Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    pfSense with CloudFlare (and WireGuard - soon) - setup AD DS

    Scheduled Pinned Locked Moved General pfSense Questions
    49 Posts 3 Posters 9.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • bearhntrB
      bearhntr @bmeeks
      last edited by bearhntr

      @bmeeks

      OK - I forgot a step, and misspoke on another.

      1. pfSense (remove CloudFlare's DNS settings 1.1.1.1 and 1.0.0.1 ) from SYSTEM >> GENERAL SETUP ?? (i.e. Delete these?) - I had set them to CloudFlare, per a video I watched: https://youtu.be/-uzNMospB5I

      -- So you are saying remove these?
      e8f72284-4ca3-4051-a142-8a11165b1cb1-image.png

      That would mean that the DNS would be my ISP, again-- correct?

      And So I set this - like so?

      e7a29176-0dbb-4570-8091-23f9818e3686-image.png

      bmeeksB 1 Reply Last reply Reply Quote 0
      • bmeeksB
        bmeeks @bearhntr
        last edited by bmeeks

        @bearhntr said in pfSense with CloudFlare (and WireGuard - soon) - setup AD DS:

        @bmeeks

        OK - I forgot a step, and misspoke on another.

        1. pfSense (remove CloudFlare's DNS settings 1.1.1.1 and 1.0.0.1 ) from SYSTEM >> GENERAL SETUP ?? (i.e. Delete these?) - I had set them to CloudFlare, per a video I watched: https://youtu.be/-uzNMospB5I

        -- So you are saying remove these?
        e8f72284-4ca3-4051-a142-8a11165b1cb1-image.png

        That would mean that the DNS would be my ISP, again-- correct?

        And So I set this - like so?

        e7a29176-0dbb-4570-8091-23f9818e3686-image.png

        Remove the 1.1.1.1 and 1.0.0.1 addresses from the General Settings tab. Leave those lines blank.

        That does NOT make your ISP your DNS server, it makes the local unbound DNS Resolver your DNS server (for the firewall).

        You still seem to be missing the big picture here. Let's go through this once more:

        1. In your Active LAN network you have one or more AD domain controllers that are running the DNS service. Those are the DNS servers for your internal network and are authoritative for that sub-domain and its associated reverse point lookup zones. Your sub-domain is going to be your Active Directory name. In DNS, "authoritative" means the server is where the master copy of the data for that domain lives. The authoritative server "owns" the data for that DNS zone. Other servers may have copies of it, but they do not modify it.

        2. You run DHCP on your domain controllers, and those DHCP services are going to give all of your internal LAN clients the IP address of the AD domain controller as the "DNS Server". So all local clients are going to ask the DNS service on the domain controller to find IP addresses for them.

        3. For any domain the AD DNS server is not authoritative for (which in practice means anything other than your internal sub-domain), it is going to either attempt to resolve it using the DNS root servers or it is going to forward the request to another DNS server and ask that server to resolve the IP on its behalf. So you have a choice to make on your AD DNS server. Do you want it to "resolve" or "forward"? And if you want it to "forward", you must tell it the IP address of the Forwarder it should use. You can forward to the DNS Resolver on pfSense, or you can forward to any other DNS server on the Internet that you can reach.

        4. Your pfSense firewall comes with a DNS resolver binary out-of-the-box called unbound. It is configured to start and run by default and to "resolve" using the DNS root servers. You don't have to put a single IP address in any DNS box anywhere in the setup for this work. That's why I keep saying "leave those IP address boxes blank". When you leave those IP address boxes empty under DNS Settings on the General Setup tab, then pfSense will automatically ask its internal DNS Resolver (that unbound executable I mentioned) to resolve IP addresses from domain names. unbound is itself a sort of basic DNS server. Everything works just fine with defaults out of the box. Folks, though, seemed determined to shoot themselves in the foot by screwing around with the default DNS setup on pfSense before fully understanding the ramifications of doing that 😀 .

