<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
    xmlns:content="http://purl.org/rss/1.0/modules/content/"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>DNSWatch - General — WatchGuard Community</title>
        <link>https://community.watchguard.com/watchguard-community/</link>
        <pubDate>Mon, 16 Mar 2026 01:56:15 +0000</pubDate>
        <language>en</language>
            <description>DNSWatch - General — WatchGuard Community</description>
    <atom:link href="https://community.watchguard.com/watchguard-community/categories/dnswatch-general/feed.rss" rel="self" type="application/rss+xml"/>
    <item>
        <title>Possible network loop?</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4529/possible-network-loop</link>
        <pubDate>Wed, 11 Feb 2026 06:24:55 +0000</pubDate>
        <category>DNSWatch - General</category>
        <dc:creator>Olix</dc:creator>
        <guid isPermaLink="false">4529@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>I have another question about the DNSWatch configuration:</p>

<p>I use an internal DNS server and set the IP address at the top of the global DNS server list in the Firebox, as recommended in the instructions. Enforcement is disabled.</p>

<p>On my DNS server, I now enter the IP address of the Firebox as the DNS forwarder. (As described in the Help Center under “DNSWatch DNS Settings Precedence on a Firebox” , if DNSWatch enforcement is disabled)</p>

<p>Doesn't the DNS query then go round in circles permanently?</p>

<p>The internal DNS server forwards DNS queries to the Firebox. The Firebox has the internal DNS server entered as its first DNS server. According to the instructions, this has priority over DNSWatch, and the query then goes back to the internal DNS server... and so on.</p>
]]>
        </description>
    </item>
    <item>
        <title>More than one internal DNS Server</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4530/more-than-one-internal-dns-server</link>
        <pubDate>Wed, 11 Feb 2026 08:45:00 +0000</pubDate>
        <category>DNSWatch - General</category>
        <dc:creator>Olix</dc:creator>
        <guid isPermaLink="false">4530@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>I am using a scenario as described in example 6 in the Watchguard Help Center, “Multiple Internal Networks.”</p>

<p><img src="https://www.watchguard.com/help/docs/help-center/en-us/Content/en-US/Fireware/services/dnswatch/images/diagram_dnswatch_configuration_example_7.jpg" alt="" title="" srcset="https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=300, width=300/https://www.watchguard.com/help/docs/help-center/en-us/Content/en-US/Fireware/services/dnswatch/images/diagram_dnswatch_configuration_example_7.jpg 300w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=600, width=600/https://www.watchguard.com/help/docs/help-center/en-us/Content/en-US/Fireware/services/dnswatch/images/diagram_dnswatch_configuration_example_7.jpg 600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=800, width=800/https://www.watchguard.com/help/docs/help-center/en-us/Content/en-US/Fireware/services/dnswatch/images/diagram_dnswatch_configuration_example_7.jpg 800w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1200, width=1200/https://www.watchguard.com/help/docs/help-center/en-us/Content/en-US/Fireware/services/dnswatch/images/diagram_dnswatch_configuration_example_7.jpg 1200w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1600, width=1600/https://www.watchguard.com/help/docs/help-center/en-us/Content/en-US/Fireware/services/dnswatch/images/diagram_dnswatch_configuration_example_7.jpg 1600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=2000, width=2000/https://www.watchguard.com/help/docs/help-center/en-us/Content/en-US/Fireware/services/dnswatch/images/diagram_dnswatch_configuration_example_7.jpg 2000w, https://www.watchguard.com/help/docs/help-center/en-us/Content/en-US/Fireware/services/dnswatch/images/diagram_dnswatch_configuration_example_7.jpg" sizes="100vw" /></p>

