Server unable to interpret format
Cause #1This problem may occur on some Cisco PIX Firewall models with software that is earlier than PIX Firewall version 6.3(2). The Cisco PIX Firewall drops DNS packets sent to User Datagram Protocol (UDP) port 53 that are larger than the configured maximum length. By default, the maximum length for UDP packets is 512 bytes.
Cause #2This problem may occur if the external DNS server does not support Extension Mechanisms for DNS (EDNS0) or if a firewall exists between your server and the external DNS server. DNS servers that do not support EDNS0 cannot process EDNS0 data, and this behavior causes the query to fail. Some firewalls may drop the EDNS0 packets that are sent by servers that support EDNS0, or may drop UDP packets that are larger than 512 bytes that are sent by servers that support EDNS0.
Workaround #1To resolve this problem, visit the following Cisco Systems Web site for information and update instructions:
Workaround #2To work around this problem, turn off EDNS0 support in Windows Server 2003. To do this, follow these steps:
- Start a command prompt.
- Type dnscmd /Config /EnableEDnsProbes 0, and then press ENTER.
Microsoft provides third-party contact information to help you find technical support. This contact information may change without notice. Microsoft does not guarantee the accuracy of this third-party contact information.
Article ID: 828731 - Last Review: Mar 29, 2017 - Revision: 3