0
Votes

BLOCKING OR RESETTING PORT53 TO TUNNEL THE DNS REQUEST TIO PARTICULAR DNS SERVER

  This repeated request has been merged into the main thread BLOCKING OF BYPASS DNS . Please vote on the main thread.

This thread has been locked for further replies. You can start a new thread to share your ideas or ask questions.
 
0
Votes

BLOCKING OR RESETTING PORT53 TO TUNNEL THE DNS REQUEST TIO PARTICULAR DNS SERVER

  This repeated request has been merged into the main thread BLOCKING OF BYPASS DNS . Please vote on the main thread.
This thread has been locked for further replies. You can start a new thread to share your ideas or ask questions.
BLOCKING OR RESETTING PORT53 TO TUNNEL THE DNS REQUEST TIO PARTICULAR DNS SERVER
BLOCKING OR RESETTING PORT53 TO TUNNEL THE DNS REQUEST TIO PARTICULAR DNS SERVER
2025-01-19 06:20:34 - last edited 2025-03-07 01:05:25

I have an old existing Wireless N 300 Mbps WR841N router configured for packet filtering restricting access to users through Access Control feature to pass all the DNS traffic only through OPENDNS server i.e., on port 53. Any attempt by any user using other static DNS IPs on their computer on the network to bypass OPENDNS would result in no internet. It is so well configured and tested on the network but the same is missing from new routers for example Archer C20. Access control feature exists but it only restricts users on the network to either access or block internet without any ACL rule to filter internet traffic based on ports or services. How can I accomplish the same on the new Archer c 20 router? Any suggestions would be greatly appreciated.

#1
Options