<p>However, I am using two internal DNS servers. In this case, should both internal DNS server IP addresses be listed as the first and second entries in the Network (Global) DNS Server List on the Firebox, with a public DNS server as the third entry?</p>
]]>
        </description>
    </item>
    <item>
        <title>Usage Enforcement only on external traffic?</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4527/usage-enforcement-only-on-external-traffic</link>
        <pubDate>Tue, 10 Feb 2026 10:16:59 +0000</pubDate>
        <category>DNSWatch - General</category>
        <dc:creator>Olix</dc:creator>
        <guid isPermaLink="false">4527@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>When using DNSWatch with active enforcement mode, is only external traffic (to the Internet) monitored, or is traffic between internal interfaces (Trusted, Optional) on TCP/53 also monitored and redirected to the DNSWatch servers?</p>
]]>
        </description>
    </item>
    <item>
        <title>Noob question - Enabled DNSWatch Enforement - DNS breaks - what am I missing?</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/607/noob-question-enabled-dnswatch-enforement-dns-breaks-what-am-i-missing</link>
        <pubDate>Tue, 12 Nov 2019 20:47:27 +0000</pubDate>
        <category>DNSWatch - General</category>
        <dc:creator>Mordac</dc:creator>
        <guid isPermaLink="false">607@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>We have two internal DNS servers (Windows) on our network, configured with forwarders pointing to Google DNS and OpenDNS servers.  We have one protected interface on our WatchGuard 500.  I enabled DNSWatch enforcement on the one protected interface.  All of DNS requests (for external name/IP resolution) go out through the protected interface.  When I enabled DNSWatch enforcement, users PCs (that point to our two internal DNS servers for name/IP resolution) no longer are able to resolve any external FQDNs to IPs.  My understanding from WatchGuard docs is that once enforcement is enabled, DNSWatch will redirect the name/IP resolution requests to the nearest WatchGuard (StrongArm) DNS servers.  So even if a user PC points to our internal DNS server which in turn tries to contact Google 8.8.8.8 (for example), DNSWatch will intercept and redirect the request to its (Strongarm) DNS server to either resolve, or will return the IP of the DNS sinkhole server.<br />
I am guessing that I am missing something as DNS breaks (unable to resolve external FQDN to IP).  Any suggestions appreciated.  Thanks!</p>
]]>
        </description>
    </item>
    <item>
        <title>DNSWatch answering when not enabled</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4194/dnswatch-answering-when-not-enabled</link>
        <pubDate>Sun, 16 Feb 2025 02:15:30 +0000</pubDate>
        <category>DNSWatch - General</category>
        <dc:creator>CWR</dc:creator>
        <guid isPermaLink="false">4194@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>We have noticed our m370 which does not have DNS Watch enabled is sending dns queries to the DNSWatch EU servers 34.240.115.208 and 34.251.171.117 so only one of our own configured dns servers get used after those two. Had a look through the network settings and those of the vlans etc and can only see out 2 dns servers. The site has had some odd dns behaviour so wondering if this could be related.</p>

<p>We tested DNSWatch when it first came out but disabled it and switched to our own over a year ago.</p>

<p>Logs show the dns requests going to the dnswatch servers.</p>

<p>On latest firmware.</p>

<p>Have I missed a setting or does this need to ne escalated to support.</p>

<p>Out M390 at our other site (same config) does not have this issue and uses both our configured dns servers.</p>
]]>
        </description>
    </item>
    <item>
        <title>DNSWatch Down Again</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4034/dnswatch-down-again</link>
        <pubDate>Tue, 22 Oct 2024 06:59:38 +0000</pubDate>
        <category>DNSWatch - General</category>
        <dc:creator>HN13</dc:creator>
        <guid isPermaLink="false">4034@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hello together,</p>

<p>this morning DNSWatch stopped working again for us. No internet for whole company..<br />
On watchguard status page everything is shown green. I´ll disable this service now an neveruse it again. It´s to risky. Maybe Cisco has better service. Annoying.</p>

<p>Best regards</p>

<p>Hendrik</p>
]]>
        </description>
    </item>
    <item>
        <title>DNS Server in Ireland down? 34.251.171.117 get unknown error</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3961/dns-server-in-ireland-down-34-251-171-117-get-unknown-error</link>
        <pubDate>Mon, 02 Sep 2024 07:50:49 +0000</pubDate>
        <category>DNSWatch - General</category>
        <dc:creator>HN13</dc:creator>
        <guid isPermaLink="false">3961@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>From last Friday on my DNSWatch did not work. I had to disable DNSWatch on my firebox to get my company get back to work.</p>

