Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    DSNBL with Active Directory

    Scheduled Pinned Locked Moved pfBlockerNG
    11 Posts 6 Posters 1.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • keyserK
      keyser Rebel Alliance @luquinhasdainfra
      last edited by

      @luquinhasdainfra said in DSNBL with Active Directory:

      Hi, hope you're having a great day

      How do i setup the DNSBL in a network that works totaly around the Active Directory Domain Services?

      Can i foward all trafic from both domain controllers to the PfSense? Doing this there's a chance of broke anything related to the AD?

      For example, if i forward the trafic to PfSense, can i resolve the names, accounts and the applications that are hosted on my Domain Controller?

      In an AD environment you should let all clients recieve DHCP/DNS from and on the domain controllers (so dynamic registrations and service records works as normal.
      Change the AD DNS servers from their default root-hint mode, to forwarding mode, and have them both ask your pfBlocker augmented Unbound DNS server on pfSense (That runs in resolver mode).
      That also allows you to let guest clients (non-AD) get the DNS server on pfSense instead of the AD DNS servers. Thus they cannot resolve anything internal - and if you want them to resolve an internal name or two, create a host-override for those names in pfSenses DNS Resolver.

      Love the no fuss of using the official appliances :-)

      L 1 Reply Last reply Reply Quote 0
      • J
        jrey @luquinhasdainfra
        last edited by

        @luquinhasdainfra

        I have DNS running on the AD, both of these systems can resolve any missing queries outside as they have always done. Then on my DHCP system I give each client the Netgate as the DNS. (my DHCP is not running on the NG either, historical reasons and no real reason to move)

        on the NG - DNS Resolver is set for, Network Interfaces LAN, Outgoing Network Interfaces LAN, it it doesn't go directly outside for anything.

        Under System -> General Setup - DNS Servers are set to the two internal AD DNS servers.

        Client DNS request goes, NG (DNSBL via pfBlockerNG, gets dumped if needed by DNSBL) -> internal DNS, usually hits from cache, but can still reach out if they can't resolve the address)

        works like a charm - blazing fast DNS response times.

        Does that help?

        L 1 Reply Last reply Reply Quote 0
        • S
          SteveITS Galactic Empire @luquinhasdainfra
          last edited by

          @luquinhasdainfra said in DSNBL with Active Directory:

          Can i foward all trafic from both domain controllers to the PfSense? Doing this there's a chance of broke anything related to the AD?
          For example, if i forward the trafic to PfSense, can i resolve the names, accounts and the applications that are hosted on my Domain Controller?

          Agree with both of the above. If you needed pfSense to resolve the internal domain you could always set a Domain Override to point the internal domain and/or your subnet .in-addr.arpa domain to AD DNS.

          We set up all our clients AD DNS to forward to pfSense and/or Quad9.

          Do note, Windows PCs cannot use any DNS that doesn't resolve the internal domain name. Windows does not use DNS in order, it uses the last known good DNS server first.

          Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
          When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
          Upvote 👍 helpful posts!

          1 Reply Last reply Reply Quote 0
          • L
            luquinhasdainfra @keyser
            last edited by

            @keyser

            Thank you for the tip, i'm going to test it by forwarding the AD DNS servers to PfSense,

            Best whises

            1 Reply Last reply Reply Quote 0
            • L
              luquinhasdainfra @jrey
              last edited by

              @jrey

              Understood,

              So, the request first goes to PfSense and them they are forwarded to the AD DNS servers?

              Looks pretty reliable, going to test it,

              S 1 Reply Last reply Reply Quote 0
              • S
                SteveITS Galactic Empire @luquinhasdainfra
                last edited by

                @luquinhasdainfra You can do it either way (pfSense forward local domain to AD, or AD forward to pfSense). I would say probably the latter is more straightforward, plus if pfSense is down then internal DNS still works.

                Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                Upvote 👍 helpful posts!

                J 1 Reply Last reply Reply Quote 0
                • J
                  jrey @SteveITS
                  last edited by

                  @steveits said in DSNBL with Active Directory:

                  plus if pfSense is down

                  bite your tongue -- pfSense never goes down - LOL

                  if it ever did that would be the bigger problem, at least for us.
                  JR

                  S JeGrJ 2 Replies Last reply Reply Quote 0
                  • S
                    SteveITS Galactic Empire @jrey
                    last edited by

                    @jrey :) can be solved/prevented either way...backup AD/DNS, pfSense in HA...

                    Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                    When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                    Upvote 👍 helpful posts!

                    1 Reply Last reply Reply Quote 0
                    • JeGrJ
                      JeGr LAYER 8 Moderator @jrey
                      last edited by

                      @luquinhasdainfra
                      I'd say for the sake of an AD network, I'd actually go with the first route with AD clients pointing DHCP/DNS to the domain controllers and them fowarding to pfSense instead of pointing all clients to pfSense itself. Reason is explained by @keyser

                      @keyser said in DSNBL with Active Directory:

                      That also allows you to let guest clients (non-AD) get the DNS server on pfSense instead of the AD DNS servers. Thus they cannot resolve anything internal - and if you want them to resolve an internal name or two, create a host-override for those names in pfSenses DNS Resolver.

                      That is a valid concern, as it gives you the ability based on the DHCP response to hand out DNS server(s) with or without internal information to your clients. A guest network, IoT things or even a few WiFi setups don't need internal information about your network, your server/client naming, your internal domain etc. So just hand them pfSense as DNS withtout having a domain override/forwarding there, you get the DNS resolving without leaking internal information.

                      Cheers

                      Don't forget to upvote 👍 those who kindly offered their time and brainpower to help you!

                      If you're interested, I'm available to discuss details of German-speaking paid support (for companies) if needed.

                      1 Reply Last reply Reply Quote 0
                      • T
                        Tzvia
                        last edited by

                        This is one of the main reasons I finally decided to setup vlans. Using Windows server DHCP, you can set the IOT and guest network to use PFSense for DNS, and hand your AD DNS server info to the domain joined clients. Then just forward to PFSense DNS from the domain DNS servers so that you get the benefit of PFBlocker and any other security settings you enabled in the router. You can even create NAT redirects to redirect the hard coded IOT DNS back to PFSense DNS, and not open port 53 to the internet. You can even use public DNS server lists with PFBlocker to block IOT from using whatever DNS they are hard coded to use even when using DOH (my kindles are hard coded for 8.8.8.8 which would skip PFBlocker if used). It took me a bit to put the pieces together and get it working but I can't stand these crap devices doing whatever they want.

                        Tzvia

                        Current build:
                        Hunsn/CWWK Pentium Gold 8505, 6x i226v 'micro firewall'
                        16 gigs ram
                        500gig WD Blue nvme
                        Using modded BIOS (enabled CSTATES)
                        PFSense 2.72-RELEASE
                        Enabled Intel SpeedShift
                        Snort
                        PFBlockerNG
                        LAN and 5 VLANS

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.