Cisco Cisco Packet Data Interworking Function (PDIF)
HA Proxy DNS Configuration Mode Commands
pass-thru ▀
Command Line Interface Reference, StarOS Release 16 ▄
6055
pass-thru
Sets IP addresses that should be allowed through the proxy DNS intercept feature.
Product
HA
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > Proxy DNS Configuration
configure > context context_name > proxy-dns intercept-listlist_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-proxy-dns-intercept-list)#
Syntax
[ no ] pass-thru ip_address [ /ip_mask ]
no
Removes the DNS IP address from the pass-thru rule.
pass-thru ip_address [ /ip_mask ]
Specifies an DNS IP address that is allowed through the intercept feature.
ip_address
[ /
ip_mask
]: Specifies the IP address and network mask bits.
ip_address
[ /
ip_mask
] is
specified using IPv4 dotted decimal or IPv6 colon-separated-hexadecimal notation. The mask bits are a
numeric value which is the number of bits in the subnet mask (CIDR notation).
numeric value which is the number of bits in the subnet mask (CIDR notation).
Usage
Use this command to identify DNS IP addresses that should be allowed through the intercept feature. For a
more detailed explanation of the proxy DNS intercept feature, see the
more detailed explanation of the proxy DNS intercept feature, see the
proxy-dns intercept-list
command in the Context Configuration Mode Commands chapter. A maximum of 16 intercept rules (either
redirect
or
pass-thru
) are allow for each intercept list.
Important:
To allow packets through that do not match either the
pass-thru
or
redirect
rules, set a
pass-
thru
rule address as: 0.0.0.0/0. If a packet does not match either the
pass-thru
or
redirect
rule, the packet is
dropped.
Example
The following command allows a foreign network’s DNS with an IP address of
10.2.55.12
to avoid being
redirected:
pass-thru 10.2.55.12