Last adaptation to the version: 14.1.0 (08.2025)
- If there is a Cloud Shield configuration via the USC, no DNS forwarding can be configured locally
- DNS Forwarding possible with DNS over TLS (DoT)
- Individual domains can be excluded from the DNSSEC-Verification
The EDNS-option is removed in favor of the option to ignore domains during DNSSEC verification - Client names can be resolved if the host is in a DHCP-Pool with domain names
- The mDNS-Repeater is no longer configured in the name server but has receives its own own Menu
- The setting Use the provider's DNS server is now configured in the DNS-Forwarding
- 10.2025
- Updated hints for PTR-RR
Introduction
The nameserver of the UTM offers:
- Forward zones: Name resolution (FQDN) in IP addresses
- Reverse zones: IP addresses into FQDN)
- Relay zones: Forwarding of queries belonging to a specific domain
- DNS Forwarding: Forwarding of all DNS queries
As a service, at least
However, it is generally recommended to use the service group
Prerequisites
Set Firewall as Namesever
UTMuser@firewall.name.fqdnNetwork
Nameserver IP
The first step is to define the UTM itself as the nameserver of the firewall.
- Configuration under Area Server settings section DNS Server
- Field Primary nameserver set the IP to 127.0.0.1 (localhost) as IP.
- Save with
Forward-Zone
A forward zone is used to convert domain names into IP addresses.
This implementation is possible in both IPv4 (A) and IPv6 (AAAA). The following setup example shows the creation of an A-RR for a public domain.
If the DNS of the firewall is used for resolution, a private IP from the internal network should be returned.
This setting is required, among other things, if a domain whose public IP is that of the firewall is accessed from the internal network.
Without this entry, a complicated port forwarding would be required, but this way the request can be sent directly to the server without any detours.
Setup under Area Zones button .
Create A-RR
DNS Forwarding
A DNS forwarding is used to forward all DNS requests made to the firewall's name server to another IP.
Cloud Shield Cloud Shield notempty New as of v14.1.0 | |||
|
UTMuser@firewall.name.fqdnApplication Cloud Shield configuration available in the USP
| ||
DNS Forwarding | |||
Add DNS Forwarding Add DNS Forwarding Menu Area DNS Forwarding button | |||
| Caption | Value | Description | UTMuser@firewall.name.fqdnApplicationNameserver Creating a DNS Forwarding
|
|---|---|---|---|
| Type: | DNS: classic unencrypted DNS-resolution | ||
| IP address: | 203.0.113.113 | IP address of a DNS server to which the DNS requests should be forwarded. | |
| notempty New as of v14.0 | |||
| Type: | DoT: DNS over TLS DNS queries are encrypted with TLS | UTMuser@firewall.name.fqdnApplicationNameserver DNS over TLS notemptyNew as of v14.0 | |
| IP address: | 1.1.1.1 Example value |
IP address of a DNS server to which the DNS requests should be forwarded. | |
| Hostname | cloudflare-dns.com Example value |
The hostname is required fot thr verification of the TLS certificate | |
| Saves the entry | |||
Provider-DNS Provider-DNS | |||
| Use the provider's DNS server | Off | When On is activated, the DNS server of the internet provider is used | UTMuser@firewall.name.fqdnApplication
|
Domain forwarding through a VPN tunnel
Sometimes it is necessary to forward internal domain requests to a remote name server located in a VPN.
It should be noted here that, by default, all direct requests addressed to external name servers are sent from the firewall with the external IP. However, a public IP is not routed into a VPN tunnel.
Set the name server of the firewall
| Caption | Value | Description | UTMuser@firewall.name.fqdnNetwork Name server IP
|
|---|---|---|---|
| Check name server before local cache: | Yes | Should be enabled | |
| Primary name server: | 127.0.0.1 | The IP of the UTM itself (localhost=127.0.0.1) | |
| Secondary name server: | Can remain empty or designate another DNS in the VPN | ||
| Saves the entry | |||
Create relay
Menu Area Zones button .
| Caption | Value | Description | UTMuser@firewall.name.fqdnApplicationNameserver Creating the relay zone
|
|---|---|---|---|
| Zone name: | relay.test.local | Zone name of the desired domain | |
| Type:: | Select this type | ||
| IP address: | 192.168.8.5 | Click on and in the IP address field the address of the remote name server is entered
| |
| Saves the entry | |||
Create network object
Menu button . A network object must be created for the IPSec network.
| Caption | Value | Description | UTMuser@firewall.name.fqdnFirewallNetwork object Network object
|
|---|---|---|---|
| Name: | IPSec-Network | Choose unique name | |
| Type:: | Select this type | ||
| Address: | 192.168.8.0/24 | The IP address corresponds to that of the IPSec network | |
| Zone: | Suitable zone must be selected | ||
| Saves the entry | |||
Add Rule
In the last step, a firewall rule with a Hide NAT must be created. This causes the DNS forwarding to also go into the tunnel, and not directly into the Internet.