        5. You can, if you have a specific reason such as a desire to use an external DNS service for content filtering or some other unique setup, configure the DNS Resolver (unbound) to "forward" instead of "resolve via the DNS roots". You do that by checking the "Use Forwarding" box and then (and only then) putting the IP address of the DNS forwarding server you want unbound to ask for IP addresses.

        bearhntrB 1 Reply Last reply Reply Quote 2
        • bearhntrB
          bearhntr @bmeeks
          last edited by

          @bmeeks

          I know I am coming across as 'dense' - but I have done this before, and as I stated...something started happening about 7-10 days in. I would start having issues connecting to the Internet. If I would ping a device by name I would get no response (not-found)...but if I did a ping by address with name resolution - it would just give back the IP. I could then get on the AD DS and open DNS - do a root hints refresh and things would work again (7-10 days) or so. Scavenging is enabled for 7 days - so I am thinking that had something to do with it. I got tired of having to do that over and over - so I turned OFF the AD DS server, and eventually deleted it (it was a VM). It was so jacked up - because of all the changes - I figured it would be easier to start from scratch (where I am now).

          I also reloaded pfSense and decided to let it handle DNS and DHCP (like my old Netgear ORBI was doing (with a much better FW)).

          I am willing to reload pfSense back to Factory Defaults if I can get this working - I just do not want to lose Internet in 7-10 days - one day happened while I was on a SEV-1 Customer Call - That was hard to explain...when I disappeared for 15 minutes when I rebooted everything.

          I have watched numerous videos and I have setup many a DC - but usually in a LAB environment at work where It uses the corporate DNS and gateway to get to the Internet. They have their own firewall, etc.

          This is for my home where I have my own Cable Modem >> pfSense >> ORBI (in AP mode) for WiFi and everything else is wired.

          I am just making sure that I am 'crystal' before I dive in - as messing with the pfSense - I lose ALL INTERNET at home until I get it running again.

          bmeeksB 1 Reply Last reply Reply Quote 0
          • bmeeksB
            bmeeks @bearhntr
            last edited by bmeeks

            @bearhntr said in pfSense with CloudFlare (and WireGuard - soon) - setup AD DS:

            @bmeeks

            I know I am coming across as 'dense' - but I have done this before, and as I stated...something started happening about 7-10 days in. I would start having issues connecting to the Internet. If I would ping a device by name I would get no response (not-found)...but if I did a ping by address with name resolution - it would just give back the IP. I could then get on the AD DS and open DNS - do a root hints refresh and things would work again (7-10 days) or so. Scavenging is enabled for 7 days - so I am thinking that had something to do with it. I got tired of having to do that over and over - so I turned OFF the AD DS server, and eventually deleted it (it was a VM). It was so jacked up - because of all the changes - I figured it would be easier to start from scratch (where I am now).

            I also reloaded pfSense and decided to let it handle DNS and DHCP (like my old Netgear ORBI was doing (with a much better FW)).

            I am willing to reload pfSense back to Factory Defaults if I can get this working - I just do not want to lose Internet in 7-10 days - one day happened while I was on a SEV-1 Customer Call - That was hard to explain...when I disappeared for 15 minutes when I rebooted everything.

            I have watched numerous videos and I have setup many a DC - but usually in a LAB environment at work where It uses the corporate DNS and gateway to get to the Internet. They have their own firewall, etc.

            This is for my home where I have my own Cable Modem >> pfSense >> ORBI (in AP mode) for WiFi and everything else is wired.

            I am just making sure that I am 'crystal' before I dive in - as messing with the pfSense - I lose ALL INTERNET at home until I get it running again.

