0
Votes

BLOCKING OR RESETTING PORT53 TO TUNNEL THE DNS REQUEST TIO PARTICULAR DNS SERVER

  This repeated request has been merged into the main thread BLOCKING OF BYPASS DNS . Please vote on the main thread.

 
0
Votes

BLOCKING OR RESETTING PORT53 TO TUNNEL THE DNS REQUEST TIO PARTICULAR DNS SERVER

  This repeated request has been merged into the main thread BLOCKING OF BYPASS DNS . Please vote on the main thread.
BLOCKING OR RESETTING PORT53 TO TUNNEL THE DNS REQUEST TIO PARTICULAR DNS SERVER
BLOCKING OR RESETTING PORT53 TO TUNNEL THE DNS REQUEST TIO PARTICULAR DNS SERVER
2025-01-19 06:20:34 - last edited a week ago

I have an old existing Wireless N 300 Mbps WR841N router configured for packet filtering restricting access to users through Access Control feature to pass all the DNS traffic only through OPENDNS server i.e., on port 53. Any attempt by any user using other static DNS IPs on their computer on the network to bypass OPENDNS would result in no internet. It is so well configured and tested on the network but the same is missing from new routers for example Archer C20. Access control feature exists but it only restricts users on the network to either access or block internet without any ACL rule to filter internet traffic based on ports or services. How can I accomplish the same on the new Archer c 20 router? Any suggestions would be greatly appreciated.

#1
Options

Information

Helpful: 0

Views: 124

Replies: 0