Jump to content

Am I loosing my mind with pfSense? DNS Trouble

KingCollins

Hey guys, long story short, I have a standard WAN connection on pfsense with multiple VPN gateways. I have configured certain devices to pass through the VPN tunnels, which is working well, except for these blasted DNS queries!!!

 

First off I have DNS Resolver enabled, DNS DHCP (ISP DNS) override disabled, and Google DNS configured as my default DNS server for the resolver. This doesn't change anything, any device in my home still uses my ISP DNS for resolving queries. That's one issue, 

image.png.3e6ef95fec4ba31f798d25c30c29a047.png


Second issue, I have a Windows 10 machine and a Windows 7 VM, both automatically assigning IP address and DNS, and BOTH passing through a VPN tunnel.

Yet, when I do a DNS leak test, one machine resolves to my ISP, and the other resolves to my VPN DNS . . . . WHY?? 

There's no difference in configuration, makes no sense, any ideas?

 

Screenshots:

 

Windows 10:

image.png.c6dca14e9cd545b0c6461af635485afa.png

Windows 7 VM:

image.png.94296cb043ebd2b4ffe8cf2d2459bbb0.png

 

 

My Gaming Rig: AMD Ryzen 5600x  |  Corsair H100i GTX  |  ASUS ROG Strix B450-F Gaming  |  32GB Samsung DDR4 3600MHz  |  ASUS RTX 3070 ROG Strix  |  WD Black 240GB NVMe  |  1TB Samsung 850 Pro SSD | 2TB Samsung Enterprise SSD  |  WD Black 1.5TB   |  3x NZXT Aer RGB 140MM  |  Seasonic Focus 750w   |  NZXT H500 Elite   |  Windows 10 Pro

 

My Home Server: AMD Ryzen 1400x  |  Gigabyte Aurora B550 Elite  |  32Gb Samsung DDR3 3200Mhz  |  HP RTX 2060 6GB  |  1TB Samsung 850 Pro  |  2x Seagate IronWolf Pro 18TB | 3x Seagate IronWolf Pro 4TB |  2x WD Green 2TB  |  Corsair CX650m  | Bitfenix Shinobi | Windows Server 2022

Link to comment
Share on other sites

Link to post
Share on other sites

If you are using VPN tunnels, generally the DNS is also configured on the tunnel endpoint as forwarding all traffic down a tunnel and not configuring DNS on the exit point will prevent any DNS lookups being made.

 

DNS in pfSense's system config wont matter if you are shunting *all* traffic including UDP 53 down a VPN tunnel.  You can usually specify the endpoint DNS servers in the VPN tunnel configuration.

Please quote or tag me if you need a reply

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×