• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Can't block DNS request for a specific client

Scheduled Pinned Locked Moved Firewalling
11 Posts 3 Posters 865 Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • W
    watts3000
    last edited by Mar 7, 2017, 12:11 PM

    I need to be able to block DNS for a specific client on my network. I have created an alias for that client however when I try to block DNS request using the alias nothing is blocked. However, if I change the protocol to http or https it gets blocked. So my question is how do I block DNS for a specific client?

    1 Reply Last reply Reply Quote 0
    • D
      doktornotor Banned
      last edited by Mar 7, 2017, 12:12 PM

      Show the screenshot of the rule.

      1 Reply Last reply Reply Quote 0
      • W
        watts3000
        last edited by Mar 7, 2017, 12:28 PM

        Check out the link

        http://imgur.com/ObQUNmU

        dns.png
        dns.png_thumb

        1 Reply Last reply Reply Quote 0
        • D
          doktornotor Banned
          last edited by Mar 7, 2017, 12:45 PM

          That is wrong. Make it TCP/UDP (and flush states after that).

          1 Reply Last reply Reply Quote 0
          • W
            watts3000
            last edited by Mar 7, 2017, 2:26 PM

            I actually had tcp/udp there before and it still did not work. I even flushed the state table and still nothing. As I stated other protocols work just not dns.

            1 Reply Last reply Reply Quote 0
            • D
              doktornotor Banned
              last edited by Mar 7, 2017, 2:31 PM

              1/ DNS is TCP/UDP. Pointless discussion.
              2/ If it still does not work AFTER you have flushed all the states, then fix the non-matching alias.

              1 Reply Last reply Reply Quote 0
              • W
                watts3000
                last edited by Mar 7, 2017, 3:14 PM

                Not following you on non matching alias. I configured a basic alias for example alias name is BOB I than added IP address of the workstation in question 192.168.2.50. As stated this same alias has zero problems with http traffic I just find it weird.

                1 Reply Last reply Reply Quote 0
                • D
                  doktornotor Banned
                  last edited by Mar 7, 2017, 3:21 PM

                  That TCP/UDP rule will block DNS just perfectly fine if the queries are coming from the computer itself. It will not block anything at all if they are coming from elsewhere, such as another DNS server on LAN.

                  1 Reply Last reply Reply Quote 0
                  • P
                    pfBasic Banned
                    last edited by Mar 7, 2017, 4:36 PM

                    Is there another rule above it that is already passing DNS traffic?

                    1 Reply Last reply Reply Quote 0
                    • W
                      watts3000
                      last edited by Mar 7, 2017, 8:00 PM

                      doktornotor is correct if I define dns servers for example google dns the rule works. My problem is the dns queries are sent to an internal dns server than that server is configured with forwarders out to opendns.

                      1 Reply Last reply Reply Quote 0
                      • D
                        doktornotor Banned
                        last edited by Mar 8, 2017, 12:15 AM

                        Well, so… If you want to force your DNS to pfSense, the only DNS traffic that should be allowed is from pfSense itself.

                        https://doc.pfsense.org/index.php/Blocking_DNS_queries_to_external_resolvers
                        https://doc.pfsense.org/index.php/Redirecting_all_DNS_Requests_to_pfSense

                        1 Reply Last reply Reply Quote 0
                        7 out of 11
                        • First post
                          7/11
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                          This community forum collects and processes your personal information.
                          consent.not_received