block external DNS in favor of using several sets of internal servers so that our BYOD users still have access to internal services that aren't available on the public Internet.&amp;nbsp; We're also interested in possibly using a DNS security service at some point so keeping DNS queries internal seems like a good policy still.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I had originally thought to catch the DNS queries on the way out the firewall and then somehow provide a notification to the user that they need to set their DNS settings to Obtain Automatically from DHCP.&amp;nbsp; I thougth I had figured out how to do this at some point but, for the life of me, I can't remember what I was going to do.&amp;nbsp; Blocking, obviously, is no problem but is there any way to provide from the firewall to provide a notice to the end user without them running GlobalProtect or something?&amp;nbsp; For an application block like Facebook, the browser is open and intigating the app usage but DNS happens a lot behind the scenes and I wasn't sure if there was a way to display the notification.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2019 15:50:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-block-and-notification-on-specific-networks/m-p/282502#M76099</guid>
      <dc:creator>jsalmans</dc:creator>
      <dc:date>2019-08-13T15:50:47Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Block and Notification on Specific Networks</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-block-and-notification-on-specific-networks/m-p/282655#M76113</link>
      <description>&lt;P&gt;Just a thought... would the entire operation be smoother if you just forwarded all DNS requests to your internal boxes via NAT policies...?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Aug 2019 06:20:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-block-and-notification-on-specific-networks/m-p/282655#M76113</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2019-08-14T06:20:23Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Block and Notification on Specific Networks</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-block-and-notification-on-specific-networks/m-p/282702#M76124</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/9981"&gt;@Mick_Ball&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Just a thought... would the entire operation be smoother if you just forwarded all DNS requests to your internal boxes via NAT policies...?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Possibly and it is certainly something to consider.&amp;nbsp; I'm not sure how many of these devices are using anything like DNSSEC.&amp;nbsp; The worst part would be that I'd probably have to do a hairpin NAT since the servers reside on the same area of the network as the users I want to do this for so I'd have to adjust both source and destination IPs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Another alternative might be to spoof the IP addresses on the DNS servers themselves so that they respond to queries to 8.8.8.8 and 8.8.4.4 but I'm not sure if that is considered bad practice.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Aug 2019 12:54:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-block-and-notification-on-specific-networks/m-p/282702#M76124</guid>
      <dc:creator>jsalmans</dc:creator>
      <dc:date>2019-08-14T12:54:12Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Block and Notification on Specific Networks</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-block-and-notification-on-specific-networks/m-p/282707#M76127</link>
      <description>&lt;P&gt;spoofing would work but of course this would need to be routable....&amp;nbsp; also... if you are using google as a forwarder for external dennis then big fail. Not to mention RFC1918 blahdy blah........&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The NAT will only need to setup once and then left alone, no security policy required as interzoney stuff...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PAN knows this as a U-Turn NAT.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;helpful link here....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClEiCAK" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClEiCAK&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Aug 2019 13:16:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-block-and-notification-on-specific-networks/m-p/282707#M76127</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2019-08-14T13:16:05Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Block and Notification on Specific Networks</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-block-and-notification-on-specific-networks/m-p/283351#M76214</link>
      <description>&lt;P&gt;There is no method to return a display to the user that their DNS settings need to be updated.&lt;/P&gt;&lt;P&gt;The NAT idea is interesting and maybe the best option besides expecting your users to eventually figure it out.&lt;/P&gt;&lt;P&gt;I would certainly not use spoofing - and it wouldnt resolve the overall problem.&amp;nbsp; Sure, Google's DNS servers are probably the most popular but there are infinite other options people could use that would break.&lt;/P&gt;&lt;P&gt;Personally, I would just publish the policy that you don't accept static IP (or DNS) configurations and let users figure it out.&amp;nbsp; But obviously, every organization is different.&lt;/P&gt;</description>
      <pubDate>Sun, 18 Aug 2019 01:57:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-block-and-notification-on-specific-networks/m-p/283351#M76214</guid>
      <dc:creator>TSilverline</dc:creator>
      <dc:date>2019-08-18T01:57:54Z</dc:date>
    </item>
  </channel>
</rss>

