Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    pfSense with CloudFlare (and WireGuard - soon) - setup AD DS

    Scheduled Pinned Locked Moved General pfSense Questions
    49 Posts 3 Posters 10.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • bmeeksB
      bmeeks
      last edited by

      1. Do you have your AD DNS server configured to resolve?
      2. Do you have your AD DNS server's IP address being given out by the AD DHCP server as the DNS for clients to utilize?
      3. When you say your Internet quits working, can you be more specific. Do you mean browsing or pinging an external host by domain name from a device on your LAN does not work with DNS turned off in pfSense, but it works when DNS in pfSense is enabled? If so, the you do not have things set properly as your either clients seem to be using pfSense for DNS or you do not have the AD DNS server configured to resolve (with roots properly imported).

      I promise you this is not difficult at all. You are not getting all of the configuration correct.

      bearhntrB 2 Replies Last reply Reply Quote 0
      • bearhntrB
        bearhntr @bmeeks
        last edited by

        @bmeeks said in pfSense with CloudFlare (and WireGuard - soon) - setup AD DS:

        1. Do you have your AD DNS server configured to resolve?

        I believe I am. From the AD DNS - not having any issues getting to the Internet. From the DNS tool - all the root hints resolve and I have the following settings (see images)

        3c7b288c-e075-42b7-acf8-f39bef6ba663-image.png f05a04b4-1e6f-478a-8c6d-0ac0703bb763-image.png 072a61ed-6c0e-446e-9725-2ea5e278dc5a-image.png

        1. Do you have your AD DNS server's IP address being given out by the AD DHCP server as the DNS for clients to utilize?

        I believe this is working -- this one of my home computers (not joined to the Domain -- yet) - but it looks like it is getting the right IPs ( gateway - 192.168.10.254 = pfSense // 192.168.10.250 = AD DNS )

        18051a1c-d503-41fd-a6b4-09f5534511db-image.png

        1. When you say your Internet quits working, can you be more specific. Do you mean browsing or pinging an external host by domain name from a device on your LAN does not work with DNS turned off in pfSense, but it works when DNS in pfSense is enabled? If so, the you do not have things set properly as your either clients seem to be using pfSense for DNS or you do not have the AD DNS server configured to resolve (with roots properly imported).

        When I turned off the DNS Resolver feature in pfSense - then from the machine shown in #2 above - I tried to go to a new website...and I got :page cannot be displayed: error. I also tried to ping google.com and got No Response. Soon as I turned on the DNS resolver on in pfSense and unchecked everything except the DNSSEC (what appears to be the defaults) - everything started working again.

        I promise you this is not difficult at all. You are not getting all of the configuration correct.

        Yeah - I did not think it was hard either...as I am no idiot...but again, when NETGEAR ORBI was doing all the Routing and DNS and DHCP (never had these problems) - it is just with the pfSense. 😖

        If there is anything you want an image of - let me know.

        1 Reply Last reply Reply Quote 0
        • bearhntrB
          bearhntr @bmeeks
          last edited by

          @bmeeks

          Then next is to fix ipv6:

          6ef7cc7a-e232-45f1-b620-15dac8de79d1-image.png

          1 Reply Last reply Reply Quote 0
          • bmeeksB
            bmeeks
            last edited by

            For IPv6
            Unless you are actually using IPv6 and have a public IPv6 address through your ISP, you will need to go in and delete all the IPv6 root servers on the Windows AD box. You do that on the same screen where you checked the resolving. Just select and remove the IPv6 addresses (again, if you don't have a public IPv6 address for pfSense.

            bearhntrB 1 Reply Last reply Reply Quote 0
            • bmeeksB
              bmeeks
              last edited by bmeeks

              For DNS:
              Do you have any rules in place on the pfSense firewall that would be interfering here? Do you have DNS redirects in place?

              And it really makes zero sense that as soon as you enable the Resolver on pfSense that things start working. That really screams a misconfiguration someplace.

