<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DNS Query going through implied rules in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-Query-going-through-implied-rules/m-p/152796#M25506</link>
    <description>&lt;P&gt;Traffic originating from the gateway itself is typically allowed (and not logged) through implied rules...unless you've turned that off.&lt;/P&gt;</description>
    <pubDate>Tue, 12 Jul 2022 12:59:24 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2022-07-12T12:59:24Z</dc:date>
    <item>
      <title>DNS Query going through implied rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-Query-going-through-implied-rules/m-p/89646#M10924</link>
      <description>&lt;P&gt;Currently, In checkpoint firewall (R80.20 take 47) i see lot of DNS query request is going from firewalls IPs to Internal DNS servers. I want to stop this because DNS&lt;BR /&gt;query is coming from firewalls IPs and its pointing to malicious dominas via interanl DNS servers.&lt;/P&gt;&lt;P&gt;Secondly, I changed the DNS settings to Public DNS servers and also , i have uncheck Implied rules i.e "Accept Domain Name UDP QUERIES" and "Accept incoming traffic to DHCP and DNS services of gateways" but&lt;BR /&gt;till i see DNS request is coming through security gateways to AD servers.&lt;/P&gt;&lt;P&gt;Can anyone guide or help us why such behaviour is observed ??&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jun 2020 07:23:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-Query-going-through-implied-rules/m-p/89646#M10924</guid>
      <dc:creator>Sanjay_Gounder</dc:creator>
      <dc:date>2020-06-24T07:23:18Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Query going through implied rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-Query-going-through-implied-rules/m-p/90251#M10925</link>
      <description>The DNS Server being queried here is a function of what you've configured in GAIA OS.&lt;BR /&gt;Change it to a different server.</description>
      <pubDate>Wed, 01 Jul 2020 00:31:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-Query-going-through-implied-rules/m-p/90251#M10925</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-07-01T00:31:49Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Query going through implied rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-Query-going-through-implied-rules/m-p/152595#M25430</link>
      <description>&lt;P&gt;We are seeing exactly the same issue, but need to identify the infected client that is presumably using the FW as DNS proxy. I have triend packet capture and cannot see the initial query, only the query from the FW to DNS server. I've created a spoofed zone on our DNS server and A records for the suspect queries to try and trap the client, but it's not connecting to the spoofed IP. CP logs do not show the original client query. Any ideas how I might find the culprit? Can you turn on logging for the DNS proxy service?&lt;/P&gt;</description>
      <pubDate>Fri, 08 Jul 2022 15:56:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-Query-going-through-implied-rules/m-p/152595#M25430</guid>
      <dc:creator>SteveM</dc:creator>
      <dc:date>2022-07-08T15:56:16Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Query going through implied rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-Query-going-through-implied-rules/m-p/152602#M25431</link>
      <description>&lt;P&gt;When your clients attempt to access resources on the internet by name, these must be resolved to IPs for traffic to be forwarded.&lt;/P&gt;
&lt;P&gt;Gateway will query DNS servers configured in its properties to do so.&lt;/P&gt;
&lt;P&gt;If your clients and DNS servers are in different networks connected to different interfaces of the gateway, you can identify those that are querying malicious destinations.&lt;/P&gt;
&lt;P&gt;If you have a flat network, the origins of the query will be your internal DNS servers.&lt;/P&gt;
&lt;P&gt;When you are stating that "DNS query is coming from firewalls IPs", I'd like to know where you re seeing it.&lt;/P&gt;
&lt;P&gt;Post the firewall logs replacing your actual public IPs with bogus entries.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Jul 2022 17:53:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-Query-going-through-implied-rules/m-p/152602#M25431</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2022-07-08T17:53:55Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Query going through implied rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-Query-going-through-implied-rules/m-p/152656#M25439</link>
      <description>&lt;P&gt;In my experience, if you change DNS (either via clish or Web GUI) the appliance needs to be rebooted for the change to take effect.&amp;nbsp; If the impact is too high restarting the WSDNSD process might also do the trick&lt;/P&gt;
&lt;DIV dir="auto"&gt;cpwd_admin stop -name WSDNSD -path "$FWDIR/bin/wsdnsd" -command "kill -SIGTERM $(pidof $FWDIR/bin/wsdnsd)"&lt;/DIV&gt;
&lt;DIV dir="auto"&gt;cpwd_admin start -name WSDNSD -path "$FWDIR/bin/wsdnsd" -command "wsdnsd"&lt;/DIV&gt;</description>
      <pubDate>Mon, 11 Jul 2022 08:10:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-Query-going-through-implied-rules/m-p/152656#M25439</guid>
      <dc:creator>Ruan_Kotze</dc:creator>
      <dc:date>2022-07-11T08:10:13Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Query going through implied rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-Query-going-through-implied-rules/m-p/152679#M25461</link>
