atp100
Good afternoon. I am configuring the ATP100 hardware firewall in transparent mode, created a new object, a new bridge, and disabled the last two ports in it. The rules created in the firewall control the passage of traffic through the bridge. Is it possible to redirect DNS traffic, for example, all that goes through the UDp53 port, so that the device can control access to specific website names through all its functionality, for example, so that reputation filters work?
All Replies
-
I don't think so you would likely need a way to have the NIC to have many interfaces a untag one with no DNS to bridge and a tag one with DNS to ATP100 then the ATP100 looks up the DNS.
I know FQDN are picked up by the transparent bridge for use in control policy
don't have a License to test reputation filter
0
Categories
- All Categories
- 415 Beta Program
- 2.4K Nebula
- 149 Nebula Ideas
- 96 Nebula Status and Incidents
- 5.7K Security
- 263 USG FLEX H Series
- 271 Security Ideas
- 1.4K Switch
- 74 Switch Ideas
- 1.1K Wireless
- 40 Wireless Ideas
- 6.4K Consumer Product
- 249 Service & License
- 387 News and Release
- 84 Security Advisories
- 29 Education Center
- 10 [Campaign] Zyxel Network Detective
- 3.5K FAQ
- 34 Documents
- 34 Nebula Monthly Express
- 85 About Community
- 73 Security Highlight