              My first thought is your client is looking to pfSense for DNS, but from the screen shot you posted that does NOT seem to be the case. That leaves maybe a firewall rule or DNS redirect on the firewall that is interfering with your AD server's DNS role. Let's see your LAN interface firewall rules and any you might have on the FLOATING RULES tab. If DNS works when you enable the Resolver on pfSense, then that means your client is getting sent there for DNS for some reason (but it should not be).

              While I don't think it's the problem here, you really do not need the forwarder IP addresses if you are going to use the root hints and let AD DNS resolve.

              bearhntrB 1 Reply Last reply Reply Quote 0
              • bearhntrB
                bearhntr @bmeeks
                last edited by

                @bmeeks

                I have done that in the DNS tool - root hints. There are no IPv6 addresses there (except the Link-Local one)...if you disable ipv6 protocol completely - you get other errors (apparently AD DS needs ipv6 for something).

                29a3285d-b36e-4719-b90e-5fc2a57f0e47-image.png

                54d152ea-1631-43c7-846f-d15c315653e3-image.png

                a4965f33-4bb3-44d9-9843-96e6db546982-image.png

                603358bf-3f9b-431a-a4d9-2a42fd9704b3-image.png

                bmeeksB 1 Reply Last reply Reply Quote 0
                • bearhntrB
                  bearhntr @bmeeks
                  last edited by

                  @bmeeks said in pfSense with CloudFlare (and WireGuard - soon) - setup AD DS:

                  For DNS:
                  Do you have any rules in place on the pfSense firewall that would be interfering here? Do you have DNS redirects in place?

                  d1d6bfb4-b468-4796-a768-9c3ce0d6f7e9-image.png

                  And it really makes zero sense that as soon as you enable the Resolver on pfSense that things start working. That really screams a misconfiguration someplace.

                  My first thought is your client is looking to pfSense for DNS, but from the screen shot you posted that does NOT seem to be the case. That leaves maybe a firewall rule or DNS redirect on the firewall that is interfering with your AD server's DNS role. Let's see your LAN interface firewall rules and any you might have on the FLOATING RULES tab. If DNS works when you enable the Resolver on pfSense, then that means your client is getting sent there for DNS for some reason (but it should not be).

                  While I don't think it's the problem here, you really do not need the forwarder IP addresses if you are going to use the root hints and let AD DNS resolve.

                  bmeeksB 1 Reply Last reply Reply Quote 0
                  • bmeeksB
                    bmeeks @bearhntr
                    last edited by bmeeks

                    @bearhntr said in pfSense with CloudFlare (and WireGuard - soon) - setup AD DS:

                    @bmeeks said in pfSense with CloudFlare (and WireGuard - soon) - setup AD DS:

                    For DNS:
                    Do you have any rules in place on the pfSense firewall that would be interfering here? Do you have DNS redirects in place?

                    d1d6bfb4-b468-4796-a768-9c3ce0d6f7e9-image.png

                    And it really makes zero sense that as soon as you enable the Resolver on pfSense that things start working. That really screams a misconfiguration someplace.

                    My first thought is your client is looking to pfSense for DNS, but from the screen shot you posted that does NOT seem to be the case. That leaves maybe a firewall rule or DNS redirect on the firewall that is interfering with your AD server's DNS role. Let's see your LAN interface firewall rules and any you might have on the FLOATING RULES tab. If DNS works when you enable the Resolver on pfSense, then that means your client is getting sent there for DNS for some reason (but it should not be).

                    While I don't think it's the problem here, you really do not need the forwarder IP addresses if you are going to use the root hints and let AD DNS resolve.

                    Not WAN rules. Show LAN rules and the FLOATING rules (if you have any of those).

                    bearhntrB 1 Reply Last reply Reply Quote 0
                    • bmeeksB
                      bmeeks @bearhntr
                      last edited by

                      @bearhntr said in pfSense with CloudFlare (and WireGuard - soon) - setup AD DS:

                      @bmeeks

                      I have done that in the DNS tool - root hints. There are no IPv6 addresses there (except the Link-Local one)...if you disable ipv6 protocol completely - you get other errors (apparently AD DS needs ipv6 for something).

