Another benefit is that you can set your smtp servers so systems only can use approved mail servers. This way no device can try to start using non approved email smtp servers.
What I do with this is I made an alias
Screenshot 2023-08-21 at 8.48.44 PM.png
(SMTP US SERVERS)
Screenshot 2023-08-21 at 8.49.09 PM.png
(IMAP US SERVERS)
Screenshot 2023-08-21 at 8.52.30 PM.png
(Alias for ports)
After I create a server specific mail ACL (access control list)
Screenshot 2023-08-21 at 8.50.58 PM.png
(now my hosts can only access the approved smtp and imap servers)
The ports I have for mail can only be used for mail and for specific approved servers.
Once and a while google takes a min to resolve and send only issue.
Screenshot 2023-08-21 at 8.55.39 PM.png
(resolved automatically when they change every 5 or so mins)
Your system now will only use the approved USA servers. A couple years ago this was a big issue for some offices as the email being sent out was going to non approved servers.
You can also use "DNS over SSL" with port 853 and get some extra security.
Screenshot 2023-08-21 at 8.58.08 PM.png (DNS OVER 853)
Everything for my system uses DNS over SSL/TLS. The firewall does the SSL/TLS DNS requests for me.
You can also create access control lists on who can send DNS requests to the firewall.
Screenshot 2023-08-21 at 8.59.32 PM.png
Keep in mind devices will try to use DoH and all sorts of other ways to quarry an IP address if pfSense does it you have some more control over just opening up port 53 with a any any * * rule.
Of course you need a good NAT rule.
Screenshot 2023-08-21 at 9.03.11 PM.png
And you need a good DoH block list to really get good control
Screenshot 2023-08-21 at 9.04.24 PM.png
combineddohlist.txt
The firewall can make better use of IPS/IDS if it knows what it is resolving to.