|
NAMEacl - enforces access control policies on source ip and prevents unauthorized access to DNS servers.DESCRIPTIONWith acl enabled, users are able to block or filter suspicious DNS queries by configuring IP filter rule sets, i.e. allowing authorized queries to recurse or blocking unauthorized queries.This plugin can be used multiple times per Server Block. SYNTAXacl [ZONES...] { ACTION [type QTYPE...] [net SOURCE...] }
EXAMPLESTo demonstrate the usage of plugin acl, here we provide some typical examples.Block all DNS queries with record type A from 192.168.0.0/16: . { acl { block type A net 192.168.0.0/16 } } Filter all DNS queries with record type A from 192.168.0.0/16: . { acl { filter type A net 192.168.0.0/16 } } Block all DNS queries from 192.168.0.0/16 except for 192.168.1.0/24: . { acl { allow net 192.168.1.0/24 block net 192.168.0.0/16 } } Allow only DNS queries from 192.168.0.0/24 and 192.168.1.0/24: . { acl { allow net 192.168.0.0/24 192.168.1.0/24 block } } Block all DNS queries from 192.168.1.0/24 towards a.example.org: example.org { acl a.example.org { block net 192.168.1.0/24 } } METRICSIf monitoring is enabled (via the prometheus plugin) then the following metrics are exported:
The server and zone labels are explained in the metrics plugin documentation.
Visit the GSP FreeBSD Man Page Interface. |