Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    DNS Forwarder for subdomain doesn't appear to be working

    Scheduled Pinned Locked Moved DHCP and DNS
    4 Posts 3 Posters 1.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B Offline
      bnoeafk
      last edited by

      I've got two sites both running the latest pfSense and I have an IPSec VPN between them. Each site has their own independent domain name (east.mycorp.com) and (west.mycorp.com) and at each site I have a WWW server set up (www.east.mycorp.com) and (www.west.mycorp.com).  On both boxes I have their respective ISPs DNS servers set up in System > General Setup > DNS Servers, and DNS Resolver enabled, no port defined (therefore 53), all interfaces, all outbound interfaces, DHCP registration and DHCP static registration turned on. I also have a domain override enabled on each system that points to the other pfsense box for the other subdomain, therefore:

      • WEST pfSense (192.168.27.1) has

        • a domain override for east.mycorp.com pointing to 192.168.9.1

        • a host override set up for www.west.mycorp.com resolving to 192.168.27.199

      • EAST pfSense (192.168.9.1) has

        • a domain override for west.mycorp.com pointing to 192.168.27.1

        • a host override set up for www.east.mycorp.com resolving to 192.168.9.199

      On my EAST network, I attempt an nslookup for www.west.mycorp.com and I don't get any resolution.  During my testing (from a client) I check nslookup www.west.mycorp.com 192.168.9.1 and I get a denied message, so I turned on an access list on WEST pfSense to permit lookups from 192.168.9.0/24, after which my nslookup www.west.mycorp.com 192.168.9.1 successfuly resolves to 192.168.27.199.  :D Happy days, I've solved it I thought. Not so fast, bnoeafk…

      Multiple attempts to use my EAST pfSense to forward the resolution to the WEST doesn't seem to work, from the clients or from pfSense itself (Diagnostics > DNS Lookup). SSH'ing into the box and running unbound-control lookup www.west.mycorp.com reports back that there is "no delegation from cache; goes to configured roots"

      I've tried a number of things (turning on / off DNS Querying Forwarding was suggested from https://doc.pfsense.org/index.php/Unbound_DNS_Resolver) but that doesn't appear to have helped either.  Now obviously I need this to work from both sites, but at the moment I'm just trying to get EAST to read WEST's host overrides so that I can get on with life.

      Anyone have any pointers or see where I'm going so drastically wrong?

      Your humble servant,

      bnoeafk.

      1 Reply Last reply Reply Quote 0
      • DerelictD Offline
        Derelict LAYER 8 Netgate
        last edited by

        I see you have all outbound interfaces selected.

        I know when using OpenVPN you have to source the queries from something that is included in a remote network at the other side. I have mine set to LAN here.

        You would probably need to source it from something in the local side of a phase 2 entry.

        You can log into the firewall and use drill to see what's going on.

        For example, on EAST

        drill -I 192.168.9.1 @192.168.27.1 something.west.mycorp.com

        -I is the source address of the query and @ is the name server to query.

        This has the side effect of queries needing to go through NAT when going out WAN (instead of just having a source address of WAN address) but I am pretty sure it's the only way.

        And IPSec firewall rules at the destination side (WEST in this example) have to pass the traffic, naturally.

        Chattanooga, Tennessee, USA
        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
        Do Not Chat For Help! NO_WAN_EGRESS(TM)

        1 Reply Last reply Reply Quote 0
        • B Offline
          bnoeafk
          last edited by

          Derelict,
          Many thanks for your help. I've set the Outgoing Network Interfaces to LAN and now it's working just perfectly. I really appreciate this!

          bnoeafk

          1 Reply Last reply Reply Quote 0
          • luckman212L Offline
            luckman212 LAYER 8
            last edited by

            I may have asked this question before in another thread (sorry if it has already been answered – I am an old man!) but what are the ramifications if any of doing this? It seems that setting Unbound's outgoing interface to LAN just fixes everything up in most cases, I am wondering why the default behavior is to set it to "ALL".

            1 Reply Last reply Reply Quote 0
            • First post
              Last post
            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.