Last adaptation to the version: 14.0.0
- DNS Forwarding possible with DNS over TLS (DoT)
- Individual domains can be excluded from the DNSSEC-Verification
The EDNS-option is removed in favor of the option to ignore domains during DNSSEC verification - Client names can be resolved if the host is in a DHCP-Pool with domain names
- The mDNS-Repeater is no longer configured in the name server but has receives its own own Menu
- The setting Use the provider's DNS server is now configured in the DNS-Forwarding
Introduction
The nameserver of the UTM offers:
- Forward zones: Name resolution (FQDN) in IP addresses
- Reverse zones: IP addresses into FQDN)
- Relay zones: Forwarding of queries belonging to a specific domain
- DNS Forwarding: Forwarding of all DNS queries
As a service, at least
However, it is generally recommended to use the service group
Prerequisites
Set Firewall as Namesever
UTMuser@firewall.name.fqdnNetwork Nameserver IP
The first step is to define the UTM itself as the nameserver of the firewall.
- Configuration under Server settings section DNS Server
Area
- Field Primary nameserver set the IP to 127.0.0.1 (localhost) as IP.
- Save with
Forward-Zone
A forward zone is used to convert domain names into IP addresses.
This implementation is possible in both IPv4 (A) and IPv6 (AAAA). The following setup example shows the creation of an A-RR for a public domain.
If the DNS of the firewall is used for resolution, a private IP from the internal network should be returned.
This setting is required, among other things, if a domain whose public IP is that of the firewall is accessed from the internal network.
Without this entry, a complicated port forwarding would be required, but this way the request can be sent directly to the server without any detours.
Setup under Area Zones Button .
Create A-RR