                      29a3285d-b36e-4719-b90e-5fc2a57f0e47-image.png

                      54d152ea-1631-43c7-846f-d15c315653e3-image.png

                      a4965f33-4bb3-44d9-9843-96e6db546982-image.png

                      603358bf-3f9b-431a-a4d9-2a42fd9704b3-image.png

                      I don't think you understood what I was saying in my IPv6 post.

                      If you have do NOT have a public IPv6 address on your WAN (and thus a delegation for your LAN), then you would remove the root hints IPv6 addresses. But since you DO have a public IPv6 (since you are showing one), then do NOT remove the IPv6 addresses for the root hints. And make sure that your AD domain controllers have proper IPv6 addresses assigned from the IPv6 subnet used on your LAN.

                      1 Reply Last reply Reply Quote 0
                      • bmeeksB
                        bmeeks
                        last edited by bmeeks

                        Also, you will need to enter the appropriate domain overrides in the DNS Resolver on pfSense so that unbound will know to go ask your AD DNS server for the local hostnames of local devices listed in things like the ARP table.

                        But having (or not having) the domain overrides configured has no impact on external DNS lookups working. You have still seem to have something misconfigured for that not to be working from a client machine on your LAN.

                        1 Reply Last reply Reply Quote 0
                        • bmeeksB
                          bmeeks
                          last edited by bmeeks

                          IPv6 on your LAN
                          You did not state initially state you wanted to use IPv6. That is possibly going to be problematic if you do not have a static IPv6 subnet to work with (meaning NOT one configured by tracking your WAN IPv6 delegation).

                          Did you configure a DHCPv6 setup in the Active Directory DHCP server? If so, realize that unless you have a true static IPv6 prefix, you will have to change the DHCPv6 scope every time your WAN prefix changes.

                          If IPv6 is available, Windows will default to using it first. So that means the IPv6 configuration must be fully functional.

                          You can, of course, let pfSense be the DHCPv6 server (or use something like SLAAC). But if you do that, local clients will not have their IPv6 address registered in the Active Directory DNS.

                          bearhntrB 1 Reply Last reply Reply Quote 0
                          • bearhntrB
                            bearhntr @bmeeks
                            last edited by

                            @bmeeks

                            bd92219e-7450-4f01-a704-9eb24a06eee9-image.png

                            ee0486f8-85d4-4310-a4e4-0619aff10cac-image.png

                            WireGuard is there - but it has not been setup yet or configured. Just the PACKAGE installed.

                            33071982-9c04-42c9-bbda-a65d738cc20d-image.png

                            bmeeksB 1 Reply Last reply Reply Quote 0
                            • bmeeksB
                              bmeeks @bearhntr
                              last edited by bmeeks

                              @bearhntr said in pfSense with CloudFlare (and WireGuard - soon) - setup AD DS:

                              @bmeeks

                              bd92219e-7450-4f01-a704-9eb24a06eee9-image.png

                              ee0486f8-85d4-4310-a4e4-0619aff10cac-image.png

                              WireGuard is there - but it has not been setup yet or configured. Just the PACKAGE installed.

                              33071982-9c04-42c9-bbda-a65d738cc20d-image.png

                              Okay, I don't see any DNS redirect rules.

                              Let's do this step-by-step.

                              1. Turn off the DNS Resolver on pfSense (disable it for now).
                              2. Open a command prompt session on a Windows client on your LAN (use either a laptop or desktop PC).
                              3. Execute this command:
                              nslookup cnn.com
                              

                              Post what comes back from that command. What should happen is your AD DNS server should go out and resolve that domain name to several IPv4 and IPv6 addresses. Here is what that looks like on my desktop Windows PC.

