atp100
Good afternoon. I am configuring the ATP100 hardware firewall in transparent mode, created a new object, a new bridge, and disabled the last two ports in it. The rules created in the firewall control the passage of traffic through the bridge. Is it possible to redirect DNS traffic, for example, all that goes through the UDp53 port, so that the device can control access to specific website names through all its functionality, for example, so that reputation filters work?
All Replies
-
I don't think so you would likely need a way to have the NIC to have many interfaces a untag one with no DNS to bridge and a tag one with DNS to ATP100 then the ATP100 looks up the DNS.
I know FQDN are picked up by the transparent bridge for use in control policy
don't have a License to test reputation filter
0
Categories
- All Categories
- 415 Beta Program
- 2.4K Nebula
- 151 Nebula Ideas
- 100 Nebula Status and Incidents
- 5.8K Security
- 284 USG FLEX H Series
- 278 Security Ideas
- 1.5K Switch
- 74 Switch Ideas
- 1.1K Wireless
- 42 Wireless Ideas
- 6.5K Consumer Product
- 251 Service & License
- 396 News and Release
- 85 Security Advisories
- 29 Education Center
- 10 [Campaign] Zyxel Network Detective
- 3.6K FAQ
- 34 Documents
- 34 Nebula Monthly Express
- 86 About Community
- 75 Security Highlight