<p>Isn´t there a fallback to 34.240.115.208?</p>

<p>I am not sure what to do.</p>

<p>Best regards</p>

<p>Hendrik</p>
]]>
        </description>
    </item>
    <item>
        <title>How to identify IP Address of a &quot;Victim Port&quot; number?</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3887/how-to-identify-ip-address-of-a-victim-port-number</link>
        <pubDate>Tue, 09 Jul 2024 15:03:18 +0000</pubDate>
        <category>DNSWatch - General</category>
        <dc:creator>Jes_DFS</dc:creator>
        <guid isPermaLink="false">3887@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Under DNS Watch - "Initial connection details"<br />
How do I determine the actual user's IP address using the victim port number? I would like to do this so I can review the user's computer, browser history, perform a scan if needed, etc. In the same window where I see "victim port", it does show "victim ip address" but it is our public facing IP address, not a specific end user's IP address and then the victim hostname is unknown. I would like to try and track these down if possible. <img src="https://us.v-cdn.net/6029905/uploads/editor/j5/mw4mhztmidjf.jpg" alt="" title="" srcset="https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=300, width=300/6029905/uploads/editor/j5/mw4mhztmidjf.jpg 300w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=600, width=600/6029905/uploads/editor/j5/mw4mhztmidjf.jpg 600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=800, width=800/6029905/uploads/editor/j5/mw4mhztmidjf.jpg 800w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1200, width=1200/6029905/uploads/editor/j5/mw4mhztmidjf.jpg 1200w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1600, width=1600/6029905/uploads/editor/j5/mw4mhztmidjf.jpg 1600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=2000, width=2000/6029905/uploads/editor/j5/mw4mhztmidjf.jpg 2000w, https://us.v-cdn.net/6029905/uploads/editor/j5/mw4mhztmidjf.jpg" sizes="100vw" /></p>
]]>
        </description>
    </item>
    <item>
        <title>DNSWatch protected network in Firefox - Just an IP adress?</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3644/dnswatch-protected-network-in-firefox-just-an-ip-adress</link>
        <pubDate>Thu, 25 Jan 2024 12:41:27 +0000</pubDate>
        <category>DNSWatch - General</category>
        <dc:creator>Jordi</dc:creator>
        <guid isPermaLink="false">3644@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi,</p>

<p>We have activated the DNSWatch in our Firefox now. We see in DNSWacth site it, everything looks fine.</p>

<p>But we see that the messages for block sites and content police are the generics and not the customiced.</p>

<p>In my opinion, it is becouse the protected network of the Firefox is just a public IP (/32) but we have more than an IP (/28) and the users goes out by other public IP than the firefox.</p>

<p>The option to add protected network in the DNSWacth site say that we need a extra license</p>

<p>Anybody know how to do it?</p>

<p>Thanks in advanced,<br />
Jordi.</p>
]]>
        </description>
    </item>
    <item>
        <title>DNS_PROBE_FINISHED_NXDOMAIN</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/2094/dns-probe-finished-nxdomain</link>
        <pubDate>Mon, 27 Sep 2021 18:52:59 +0000</pubDate>
        <category>DNSWatch - General</category>
        <dc:creator>toscanatlc</dc:creator>
        <guid isPermaLink="false">2094@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hello everyone,</p>

<p>for some time now a strange thing has happened to me for the watchguard forum site, when I try to login on the forum the "DNS_PROBE_FINISHED_NXDOMAIN" page appears after 1 second the page is automatically reloaded and everything is ok.</p>

<p>the nice thing that it does only on the forum site .... it happens to you too, I have active dnswatch</p>
]]>
        </description>
    </item>
    <item>
        <title>DNS watch - suspicious connections</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3242/dns-watch-suspicious-connections</link>
        <pubDate>Tue, 02 May 2023 12:30:24 +0000</pubDate>
        <category>DNSWatch - General</category>
        <dc:creator>tantony</dc:creator>
        <guid isPermaLink="false">3242@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hello,</p>

<p>For the last couple of weeks, I've been getting this email about DNSWatch stopping suspicious domains.  Its good that it was caught and blocked, but is there anything else I can do?  Should I open a case with support?</p>

<p>_Greetings,<br />
DNSWatch stopped one of your devices from connecting with a suspicious domain. Your network is safe. _</p>

<p>When I login to DNSWatch, this is what I see.  Looks like the latest are from Vietnam (.vn).</p>