Menu button .
| Caption | Value | UTMuser@firewall.name.fqdnFirewallPacketfilter
|
|---|---|---|
| Aktive: | On | |
| Source: | ||
| Destination: | ||
| Service: | ||
[-] NAT
| ||
| Type:: | ||
| Network object: | ||
| Saves the rule and closes the dialogue. The rules must then be updated. | ||
Safe Search with external DHCP server
If an external DHCP server is used, the active web filter Safe Search often does not work for search engines, especially Google, when searching for images.
In order for this web filter to take effect there as well, the following forward zones must be set up for all ccTLDs (see https://www.google.com/supported_domains : www.google.de, www.google.ch, ...).
Menu button .
| Caption | Value | UTMuser@firewall.name.fqdnApplicationNameserver The forward zone set up for www.google.com
|
|---|---|---|
| Zone name: | www.google.com | |
| Name server hostname: | localhost | |
| Name server IP address: | ||
| In the Name server window, click in the www.google.de zone. In the Edit Zone window click . | ||
| Name: | www.google.com | |
| Type:: | A | |
| Value: | 216.239.38.120 | |
| and click again on . | ||
| Name: | www.google.com | |
| Type:: | AAAA | |
| Value: | 2001:4860:4802:32::78 | |
| Saves the entry | ||
DNA rebinding attack and prevention
This type of attack attempts to gain access to internal resources using falsified DNS responses.
The attacker needs nothing more than a domain with malicious code and a name server that answers all DNS queries for the attacker site.
1. the victim is lured to a prepared website whose IP address is only marked as valid for a few seconds.
2. Malicious code is loaded on the website, which starts a new call after the IP address has expired,
3. but which now uses a modified, proprietary DNS server to display an address from the victim's local network as the destination
4. The attacker now has access to the host with the internal IP through his malicious code (e.g. Java script)
DNS rebinding prevention prevents internal IP addresses from the local network from being issued in response to a DNS query.
Configuration
DNS Rebinding Prevention is configured under Area DNS Rebinding Prevention.
| Caption | Value | Description | UTMuser@firewall.name.fqdnApplications DNS Rebinding Prevention tab
|
|---|---|---|---|
| DNS Rebinding Prevention: | On default |
Activates DNS rebinding prevention | |
| Mode: | In the factory settings, all private IP addresses (class A, B and C) are blocked. The corresponding private IPv6 addresses and the unique local unicast address are also protected in automatic mode. | ||
| The addresses can be set manually. | |||
| Protected addresses: | All addresses that are protected by the prevention are displayed here. | ||
| Saves the settings | |||
| Protected aliases | |||
| The DNS entries already configured are activated as protected aliases by default. Only zones for which a relay is configured are displayed. notempty As of v14.0.1 If the aliases already configured in the Zones tab are to be excluded from protection, they can be deactivated. Off | |||
mDNS-Repeater
General Settings | |||
| General settings are made under Area General. | |||
| Caption | Value | Description | UTMuser@firewall.name.fqdnAnwendungen Tab General
|
|---|---|---|---|
| DNSSEC validation in resolver: | Off | notempty Caution! If DNSSEC Validation is enabled alongside Forward-Zones, it must be ensured that the domains corresponding to the forward zones can be validated within the global DNS or that they are added to the ignore domains list below. Replies corresponding to not globally registered domains are refused and lead to SERVFAIL replies for the domain in question. When this function is activated, all DNS entries are resolved with DNSSEC without exception. This would also attempt a validation in the DNS hierarchy for only local addresses. However, due to the lack of uniqueness of the local address, it cannot be registered with higher-level DNS servers. An error message appears, the address is not resolved and the zone is therefore not accessible (using DNS). This applies, for example, to .local domains! Further information on the implementation of DNSSEC can be found here. | |
| Allow DNS queries only from routed and VPN networks: | On Default |
By default, only DNS queries from the following sources are answered:
| |
| Off | If DNS queries are to be answered from other external networks as well, this option must be disabled | ||
| Ignore Domains during DNSSEC Verificationnotempty New as of v14.0 |
Domains that should not be validated with DNSSEC | ||
| Resolve DHCP Domain names: notempty New as of v14.0 |
anyideas.local (Pool: Local-Pool1 | If a domain is specified in the DHCP pool configuration these domains are selectable here. When a domain is selected, the DHCP hosts can be resolved either by the assigned name of the static lease or, if none is defined, by the client name with which the client registers with the DHCP server. | |
| Disable EDNS for the following servers notempty New as of v14.0 Update v14.0.1 |
The EDNS option is omitted in favor of the option Ignore domains during DNSSEC verification
Inhalte in der extc-Variablen EDNS_SERVERS_OFF
Don't forget to save!
However, the message will appear again at the next login. |
![]() UTMuser@firewall.name.fqdnApplications Example of invalid IP addresses from previous configuration
| |
| Use DNS server specified by the provider: This setting is applied in the section DNS-Forwarding | |||





























