Precedence for DNSWatch in WatchGuard Cloud

Applies To: DNSWatch in WatchGuard Cloud

References to DNSWatch in this topic relate to DNSWatch in WatchGuard Cloud. To learn about the legacy DNSWatch UI, go to About WatchGuard DNSWatch in Fireware Help.

When enabled on your Firebox, DNSWatch in WatchGuard Cloud adds two DNSWatch server IP addresses to your Firebox configuration:

  • 166.117.187.59
  • 13.248.160.135

When you enable DNSWatch enforcement on an internal interface, the Firebox redirects all outbound DNS requests from that interface to DNSWatch DNS servers.

When one of the DNSWatch servers is not available, the Firebox sends requests to the other DNSWatch server.

DNSWatch Configuration Precedence

With DNSWatch in WatchGuard Cloud, a DNSWatch configuration created at the Service Provider level might not meet the needs of a specific Subscriber account or Firebox. In these cases, you might subscribe a Firebox to more than one DNSWatch configuration.

When a Firebox is subscribed to more than one configuration, precedence follows these rules:

  • When SafeSearch is enabled on one DNSWatch configuration but not others, the Firebox enforces SafeSearch rules.
  • When Block DNS Resolution to Private IP Addresses is enabled on one configuration but not others, the Firebox blocks DNS resolution to private IP addresses.
  • When a domain is marked as malicious in one DNSWatch configuration but not others, the Firebox treats the domain as malicious, blocks the domain, and returns the security block page.
  • When a domain is blocked and not marked as malicious in one DNSWatch configuration but not others, the Firebox blocks the domain and returns the content filter block page.
  • When a content filter category is blocked in one DNSWatch configuration, but allowed in others, the Firebox blocks the category and returns the content filter block page.
  • When a content filter category is blocked in one DNSWatch configuration, but a specific domain in that blocked category is allowed in another configuration, the Firebox allows the specific domain.
  • When a domain is blocked in one DNSWatch configuration but the same domain is allowed in other configurations, the Firebox allows the domain.

DNSWatch Server Precedence

When DNSWatch is enabled, DNSWatch servers take precedence over these DNS servers:

  • Default DNS servers configured on your Firebox (DNSWatch does not take precedence over a local DNS server that appears first in the Network DNS server list in the Firebox configuration)
  • DHCP/Interface DNS servers configured on your Firebox
  • DNS servers assigned by your ISP (when the Firebox is a DHCP or PPPoE client)
  • Forwarders to public DNS servers configured on a local DNS server
  • DNS servers manually configured on a network host

These factors affect whether the Fireboxes sends DNS requests from your network to DNSWatch:

  • Contents of the Firebox DNS resolver cache. The Firebox DNS resolver runs only if DNSWatch enforcement is enabled, or if the DNS forwarding feature is enabled.
  • Conditional DNS forwarding rules configured on the Firebox.
  • DNSWatch enforcement setting. When enforcement is enabled, the Firebox redirects all outbound DNS requests from your network to DNSWatch, even if hosts on your network are manually configured with different DNS servers.

Default DNS Server

The Firebox sends DNS requests to the first server in the default DNS server list before other servers in the list. DNSWatch does not take precedence over a local DNS server if that server appears first in the default DNS server list.

For cloud-managed Fireboxes, you configure default DNS servers as Public DNS servers. For locally-managed Fireboxes, you configure the default DNS servers as Network (Global) DNS servers.

When you enable DNSWatch on a cloud-managed Firebox, enforcement is enabled by default. When you enable DNSWatch on a locally-managed Firebox, you select the usage enforcement option (enabled or disabled). For more information, go to Configure Firebox DNS Settings (cloud-managed Fireboxes) or About DNS on the Firebox (locally-managed Fireboxes).

DHCP Server

On a cloud-managed Firebox, you can configure the DHCP server to assign IP addresses on the network. On a locally-managed Firebox, the interface DNS server is an optional DNS server that you can specify when you configure an interface as a DHCP server.

DNS Server from an ISP

When your Firebox is configured as a DHCP or PPPoE client, it receives DNS server settings from your ISP.

Forwarders on a Local DNS Server

Local DNS servers resolve queries for host names on your private networks and contact other DNS servers to resolve queries for public host names. There are two methods that your DNS server can use to resolve queries for public host names: forwarders and root hints.

DNSWatch is not compatible with root hints. On a Windows server, if you have both forwarders and root hints configured, root hints are used if forwarders do not respond. For the best results with DNSWatch, we recommend that you clear the Use root hints if no forwarders are available option on the Forwarders tab of the Windows server.

Manually Configured DNS Servers on a Host

A host on your network might be manually configured with DNS server settings.

Related Topics

Quick Start — Set Up DNSWatch in WatchGuard Cloud

Add a DNSWatch Configuration in WatchGuard Cloud