Overview
Provides instructions to configure a trusted DNS server in Firewall Management Center (FMC) so that Threat Defense devices can resolve application domains for DIA traffic.
Application detection in DIA relies on DNS snooping to map the application domains to IPs in order to detect the application or a group of applications. To ensure that DNS requests are not resolved by rogue DNS servers and are indeed locked to desired DNS servers, Firewall Management Center allows you to configure trusted DNS servers for Firewall Threat Defense devices. Thus, the firewall only snoops the traffic that goes to trusted DNS servers. Apart from configuring the trusted DNS servers, you can include the already configured servers in DNS server group, DHCP pool, DHCP relay, and DHCP client as trusted DNS servers.
For an application-based PBR, you must configure trusted DNS servers. You must also ensure that the DNS traffic passes through threat defense in a clear-text format (encrypted DNS is not supported) so that domains can be resolved to detect applications.
Before you begin
-
Ensure you have created one or more DNS server groups. For more information, see Creating DNS Server Group Objects.
-
Ensure you have created interface objects to connect to the DNS servers.
-
Ensure that the managed device has appropriate static or dynamic routes to access the DNS servers.
Procedure
| 1. | Choose and edit a threat defense policy. |
|
| 2. | Click the Edit ( |
|
| 3. | Click DNS. |
|
| 4. | To configure the trusted DNS servers, click the Trusted DNS Servers tab. |
|
| 5. | To choose DNS_Server from the existing host objects, under Available Host Objects, search for it using the search field, and click Add to include it to the Selected DNS Servers list.
|
|
| 6. | Click Save. The added DNS server is displayed in the Trusted DNS Servers page. |
|
| 7. | Click Policy Assignments to ensure NGFWBR1 is already in the Selected Devices list. |
|
| 8. | Click OK to confirm the changes. |
|
| 9. | Click Save to write the changes for platform settings. |
