<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Redirecting DNS in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redirecting-DNS/m-p/223661#M42905</link>
    <description>&lt;P&gt;Hi, Thank you for the answer, but I'm not sure what do you mean... translated source (as on the picture in previous post) is in Hide mode (letter H on it). The translated destination is the DNS server in my LAB.&lt;/P&gt;&lt;P&gt;If this is wrong could you please share example how should it look like?&lt;/P&gt;</description>
    <pubDate>Wed, 14 Aug 2024 14:33:37 GMT</pubDate>
    <dc:creator>MariuszT</dc:creator>
    <dc:date>2024-08-14T14:33:37Z</dc:date>
    <item>
      <title>Redirecting DNS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redirecting-DNS/m-p/65403#M23548</link>
      <description>&lt;P&gt;Running R80.30 for home use, and I want to force my kids devices to use OpenDNS Family Shield DNS Servers, while allowing other devices to use regular DNS Servers.&lt;/P&gt;&lt;P&gt;I was able to do this with DD-WRT via MAC address by using these commands. Even if the DNS Servers were changed on the device manually, they were forced to use Family Shield.&lt;/P&gt;&lt;PRE&gt;&lt;SPAN class="pln"&gt;iptables &lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;t nat &lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;I PREROUTING &lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;i br0 &lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;m mac &lt;/SPAN&gt;&lt;SPAN class="pun"&gt;--&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;mac&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;source &lt;/SPAN&gt;&lt;SPAN class="com"&gt;##:##:##:##:##:## -p udp --dport 53 -j DNAT --to 208.67.222.123&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="pln"&gt;iptables &lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;t nat &lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;I PREROUTING &lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;i br0 &lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;m mac &lt;/SPAN&gt;&lt;SPAN class="pun"&gt;--&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;mac&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;source &lt;/SPAN&gt;&lt;SPAN class="com"&gt;##:##:##:##:##:## -p tcp --dport 53 -j DNAT --to 208.67.222.123&lt;/SPAN&gt;&lt;/PRE&gt;&lt;P&gt;How do I accomplish this in GAIA?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 20 Oct 2019 19:55:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redirecting-DNS/m-p/65403#M23548</guid>
      <dc:creator>Lockout888</dc:creator>
      <dc:date>2019-10-20T19:55:52Z</dc:date>
    </item>
    <item>
      <title>Re: Redirecting DNS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redirecting-DNS/m-p/65607#M23549</link>
      <description>You cannot write rules in terms of a MAC address in the Check Point security policy.&lt;BR /&gt;You can do it by IP and create NAT rules, however, with similar effect.</description>
      <pubDate>Tue, 22 Oct 2019 21:23:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redirecting-DNS/m-p/65607#M23549</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-10-22T21:23:51Z</dc:date>
    </item>
    <item>
      <title>Re: Redirecting DNS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redirecting-DNS/m-p/65636#M23550</link>
      <description>Make sure in your DHCP the kids always get the same IP, then setup an NAT rule with service DNS and their source IP's (in a group) and in the translated add the correct destination DNS server IP.&lt;BR /&gt;In the original destination you can test to see if any is allowed, otherwise create a group with known 'Open' DNS servers like 1.1.1.1 Cloudflare, 8.8.8.8 Google, 208.67.220.220 OpenDNS and your providers' DNS servers.</description>
      <pubDate>Wed, 23 Oct 2019 09:01:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redirecting-DNS/m-p/65636#M23550</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2019-10-23T09:01:08Z</dc:date>
    </item>
    <item>
      <title>Re: Redirecting DNS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redirecting-DNS/m-p/66005#M23551</link>