            If I understood your original post correctly, when you had this set up the first time you had some things (maybe DHCP and DNS) happening over on pfSense. You just should never do that with Active Directory. AD is very picky about DNS, and it puts some quirky Microsoft stuff in the zones. Much better to let the Microsoft servers handle all DHCP and DNS. In home networks, the best thing in my opinion is to install two domain controllers as virtual machines, and then add the DHCP and DNS feature to both of them as part of the AD setup. With newer Windows Server versions, DHCP can be configured with failover so DHCP won't go down if the DC it is installed on goes down. The secondary DC and its DHCP service will pick up the task. Read up on the Microsoft AD best practices you can find via Google searches. Also run the Best Practices Analyzer wizard on the domain controller. And resolve all the issues it identifies. Some of the other issues you describe sound like the DNS service was not configured 100% correctly in Windows. When you have more than two Windows DNS servers and more than a single domain controller, you have to be careful how you configure the primary and secondary DNS settings on the two domain controllers! Go read the Microsoft docs and heed the advice/info from the Best Practices wizard in Server Manager on the Windows servers.

            I have been running the setup I shared with you for years and years without incident all the way back to Server 2008. Let the AD domain controllers do all DHCP and DNS for your LAN and things will work just fine.

            The symptom you had of local hosts disappearing out of DNS (you could ping by IP but not by name) indicates DHCP was not updating DNS. That's the big issue with DHCP on pfSense right now. Unless you want the DNS service restarting every time a local host renews its DHCP reservation, you have to disable the auto-registration feature in the pfSense DHCP server. In Windows, using the domain controller's DHCP and DNS services, this auto-registration works wonderfully. Just be sure you tick the checkbox to enable dynamic DNS updates on the DHCP server setup.

            So install DHCP and DNS on your domain controllers. Disable the DHCP server on pfSense. Do not use that service on your LAN configuration in pfSense. Make sure DHCP on AD hands out the pfSense LAN interface as the "gateway" and the AD domain controller as the DNS server for all clients.

            As for DNS, you can import the DNS roots and let the AD DNS server resolve, or you can leave pfSense at its default setup and tell the AD DNS server to forward zones for which it is not authoritative to pfSense. In my setup, I do the former (my AD DNS does the resolving with no forwarding). Either way you still need to configure the two domain overrides I posted an image of earlier in this thread.

            bearhntrB 1 Reply Last reply Reply Quote 0
            • bearhntrB
              bearhntr @bmeeks
              last edited by

              Apologies for the delay in a response - I was on VAC last week, and I made myself have a "no-computer-week". lol (see below)

              @bmeeks said in pfSense with CloudFlare (and WireGuard - soon) - setup AD DS:

              If I understood your original post correctly, when you had this set up the first time you had some things (maybe DHCP and DNS) happening over on pfSense. You just should never do that with Active Directory. AD is very picky about DNS, and it puts some quirky Microsoft stuff in the zones. Much better to let the Microsoft servers handle all DHCP and DNS. In home networks, the best thing in my opinion is to install two domain controllers as virtual machines, and then add the DHCP and DNS feature to both of them as part of the AD setup. With newer Windows Server versions, DHCP can be configured with failover so DHCP won't go down if the DC it is installed on goes down. The secondary DC and its DHCP service will pick up the task. Read up on the Microsoft AD best practices you can find via Google searches. Also run the Best Practices Analyzer wizard on the domain controller. And resolve all the issues it identifies. Some of the other issues you describe sound like the DNS service was not configured 100% correctly in Windows. When you have more than two Windows DNS servers and more than a single domain controller, you have to be careful how you configure the primary and secondary DNS settings on the two domain controllers! Go read the Microsoft docs and heed the advice/info from the Best Practices wizard in Server Manager on the Windows servers.

              Yeah - I did not understand it either. pfSense was "NOT" doing any of the DNS or DHCP stuff when I was having the problems - but strange things were happening. When I first setup the AD DS on the server - I did the DNS and the DHCP there- In pfSense I had it pointing to 192.168.10.250 (the AD DS IP Address) for DNS and DHCP RELAY was turned ON within pfSense and DHCP SERVER was OFF. It all seemed to work for a while - then I started having issues ever 7-10 days - and a reboot of the pfSense seemed to fix it.

