• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

DNS Suffix Search List

Scheduled Pinned Locked Moved DHCP and DNS
11 Posts 3 Posters 1.9k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • J
    jlw52761
    last edited by Jul 9, 2019, 8:23 PM

    I have a seperate Bind and ISC-DHCP server that I maintain for my 2 internal and 1 external DNS domains. The internal ones are:

    dhcp.mydomain.local = Internal DHCP Clients
    mydomain.local = Internal Static Clients

    and the external is mydomain.com. I have the PFSense appliance (hardware) in the external DNS space, and that all works fine, except I cannot get it to resolve host name only for clients in the internal domains. Typically on a Linux system I would just add the search line into /etc/resolv.conf and call it a day, but with this being FreeBSD I am not sure on the method of doing this, or if it's something that can be done through the PFSense GUI itself.

    I do plan on keeping DNS and DHCP external and independent of PFsense.

    1 Reply Last reply Reply Quote 0
    • K
      KOM
      last edited by KOM Jul 10, 2019, 12:37 AM Jul 9, 2019, 8:48 PM

      External DNS shouldn't be resolving internal domains in the first place. That's not a good design. External DNS for public clients, internal DNS for internal clients. Why do external clients need to resolve internal domains that aren't reachable from the public Internet?

      1 Reply Last reply Reply Quote 0
      • J
        jlw52761
        last edited by Jul 9, 2019, 9:42 PM

        They don't, but the firewall appliance needs to resolve these so in my reports I get proper hostname translation from the IP. This is not for external clients to resolve internal, purely for the firewall to resolve more than just it's own domain without needing FQDN.

        1 Reply Last reply Reply Quote 0
        • K
          KOM
          last edited by Jul 10, 2019, 12:58 AM

          How do you currently have DNS configured on pfSense? Forwarder or resolver? What do you have under General Setup - DNS Server Settings - DNS Servers?

          1 Reply Last reply Reply Quote 0
          • J
            jlw52761
            last edited by Jul 10, 2019, 2:31 AM

            Under the DNS Server Settings - DNS Servers I have my two internal DNS servers setup, and using Resolver.

            1 Reply Last reply Reply Quote 0
            • J
              johnpoz LAYER 8 Global Moderator
              last edited by Jul 10, 2019, 2:54 AM

              if you have some internal domain you want to resolve, then you need to tell pfsense were to resolve those via a domain override.

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.8, 24.11

              1 Reply Last reply Reply Quote 0
              • J
                jlw52761
                last edited by Jul 10, 2019, 3:24 AM

                So that does work for doing FQDN lookups, but doing just hostname lookup without adding the domain is what I need to have happen.

                1 Reply Last reply Reply Quote 0
                • J
                  johnpoz LAYER 8 Global Moderator
                  last edited by johnpoz Jul 10, 2019, 4:28 AM Jul 10, 2019, 4:27 AM

                  Just at a lost to why you think pfsense is going to be looking up just host names? If you want it to resolve something for logs it would be a PTR lookup anyway, not a A record lookup.

                  It would be looking for the name associated to the IP that hit it..

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  1 Reply Last reply Reply Quote 0
                  • J
                    jlw52761
                    last edited by Jul 12, 2019, 2:05 AM

                    Yeah, it should only be a PTR, I've seen where this has issues without forward lookup working. But, I've been looking at implementing pfBlockerNG, so I will need to change the way this setup works by pointing my internal DNS servers to pfSense for the forward lookups, so this all is going to change anyway. So with that, I guess my question is no longer valid.

                    1 Reply Last reply Reply Quote 0
                    • J
                      johnpoz LAYER 8 Global Moderator
                      last edited by Jul 12, 2019, 2:13 AM

                      You can have your clients ask your internal, and have those NS forward to pfsense which then resolves - and uses pfblocker.

                      Pfsense will still need to have domain overrides for stuff you want it to look up that are on your NS.. but the domain overrides would be the PTR zones, not forward zones.

                      So you setup an override for say

                      1.168.192.in-addr.arpa.

                      That points to your NS that are authoritative for that zone.

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      1 Reply Last reply Reply Quote 1
                      • J
                        jlw52761
                        last edited by Jul 16, 2019, 5:35 AM

                        Yeah, that's what I ended up doing, pointing all clients to my bind servers, then having the bind forward to pfSense, then pfSense forward to Google and Cloudflare. I put in domain overrides for local domains and reverse domains for my LAN, and that seems to be working and for the most part it seems pfBlocker is now working as expected.
                        A little more convoluted than I originally imagined but actually makes sense since pfBlocker is acting as a DNS Rewrite engine it would have to be the "final say" for clients on the LAN.

                        1 Reply Last reply Reply Quote 0
                        11 out of 11
                        • First post
                          11/11
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                          This community forum collects and processes your personal information.
                          consent.not_received