      <description>&lt;P&gt;I have Original Source = IP Address Range.&amp;nbsp; Original Service = DNS. Original Destination will not allow Any.&lt;/P&gt;&lt;P&gt;When I create a Group for Original Destination and add some common DNS Servers to it, I get this error:&lt;/P&gt;&lt;P&gt;- NAT Rule 9: You cannot use the Network Group (DNS_Common) as the Original Destination.&lt;BR /&gt;The Network Group is only valid if the value of the matching translated column is 'Original'.&lt;BR /&gt;- Policy verification failed.&lt;BR /&gt;--------------------------------------------------------------------------------&lt;/P&gt;</description>
      <pubDate>Sun, 27 Oct 2019 19:44:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redirecting-DNS/m-p/66005#M23551</guid>
      <dc:creator>Lockout888</dc:creator>
      <dc:date>2019-10-27T19:44:33Z</dc:date>
    </item>
    <item>
      <title>Re: Redirecting DNS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redirecting-DNS/m-p/66593#M23552</link>
      <description>I have a similar case where some LAN computers have the CKP GW address as DNS. As this one is GAIA, and not GAIA Embedded, it does not support DNS forwarding. I have tried a NAT rule and it does not work properly.&lt;BR /&gt;&lt;BR /&gt;Any ideas on how to approach this subject raised by the original poster?&lt;BR /&gt;&lt;BR /&gt;It looks like bind-like is basic functionality yet it is missing in CKP. The previous firewall was pfSense and we replaced that. Now we have noticed we have some missing functionality - and yes we can just reconfigure all clients to use proper DNS but that is not the point. The point is rather to force unruly or rogue clients (maybe on wifi) to use a filtered or specific DNS and not whatever they like DNS</description>
      <pubDate>Tue, 05 Nov 2019 13:30:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redirecting-DNS/m-p/66593#M23552</guid>
      <dc:creator>cezar_varlan1</dc:creator>
      <dc:date>2019-11-05T13:30:51Z</dc:date>
    </item>
    <item>
      <title>Re: Redirecting DNS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redirecting-DNS/m-p/66598#M23553</link>
      <description>It seems to me the correct approach is to block DNS to all servers but the ones you want to allow in the Access Policy.&lt;BR /&gt;The one(s) allowed would be provided by DHCP.&lt;BR /&gt;&lt;BR /&gt;Destination NAT must be a 1 to 1 mapping (i.e. you cannot map multiple destinations to a single one using a single rule).&lt;BR /&gt;If you have clients that MUST use a specific DNS server that's not a preferred one, you could create a specific NAT rule that routes the request to your preferred destination.&lt;BR /&gt;Something like:&lt;BR /&gt;&lt;BR /&gt;Original Source: Client IP range&lt;BR /&gt;Original Destination: 8.8.8.8&lt;BR /&gt;Original Service: DNS&lt;BR /&gt;Translated Source: Gateway (Hide)&lt;BR /&gt;Translated Destination: x.y.z.w&lt;BR /&gt;Translated Service: Original</description>
      <pubDate>Tue, 05 Nov 2019 13:58:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redirecting-DNS/m-p/66598#M23553</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-11-05T13:58:36Z</dc:date>
    </item>
    <item>
      <title>Re: Redirecting DNS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redirecting-DNS/m-p/72922#M23554</link>
      <description>&lt;P&gt;Yep. I have the same requirement.&lt;/P&gt;&lt;P&gt;RFE ID: WZD-515-34316&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jan 2020 22:09:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redirecting-DNS/m-p/72922#M23554</guid>
      <dc:creator>John_Tomasetti</dc:creator>
      <dc:date>2020-01-21T22:09:00Z</dc:date>
    </item>
    <item>
      <title>Re: Redirecting DNS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redirecting-DNS/m-p/147508#M23555</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;I know it's been a while since you posted this answer but I'm just replying to thank you. You're a lifesaver.&lt;/P&gt;</description>
      <pubDate>Sun, 01 May 2022 00:53:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redirecting-DNS/m-p/147508#M23555</guid>
      <dc:creator>ClauberTeles</dc:creator>
      <dc:date>2022-05-01T00:53:36Z</dc:date>
    </item>
    <item>
      <title>Re: Redirecting DNS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redirecting-DNS/m-p/223431#M42841</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I know that this topic is old, but... have anything changed in that matter? It would be nice to create only one NAT rule with source *any and prefered DNS server as destination, and not separate rules for each host.&lt;/P&gt;&lt;P&gt;Greetings,&lt;/P&gt;&lt;P&gt;Mariusz&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2024 07:56:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redirecting-DNS/m-p/223431#M42841</guid>