                              nslookup_command.png

                              You can see in the above screen shot that the DNS lookup request was handled by one of my domain controllers (redmond1 is the machine name) at IP address 192.168.10.4. It resolved the domain "cnn.com" to that list of IP addresses.

                              1. If the above steps don't work, then let's first figure out why and get that working.
                              bearhntrB 1 Reply Last reply Reply Quote 0
                              • bearhntrB
                                bearhntr @bmeeks
                                last edited by

                                @bmeeks

                                a8484276-375e-474e-b266-357207e4fb73-image.png

                                bmeeksB 1 Reply Last reply Reply Quote 0
                                • bearhntrB
                                  bearhntr @bmeeks
                                  last edited by

                                  @bmeeks said in pfSense with CloudFlare (and WireGuard - soon) - setup AD DS:

                                  I wanted to say thank you again for your assist with this.

                                  IPv6 on your LAN
                                  You did not state initially state you wanted to use IPv6. That is possibly going to be problematic if you do not have a static IPv6 subnet to work with (meaning NOT one configured by tracking your WAN IPv6 delegation).

                                  Before I decided to move to the AD DS to handle DNS and DHCP, pfSense was my DNS and DHCP/DHCPv6 -- using those same settings I showed earlier...WAN (DHCP / DHCPv6 from my ISP) and LAN (Track Interface = WAN). I would get an IPv6 address for both of them - and I watched them for weeks - they never changed....and my devices were indeed getting v6 addresses.

                                  Did you configure a DHCPv6 setup in the Active Directory DHCP server? If so, realize that unless you have a true static IPv6 prefix, you will have to change the DHCPv6 scope every time your WAN prefix changes.

                                  No - not yet...that is what I meant when I mentioned that I wanted to set that up. I just find it strange as there are no v6 Root Hints configured - but the Best Practices Analyzer in Windows shows them.

                                  1e34f448-ec74-4b60-96b9-09a1cc34f06a-image.png 169a9355-df56-4993-bf9c-56a80f0e7631-image.png

                                  If IPv6 is available, Windows will default to using it first. So that means the IPv6 configuration must be fully functional.

                                  You can, of course, let pfSense be the DHCPv6 server (or use something like SLAAC). But if you do that, local clients will not have their IPv6 address registered in the Active Directory DNS.

                                  bearhntrB bmeeksB 2 Replies Last reply Reply Quote 0
                                  • bearhntrB
                                    bearhntr @bearhntr
                                    last edited by

                                    @bmeeks

                                    I have also noticed that only a few of my devices when they get a DHCP address - - are registering in the DNS. Before I made this change -- none of them were doing this.

                                    So when I ping a device by name - I get no response (no resolution). Same if I ping the IP.

                                    53b6a9b1-917b-4847-a9ec-833dfbe9440f-image.png

                                    Does not make any sense why DNS records are not getting created for my network in DNS.

                                    bmeeksB 1 Reply Last reply Reply Quote 0
                                    • bmeeksB
                                      bmeeks @bearhntr
                                      last edited by bmeeks

                                      @bearhntr said in pfSense with CloudFlare (and WireGuard - soon) - setup AD DS:

                                      @bmeeks

                                      I have also noticed that only a few of my devices when they get a DHCP address - - are registering in the DNS. Before I made this change -- none of them were doing this.

                                      So when I ping a device by name - I get no response (no resolution). Same if I ping the IP.

                                      53b6a9b1-917b-4847-a9ec-833dfbe9440f-image.png

                                      Does not make any sense why DNS records are not getting created for my network in DNS.

                                      Checking that option just tells the DHCP server to always update DNS. This is sometimes required for dumb devices like IoT stuff. But in order for this to actually work, the DHCP client on the device requesting an IP address has to have some kind of hostname to start with that it can give to the DHCP server when asking for an IP. Otherwise there is nothing for the DHCP server to put into DNS. It can't pull the hostname out of the ether. The requesting device must offer it first.