      <description>&lt;P&gt;Thank you for your replies and let me try and elaborate. Logs on our internal DNS server show DNS A record queries for known C&amp;amp;C FQDNs. The logs on the server (and packet capture taken on server) both show the source IP of the query being the&amp;nbsp; Checkpoint interbal Cluster IP. We need to identify the client(s) trying to resolve these C&amp;amp;C FQDNs.&lt;/P&gt;&lt;P&gt;Now clearly since the source IP of the query is the Checkpoint VIP, a device (not on our internal LAN) is either querying the internal DNS server directly and the traffic is being NATd to the Cluster internal VIP (this can't be the case as not shown in FW logs, or tcpdump taken on Checkpoint). Or perhaps the client(s) are performing DNS query against one of the FW interface IPs and the Checkpoint DNS proxy daemon is then querying the internal DNS server - but if this is the case, once again neither the client -&amp;gt; FW DNS query is logged, nor is the FW -&amp;gt; internal DNS query. Neither are showing in a tcpdump.&lt;/P&gt;&lt;P&gt;So I can't post any logs here as nothing is logged for these suspicious DNS queries yet they are either originating from, or being proxied by, the Checkpoint. Logging of Implied Rules is also enabled.&lt;/P&gt;&lt;P&gt;Mystery!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Jul 2022 10:37:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-Query-going-through-implied-rules/m-p/152679#M25461</guid>
      <dc:creator>SteveM</dc:creator>
      <dc:date>2022-07-11T10:37:06Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Query going through implied rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-Query-going-through-implied-rules/m-p/152680#M25462</link>
      <description>&lt;P&gt;Might be worth double-checking that&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk74060" target="_self"&gt;DNS Trap&lt;/A&gt; is enabled?&amp;nbsp; With it enabled, doing a log query for traffic where the destination&amp;nbsp;is your trap IP (default is&amp;nbsp;62.0.58.94) should show the offending client IP?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Jul 2022 10:48:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-Query-going-through-implied-rules/m-p/152680#M25462</guid>
      <dc:creator>Ruan_Kotze</dc:creator>
      <dc:date>2022-07-11T10:48:44Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Query going through implied rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-Query-going-through-implied-rules/m-p/152681#M25463</link>
      <description>&lt;P&gt;Thank you - this isn't enabled, but I've enabled the same functionality by creating zones and bogus A records for many of the C&amp;amp;C FQDNs on our internal DNS server. Unfortunately even when a bogus IP is returned, the infected client(s) are not connecting&amp;nbsp; to the IP. I really need a way to either log the original DNS query or capture the traffic - it just seems this is not possible for traffic to the Checkpoint "self"&lt;/P&gt;</description>
      <pubDate>Mon, 11 Jul 2022 11:00:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-Query-going-through-implied-rules/m-p/152681#M25463</guid>
      <dc:creator>SteveM</dc:creator>
      <dc:date>2022-07-11T11:00:30Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Query going through implied rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-Query-going-through-implied-rules/m-p/152696#M25467</link>
      <description>&lt;P&gt;Update - I originally thought the queries were from clients using one of the FW IPs as DNS server and although DNS Proxy is enabled by default, our Security Policy doesn't permit DNS queries against the FW interfaces.&lt;/P&gt;&lt;P&gt;I really need a way to locate the source of the DNS queries. The query is originating from the internal Cluster VIP and yet there is absolutely no log for these connections. Any help would be most appreciated.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Jul 2022 13:54:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-Query-going-through-implied-rules/m-p/152696#M25467</guid>
      <dc:creator>SteveM</dc:creator>
      <dc:date>2022-07-11T13:54:06Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Query going through implied rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-Query-going-through-implied-rules/m-p/152708#M25473</link>
      <description>&lt;P&gt;Mystery solved - the queries were the FWs looking up IPs for Domain objects. We have rules blocking access to many known C&amp;amp;C servers and our DNS provider was flagging that we had infected hosts. Interesting to know that "self DNS" traffic isn't logged though.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Jul 2022 15:26:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-Query-going-through-implied-rules/m-p/152708#M25473</guid>
      <dc:creator>SteveM</dc:creator>
      <dc:date>2022-07-11T15:26:05Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Query going through implied rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-Query-going-through-implied-rules/m-p/152796#M25506</link>
      <description>&lt;P&gt;Traffic originating from the gateway itself is typically allowed (and not logged) through implied rules...unless you've turned that off.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Jul 2022 12:59:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-Query-going-through-implied-rules/m-p/152796#M25506</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-07-12T12:59:24Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Query going through implied rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-Query-going-through-implied-rules/m-p/154032#M26011</link>
      <description>&lt;P&gt;Hi Steve,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;is there anyway to prove that its because of the FQDN object but nothing else?&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jul 2022 01:55:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-Query-going-through-implied-rules/m-p/154032#M26011</guid>
      <dc:creator>Wei_Jie__Ho</dc:creator>
      <dc:date>2022-07-28T01:55:23Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Query going through implied rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-Query-going-through-implied-rules/m-p/154051#M26023</link>
      <description>&lt;P&gt;Hi in our case it was obvious because thre was one rule blocking access the the FQDNs that were being resolved by the internal DNS server. Perhaps you could remove the domain object(s) from the policy and see if the DNS server is still being queried for it/them.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jul 2022 08:39:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-Query-going-through-implied-rules/m-p/154051#M26023</guid>
      <dc:creator>SteveM</dc:creator>
      <dc:date>2022-07-28T08:39:54Z</dc:date>
    </item>
  </channel>
</rss>

