I just wasted 3 hours of my life trying to block traffic to unauthorized DNS servers from my RV082
I created rules to block both TCP and UDP port 53 from the LAN side, and created rules to allow traffic to authorized DNS servers (OpenDNS). No matter what I did, workstations could still be set to use other DNS servers and browse the web without issue.
Looking at the router's online Help, I saw this:
Custom rules can be created to override the RV082 default rules, but there are four additional default rules that will be always active, and custom rule can not override the four rules.
* HTTP service from LAN side to RV082 is always allowed.
* DHCP service from LAN side is always allowed.
* DNS service from LAN side is always allowed.
* Ping service from LAN side to RV082 is always allowed.
I think I just lost faith in my favorite router. Why in the world would they not allow you to block/restrict DNS traffic?
Anyone aware of a workaround? Cisco was not of any help....