Configuring DNS client verification

Configure DNS client verification the interface that is connected to the external network. The DNS client verification protects internal DNS servers against DNS flood attacks.

IP addresses protected by DNS client verification can be manually added or automatically learned:

If a DNS client is verified legitimate, the device adds the client's IP address to the trusted IP list. The device directly forwards DNS packets from trusted IP addresses.

DNS client verification can be used alone or together with a DNS flood attack defense policy.

To configure DNS client verification:

Step

Command

Remarks

1. Enter system view.

system-view

N/A

2. (Optional.) Specify an IP address to be protected by the DNS client verification feature.

client-verify dns protected { ip destination-ip-address | ipv6 destination-ipv6-address } [ vpn-instance vpn-instance-name ] [ port port-number ]

By default, the DNS client verification feature does not protect any IP address.

3. Enter interface view.

interface interface-type interface-number

N/A

4. Enable DNS client verification.

client-verify dns enable

By default, DNS client verification is disabled.