<p><img src="https://us.v-cdn.net/6029905/uploads/editor/ek/r0d8brmo2czo.png" alt="" title="" srcset="https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=300, width=300/6029905/uploads/editor/ek/r0d8brmo2czo.png 300w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=600, width=600/6029905/uploads/editor/ek/r0d8brmo2czo.png 600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=800, width=800/6029905/uploads/editor/ek/r0d8brmo2czo.png 800w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1200, width=1200/6029905/uploads/editor/ek/r0d8brmo2czo.png 1200w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1600, width=1600/6029905/uploads/editor/ek/r0d8brmo2czo.png 1600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=2000, width=2000/6029905/uploads/editor/ek/r0d8brmo2czo.png 2000w, https://us.v-cdn.net/6029905/uploads/editor/ek/r0d8brmo2czo.png" sizes="100vw" /></p>
]]>
        </description>
    </item>
    <item>
        <title>How to watchguard m270 and look at ports being forwarded to an exchange server</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3021/how-to-watchguard-m270-and-look-at-ports-being-forwarded-to-an-exchange-server</link>
        <pubDate>Thu, 05 Jan 2023 17:47:05 +0000</pubDate>
        <category>DNSWatch - General</category>
        <dc:creator>Ain2828</dc:creator>
        <guid isPermaLink="false">3021@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>How to watchguard m270 and look at ports being forwarded to an exchange server</p>
]]>
        </description>
    </item>
    <item>
        <title>DNSWatchGo clients behind Firebox</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/1066/dnswatchgo-clients-behind-firebox</link>
        <pubDate>Fri, 19 Jun 2020 11:59:16 +0000</pubDate>
        <category>DNSWatch - General</category>
        <dc:creator>Catweazle30169</dc:creator>
        <guid isPermaLink="false">1066@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hello.<br />
Were using DNSWatchGo on our notebooks and DNSWatch on our Fireboxes.<br />
I suppose, we have DNS performance problems, when both are active. I checked one computer. DNS was set to ::1 and 127.0.0.1 instead the "normal" DNS-Servers. Is it possible to deactivate DNSWatchGo automatically, when the machines runs in corporate network?</p>

<p>Thanks in advance for your answers.</p>

<p>Have a nice weekend <img src="https://community.watchguard.com/resources/emoji/smile.png" title=":)" alt=":)" height="20" /></p>

<p>Dirk Emmermacher</p>
]]>
        </description>
    </item>
    <item>
        <title>Total security suite and DNSWatchGo</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/2938/total-security-suite-and-dnswatchgo</link>
        <pubDate>Wed, 16 Nov 2022 13:58:13 +0000</pubDate>
        <category>DNSWatch - General</category>
        <dc:creator>RalphtheMac</dc:creator>
        <guid isPermaLink="false">2938@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi there, I am trying to ascertain what benefits I might get for my users/endpoints from DNSWatchGo.<br />
We already have Total Security Suite on Watchguard Firewalls, accross a number of sites. Home users _usually _ use a VPN that is not split tunnel.</p>

<p>I had thought that possibly DNSWatchGo might protect home users that are not on VPN. However, I dont fully know the benefits of the product over and above what the firewall setup offers (with DNS protection already setup).</p>

<p>So my question is - <br />
aside from users at home that do not use VPN - does DNSWatch offer extra protection over the firewall protection for users on and offsite? if so, what is it!?</p>

<p>Thank you!</p>
]]>
        </description>
    </item>
    <item>
        <title>Proper way to set up a global local DNS Server</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/2847/proper-way-to-set-up-a-global-local-dns-server</link>
        <pubDate>Fri, 23 Sep 2022 11:51:52 +0000</pubDate>
        <category>DNSWatch - General</category>
        <dc:creator>Pops21</dc:creator>
        <guid isPermaLink="false">2847@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Good day all. I am an end-user of the T70 Firewall since they were brand new. I am in need of properly setting up my DNS server that applies to all networks on my unit. Here is what I have done so far: I have formatted a Raspberry Pi for use as a DNS Server (Pihole), and assigned it to a reserved address on 192.168.111.3 on my "Trusted" network. I then went to the DNS tab on my Interfaces section of Networks and specified that address as the ONLY DNS server. I then checked "enable DNS Forwarding" and had the T70 listen on "Trusted, Optional and Custom" interfaces. I did NOT specify a Domain name sinece my server is local to the T70 on the "Trusted" interface. I am running three networks on this unit, (2 wireless and one wired) with each network having its own IP range (Trusted 192.168.111.x, Optional 192.168.0.x, and Trusted Wireless 192.168.100.x).  Did I do this right? Do I need to check the "DNS Forwarding" tab? I am hopeful it is this easy, as I want all networks to use this local DNS Server and not external network ones. I apologize if I sound like a newbie, but I am NOT a Network Professional, this unit is in my home and I bought it for its robust Firewall capabilities. Thank you all for answering my qyestion.</p>
]]>
        </description>
    </item>
    <item>
        <title>Login</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/2718/login</link>
        <pubDate>Tue, 26 Jul 2022 13:52:08 +0000</pubDate>
        <category>DNSWatch - General</category>
        <dc:creator>toscanatlc</dc:creator>
        <guid isPermaLink="false">2718@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Greetings,</p>

