1. Allow AD DNS to Internet:Action Interface Direction Protocol Source Destination DPortPass ALL_LAN Out TCP/UDP H_Internal_DNS H_External_DNS P_DNS2. Allow Any Internal Device/Network to AD DNSAction Interface Direction Protocol Source Destination DPortPass ALL_LAN In TCP/UDP Any H_Internal_DNS P_DNS3. Block Any Internal Device/Network from Internet DNSAction Interface Direction Protocol Source Destination DPortBlock ALL_LAN In TCP/UDP Any Any P_DNS
1. Block outgoing DNS requests from any internal interface going to the internet2. Allow outgoing DNS requests from any internal interface going to my internal DNS server (AD)3. Allow my internal DNS server (AD) to send DNS requests to specific internet DNS hosts (Currently Google DNS)4. Redirect requests from any interface for DNS to my internal DNS server only
1. Allow AD DNS to Internet:Action Interface Direction Protocol Source Destination DPortPass ALL_LAN Out TCP/UDP H_Internal_DNS H_External_DNS P_DNS2. Linked rule created via the NATAction Interface Direction Protocol Source Destination DPortPass ALL_LAN In TCP/UDP Any H_Internal_DNS P_DNS3. Block Any Internal Device/Network from Internet DNS (just in case)Action Interface Direction Protocol Source Destination DPortBlock ALL_LAN In TCP/UDP Any Any P_DNS
Block All IPv6:Action Interface Direction TCP/IP Protocol Source SPort Destination DPortBlock ALL_LAN, WAN Any IPv6 Any Any Any Any Any
1. Block everything from the LAN/VLANS to the WAN (Internet)2. Then I selectively allow specific devices and ports to the WAN based on Host Groups and Port Groups,
Action Interface Direction TCP/IP Protocol Source Destination DPortPass <Interface> in IPv4 Any <interface> net <interface> address AnyBlock <Interface> In IPv4 Any <interface> net N_Private_Networks AnyBlock <Interface> In IPv4 Any <interface> net Any Any