You can use tcpdump on your DNS server to take the trace.

Command would be like below.

tcpdump -i any port 53 -w trace.pcap

You can share trace.pcap with us.

Regards
Abdul Khader

Ejaz <me...@cyberia.net.sa> wrote:

>
>Thanks you. 
>
>The traffic will go to router which is handled by the Network dept. The fear  
>that may router can crash   if we  start enabling the packet capture since it 
>is layer 7. 
>
>Is advisable,  if we  deny outbound UDP port 0  from the DNS servers, after 
>enabling firewall.
>
>
>Ejaz 
>
>-----Original Message-----
>From: S Carr [mailto:sjc...@gmail.com] 
>Sent: Wednesday, July 27, 2016 10:51 AM
>To: Ejaz <me...@cyberia.net.sa>
>Cc: bind-users <bind-users@lists.isc.org>
>Subject: Re: outgoing-traffic
>
>On 27 July 2016 at 08:41, Ejaz <me...@cyberia.net.sa> wrote:
>> Thanks for all.
>>
>> But the strange thing is that if the request comes on 53 port then it 
>> should go only from 53 is it?? Why goes out from 0, any clue would be 
>> highly appreciate.
>>
>> Regards
>> Ejaz
>
>Where's the packet capture to review?
>
>_______________________________________________
>Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
>from this list
>
>bind-users mailing list
>bind-users@lists.isc.org
>https://lists.isc.org/mailman/listinfo/bind-users
_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to