      <dc:creator>MariuszT</dc:creator>
      <dc:date>2024-08-13T07:56:04Z</dc:date>
    </item>
    <item>
      <title>Re: Redirecting DNS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redirecting-DNS/m-p/223514#M42864</link>
      <description>&lt;P&gt;As far as I know, nothing has changed.&lt;BR /&gt;However, the above rule might work better like this:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Original Source: All_Internet&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Original Destination: All_Internet&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Original Service: DNS&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Translated Source: Gateway (Hide)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Translated Destination: x.y.z.w&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Translated Service: Original&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;This should translate any DNS packet traversing your gateway to your preferred DNS server hidden behind the gateway's external IP.&lt;BR /&gt;Whether this actually works is a separate question.&lt;/P&gt;
&lt;P&gt;dnsmasq is also available, which appears to be enabled in R82 and &lt;A href="https://phoneboy.org/2014/09/02/fun-with-check-point-dynamic-ip-gateways-in-r77-dot-20-with-gaia/" target="_self"&gt;possible to enable in other releases&lt;/A&gt;.&amp;nbsp;&lt;BR /&gt;This could be configured as a forwarding DNS server.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2024 14:41:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redirecting-DNS/m-p/223514#M42864</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-08-13T14:41:39Z</dc:date>
    </item>
    <item>
      <title>Re: Redirecting DNS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redirecting-DNS/m-p/223559#M42882</link>
      <description>&lt;P&gt;The rule you provided is not accepted during policy installation. The error is the same if in source is used *any/network/group object. It is only allowed to put host object in source field.&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="image.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/27231iE2C44E13AA5AB7D2/image-size/medium?v=v2&amp;amp;px=400" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Aug 2024 04:10:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redirecting-DNS/m-p/223559#M42882</guid>
      <dc:creator>MariuszT</dc:creator>
      <dc:date>2024-08-14T04:10:11Z</dc:date>
    </item>
    <item>
      <title>Re: Redirecting DNS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redirecting-DNS/m-p/223642#M42902</link>
      <description>&lt;P&gt;You did not create the rule as I described.&lt;BR /&gt;The Translated Source must be changed to HIDE (not static as shown)&lt;BR /&gt;The Translated Destination must contain the specific DNS server you want to redirect requests to.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Aug 2024 12:47:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redirecting-DNS/m-p/223642#M42902</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-08-14T12:47:09Z</dc:date>
    </item>
    <item>
      <title>Re: Redirecting DNS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redirecting-DNS/m-p/223661#M42905</link>
      <description>&lt;P&gt;Hi, Thank you for the answer, but I'm not sure what do you mean... translated source (as on the picture in previous post) is in Hide mode (letter H on it). The translated destination is the DNS server in my LAB.&lt;/P&gt;&lt;P&gt;If this is wrong could you please share example how should it look like?&lt;/P&gt;</description>
      <pubDate>Wed, 14 Aug 2024 14:33:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redirecting-DNS/m-p/223661#M42905</guid>
      <dc:creator>MariuszT</dc:creator>
      <dc:date>2024-08-14T14:33:37Z</dc:date>
    </item>
    <item>
      <title>Re: Redirecting DNS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redirecting-DNS/m-p/223688#M42911</link>
      <description>&lt;P&gt;Destination should probably be "any" instead of All_Internet...I believe that should resolve the validation issue.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Aug 2024 18:59:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redirecting-DNS/m-p/223688#M42911</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-08-14T18:59:23Z</dc:date>
    </item>
  </channel>
</rss>