<p>from our watcguard account we access Watchgaurd Cloud, we have 5 fireboxes of different customers and I can manage everything, if instead I want to access the dnswatch of each customer I cannot because every time I log in I only see the IP from which I connect, it exists a portal only for dnswatch or every time I have to log in and enter when I am with the interested IP?</p>

<p>Thank you</p>
]]>
        </description>
    </item>
    <item>
        <title>Does DNSWatch support eDNS &amp; ECS</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/2565/does-dnswatch-support-edns-ecs</link>
        <pubDate>Thu, 28 Apr 2022 06:11:00 +0000</pubDate>
        <category>DNSWatch - General</category>
        <dc:creator>Kenjinator</dc:creator>
        <guid isPermaLink="false">2565@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi guys,</p>

<p>i've implemented DNSWatch on my customers network, works perfectly except having problems with registration of one of our sip trunks.<br />
I've configured DNSWatch to be enforced on all interfaces.</p>

<p>Checked the requierements for the sip trunk and they need to support eDNS &amp; ECS on DNS Servers used in the environment.</p>

<p>Does DNSWatch Servers support these features?</p>
]]>
        </description>
    </item>
    <item>
        <title>bad group</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/2266/bad-group</link>
        <pubDate>Wed, 15 Dec 2021 20:16:55 +0000</pubDate>
        <category>DNSWatch - General</category>
        <dc:creator>Maxspeed</dc:creator>
        <guid isPermaLink="false">2266@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi,</p>

<p>please check if I'm wrong ...</p>

<p>www.deepl.com<br /><a href="http://www.deepl.com" rel="nofollow">http://www.deepl.com</a> is categorized as Reference Materials<br />
***** not true **** I open Miscellaneous -&gt; Uncategorized</p>

<p>please do the correction</p>

<p>thank you</p>
]]>
        </description>
    </item>
    <item>
        <title>Security Block Page Content Settings</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/2219/security-block-page-content-settings</link>
        <pubDate>Tue, 30 Nov 2021 13:39:17 +0000</pubDate>
        <category>DNSWatch - General</category>
        <dc:creator>Maxspeed</dc:creator>
        <guid isPermaLink="false">2219@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi,</p>

<p>we try to activate Security Block Page Content Settings with this text (see below)</p>

<p>why when a user see the warning it's only in english not this text?</p>

<p>where is my mistake ?</p>

<p>Thank you for your help</p>

<p><strong>Il semble que vous ayez cliqué sur quelque chose de dangereux.</strong></p>

<p>Veuillez effectuer cet exercice pour découvrir comment fonctionnent les attaques de phishing.</p>

<p>** It looks like you clicked on something dangerous. **</p>

<p>Please complete this exercise to learn how phishing attacks work.</p>
]]>
        </description>
    </item>
    <item>
        <title>Why is beagle.prod.tda.link elevated exposure?</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/2057/why-is-beagle-prod-tda-link-elevated-exposure</link>
        <pubDate>Mon, 06 Sep 2021 15:21:11 +0000</pubDate>
        <category>DNSWatch - General</category>
        <dc:creator>schwicky</dc:creator>
        <guid isPermaLink="false">2057@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>I'm trying to figure out why I see dozen to hundreds of daily lookups of the domain beagle.prod.tda.link on all Security Reports and why it's classified as "elevated exposure". Even Fireboxes without DNSwatch do block accesses to that webserver and trigger an elevated exposure webblocker alert. <br />
I couldn't find any valuable information about what this webservice does and whether it's really an indication of a possible attack. But maybe I don't really understand what the category "elevated exposure" means. Is it a malicious tracker? <br />
Does anyone have more insights?</p>
]]>
        </description>
    </item>
    <item>
        <title>failed to connect always restarting</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/2031/failed-to-connect-always-restarting</link>
        <pubDate>Tue, 24 Aug 2021 00:19:54 +0000</pubDate>
        <category>DNSWatch - General</category>
        <dc:creator>jibanez</dc:creator>
        <guid isPermaLink="false">2031@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Good day,</p>

<p>i am having problems using the vpn, it was working just fine a couple of days ago, now it always shows me an error and restarting the connection.</p>

