Using DNS Sinkhole Feature To Block DNS Queries
Using DNS Sinkhole Feature To Block DNS Queries
com/es-mx/support/knowledge-base/using-dns-sinkhole-feature-to-block-dns-queries/200426101616227/
achieve this requirement is to use split DNS tunneling so that firewall can receive the DNS queries at its end and take
EXAMPLE: Lets take "yahoo.com" domain into consideration and we will block the DNS query of this
domain via firewall with client PC configured with internal or public DNS servers.
Configure Firewall in split tunnel and point the dns query for the domain towards firewall.
To configure the domain which you want to block and point its dns query towards firewall interface IP
address, navigate to Network | DNS | Settings | Split DNS and click Add.
4. Navigate to Custom Malicious Domain Name List and click Add. 5. Enter domain name Yahoo.com 6.
and click Save.
1. To configure the split tunnel, navigate to Manage |System Setup | Nnetwork | DNS 2. .
3. Enable the checkbox for IPv4 Split DNS which states Enable proxying of split DNS servers4. .
5. Configure the domain which you want to block and point its dns query towards firewall interface IP
address.
How to Test :
Run nslookup command to generate the DNS query from a PC behind X0 network of SonicWall and check
the SonicWall Logs and Packet monitor with UDP 53 traffic as : NOTE: With DNS Sinkhole Service
action selected as 'Dropping, with DNS reply of forged IP', we need to configure the forged or masked
IP address so that firewall can return the dns query with that IP. TIP: The above requirement can also
be achieved by creating FQDN object of "yahoo.com" and blocking the DNS (Name Service) through
access-rule, but it is always recommended to limit the usage of FQDN objects to avoid unnecessary CPU
spikes in firewall.