BLOCKING OR RESETTING PORT53 TO TUNNEL THE DNS REQUEST TIO PARTICULAR DNS SERVER

BLOCKING OR RESETTING PORT53 TO TUNNEL THE DNS REQUEST TIO PARTICULAR DNS SERVER

BLOCKING OR RESETTING PORT53 TO TUNNEL THE DNS REQUEST TIO PARTICULAR DNS SERVER
BLOCKING OR RESETTING PORT53 TO TUNNEL THE DNS REQUEST TIO PARTICULAR DNS SERVER
23 hours ago
Model: Archer C20  
Hardware Version: V5
Firmware Version: 0.9.1 4.17 v0001.0 BUILD 200915 REL.56357n(5553)

I have an old existing Wireless N 300 Mbps WR841N router configured for packet filtering restricting access to users through Access Control feature to pass all the DNS traffic only through OPENDNS server i.e., on port 53. Any attempt by any user using other static DNS IPs on their computer on the network to bypass OPENDNS would result in no internet. It is so well configured and tested on the network but the same is missing from new routers for example Archer C20. Access control feature exists but it only restricts users on the network to either access or block internet without any ACL rule to filter internet traffic based on ports or services. How can I accomplish the same on the new Archer c 20 router? Any suggestions would be greatly appreciated.

  0      
  0      
#1
Options