atp100
Good afternoon. I am configuring the ATP100 hardware firewall in transparent mode, created a new object, a new bridge, and disabled the last two ports in it. The rules created in the firewall control the passage of traffic through the bridge. Is it possible to redirect DNS traffic, for example, all that goes through the UDp53 port, so that the device can control access to specific website names through all its functionality, for example, so that reputation filters work?
All Replies
-
I don't think so you would likely need a way to have the NIC to have many interfaces a untag one with no DNS to bridge and a tag one with DNS to ATP100 then the ATP100 looks up the DNS.
I know FQDN are picked up by the transparent bridge for use in control policy
don't have a License to test reputation filter
0
Categories
- All Categories
- 442 Beta Program
- 2.9K Nebula
- 219 Nebula Ideas
- 127 Nebula Status and Incidents
- 6.5K Security
- 601 USG FLEX H Series
- 344 Security Ideas
- 1.7K Switch
- 84 Switch Ideas
- 1.4K Wireless
- 52 Wireless Ideas
- 7K Consumer Product
- 298 Service & License
- 480 News and Release
- 92 Security Advisories
- 31 Education Center
- 10 [Campaign] Zyxel Network Detective
- 4.8K FAQ
- 34 Documents
- 87 About Community
- 105 Security Highlight
Freshman Member
Guru Member