Firewalla Gold with Active Directory Domain - DNS

Comments

6 comments

  • Avatar
    Firewalla

    Your situation is very much like running pi-hole (DNS server), see if this can help or not https://help.firewalla.com/hc/en-us/articles/360062551673-How-to-run-an-external-pi-hole-with-Firewalla

     

    0
    Comment actions Permalink
  • Avatar
    Benjamin

    I already checked all Fiarewalla community links.

    The difference with the pi-hole DNS server situation is pretty different because I must use the Firewalla DNS server to use DNS over HTTPS and DNS booster features (and all others related features)

    If use my Domain Controller DNS then redirect the traffic to the Firewalla to make DNS encryption, the Firewalla automatically disable the DNS booster on my DC.

    This is very easy to reproduce. Everyone who use an Active Directory domain should have the same situation. Currently, I'm blocked...

    Is there a way to use differents DNS entries from the Firewalla DHCP service, to allow my domain joigned computers to point to my DC ?

    Or can we avoid my DC to be automatically removed from the DNS booster entries ?

    Others ways ?

    I can make some tests if needed !

    Thanks

    0
    Comment actions Permalink
  • Avatar
    Firewalla

    I don't think it is possible to bypass booster using your own DNS and then come back to the booster and have it encrypt 

    0
    Comment actions Permalink
  • Avatar
    Benjamin

    So,

    - how can I disable the feature which automatically exclude my own DNS server from the DNS booster client ?

    - how can I setup specific DNS server for domain joigned devices to the Firewalla DHCP module ?

    Currently, it's really a problem if an Active Directory domain cannot be used with a Firewalla.

    0
    Comment actions Permalink
  • Avatar
    Firewalla

    @Benjamin, your issue is the last step, where you want your AD to use firewalla for DoH. 

    One way that may work is setup your clients to directly talk to AD DNS and leave firewalla as is. (Also make sure your AD + clients are on the same LAN).

    The first DNS request will directly go to AD, and AD will then DNS with firewalla.

    (edit, with above, you will have the same issue, that Firewalla can't distinguish which client did the DNS)

    0
    Comment actions Permalink
  • Avatar
    Benjamin

    Already tried this solution,

    - Setup the Firewalla DHCP to point to my AD DNS

    - Configured the Firewalla as DNS forwarder on my AD DNS

    => Works a few minutes until the Firewalla automatically remove my AD DNS (DOmain COntroller) IP from the DNS Booster (certainly because it detects an internal DNS and want to avoid any DNS loops). So when DNS booster is disabled, the Firewalla DNS over HTTPS feature no more works.

    => Another problem is all devices will lose internet access if my AD DNS become under maintenance or go down (not recommended to setup a secondary DNS outside AD DNS in AD mode)

    0
    Comment actions Permalink

Please sign in to leave a comment.