              I have been running the setup I shared with you for years and years without incident all the way back to Server 2008. Let the AD domain controllers do all DHCP and DNS for your LAN and things will work just fine.

              What I am considering is doing a FACTORY RESET of the pfSense and not change anything except my 3 FW rules - do you think that is how I should do that? (well that and setting the 'names' of things again) -- As I read your steps, I should not put anything here (not even the AD DS information to handle the DNS)???

              14bcdc9e-cffd-4f42-8103-303d2e111abe-image.png

              The symptom you had of local hosts disappearing out of DNS (you could ping by IP but not by name) indicates DHCP was not updating DNS. That's the big issue with DHCP on pfSense right now. Unless you want the DNS service restarting every time a local host renews its DHCP reservation, you have to disable the auto-registration feature in the pfSense DHCP server. In Windows, using the domain controller's DHCP and DNS services, this auto-registration works wonderfully. Just be sure you tick the checkbox to enable dynamic DNS updates on the DHCP server setup.

              So install DHCP and DNS on your domain controllers. Disable the DHCP server on pfSense. Do not use that service on your LAN configuration in pfSense. Make sure DHCP on AD hands out the pfSense LAN interface as the "gateway" and the AD domain controller as the DNS server for all clients.

              As for DNS, you can import the DNS roots and let the AD DNS server resolve, or you can leave pfSense at its default setup and tell the AD DNS server to forward zones for which it is not authoritative to pfSense. In my setup, I do the former (my AD DNS does the resolving with no forwarding). Either way you still need to configure the two domain overrides I posted an image of earlier in this thread.

              I will have to look for the settings you are using. I understand letting AD DS handle the DNS and the DHCP - ideally that is how I want it. But I am sure I had something wrong when I set it all up before - as basically before setting up pfSense (my NETGEAR ORBI was my DNS, my DHCP and my FIREWALL).

              1 Reply Last reply Reply Quote 0
              • bearhntrB
                bearhntr
                last edited by

                @bmeeks

                Well -- yesterday was the day. I made the 'plunge'. I promoted the 2019 server to DC, enabled and setup DNS and DHCP on the server.

                I then disabled DHCP Server in pfSense (do I need to turn on DHCP RELAY)?

                I turned off DNS Resolver in pfSense - and I lost my Internet - everywhere. See below how I have the ETHERNET Adapter in the AD DS server. I went back in and set DNS Resolver to enabled

                09c72ac4-2750-4c9a-85eb-e1cc20c10284-image.png

                These are the settings in the DNS Resolver (which appear to be the defaults) - only the DNSSEC is checked...nothing else:

                ad7233ea-e0eb-4acb-8ed6-a268f01d75f2-image.png

                I believe that my next step is to setup these sections?

                73c2f09e-9855-4b50-ade5-5c6d171204fc-image.png

                23247a15-4df3-448c-be52-044d45024db8-image.png

                1 Reply Last reply Reply Quote 0
                • bmeeksB
                  bmeeks
                  last edited by

                  1. Do you have your AD DNS server configured to resolve?
                  2. Do you have your AD DNS server's IP address being given out by the AD DHCP server as the DNS for clients to utilize?
                  3. When you say your Internet quits working, can you be more specific. Do you mean browsing or pinging an external host by domain name from a device on your LAN does not work with DNS turned off in pfSense, but it works when DNS in pfSense is enabled? If so, the you do not have things set properly as your either clients seem to be using pfSense for DNS or you do not have the AD DNS server configured to resolve (with roots properly imported).