<p>here's the log:</p>

<p>2021-08-24T08:18:14.732 Launching WatchGuard Mobile VPN with SSL client. Version 12.7.0 (Build 637701)  Built:Mar 11 2021 16:10:22<br />
2021-08-24T08:18:17.009 Requesting client configuration from -redacted-.dyndns.org:443<br />
2021-08-24T08:18:17.031 FAILED:2021-08-24T08:18:17.132 FAILED:Cannot perform http request 12007<br />
2021-08-24T08:18:17.132 failed to get domain name<br />
2021-08-24T08:18:19.062 LaunchOpenVPN: openvpn full command-line(first 8 chars): "C:\Prog, length: 248<br />
2021-08-24T08:18:19.062 LaunchOpenVPN: vpn config full path(first 8 chars): C:\Users, length: 60<br />
2021-08-24T08:18:19.589 OVPN:&gt;HOLD:Waiting for hold release:0</p>

<p>2021-08-24T08:18:19.667 OVPN:&gt;LOG:1629764299,D,MANAGEMENT: CMD ''</p>

<p>2021-08-24T08:18:19.667 OVPN:&gt;LOG:1629764299,D,MANAGEMENT: CMD 'hold release'</p>

<p>2021-08-24T08:18:19.668 OVPN:SUCCESS: hold release succeeded</p>

<p>2021-08-24T08:18:19.668 OVPN:&gt;PASSWORD:Need 'Auth' username/password</p>

<p>2021-08-24T08:18:19.745 OVPN:&gt;LOG:1629764299,D,MANAGEMENT: CMD 'username "Auth" "-redacted-"'</p>

<p>2021-08-24T08:18:19.745 OVPN:SUCCESS: 'Auth' username entered, but not yet verified</p>

<p>2021-08-24T08:18:19.746 OVPN:&gt;LOG:1629764299,D,MANAGEMENT: CMD 'password [...]'</p>

<p>2021-08-24T08:18:19.746 OVPN:SUCCESS: 'Auth' password entered, but not yet verified</p>

<p>2021-08-24T08:18:19.746 OVPN:&gt;LOG:1629764299,,MANAGEMENT: &gt;STATE:1629764299,RESOLVE,,,,,,</p>

<p>2021-08-24T08:18:19.746 OVPN:&gt;STATE:1629764299,RESOLVE,,,,,,</p>

<p>2021-08-24T08:18:19.747 OVPN:&gt;LOG:1629764299,N,RESOLVE: Cannot resolve host address: -redacted-.dyndns.org:443 (No such host is known. )</p>

<p>2021-08-24T08:18:19.747 OVPN:&gt;LOG:1629764299,,MANAGEMENT: &gt;STATE:1629764299,RESOLVE,,,,,,</p>

<p>2021-08-24T08:18:19.747 OVPN:&gt;STATE:1629764299,RESOLVE,,,,,,</p>

<p>2021-08-24T08:18:19.748 OVPN:&gt;LOG:1629764299,N,RESOLVE: Cannot resolve host address: -redacted-.dyndns.org:443 (No such host is known. )</p>

<p>2021-08-24T08:18:19.748 OVPN:&gt;LOG:1629764299,W,Could not determine IPv4/IPv6 protocol</p>

<p>2021-08-24T08:18:19.749 OVPN:&gt;LOG:1629764299,I,SIGUSR1[soft,init_instance] received, process restarting</p>

<p>2021-08-24T08:18:19.749 OVPN:&gt;LOG:1629764299,,MANAGEMENT: &gt;STATE:1629764299,RECONNECTING,init_instance,,,,,</p>

<p>2021-08-24T08:18:19.749 Does not allow reconnectiong</p>

<p>thank you</p>

<p>*Edited out personally identifiable log lines.  James C.</p>
]]>
        </description>
    </item>
    <item>
        <title>Queries answered by DNSwatch?</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/1981/queries-answered-by-dnswatch</link>
        <pubDate>Sat, 31 Jul 2021 14:20:24 +0000</pubDate>
        <category>DNSWatch - General</category>
        <dc:creator>caleyfeli85</dc:creator>
        <guid isPermaLink="false">1981@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>could anyone chime in as to why my local DNS queries appear to be answered by these two IP-addresses? A quick search revealed that they seem to be related to DNSwatch, which I've never selected. All outbound DNS traffic (to port 53 and 853) except to one DNS resolver is blocked by a router firewall rule and DoH as well as DoT Servers are blocked by a blacklist.  [removed link]<br />
I've configured a VPN service as my DNS resolver that is unrelated to DNSwatch. Pihole has been working great, ads are blocked and a DNS leak test confirms my VPN provider as sole DNS service.</p>

