Just so you guys understand what I am trying to do. Please see this from my webhost.
Regarding your issue that you mentioned in chat before we lost each other:
"Firewall UDP Packet Source Port 53 Ruleset Bypass Risk: Critical UDP Port: -1 It is possible to by-pass the rules of the remote firewall by sending UDP packets with a source port equal to 53. An attacker may use this flaw to inject UDP packets to the remote hosts, in spite of the presence of a firewall. Solution: Review your firewall rules policy"
Our chat was cut off, but I wanted to mention some options to you.
DNS DOES run on port 53, but any communications that come from a source port of 53, to any other port, can be blocked. This will allow DNS communications to continue to run smoothly (in nearly all cases), while also allowing your scan to not bring up this alert. You may also want to make sure your DNS blocks
The easiest way to block this, is by editing your /etc/resolv.conf file and adding (or modifying these lines so that they match):
Also, you may want to secure your DNS server by doing the following if you haven't already to deny open resolver queries:
*edit your /etc/named.conf file with these settings:
nano /etc/named.conf - nano is a simple text editor, however it is not always installed by default. If it is not, simply type "yum install nano" on CentOS or "apt-get install nano" on debian based distros