Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    DNS Forwarding not working as expected

    Scheduled Pinned Locked Moved DHCP and DNS
    7 Posts 5 Posters 1.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • O
      ohmantics
      last edited by

      I had everything working in 2.1.5 and upgraded to 2.2.1 by manually setting up based on a saved config.xml, as restoring that config.xml didn't work directly (it would lock up trying to setup the old packages listed).

      Something is slightly wrong with DNS and I'm a bit stumped.

      I've tried the DNS Resolver and the DNS Forwarder, but I get the same results. It must be something obvious and I'm not seeing it.

      Most of my network is working just fine. The exception is an old Airport Extreme providing 2.4 service for our untrusted devices (e.g. Internet of Things that phone home a lot).The Airport is setup for double NAT. It's DHCP is setting itself as the DNS server. The Airport itself is resolving to pfSense, which should be forwarding the requests to the upstream ISP. Except it's not. No DNS is working on the Airport network segment. I can reach pfSense's webConfigurator from that network just fine.

      What did I mess up?

      1 Reply Last reply Reply Quote 0
      • N
        Nullity
        last edited by

        I am still unclear how your network is setup. With double NAT, one of the netweorks will not be able to directly access the other.
        You may need to forward the DNS port.

        I think you should avoid configuring the AirPort to use itself as the DNS. Either configure it to share the pfSense IP or your external DNS server's IP via DHCP.

        More information about your network topology would help.

        Please correct any obvious misinformation in my posts.
        -Not a professional; an arrogant ignoramous.

        1 Reply Last reply Reply Quote 0
        • O
          ohmantics
          last edited by

          @Nullity:

          I am still unclear how your network is setup. With double NAT, one of the netweorks will not be able to directly access the other.

          That's exactly the idea. The devices on the LAN side of this device are untrusted.

          You may need to forward the DNS port.

          I don't see in my old config.xml where this was happening before. The gateway for the Airport is pfSense, which routes out.

          I think you should avoid configuring the AirPort to use itself as the DNS. Either configure it to share the pfSense IP or your external DNS server's IP via DHCP.

          I haven't changed the setup of the Airport, just upgraded pfSense. Obviously, I may have configured it incorrectly, but it did work before.

          More information about your network topology would help.

          Basic diagram attached.

          ![Screen Shot 2015-03-22 at 9.42.07 PM.png](/public/imported_attachments/1/Screen Shot 2015-03-22 at 9.42.07 PM.png)
          ![Screen Shot 2015-03-22 at 9.42.07 PM.png_thumb](/public/imported_attachments/1/Screen Shot 2015-03-22 at 9.42.07 PM.png_thumb)

          1 Reply Last reply Reply Quote 0
          • D
            doktornotor Banned
            last edited by

            @ohmantics:

            @Nullity:

            I am still unclear how your network is setup. With double NAT, one of the netweorks will not be able to directly access the other.

            That's exactly the idea. The devices on the LAN side of this device are untrusted.

            Uh. There are firewall rules for this. Stick the untrusted segment on a separate interface and configure those firewall rules to only allow the traffic you want. Don't shoot yourself in the foot by multiNAT.

            1 Reply Last reply Reply Quote 0
            • johnpozJ
              johnpoz LAYER 8 Global Moderator
              last edited by

              ^ exactly.. why do you wan to nat when you have firewall that allows you to get as specific or as broad as you want in your rules that allow or block whatever traffic you want.

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.8, 24.11

              1 Reply Last reply Reply Quote 0
              • P
                phil.davis
                last edited by

                What did I mess up?

                Forgetting all the banter about why would you do it like this, actually it should work fine. This is the same as when I put my test pfSense WAN onto my office LAN and let it get DHCP, like any other device. Behind the test pfSense is some test LAN that is hidden from the view of the office LAN. That works for me all the time.
                On the Airport Extreme it would be nice to know that it received a good DHCP address and DNS server… from the upstream pfSense. Then try some packet capture between Airport Extreme and pfSense to see what DNS traffic is actually going between them.

                As the Greek philosopher Isosceles used to say, "There are 3 sides to every triangle."
                If I helped you, then help someone else - buy someone a gift from the INF catalog http://secure.inf.org/gifts/usd/

                1 Reply Last reply Reply Quote 0
                • O
                  ohmantics
                  last edited by

                  @phil.davis:

                  What did I mess up?

                  Forgetting all the banter about why would you do it like this, actually it should work fine. This is the same as when I put my test pfSense WAN onto my office LAN and let it get DHCP, like any other device. Behind the test pfSense is some test LAN that is hidden from the view of the office LAN. That works for me all the time.
                  On the Airport Extreme it would be nice to know that it received a good DHCP address and DNS server… from the upstream pfSense. Then try some packet capture between Airport Extreme and pfSense to see what DNS traffic is actually going between them.

                  I tried a packet capture on the LAN interface specifying the Airport's IP address and saw no traffic except the HTTP for the webConfigurator. So, just because, I rebooted the Airport and presto, it works.

                  I feel stupid. But yeah,… I'm stupid.

                  For those with the many great ideas of how I could reconfigure things to work better, I get it. In my case, there's only one cable going up to where my APs are and so I can't easily handle both my regular WiFi LAN and this "untrusted" Airport via separate NICs. I'm sure I could get something going with VLANs, but that's not a today problem. Today's problem is buying some new APs that don't suck.

                  1 Reply Last reply Reply Quote 0
                  • First post
                    Last post
                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.