                                      1 Reply Last reply Reply Quote 0
                                      • bmeeksB
                                        bmeeks @bearhntr
                                        last edited by bmeeks

                                        @bearhntr said in pfSense with CloudFlare (and WireGuard - soon) - setup AD DS:

                                        @bmeeks said in pfSense with CloudFlare (and WireGuard - soon) - setup AD DS:

                                        I wanted to say thank you again for your assist with this.

                                        IPv6 on your LAN
                                        You did not state initially state you wanted to use IPv6. That is possibly going to be problematic if you do not have a static IPv6 subnet to work with (meaning NOT one configured by tracking your WAN IPv6 delegation).

                                        Before I decided to move to the AD DS to handle DNS and DHCP, pfSense was my DNS and DHCP/DHCPv6 -- using those same settings I showed earlier...WAN (DHCP / DHCPv6 from my ISP) and LAN (Track Interface = WAN). I would get an IPv6 address for both of them - and I watched them for weeks - they never changed....and my devices were indeed getting v6 addresses.

                                        Did you configure a DHCPv6 setup in the Active Directory DHCP server? If so, realize that unless you have a true static IPv6 prefix, you will have to change the DHCPv6 scope every time your WAN prefix changes.

                                        No - not yet...that is what I meant when I mentioned that I wanted to set that up. I just find it strange as there are no v6 Root Hints configured - but the Best Practices Analyzer in Windows shows them.

                                        1e34f448-ec74-4b60-96b9-09a1cc34f06a-image.png 169a9355-df56-4993-bf9c-56a80f0e7631-image.png

                                        If IPv6 is available, Windows will default to using it first. So that means the IPv6 configuration must be fully functional.

                                        You can, of course, let pfSense be the DHCPv6 server (or use something like SLAAC). But if you do that, local clients will not have their IPv6 address registered in the Active Directory DNS.

                                        You will likely want to update the list of root servers by clicking the Copy from Server button and putting the IP address of one of the root servers in the box within the dialog that pops up. Use 191.41.0.4. That will pull in a fresh list and you should then see several IPv6 servers.

                                        1 Reply Last reply Reply Quote 0
                                        • bmeeksB
                                          bmeeks @bearhntr
                                          last edited by bmeeks

                                          @bearhntr said in pfSense with CloudFlare (and WireGuard - soon) - setup AD DS:

                                          @bmeeks

                                          a8484276-375e-474e-b266-357207e4fb73-image.png

                                          In your screenshot above, notice that your AD DNS server does not have a hostname shown. It says "Unknown".

                                          Did you create a proper static hostname entry for it in the forward lookup zone in DNS? Also, do you have a proper reverse pointer lookup zone defined and is there a record there pointing to the hostname for the static IP of the AD DNS server?

                                          Refer back to my example and you will see that nslookup should be able to resolve a valid hostname for your AD DNS server. Mine was "redmond1.themeeks.net", for example.

                                          bearhntrB 1 Reply Last reply Reply Quote 0
                                          • bearhntrB
                                            bearhntr @bmeeks
                                            last edited by

                                            @bmeeks

                                            That was the first thing that I did when I setup the DNS.

                                            See entry for 192.168.10.250

                                            5d0e8cc5-5917-4893-ba97-60138cdb3222-image.png

                                            the PTR record is also there for it

                                            963135f6-3ff9-444f-9a51-34497a56a8cc-image.png

                                            Notice that only the OP7010-BEAR created a DNS record when DHCP gave it an address...the 2x entries for it in the REV LOOKUP are from a reboot where I had the WiFi turned on...it got .26....wired is .33. The last entry in the reverse lookup is my work laptop which is on another VPN accessed Domain.

                                            I also just noticed that the NETWORK is no longer showing as a DOMAIN - but as PRIVATE:

                                            fb9cda7f-b136-4a81-9eb6-8d2763247932-image.png

                                            ---this is apparently a known "BUG" in Windows 2019.

                                            bearhntrB 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.