Network Tools Settings

DNS Settings

Name servers
The IP addresses to use as name servers. If this is empty the application will default to using the /etc/resolv.conf file. Default: Empty

Use TCP
Use TCP instead of UDP for DNS queries. UDP is faster, but is limited in size. DNS lookups will automatically use TCP for zone transfers (AFXR) and when a response was truncated.
Default: FALSE

Sctrict query mode
If the hostname that was looked up is not actually in the answer section of the response, the DNS lookup will return an empty answer section, instead of an answer section that could contain CNAME records.
Default: FALSE

Randomize name servers
Randomize the name servers list each time it is used.
Default: FALSE

DNS port
The UDP/TCP port to use when making DNS queries.
Default: FALSE

Timeout
Timeout value to use for socket connections (in seconds).
Default: FALSE

Cache type
The type of cache to use.
Default: file

Cache size
The number of bytes the application is allowed to use as a DNS cache (in bytes)
Default: 1048576

DNS Blacklist Settings

Blacklists
The dns blacklists to use when performing DNS based blacklist checks.
Default: zen.spamhaus.org, bl.spamcop.net, b.barracudacentral.org , bl.score.senderscore.com, cidr.bl.mcafee.com, dnsbl.forefront.microsoft.com, bogons.cymru.com, scbl.abuseat.org, all.spamrats.com

Reputation Settings

AbuseIPDB API key
The API key required to use the AbuseIPDB IP address reputation service.
Default: empty

AbuseIPDB cache
Cache AbuseIPDB lookups for this long (in minutes). This can help lower API usage. Setting this to 0 will disable the cache.
Default: 240 minutes

Block reporting
Report login failure blocks to AbuseIPDB. This will change the firewall option under Settings -> Reporting & Alerts -> Block reporting script (BLOCK_REPORT) so that the login failure daemon will submit blocks to AbuseIPDB.
Default: false

How to get an AbuseIPDB API key

  1. Signup for the free API key here. The free API key is good for up to 1000 checks per day.
  2. Generate an API key here
  3. Navigate to Juggernaut Firewall -> Settings -> Network Tools Settings and enter the license key under Reputation Settings -> AbuseIPDB API key.