- CheckMates
- :
- Products
- :
- General Topics
- :
- Check Point Next Generation Firewall in Front of P...
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Check Point Next Generation Firewall in Front of Públic DNS
Dear Mates
We recently bought a new DNS solution which will be used as our public server. The solution comes with security features to protect the server from different type of attacks (see attachec picture ).
We are in the process of deciding whether you should put it behind our Next Generation Firewall or not. So, I would like to ask based on your experience which solution is appropriate and why. The solutions are mentioned bellow:
1. DNS server exposed directly on the internet relying on its security features (see attached picture)
2. Next Generation Firewall (Check Point) in front of the public DNS server
What are the benefits of one solution in detriment of the other. Which set up would you advise us to follow.
Thanks in Advance
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Not to mention you can use policy to limit poking and prodding on other ports.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Apologies, but I would like to ask you a conceptual question:
Why would you expect incoming DNS queries to your on-premises public DNS server?
Typically, you'd host your public DNS locally when using it as a stealth master and replicate zones to the cloud hosted DNS providers. Those are then used to actually take hits from the outside.
Take a look here for instance: https://www.infoworld.com/article/2629086/why-you-should-use-stealth-master-dns.html
If this is the design you are working towards, then yes, place the DNS behind firewall and permit only zone replication to the cloud-based secondaries.
Regards,
Vladimir
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
We provide DNS services to some of our enterprise clients as well. And So we expect them to come to our public DNS server. Thats why we expect DNS queries from them.
Regards
Dialungana Malungo
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
It is a normal utilization of the public DNS, except by offloading your secondary zones to the cloud-based DNS services, you are removing the possibility of someone DDoSing your on-premises server.
Serving DNS directly from your master on-premises server creates two issues:
1. latency. Whoever will be trying to resolve your public addresses has to get the responses from your server, regardless of where they are located. In cloud-based secondaries, they will get the resolution from closest geographically located pool.
2. Susceptibility to denial of service: because this is the single server seating behind your ISP, simply querying it repeatedly may slow-down legitimate queries.
Perhaps there are some cases where it makes sense, but the reasons got to be justified.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I fully agree with Vladimir, hosting DNS locally and answering DNS queries direct from this isn't a good solution.
Let one of the DNS providers in the cloud answer your clients queries. They are well prepared for DDOS attacks, reliability all over the world and gives you a very good availability. You can get the same level of service with your local environment only with a lot of hardware, ISP-lines and a lot of work to do.
Maybee you need this local, but review your solution. We did the same thing for our clients and this working well with transfering the DNS-zones from us to the public cloud DNS-providers.
Wolfgang
