<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DNS issues in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/dns-issues/m-p/286520#M76606</link>
    <description>&lt;P&gt;run wireshark on PC check for DNS packet&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;enabled packet capture on firewall to check DNS traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As mentioned check security policy between different zones.&lt;/P&gt;</description>
    <pubDate>Wed, 04 Sep 2019 11:32:05 GMT</pubDate>
    <dc:creator>fatboy1607</dc:creator>
    <dc:date>2019-09-04T11:32:05Z</dc:date>
    <item>
      <title>DNS issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-issues/m-p/286021#M76531</link>
      <description>&lt;P&gt;Hi All,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;hoping someone could possibly shed some light on what I maybe missing in the configuration...Im going out of my mind looking at this as I just cant see it, ill try to keep it short....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I recently replaced our offsite meeting room location Juniper SRX with a PA-220:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;PPPoe Setup with VDSL modem&lt;/LI&gt;&lt;LI&gt;VPN tunnel back to main office&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;Meraki AP to provide CORP and Guest wifi (both networks broadcast from same AP)&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;Internet access pushed back to main office firewall and onto proxy server for filtering (will be removing proxy servers but not yet)&lt;/LI&gt;&lt;LI&gt;DHCP configured on Interface for CORP Wifi&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;The above setup worked without issues on the SRX - since moving across to the PA-220 I am having issues with DNS resolution:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Able to perform NSLOOKUP to domain controller at main site and resolve&lt;/LI&gt;&lt;LI&gt;unable to resolve any hostname from CORP Wifi&lt;/LI&gt;&lt;LI&gt;Tested connecting directly to the firewall via cable and setting up test network - same issues&amp;nbsp;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;I am aware that a whole number of things could cause these issues so ill list what we have done/ tested/ setup&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;x2 layer 3 subinterfaces one for CORP wifi and one for GUEST wifi - both tagged but no VLAN's configured on the PA-220&lt;/LI&gt;&lt;LI&gt;layer 3 sub interface for CORP wifi has DHCP configured with internal DNS servers - policy created to push internet traffic from this zone across the VPN tunnel to the Proxy server for internet access - VPN tunnel is up and no issues with PPPoe network access&lt;/LI&gt;&lt;LI&gt;Layer 3 Sub interface for GUEST wifi goes straight out of the firewall for internet access&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;NAT rule created for GUEST wifi - this wifi access works without issues, external DNS resolutoin with no issues&lt;/LI&gt;&lt;LI&gt;Security policies created for DC Comms including DNS access - I can see traffic coming from the PA-220 and hitting the main office firewall as allowed when running nslookups and traceroutes&lt;/LI&gt;&lt;LI&gt;Clients can obtain IP addresses from the DHCP set up on CORP Wifi and have the correct internal DNS settings&lt;/LI&gt;&lt;LI&gt;When attempting to access any internal resource by DNS name it immediately fails&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;The more i look at it the more i know ive probably missed something but cant put my finger on what....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any one have any ideas?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Aug 2019 15:50:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-issues/m-p/286021#M76531</guid>
      <dc:creator>VictoriaMyatt1</dc:creator>
      <dc:date>2019-08-30T15:50:57Z</dc:date>
    </item>
    <item>
      <title>Re: DNS issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-issues/m-p/286042#M76533</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Do you have logging enabled on the default policies, Inter/Intra zone? If not enable then and check the logs for dns traffic. If your WiFi is in a different zone than you VPN tunnel (it should be), check the logs to see if its getting blocked somewhere.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Fri, 30 Aug 2019 16:44:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-issues/m-p/286042#M76533</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2019-08-30T16:44:40Z</dc:date>
    </item>
    <item>
      <title>Re: DNS issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-issues/m-p/286520#M76606</link>
      <description>&lt;P&gt;run wireshark on PC check for DNS packet&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;enabled packet capture on firewall to check DNS traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As mentioned check security policy between different zones.&lt;/P&gt;</description>
      <pubDate>Wed, 04 Sep 2019 11:32:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-issues/m-p/286520#M76606</guid>
      <dc:creator>fatboy1607</dc:creator>
      <dc:date>2019-09-04T11:32:05Z</dc:date>
    </item>
  </channel>
</rss>

