Is there a recommended set of firewall rules that insure that all necessary DNS traffic can enter and leave, even the larger packets that result from dns-sec?
We want port 53 traffic from anywhere, in this case and can send it anywhere, and want to be sure that no port 53 traffic is being lost. Thank you _______________________________________________ bind-users mailing list bind-users@lists.isc.org https://lists.isc.org/mailman/listinfo/bind-users