<p>Any help is greatly appreciated. cheers!</p>
]]>
        </description>
    </item>
    <item>
        <title>Is DNSWatch login down?</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/1775/is-dnswatch-login-down</link>
        <pubDate>Tue, 20 Apr 2021 18:35:58 +0000</pubDate>
        <category>DNSWatch - General</category>
        <dc:creator>greggmh123</dc:creator>
        <guid isPermaLink="false">1775@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>At 11:30AM Pacific time on April 20th, I am unable to log into DNSWatch and I get the following error.</p>

<p>This page isn’t working<br />
dnswatch.watchguard.com took too long to respond.<br />
HTTP ERROR 504</p>

<p>I can log into the WatchGuard Cloud, but not DNSWatch.</p>

<p>Gregg</p>
]]>
        </description>
    </item>
    <item>
        <title>How to tell WHAT content policy blocked something?</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/1737/how-to-tell-what-content-policy-blocked-something</link>
        <pubDate>Mon, 05 Apr 2021 18:10:44 +0000</pubDate>
        <category>DNSWatch - General</category>
        <dc:creator>greggmh123</dc:creator>
        <guid isPermaLink="false">1737@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>I tried to reach account.samsung.com and got the following message:</p>

<p>"WEBSITE BLOCKED<br />
account.samsung.com has been blocked by DNSWatch</p>

<p>This website was blocked because it's against your company's content policy."</p>

<p>I couldn't find "samsung" anywhere in my config, nor do I see Deny traffic to samsung in FSM traffic monitor, so how can I find exactly which content policy is involved in this block? I can't see it in the DNSWatch console either, but maybe I am not looking in the right place.</p>

<p>The one thing I despise about DNSWatch is that is doesn't tell on its block page exactly why it blocked something.</p>

<p>Gregg</p>
]]>
        </description>
    </item>
    <item>
        <title>DNSWatchGO for Chromebooks Beta</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/1709/dnswatchgo-for-chromebooks-beta</link>
        <pubDate>Fri, 26 Mar 2021 12:41:24 +0000</pubDate>
        <category>DNSWatch - General</category>
        <dc:creator>Ricardo_Arroyo</dc:creator>
        <guid isPermaLink="false">1709@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Greetings WatchGuard community! We are proud to announce the open Beta for the DNSWatchGO Chrome extension for Chromebooks. With the DNSWatchGO Chrome extension, you can extend the protection of DNSWatch to provide consistent policy enforcement and security protection when your users leave the safety of your network. Similar to the DNSWatchGO Client on Windows devices, the DNSWatchGO Chrome extension provides DNS-level protection for users with Chrome. When the Chrome browser opens a site, the Chrome extension queries the DNSWatch servers to check if the site is malicious.</p>

<p>To participate in this beta test, you must have:</p>

<ol><li>A DNSWatchGO license (or trial license)</li>
<li>A Google Workspace (formerly known as G Suite) administrative account. This gives you access to the Google Admin Console where you manage Google services for people in an organization, school, or group.</li>
</ol><p>At a high level, to get started:</p>

<ul><li>Download the DNSWatchGO Chrome extension file from the DNSWatch web UI.</li>
<li>From the Google Admin Console, configure and deploy the DNSWatchGO Chrome extension.</li>
</ul><p>To participate in the Beta just click <a rel="nofollow" href="https://watchguard.centercode.com/key/DNSWatchChromeOSExtensionBeta">here</a> to visit the Beta Site for further instructions.</p>

<p>Again, we appreciate your help in beta testing this new feature. Thanks for your help in making our products better!</p>

<p>The WatchGuard Beta Team</p>
]]>
        </description>
    </item>
    <item>
        <title>Issue with DNSWatch and akamai servers: wrong IP resolved</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/1594/issue-with-dnswatch-and-akamai-servers-wrong-ip-resolved</link>
        <pubDate>Thu, 04 Feb 2021 09:11:15 +0000</pubDate>
        <category>DNSWatch - General</category>
        <dc:creator>netdiver</dc:creator>
        <guid isPermaLink="false">1594@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Good morning.<br />
Since yesterday 3 of february 2021 around 15:30 CET we had problems in opening web pages hosted on Akamai CDN.<br />
This morning we looked deeper in the problem and we found out that DNSWatch was the culprit:<br />
with DNSWatch active, our DNS server replied with this IP for www.dell.com:<br />
23.195.119.68<br />
which is inactive and does not reply to ping.</p>

