@hydn Appreciate the heads-up.
In general settings, I’m using Quad9 over DoT. The network uses the DNS Resolver with pfBlockerNG and DNSBL, listening on the network interface addresses. This all works fine.
What I’m now trying to do is to isolate part of the network by using a VLAN and route all its traffic—including DNS—exclusively through the VPN. From a privacy perspective having VPN traffic and DNS within the VPN seems to be the safest approach. I’m fine giving up some control and filtering provided by pfBlockerNG and popular public DNS.
I’m still not quite sure how to set this up properly. I tried configuring the VLAN’s DHCP server to hand out the VPN’s internal DNS IPs (10.2.1.1 and 10.2.2.1) for the 10.10.99.0/24 subnet. It looked like it was working earlier, but now DNS queries are timing out.
I have disabled DNS Resolver on the vlan 99 interface.
The 2 Gateway VPN IPs are used as dns servers on my host /etc/resolv.conf
86bc21ae-69f8-41da-b82e-35ce06810538-image.png
7a22fe03-c791-4d75-8e5c-58fd80df1c49-image.png
nslookup timeout
501415eb-3e40-4f1e-a0e2-d80f1b446853-image.png
Traffic going out from VLAN to VPN DNS
59e063d0-febe-4c03-9e10-a8b6afb26eaf-image.png
traffic seems coming back from the VPN (this is correct as I have 1:1 NAT on 10.2.0.2 to 10.2.1.1)
0b095dd3-f8e9-4b14-a431-1069c9cb85f6-image.png
I suppose on the VLAN I should see traffic response coming in from 10.2.1.1 but I do not and that is why I see "timed out".
The nat seems to work I think. I am confused on why the DNS response is not properly routing back to the client
my 1:1 NAT
217c0de8-17cd-4d0c-81e1-0ef5ba5b32e2-image.png
my outbound
48ab8aed-4cd5-4edb-82b2-78c13dece434-image.png