Link to home
Start Free TrialLog in
Avatar of kaosmadness
kaosmadness

asked on

prevent users from changing DNS server settings on XP or block DNS from PIX

Hi, I want to use opendns.com and want to prevent windows XP users from chaning their dns settings after I make opendns their dns. Or is there a way in PIX to block or catch all DNS traffic except for the servers that belong to opendns?

Thanks,

Art
Avatar of Ioannis_Avgeros
Ioannis_Avgeros
Flag of Greece image

Hi,

simply denying them admin rights on their local computers will do that for you.
ASKER CERTIFIED SOLUTION
Avatar of Ioannis_Avgeros
Ioannis_Avgeros
Flag of Greece image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Avatar of kaosmadness
kaosmadness

ASKER

Thanks Ioannis. Sorry i should have clarified, we run software that requires the user logged in to have admin rights. Is there a way to change just that setting or filtering dns from PIX?
SOLUTION
Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Great! I will accept that as a solution! But is there any way to have all traffic redirected at the pix so I dont have to change DNS servers in all the end users computer? A lot of them have a static IP so I would have to go change all of them since changing it in DHCP server wont affect them.
SOLUTION
Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Why don't you use a DHCP server instead of setting IP Addresses locally? It would make your life a lot easier.
SOLUTION
Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Here you go!  Thanks again, we use an ATT managed internet service, is it possible they are blocking ports in their managed router?
PIX Version 6.3(5)
interface ethernet0 10baset
interface ethernet1 10baset
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password ---- encrypted
passwd -----
hostname cisco-pix
domain-name sheraton.com
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names        
access-list 100 permit icmp any any
access-list 100 permit tcp any any eq 1433
access-list 100 permit tcp any any eq 1434
access-list 100 permit udp any any eq 1434
access-list 100 permit udp any any eq 1433
access-list any permit tcp any any eq 1433
access-list any permit udp any any eq 1434
access-list 300 permit ip any any
pager lines 20
logging on    
logging buffered warnings
mtu outside 1500
mtu inside 1500
ip address outside XX.XX.XX.X 255.255.255.240
ip address inside 10.63.104.11 255.255.0.0
ip audit info action alarm
ip audit attack action alarm
pdm location 10.63.104.253 255.255.255.255 inside
pdm location 10.63.104.0 255.255.255.0 inside
pdm location 10.63.104.227 255.255.255.255 inside
pdm location 12.120.XX.XX 255.255.255.255 outside
pdm logging debugging 100
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
access-group 300 in interface inside
route outside 0.0.0.0 0.0.0.0 12.68.113.1 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout sip-disconnect 0:02:00 sip-invite 0:03:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server TACACS+ max-failed-attempts 3
aaa-server TACACS+ deadtime 10
aaa-server RADIUS protocol radius
aaa-server RADIUS max-failed-attempts 3
aaa-server RADIUS deadtime 10
aaa-server LOCAL protocol local
http server enable
http 10.63.104.253 255.255.255.255 inside
http 10.63.104.227 255.255.255.255 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
telnet timeout 5
ssh 10.63.104.253 255.255.255.255 inside
ssh 10.63.104.0 255.255.255.0 inside
ssh timeout 60
console timeout 0
username ---------
terminal width 80
Cryptochecksum:33b081b2d820ff6c31e4d01d79490fc1
I would suggest a 4 way split since we all gave good suggestions.
Avatar of LeeTutor
This question has been classified as abandoned and is being closed as part of the Cleanup Program.  See my comment at the end of the question for more details.