• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

DNS Resolver Over IPSec Connection

Scheduled Pinned Locked Moved DHCP and DNS
6 Posts 2 Posters 910 Views 2 Watching
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • R Offline
    rchiocchio
    last edited by Dec 14, 2022, 3:07 PM

    Original Post, for reference:

    https://forum.netgate.com/topic/176292/ios-ipsec-connection-error

    I seem to be having an issue getting any clients connected via IPSec to use the pfsense device to resolve host names defined in the DNS Resolver - Host Overrides list. For reference, the device itself is able to resolve all entries via the ping test without a problem. I've attached screenshots of my config for reference here too.

    ipsec_phase1.png

    ipsec_phase2.png

    dnsResolverGeneral.png

    netgateDNSTest.PNG

    In the previous thread someone had mentioned that I'm only giving the VPN clients access to the LAN, but the pfsense is on the same subnet as the devices I'm trying to connect to. I have no problem connecting to the devices on the subnet via ip address.

    Thanks!

    M 1 Reply Last reply Dec 14, 2022, 3:10 PM Reply Quote 0
    • M Offline
      mcury Rebel Alliance @rchiocchio
      last edited by Dec 14, 2022, 3:10 PM

      @rchiocchio Check the if the ACL in DNS resolver is allowing it.
      You need to add the remote network there.

      eefadd48-2311-4f6b-8cea-fa44b272b9ce-image.png

      dead on arrival, nowhere to be found.

      R 1 Reply Last reply Dec 14, 2022, 3:47 PM Reply Quote 1
      • R Offline
        rchiocchio @mcury
        last edited by Dec 14, 2022, 3:47 PM

        @mcury thanks, figured there was one other thing... first time using a pfsense firewall for me.

        849833b6-fd52-4143-bcf3-d7ff1cc89c99-image.png

        went ahead and added it like this, .1 is the local subnet and .2 is the vpn subnet. Let me restart the dns resolver and see how it goes. Is there anything else I might be missing in here?

        M 1 Reply Last reply Dec 14, 2022, 3:53 PM Reply Quote 0
        • M Offline
          mcury Rebel Alliance @rchiocchio
          last edited by mcury Dec 14, 2022, 3:54 PM Dec 14, 2022, 3:53 PM

          @rchiocchio said in DNS Resolver Over IPSec Connection:

          went ahead and added it like this, .1 is the local subnet and .2 is the vpn subnet. Let me restart the dns resolver and see how it goes.

          You usually don't need to add the local subnets there.
          This is only required when the subnet is not directly connected to pfsense, behind another router connected to pfsense, or a remote network that is going to use unbound.

          Is there anything else I might be missing in here?

          Make sure that you are forwarding the traffic to the DNS resolver to an interface that is listening on port 53 TCP/UDP, and also that this traffic is allowed to go through the tunnel (phase 2), and firewall rules.

          dead on arrival, nowhere to be found.

          R 1 Reply Last reply Dec 14, 2022, 4:54 PM Reply Quote 0
          • R Offline
            rchiocchio @mcury
            last edited by Dec 14, 2022, 4:54 PM

            @mcury said in DNS Resolver Over IPSec Connection:

            Make sure that you are forwarding the traffic to the DNS resolver to an interface that is listening on port 53 TCP/UDP, and also that this traffic is allowed to go through the tunnel (phase 2), and firewall rules.

            Looks like the forward & rules were already set up by default?

            fad2bc9c-4c56-4aad-ad8a-34fe8b7e9332-image.png

            4e9e9583-78fc-4af4-ad64-c8be5e058652-image.png

            and this rule should allow all traffic...

            78e056cd-f21b-4f25-9d94-06495e872f87-image.png

            M 1 Reply Last reply Dec 14, 2022, 5:34 PM Reply Quote 0
            • M Offline
              mcury Rebel Alliance @rchiocchio
              last edited by Dec 14, 2022, 5:34 PM

              @rchiocchio Keep that NAT disabled, you don't need that.

              You are allowing only TCP traffic, DNS most of the times uses UDP, try to change that rule from the IPsec tab to TCP/UDP and test again.

              dead on arrival, nowhere to be found.

              1 Reply Last reply Reply Quote 0
              6 out of 6
              • First post
                6/6
                Last post
              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                This community forum collects and processes your personal information.
                consent.not_received