Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    DNS resolution barely works on backup node

    Scheduled Pinned Locked Moved HA/CARP/VIPs
    16 Posts 2 Posters 1.1k Views 2 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B Offline
      benbrummer
      last edited by

      It looks like the resolver mode is irrelevant, but in the HA cluster the Wan interface is required the be selected as Outgoing Network Interface

      HA Cluster
      Outgoing Network Interface: LAN, WAN, Localhost

      Single Node
      Outgoing Network Interface: LAN, Localhost

      Without WAN the backup pfsense fails to resolve DNS.

      So it works now, but I still try to understand why.

      S 1 Reply Last reply Reply Quote 0
      • S Offline
        SteveITS Rebel Alliance @benbrummer
        last edited by

        @benbrummer are you forwarding to a DNS server on LAN? WAN would be the expected way to get to the Internet…. The default of ALL should also work.

        Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
        When upgrading, allow 10-15 minutes to reboot, or more depending on packages, and device or disk speed.
        Upvote 👍 helpful posts!

        1 Reply Last reply Reply Quote 0
        • B Offline
          benbrummer
          last edited by

          @SteveITS trough the lan interface a DNS Server can be queried trough an IPsec, to have DNS available for names on the other side
          Default would indeed work, but we have interfaces e.g. to external parties, where we do not want to send any DNS queries.

          For my understanding if WAN is not selected in our HA Cluster, which was the case I should expect DNS issues on master AND backup, but master works and backup does not respond on 127.0.0.1.

          Current working configuration:

          • General configuration: Quad9 DNS servers
          • Resolver runs in resolver mode to query root servers
          • Network Interfaces: All
          • Outgoing Network Interfaces: WAN, Localhost, LAN
          • Strict Outgoing Network Interface Binding: Enabled

          If the WAN is removed from Outgoing Network Interfaces, backup firewall has DNS issues and navigating the Webinterface is incredible slow. Login takes 30 seconds or longer. DNS Lookup, gets no response from 127.0.0.1.

          • Not sure why DNS works on the master, when WAN is removed
          • Single instance at a different location with Outgoing Network Interfaces: Localhost, LAN works

          By the way, thanks for the support!

          S 1 Reply Last reply Reply Quote 0
          • S Offline
            SteveITS Rebel Alliance @benbrummer
            last edited by SteveITS

            @benbrummer said in DNS resolution barely works on backup node:

            DNS Server can be queried trough an IPsec

            And this VPN is not originating on pfSense? Something else is creating that tunnel? It sounds like the backup router can't connect to it...maybe try dig/nslookup on the backup router using that "LAN" DNS server.

            The web GUI being slow (when DNS isn't working) was a problem in earlier pfSense versions but IIRC it was fixed a year or two ago.

            Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
            When upgrading, allow 10-15 minutes to reboot, or more depending on packages, and device or disk speed.
            Upvote 👍 helpful posts!

            B 1 Reply Last reply Reply Quote 0
            • B Offline
              benbrummer @SteveITS
              last edited by

              @SteveITS
              a1b45175-1e93-4e03-b031-c69de3fc0111-image.png

              • #1 Everything works now, with Outgoing Network Interface WAN, LAN, OPTx and Localhost.
              • #2 Everything was working before without WAN being activated for Outgoing Network Interface, except DNS on Backup pfsense.

              I'm fine if #1 is the correct way to configure it, but I try to understand, why DNS was working in #1 without WAN being activated for Outgoing Network Interface.

              So my expectation is a consistent behaviour for master and backup:
              With WAN: DNS resolution on both
              Without WAN: No DNS resolution for both

              S 1 Reply Last reply Reply Quote 0
              • S Offline
                SteveITS Rebel Alliance @benbrummer
                last edited by

                @benbrummer Did you try a traceroute? Seems like an asymmetric routing scenario possibly.

                Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                When upgrading, allow 10-15 minutes to reboot, or more depending on packages, and device or disk speed.
                Upvote 👍 helpful posts!

                1 Reply Last reply Reply Quote 0
                • B Offline
                  benbrummer
                  last edited by benbrummer

                  No difference for traceroute when Outgoing network interfaces are with or without WAN. It works without issue for netgate.com.

                  But the DNS Resolver status page on backup is basically empty. Zone contains always "-".

                  Wan WAN is activated again the Resolver Status page quickly populates with ips and zones.

                  S 1 Reply Last reply Reply Quote 0
                  • S Offline
                    SteveITS Rebel Alliance @benbrummer
                    last edited by

                    @benbrummer traceroute works to netgate.com or to the internal DNS server?

                    Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                    When upgrading, allow 10-15 minutes to reboot, or more depending on packages, and device or disk speed.
                    Upvote 👍 helpful posts!

                    1 Reply Last reply Reply Quote 0
                    • B Offline
                      benbrummer
                      last edited by benbrummer

                      @SteveITS yes traceroute works internal and external.

                      But the problem is changing now.

                      If I select "Outgoing Network Interfaces" all , DNS resolution for the b.example.com is starting to fail, "Query refused", so the wrong interface is sending the queries.

                      With WAN, LAN, Localhost resolution is slow, 1-2 timeouts before successful resolution.

                      With just LAN and Localhost resolution for internal works instantly, but public addresses fail.

                      So it looks like I need to ensure, that the correct interfaces are used fro the right DNS server

                      WAN => Public DNS
                      LAN => DNS at Location B
                      OPTx => DNS at Partner

                      Additionally:
                      On the master the DNS resolution without WAN seams to work, but slow, too. Eg fqdn aliases are populated slowly or sometimes failing, causing firewall rules to not apply.

                      Conclusion
                      WAN is mandatory, but I need to find out how to send specific DNS queries from specific interfaces.

                      Will check on this: https://docs.netgate.com/pfsense/en/latest/multiwan/interfaces-and-dns.html#dns-forwarding-and-static-routes

                      B 1 Reply Last reply Reply Quote 0
                      • B Offline
                        benbrummer @benbrummer
                        last edited by

                        Current status: It works now

                        1. Created a GW for Interface LAN with the VIP for LAN. The ACL on other pfsense expect that queries originate from this IP
                        2. Created an alias, holding all our internal DNS servers on other locations
                        3. I created a static root for the new gateway to this alias
                        4. Same was done for another interface and an alias for the partners DNS servers
                        1 Reply Last reply Reply Quote 0
                        • B Offline
                          benbrummer
                          last edited by

                          DNS for internal servers is not working on the secondary

                          b4c8280c-7add-4fda-87c2-6dc53a05a52c-image.png

                          • traceroute 2 hops
                          • ping works
                          • Public DNS works fine, Interface is responsive

                          primary works great, with
                          046dfb22-7108-4283-a549-88b72d3fb98e-image.png and a static route

                          1 Reply Last reply Reply Quote 0
                          • B Offline
                            benbrummer
                            last edited by

                            So I'm back where I started following

                            • https://forum.netgate.com/topic/149472/solved-remote-dns-not-working-over-ipsec

                            As WAN is not selected primary works, internal and external dns is reliable

                            Secondary is slow on the webinterface and has basically no DNS

                            nslookup google.de
                            ;; communications error to 127.0.0.1#53: timed out
                            ;; Got SERVFAIL reply from 127.0.0.1, trying next server
                            ;; communications error to ::1#53: connection refused
                            ;; communications error to ::1#53: connection refused
                            ;; no servers could be reached
                            

                            So the secondary firewall is basically not listening to dns requests at all. As I removed now all DNS server on general settings to only use the root servers.
                            (Identical behaviour for snmp monitoring, only the primary firewall can be monitored.)

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.