According to the Docs:
For all DNS queries that are directed to an interface IP address, the firewall supports the selective directing of queries to different DNS servers based on full or partial domain names. TCP or UDP DNS queries are sent through the configured interface. UDP queries fail over to TCP when a DNS query answer is too long for a single UDP packet.
If the domain name is not found in the DNS proxy cache, the domain name is searched for a match based on configuration of the entries in the specific DNS proxy object (on the interface on which the DNS query arrived) and forwarded to a name server based on the match results. If no match is found, the default name servers are used. Static entries and caching are also supported.
It would be interesting to try.
Hi, except from DNS-proxy another way to accomplish this is using U-turn NAT configuration
Source Zone: Trust-Zone
Dest Zone: Untrust-Zone
service: dns (53tcp +53udp)
Source : Your internal network
Dest: External Dns server IP (ie 18.104.22.168 google)
Source translate: dynamic-ip-port (PAT) of your internal firewall interface
Dest translate: Your internal DNS server IP
Also you need a permit security policy from Trust-Zone to Trust-Zone
The drawback that you need a NAT entry for every external dns server, but if you verify which ones is mostly used I think that 10 rules could match 90% of your dns external requests.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the Live Community as a whole!
The Live Community thanks you for your participation!