                  I promise you this is not difficult at all. You are not getting all of the configuration correct.

                  bearhntrB 2 Replies Last reply Reply Quote 0
                  • bearhntrB
                    bearhntr @bmeeks
                    last edited by

                    @bmeeks said in pfSense with CloudFlare (and WireGuard - soon) - setup AD DS:

                    1. Do you have your AD DNS server configured to resolve?

                    I believe I am. From the AD DNS - not having any issues getting to the Internet. From the DNS tool - all the root hints resolve and I have the following settings (see images)

                    3c7b288c-e075-42b7-acf8-f39bef6ba663-image.png f05a04b4-1e6f-478a-8c6d-0ac0703bb763-image.png 072a61ed-6c0e-446e-9725-2ea5e278dc5a-image.png

                    1. Do you have your AD DNS server's IP address being given out by the AD DHCP server as the DNS for clients to utilize?

                    I believe this is working -- this one of my home computers (not joined to the Domain -- yet) - but it looks like it is getting the right IPs ( gateway - 192.168.10.254 = pfSense // 192.168.10.250 = AD DNS )

                    18051a1c-d503-41fd-a6b4-09f5534511db-image.png

                    1. When you say your Internet quits working, can you be more specific. Do you mean browsing or pinging an external host by domain name from a device on your LAN does not work with DNS turned off in pfSense, but it works when DNS in pfSense is enabled? If so, the you do not have things set properly as your either clients seem to be using pfSense for DNS or you do not have the AD DNS server configured to resolve (with roots properly imported).

                    When I turned off the DNS Resolver feature in pfSense - then from the machine shown in #2 above - I tried to go to a new website...and I got :page cannot be displayed: error. I also tried to ping google.com and got No Response. Soon as I turned on the DNS resolver on in pfSense and unchecked everything except the DNSSEC (what appears to be the defaults) - everything started working again.

                    I promise you this is not difficult at all. You are not getting all of the configuration correct.

                    Yeah - I did not think it was hard either...as I am no idiot...but again, when NETGEAR ORBI was doing all the Routing and DNS and DHCP (never had these problems) - it is just with the pfSense. 😖

                    If there is anything you want an image of - let me know.

                    1 Reply Last reply Reply Quote 0
                    • bearhntrB
                      bearhntr @bmeeks
                      last edited by

                      @bmeeks

                      Then next is to fix ipv6:

                      6ef7cc7a-e232-45f1-b620-15dac8de79d1-image.png

                      1 Reply Last reply Reply Quote 0
                      • bmeeksB
                        bmeeks
                        last edited by

                        For IPv6
                        Unless you are actually using IPv6 and have a public IPv6 address through your ISP, you will need to go in and delete all the IPv6 root servers on the Windows AD box. You do that on the same screen where you checked the resolving. Just select and remove the IPv6 addresses (again, if you don't have a public IPv6 address for pfSense.

                        bearhntrB 1 Reply Last reply Reply Quote 0
                        • bmeeksB
                          bmeeks
                          last edited by bmeeks

                          For DNS:
                          Do you have any rules in place on the pfSense firewall that would be interfering here? Do you have DNS redirects in place?

                          And it really makes zero sense that as soon as you enable the Resolver on pfSense that things start working. That really screams a misconfiguration someplace.

                          My first thought is your client is looking to pfSense for DNS, but from the screen shot you posted that does NOT seem to be the case. That leaves maybe a firewall rule or DNS redirect on the firewall that is interfering with your AD server's DNS role. Let's see your LAN interface firewall rules and any you might have on the FLOATING RULES tab. If DNS works when you enable the Resolver on pfSense, then that means your client is getting sent there for DNS for some reason (but it should not be).

                          While I don't think it's the problem here, you really do not need the forwarder IP addresses if you are going to use the root hints and let AD DNS resolve.

                          bearhntrB 1 Reply Last reply Reply Quote 0
                          • bearhntrB
                            bearhntr @bmeeks
                            last edited by

                            @bmeeks

                            I have done that in the DNS tool - root hints. There are no IPv6 addresses there (except the Link-Local one)...if you disable ipv6 protocol completely - you get other errors (apparently AD DS needs ipv6 for something).

