It’s a Chicken and Egg problem:
- The forward DNS (e.g. hostname.example.com > 192.0.2.1) rarely matches the reverse DNS (192.0.2.1 > not.a.valid.name)
- We don’t know every host in *.example.com
- Short of looking at the DNS request, there’s no real way to know before a the TCP connection is established whether we are connecting to somehost.example.com. Even then, this is only feasible if the gateway is between your clients and the DNS server.
A clever way to solve this problem might be to use Anti-Bot DNS Trap.
What this will do is replace lookups for the domain with a bogus IP that goes...nowhere.
This assumes Anti-Virus and/or Anti-Bot blades are enabled.
Configure this in the relevant profile:
![Capture1.PNG Capture1.PNG](https://community.checkpoint.com/t5/image/serverpage/image-id/1302iC22F17E5CAD0724C/image-size/large?v=v2&px=999)
You can create a CSV file with the relevant domains in it.
Something like:
observ1,somedomain1.com,Domain,,low,AV,Domain_to_block
observ2,somedomain2.com,Domain,,low,AV,Domain_to_block
observ3,somedomain3.com,Domain,,low,AV,Domain_to_block
Upload it as indicators:
![Capture2.PNG Capture2.PNG](https://community.checkpoint.com/t5/image/serverpage/image-id/1303i058C2E1D4025A5FE/image-size/large?v=v2&px=999)
Install policy.