reading this
In order to provide a secure and verified environment, it is advisable to use a firewall rule to prohibit any outgoing DNS traffic on port 53 when using DNS over TLS. If clients choose to directly query other nameservers on their own, a NAT redirect rule can be used to send these requests to 127.0.0.1:53, which is the local Unbound service. This will ensure that these requests are sent over TLS.
ive done the block rule
IPv4+6 TCP/UDP * * ! RFC1918 53 (DNS) * * block LAN DNS to internet
but how do i set up the NAT
what do i put in
destination - any
destination port range - 53
redirect target ip - 127.0.0.1/32 or "this firewall"
redirect target port - 53
thanks,
rob
In order to provide a secure and verified environment, it is advisable to use a firewall rule to prohibit any outgoing DNS traffic on port 53 when using DNS over TLS. If clients choose to directly query other nameservers on their own, a NAT redirect rule can be used to send these requests to 127.0.0.1:53, which is the local Unbound service. This will ensure that these requests are sent over TLS.
ive done the block rule
IPv4+6 TCP/UDP * * ! RFC1918 53 (DNS) * * block LAN DNS to internet
but how do i set up the NAT
what do i put in
destination - any
destination port range - 53
redirect target ip - 127.0.0.1/32 or "this firewall"
redirect target port - 53
thanks,
rob
"