                            29a3285d-b36e-4719-b90e-5fc2a57f0e47-image.png

                            54d152ea-1631-43c7-846f-d15c315653e3-image.png

                            a4965f33-4bb3-44d9-9843-96e6db546982-image.png

                            603358bf-3f9b-431a-a4d9-2a42fd9704b3-image.png

                            bmeeksB 1 Reply Last reply Reply Quote 0
                            • bearhntrB
                              bearhntr @bmeeks
                              last edited by

                              @bmeeks said in pfSense with CloudFlare (and WireGuard - soon) - setup AD DS:

                              For DNS:
                              Do you have any rules in place on the pfSense firewall that would be interfering here? Do you have DNS redirects in place?

                              d1d6bfb4-b468-4796-a768-9c3ce0d6f7e9-image.png

                              And it really makes zero sense that as soon as you enable the Resolver on pfSense that things start working. That really screams a misconfiguration someplace.

                              My first thought is your client is looking to pfSense for DNS, but from the screen shot you posted that does NOT seem to be the case. That leaves maybe a firewall rule or DNS redirect on the firewall that is interfering with your AD server's DNS role. Let's see your LAN interface firewall rules and any you might have on the FLOATING RULES tab. If DNS works when you enable the Resolver on pfSense, then that means your client is getting sent there for DNS for some reason (but it should not be).

                              While I don't think it's the problem here, you really do not need the forwarder IP addresses if you are going to use the root hints and let AD DNS resolve.

                              bmeeksB 1 Reply Last reply Reply Quote 0
                              • bmeeksB
                                bmeeks @bearhntr
                                last edited by bmeeks

                                @bearhntr said in pfSense with CloudFlare (and WireGuard - soon) - setup AD DS:

                                @bmeeks said in pfSense with CloudFlare (and WireGuard - soon) - setup AD DS:

                                For DNS:
                                Do you have any rules in place on the pfSense firewall that would be interfering here? Do you have DNS redirects in place?

                                d1d6bfb4-b468-4796-a768-9c3ce0d6f7e9-image.png

                                And it really makes zero sense that as soon as you enable the Resolver on pfSense that things start working. That really screams a misconfiguration someplace.

                                My first thought is your client is looking to pfSense for DNS, but from the screen shot you posted that does NOT seem to be the case. That leaves maybe a firewall rule or DNS redirect on the firewall that is interfering with your AD server's DNS role. Let's see your LAN interface firewall rules and any you might have on the FLOATING RULES tab. If DNS works when you enable the Resolver on pfSense, then that means your client is getting sent there for DNS for some reason (but it should not be).

                                While I don't think it's the problem here, you really do not need the forwarder IP addresses if you are going to use the root hints and let AD DNS resolve.

                                Not WAN rules. Show LAN rules and the FLOATING rules (if you have any of those).

                                bearhntrB 1 Reply Last reply Reply Quote 0
                                • bmeeksB
                                  bmeeks @bearhntr
                                  last edited by

                                  @bearhntr said in pfSense with CloudFlare (and WireGuard - soon) - setup AD DS:

                                  @bmeeks

                                  I have done that in the DNS tool - root hints. There are no IPv6 addresses there (except the Link-Local one)...if you disable ipv6 protocol completely - you get other errors (apparently AD DS needs ipv6 for something).

                                  29a3285d-b36e-4719-b90e-5fc2a57f0e47-image.png

                                  54d152ea-1631-43c7-846f-d15c315653e3-image.png

                                  a4965f33-4bb3-44d9-9843-96e6db546982-image.png

                                  603358bf-3f9b-431a-a4d9-2a42fd9704b3-image.png

                                  I don't think you understood what I was saying in my IPv6 post.