Domain that is managed by an internal DNS server

The UTM itself serves as the nameserver

DNS Forwarding
DNS ForwardingA DNS forwarding is used to forward all DNS requests made to the firewall's name server to another IP.
Add DNS Forwarding
Add DNS ForwardingMenu DNS Forwarding Button
AreaCaption | Value | Description | UTMuser@firewall.name.fqdnApplicationNameserver ![]() |
---|---|---|---|
Type: | DNS: classic unencrypted DNS-resolution | ||
IP address: | 203.0.113.113 | IP address of a DNS server to which the DNS requests should be forwarded. | |
notempty New as of v14.0
| |||
Type: | DoT: DNS over TLS DNS queries are encrypted with TLS | UTMuser@firewall.name.fqdnApplicationNameserver ![]() New as of v14.0
| |
IP address: | 1.1.1.1 Example value |
IP address of a DNS server to which the DNS requests should be forwarded. | |
Hostname | cloudflare-dns.com Example value |
The hostname is required fot thr verification of the TLS certificate | |
Saves the entry | |||
Provider-DNSProvider-DNS | |||
Use the provider's DNS server | Off | When On is activated, the DNS server of the internet provider is used | UTMuser@firewall.name.fqdnApplication ![]() |
In previous versions, this option was located in the General Settings |
Domain forwarding through a VPN tunnel
Sometimes it is necessary to forward internal domain requests to a remote name server located in a VPN.
It should be noted here that, by default, all direct requests addressed to external name servers are sent from the firewall with the external IP. However, a public IP is not routed into a VPN tunnel.
Set the name server of the firewall
Caption | Value | Description | UTMuser@firewall.name.fqdnNetwork ![]() |
---|---|---|---|
Check name server before local cache: | Yes | Should be enabled | |
Primary name server: | 127.0.0.1 | The IP of the UTM itself (localhost=127.0.0.1) | |
Secondary name server: | Can remain empty or designate another DNS in the VPN | ||
Saves the entry | |||
Create relay
Menü Menu Zones Button .
AreaCaption | Value | Description | UTMuser@firewall.name.fqdnApplicationNameserver ![]() |
---|---|---|---|
Zone name: | relay.test.local | Zone name of the desired domain | |
Type:: | Select this type | ||
IP address: | 192.168.8.5 | Click on IP address field the address of the remote name server is entered
| and in the |
Saves the entry | |||
Create network object
Menu
Button . A network object must be created for the IPSec network.Caption | Value | Description | UTMuser@firewall.name.fqdnFirewallNetwork object ![]() |
---|---|---|---|
Name: | IPSec-Network | Choose unique name | |
Type:: | Select this type | ||
Address: | 192.168.8.0/24 | The IP address corresponds to that of the IPSec network | |
Zone: | Suitable zone must be selected | ||
Saves the entry | |||
Add Rule
In the last step, a firewall rule with a Hide NAT must be created. This causes the DNS forwarding to also go into the tunnel, and not directly into the Internet.
Menu Button .
Caption | Value | UTMuser@firewall.name.fqdnFirewallPacketfilter ![]() |
---|---|---|
Aktive: | On | |
Source: | ||
Destination: | ||
Service: | ||
[-] NAT
| ||
Type:: | ||
Network object: | ||
Saves the rule and closes the dialogue. The rules must then be updated. | ||
Safe Search with external DHCP server
If an external DHCP server is used, the active web filter Safe Search often does not work for search engines, especially Google, when searching for images.
In order for this web filter to take effect there as well, the following forward zones must be set up for all ccTLDs (see https://www.google.com/supported_domains : www.google.de, www.google.ch, ...).
Menu Button .
Caption | Value | UTMuser@firewall.name.fqdnApplicationNameserver ![]() |
---|---|---|
Zone name: | www.google.com | |
Name server hostname: | localhost | |
Name server IP address: | ||
In the Name server window, click In the Edit Zone window click . | in the www.google.de zone.||
Name: | www.google.com | |
Type:: | A | |
Value: | 216.239.38.120 | |
and click again on . | ||
Name: | www.google.com | |
Type:: | AAAA | |
Value: | 2001:4860:4802:32::78 | |
Saves the entry | ||
DNA rebinding attack and prevention
This type of attack attempts to gain access to internal resources using falsified DNS responses.
The attacker needs nothing more than a domain with malicious code and a name server that answers all DNS queries for the attacker site.
1. the victim is lured to a prepared website whose IP address is only marked as valid for a few seconds.
2. Malicious code is loaded on the website, which starts a new call after the IP address has expired,
3. but which now uses a modified, proprietary DNS server to display an address from the victim's local network as the destination
4. The attacker now has access to the host with the internal IP through his malicious code (e.g. Java script)
DNS rebinding prevention prevents internal IP addresses from the local network from being issued in response to a DNS query.
Configuration
DNS Rebinding Prevention is configured under DNS Rebinding Prevention.
AreaCaption | Value | Description | UTMuser@firewall.name.fqdnApplications ![]() |
---|---|---|---|
DNS Rebinding Prevention: | On default |
Activates DNS rebinding prevention | |
Mode: | In the factory settings, all private IP addresses (class A, B and C) are blocked. The corresponding private IPv6 addresses and the unique local unicast address are also protected in automatic mode. | ||
The addresses can be set manually. | |||
Protected addresses: | All addresses that are protected by the prevention are displayed here. | ||
Saves the settings | |||
Protected aliases | |||
The DNS entries already configured are activated as protected aliases by default. Only zones for which a relay is configured are displayed. notempty As of v14.0.1 If the aliases already configured in the Zones tab are to be excluded from protection, they can be deactivated. Off | |||
mDNS-Repeater
General Settings | |||
General settings are made under General. | Area|||
Caption | Value | Description | UTMuser@firewall.name.fqdnAnwendungen ![]() |
---|---|---|---|
DNSSEC validation in resolver: | Off | notempty Caution! If DNSSEC Validation is enabled alongside Forward-Zones, it must be ensured that the domains corresponding to the forward zones can be validated within the global DNS or that they are added to the ignore domains list below. Replies corresponding to not globally registered domains are refused and lead to SERVFAIL replies for the domain in question. When this function is activated, all DNS entries are resolved with DNSSEC without exception. This would also attempt a validation in the DNS hierarchy for only local addresses. However, due to the lack of uniqueness of the local address, it cannot be registered with higher-level DNS servers. An error message appears, the address is not resolved and the zone is therefore not accessible (using DNS). This applies, for example, to .local domains! Further information on the implementation of DNSSEC can be found here. | |
Allow DNS queries only from routed and VPN networks: | On Default |
By default, only DNS queries from the following sources are answered:
| |
Off | If DNS queries are to be answered from other external networks as well, this option must be disabled | ||
Domains bei DNSSEC-Überprüfung ignorierennotempty New as of v14.0 |
Domains, die nicht mit DNSSEC validiert werden sollen | ||
DHCP Domainnamen auflösen: notempty New as of v14.0 |
anyideas.local (Pool: Local-Pool1 | Wird in den DHCP-Pool Konfigurationen | ein Domainname angegeben, sind diese Domains hier auswählbar. Wird eine Domain ausgewählt, sind die DHCP-Hosts entweder über den vergebenen Namen des statischen Leases, oder, wenn keines definiert ist, über den Clientnamen mit dem sich der Client beim DHCP Server meldet, auflösbar.|
Disable EDNS for the following servers notempty New as of v14.0 notemptyUpdate v14.0.1 |
Die EDNS-Option entfällt zu Gunsten der Option Domains bei DNSSEC-Überprüfung ignorieren
Beim nächsten Login taucht auch die Nachricht allerdings erneut auf |
![]() UTMuser@firewall.name.fqdnAnwendungen ![]() | |
Use DNS server specified by the provider: Diese Einstellung wird im Abschnitt DNS-Forwarding vorgenommen | |||