Whitelisting in Guardian


Whitelisting in Guardian

Guardian operates in a secured framework, with the cache separated from the recursive DNS engines. It performs a continuous real-time analysis of the inbound and outbound traffic and therefore offers complete DNS Transactions Inspection (DTI).
This analysis is especially reliable if a large number of queries is cached. By default, Guardian caches all the answers to client queries. The answers not cached yet, are sent to the DNS resolver and transmitted to Guardian, that caches them and sends them back to the client. That way, Guardian has an ever-growing
number of queries to refine its analysis of the network and avoid potential threats.

The Guradian has triggers activated based on parameters considering the cache and number of queries and other inputs. sometimes the clients are sending the queries to a DNS server which forwards to the Guardian resulting in abnormal traffic generated from one IP. so whitelisting that proxy or that DNS servers IP might be required, below is the steps to whitelist some IPs from the Guardian countermeasures.

1. Create a forward zone in Guardian server; example: guardian-whitelist.list

2. Add the IPs in reverse format as TXT records with APPROVED in the value.

You can whitelist the whole network by adding wildcard mask *.1.168.192.


3. Edit the Guardian options to include the following:


4. Enable xfer account in Guardian services:

5. Confirm the list is being transferred to list0 from blastcli:



6. Execute abnormal DNS traffic like nslookup DGA domains:

The trigger will be fired but the action of quarantine will have no impact ;)


Did you find this article useful?



  • Measure QPS on BIND9

    BIND9 DNS engine was installed on Ubuntu server, the goal is to measure the QPS by enabling the statistics.Installing the BIND9 command: sudo apt inst...

  • Enabling DNSSEC on an external zone

    Domain Name System Security Extensions (DNSSEC) is used to strengthen DNS protocol security.It controls the integrity of all DNS answers and ensures t...

  • Utilizing ioc2rpz.net as open source RPZ

    ioc2rpz community is a portal which provides open source DNS Firewall / RPZ feeds. The DNS Firewall feeds are based on publicly available threat intel...

  • Enable Guardian for nonsupported interfaces

    Broadcom interface is not supported by default, only intel interfaces are supported for the Guardian service. this workaround only for POC: 1. login...

  • Cascaded DNS

    EDNS: Port 53 is reserved for DNS usage, DNS uses both UDP and TCP for message transport.Conventional message exchanges are short, and thus well suit...