Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    DNS Resolver Over IPSec Connection

    DHCP and DNS
    2
    6
    763
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • R
      rchiocchio
      last edited by

      Original Post, for reference:

      https://forum.netgate.com/topic/176292/ios-ipsec-connection-error

      I seem to be having an issue getting any clients connected via IPSec to use the pfsense device to resolve host names defined in the DNS Resolver - Host Overrides list. For reference, the device itself is able to resolve all entries via the ping test without a problem. I've attached screenshots of my config for reference here too.

      ipsec_phase1.png

      ipsec_phase2.png

      dnsResolverGeneral.png

      netgateDNSTest.PNG

      In the previous thread someone had mentioned that I'm only giving the VPN clients access to the LAN, but the pfsense is on the same subnet as the devices I'm trying to connect to. I have no problem connecting to the devices on the subnet via ip address.

      Thanks!

      M 1 Reply Last reply Reply Quote 0
      • M
        mcury @rchiocchio
        last edited by

        @rchiocchio Check the if the ACL in DNS resolver is allowing it.
        You need to add the remote network there.

        eefadd48-2311-4f6b-8cea-fa44b272b9ce-image.png

        dead on arrival, nowhere to be found.

        R 1 Reply Last reply Reply Quote 1
        • R
          rchiocchio @mcury
          last edited by

          @mcury thanks, figured there was one other thing... first time using a pfsense firewall for me.

          849833b6-fd52-4143-bcf3-d7ff1cc89c99-image.png

          went ahead and added it like this, .1 is the local subnet and .2 is the vpn subnet. Let me restart the dns resolver and see how it goes. Is there anything else I might be missing in here?

          M 1 Reply Last reply Reply Quote 0
          • M
            mcury @rchiocchio
            last edited by mcury

            @rchiocchio said in DNS Resolver Over IPSec Connection:

            went ahead and added it like this, .1 is the local subnet and .2 is the vpn subnet. Let me restart the dns resolver and see how it goes.

            You usually don't need to add the local subnets there.
            This is only required when the subnet is not directly connected to pfsense, behind another router connected to pfsense, or a remote network that is going to use unbound.

            Is there anything else I might be missing in here?

            Make sure that you are forwarding the traffic to the DNS resolver to an interface that is listening on port 53 TCP/UDP, and also that this traffic is allowed to go through the tunnel (phase 2), and firewall rules.

            dead on arrival, nowhere to be found.

            R 1 Reply Last reply Reply Quote 0
            • R
              rchiocchio @mcury
              last edited by

              @mcury said in DNS Resolver Over IPSec Connection:

              Make sure that you are forwarding the traffic to the DNS resolver to an interface that is listening on port 53 TCP/UDP, and also that this traffic is allowed to go through the tunnel (phase 2), and firewall rules.

              Looks like the forward & rules were already set up by default?

              fad2bc9c-4c56-4aad-ad8a-34fe8b7e9332-image.png

              4e9e9583-78fc-4af4-ad64-c8be5e058652-image.png

              and this rule should allow all traffic...

              78e056cd-f21b-4f25-9d94-06495e872f87-image.png

              M 1 Reply Last reply Reply Quote 0
              • M
                mcury @rchiocchio
                last edited by

                @rchiocchio Keep that NAT disabled, you don't need that.

                You are allowing only TCP traffic, DNS most of the times uses UDP, try to change that rule from the IPsec tab to TCP/UDP and test again.

                dead on arrival, nowhere to be found.

                1 Reply Last reply Reply Quote 0
                • First post
                  Last post
                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.