<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Heavy DNS port 53 traffic from client in Access Points - Indoor and Outdoor</title>
    <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Heavy-DNS-port-53-traffic-from-client/m-p/11537#M2667</link>
    <description>You would need to take a sniffer trace to identify the source/destination and how much DNS is utilizing your bandwidth.</description>
    <pubDate>Wed, 21 Dec 2016 23:02:32 GMT</pubDate>
    <dc:creator>michael_brado</dc:creator>
    <dc:date>2016-12-21T23:02:32Z</dc:date>
    <item>
      <title>Heavy DNS port 53 traffic from client</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Heavy-DNS-port-53-traffic-from-client/m-p/11536#M2666</link>
      <description>We have client device, a Amazon Fire TV, that streams from PlayStation Vue, &amp;nbsp;when I view the traffic usage for that client in ZD after constant streaming, it shows that 85% of the traffic is going over port 53 DNS, and only the rest is HTTPS. &amp;nbsp;It is not a small amount of data either...1.7GB down in one hour over port 53. &amp;nbsp;Any theories why so much traffic is on port 53...I would have expected almost all of the traffic would be on https.</description>
      <pubDate>Tue, 20 Dec 2016 14:34:50 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Heavy-DNS-port-53-traffic-from-client/m-p/11536#M2666</guid>
      <dc:creator>kieth_hoover</dc:creator>
      <dc:date>2016-12-20T14:34:50Z</dc:date>
    </item>
    <item>
      <title>Re: Heavy DNS port 53 traffic from client</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Heavy-DNS-port-53-traffic-from-client/m-p/11537#M2667</link>
      <description>You would need to take a sniffer trace to identify the source/destination and how much DNS is utilizing your bandwidth.</description>
      <pubDate>Wed, 21 Dec 2016 23:02:32 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Heavy-DNS-port-53-traffic-from-client/m-p/11537#M2667</guid>
      <dc:creator>michael_brado</dc:creator>
      <dc:date>2016-12-21T23:02:32Z</dc:date>
    </item>
  </channel>
</rss>