<p>without DNSWatch, the IP given for www.dell.com is<br />
104.83.100.157<br />
which is up and pinging.</p>

<p>The same thing happened with a lot of other sites hosted in Akamai CDN, e.g:<br />
www.amazon.it<br />
www.microsoft.com<br />
www.oracle.com<br />
www.walmart.com<br />
www.hpe.com</p>

<p>none of those sites worked with DNSWatch activated. We were forced to deactivate this feature.</p>

<p>Anyone had the same problem?</p>

<p>Thanks in advance</p>
]]>
        </description>
    </item>
    <item>
        <title>DNSWatch certificate when using HTTPS inspection</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/1179/dnswatch-certificate-when-using-https-inspection</link>
        <pubDate>Sat, 15 Aug 2020 10:42:18 +0000</pubDate>
        <category>DNSWatch - General</category>
        <dc:creator>Scott5297</dc:creator>
        <guid isPermaLink="false">1179@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Greeting to all,</p>

<p>I am just in the process of setting up a new T40 firebox with Fireware 12.6.1 update 1 firmware.</p>

<p>I am testing HTTPS inspection and it seems to work well.</p>

<p>I have imported the web server certificate and the proxy authority certificate to the test machine. HTTPS websites work well and functions such as blocking an HTTPS website as a test succeed.</p>

<p>One cosmetic issue is that I get a certificate error when a https website is blocked by DNSWatch.</p>

<p>The certificate states "windows does not have enough information to verify this certificate" and "The issuer of this certificate could not be found."</p>

<p>Bypassing the certificate error correctly takes me to the DNSWatch blocking page.</p>

<p>I wonder if someone would please point me in the right direction to resolving this? [edit: Is it impossible to avoid the certificate error because the DNSWatch certificate doesn't belong to the website?]</p>

<p>Many thanks</p>

<p>Scott</p>
]]>
        </description>
    </item>
    <item>
        <title>Panda Adaptive Defense 360 - Web blocker - Dnswatch</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/1554/panda-adaptive-defense-360-web-blocker-dnswatch</link>
        <pubDate>Sun, 17 Jan 2021 18:07:45 +0000</pubDate>
        <category>DNSWatch - General</category>
        <dc:creator>user808</dc:creator>
        <guid isPermaLink="false">1554@/watchguard-community/discussions</guid>
        <description><![CDATA[Currently I have DNSWatch installed on a firebox which also has the Web blocker feature activated. I have hosts with Panda Adaptive Defense 360 and some with Panda AD 360 Advanced Reporting. (I have TRD hosts installed as well.)<br /><br /> Dnswatch, web blocker and Panda all have content category filters. I have web blocker activated and dnswatch enabled and have not configured Panda. <br /><br /> Which combination of these if any would be best to use and in what configuration]]>
        </description>
    </item>
    <item>
        <title>how can i tell which device triggered a block</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/1551/how-can-i-tell-which-device-triggered-a-block</link>
        <pubDate>Fri, 15 Jan 2021 15:19:09 +0000</pubDate>
        <category>DNSWatch - General</category>
        <dc:creator>davidneltzon</dc:creator>
        <guid isPermaLink="false">1551@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>hello,<br />
i need to know which computer triggered each block.</p>

<p>i got this from the report</p>

<hr /><p>Victim IP addresses     Unavailable<br />
Victim hostname     Unknown"</p>

<p>Destination domains<br />
paste[.]ee<br />
Destination port    443</p>

<hr /><p>thanks,</p>
]]>
        </description>
    </item>
    <item>
        <title>Certificate for DNSWatchGO</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/610/certificate-for-dnswatchgo</link>
        <pubDate>Wed, 13 Nov 2019 14:28:37 +0000</pubDate>
        <category>DNSWatch - General</category>
        <dc:creator>jmsoares91</dc:creator>
        <guid isPermaLink="false">610@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi Guys,</p>

<p>When we install the DNSWatchGO client, everytime a block occurs we get a Certificate Error on the Browser.</p>

<p>Where can we download the DNSWatchGO Certificate Authoritity?</p>

<p>Should the client install the CA during the setup?</p>

<p>Thanks in advance</p>
]]>
        </description>
    </item>
   </channel>
</rss>