                                  If you have do NOT have a public IPv6 address on your WAN (and thus a delegation for your LAN), then you would remove the root hints IPv6 addresses. But since you DO have a public IPv6 (since you are showing one), then do NOT remove the IPv6 addresses for the root hints. And make sure that your AD domain controllers have proper IPv6 addresses assigned from the IPv6 subnet used on your LAN.

                                  1 Reply Last reply Reply Quote 0
                                  • bmeeksB
                                    bmeeks
                                    last edited by bmeeks

                                    Also, you will need to enter the appropriate domain overrides in the DNS Resolver on pfSense so that unbound will know to go ask your AD DNS server for the local hostnames of local devices listed in things like the ARP table.

                                    But having (or not having) the domain overrides configured has no impact on external DNS lookups working. You have still seem to have something misconfigured for that not to be working from a client machine on your LAN.

                                    1 Reply Last reply Reply Quote 0
                                    • bmeeksB
                                      bmeeks
                                      last edited by bmeeks

                                      IPv6 on your LAN
                                      You did not state initially state you wanted to use IPv6. That is possibly going to be problematic if you do not have a static IPv6 subnet to work with (meaning NOT one configured by tracking your WAN IPv6 delegation).

                                      Did you configure a DHCPv6 setup in the Active Directory DHCP server? If so, realize that unless you have a true static IPv6 prefix, you will have to change the DHCPv6 scope every time your WAN prefix changes.

                                      If IPv6 is available, Windows will default to using it first. So that means the IPv6 configuration must be fully functional.

                                      You can, of course, let pfSense be the DHCPv6 server (or use something like SLAAC). But if you do that, local clients will not have their IPv6 address registered in the Active Directory DNS.

                                      bearhntrB 1 Reply Last reply Reply Quote 0
                                      • bearhntrB
                                        bearhntr @bmeeks
                                        last edited by

                                        @bmeeks

                                        bd92219e-7450-4f01-a704-9eb24a06eee9-image.png

                                        ee0486f8-85d4-4310-a4e4-0619aff10cac-image.png

                                        WireGuard is there - but it has not been setup yet or configured. Just the PACKAGE installed.

                                        33071982-9c04-42c9-bbda-a65d738cc20d-image.png

                                        bmeeksB 1 Reply Last reply Reply Quote 0
                                        • bmeeksB
                                          bmeeks @bearhntr
                                          last edited by bmeeks

                                          @bearhntr said in pfSense with CloudFlare (and WireGuard - soon) - setup AD DS:

                                          @bmeeks

                                          bd92219e-7450-4f01-a704-9eb24a06eee9-image.png

                                          ee0486f8-85d4-4310-a4e4-0619aff10cac-image.png

                                          WireGuard is there - but it has not been setup yet or configured. Just the PACKAGE installed.

                                          33071982-9c04-42c9-bbda-a65d738cc20d-image.png

                                          Okay, I don't see any DNS redirect rules.

                                          Let's do this step-by-step.

                                          1. Turn off the DNS Resolver on pfSense (disable it for now).
                                          2. Open a command prompt session on a Windows client on your LAN (use either a laptop or desktop PC).
                                          3. Execute this command:
                                          nslookup cnn.com
                                          

                                          Post what comes back from that command. What should happen is your AD DNS server should go out and resolve that domain name to several IPv4 and IPv6 addresses. Here is what that looks like on my desktop Windows PC.

                                          nslookup_command.png

                                          You can see in the above screen shot that the DNS lookup request was handled by one of my domain controllers (redmond1 is the machine name) at IP address 192.168.10.4. It resolved the domain "cnn.com" to that list of IP addresses.

                                          1. If the above steps don't work, then let's first figure out why and get that working.
                                          bearhntrB 1 Reply Last reply Reply Quote 0
                                          • bearhntrB
                                            bearhntr @bmeeks
                                            last edited by

                                            @bmeeks

                                            a8484276-375e-474e-b266-357207e4fb73-image.png

                                            bmeeksB 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.