pfsense:pfblockerng:selectively_enforcing_pfblockerng_for_specific_clients_or_networks
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
pfsense:pfblockerng:selectively_enforcing_pfblockerng_for_specific_clients_or_networks [2020/11/29 12:18] – peter | pfsense:pfblockerng:selectively_enforcing_pfblockerng_for_specific_clients_or_networks [2021/01/06 10:06] (current) – [Basic Example] peter | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== PFSense - pfBlockerNG - Selectively enforcing pfBlockerNG for specific clients or networks ====== | ====== PFSense - pfBlockerNG - Selectively enforcing pfBlockerNG for specific clients or networks ====== | ||
+ | |||
+ | <WRAP alert> | ||
+ | **ALERT: | ||
+ | |||
+ | **Don’t do this!** | ||
+ | |||
+ | Instead, first remove any custom options you’ve implemented with this guide to do with pfBlockerNG from your **DNS Resolver Custom Options** field. | ||
+ | |||
+ | Then in **Firewall -> pfBlockerNG** deselect **Enable pfBlockerNG** from the **General Settings** page and click save. | ||
+ | |||
+ | </ | ||
+ | |||
+ | |||
+ | ---- | ||
+ | |||
+ | ===== Basic Example ===== | ||
Navigate to **Services-> | Navigate to **Services-> | ||
Line 23: | Line 39: | ||
This means all the Unbound commands generated by pfBlockerNG are not referenced when a client in 192.168.10.x queries pfSense, so DNS queries go through unchanged. | This means all the Unbound commands generated by pfBlockerNG are not referenced when a client in 192.168.10.x queries pfSense, so DNS queries go through unchanged. | ||
- | For the 192.168.20.x network, the entries are included and redirected to our sinkhole. | + | For the 192.168.20.x network, the entries are included and redirected to the pfBlockerNG |
It is important to note that you can use these entries in any CIDR notation that fall within your network topology. | It is important to note that you can use these entries in any CIDR notation that fall within your network topology. | ||
Line 57: | Line 73: | ||
We have to add them here as adding them as a **Host Override** on the **DNS Resolver** configuration page would enforce them for all clients. | We have to add them here as adding them as a **Host Override** on the **DNS Resolver** configuration page would enforce them for all clients. | ||
+ | </ | ||
+ | |||
+ | ---- | ||
+ | |||
+ | ====== Forward all DNS ====== | ||
+ | |||
+ | <code bash> | ||
+ | server: | ||
+ | access-control-view: | ||
+ | access-control-view: | ||
+ | access-control-view: | ||
+ | view: | ||
+ | name: " | ||
+ | view-first: yes | ||
+ | view: | ||
+ | name: " | ||
+ | view-first: yes | ||
+ | include: / | ||
+ | view: | ||
+ | name: " | ||
+ | view-first: yes | ||
+ | forward-addr: | ||
+ | forward-addr: | ||
+ | </ | ||
+ | |||
+ | <WRAP info> | ||
+ | **NOTE: | ||
+ | </ | ||
+ | |||
+ | ---- | ||
+ | |||
+ | ====== Forward DNS over TLS ====== | ||
+ | |||
+ | <code bash> | ||
+ | server: | ||
+ | access-control-view: | ||
+ | access-control-view: | ||
+ | access-control-view: | ||
+ | access-control-view: | ||
+ | view: | ||
+ | name: " | ||
+ | view-first: yes | ||
+ | view: | ||
+ | name: " | ||
+ | view-first: yes | ||
+ | include: / | ||
+ | view: | ||
+ | name: " | ||
+ | view-first: yes | ||
+ | forward-addr: | ||
+ | forward-addr: | ||
+ | view: | ||
+ | name: " | ||
+ | view-first: yes | ||
+ | tls-cert-bundle: | ||
+ | forward-tls-upstream: | ||
+ | forward-addr: | ||
+ | forward-addr: | ||
+ | </ | ||
+ | |||
+ | <WRAP info> | ||
+ | **NOTE: | ||
+ | |||
+ | For each server you will need to specify that the connection port using **@**, and you will also need to indicate which is its domain name with **# | ||
</ | </ | ||
pfsense/pfblockerng/selectively_enforcing_pfblockerng_for_specific_clients_or_networks.1606652328.txt.gz · Last modified: 2020/11/29 12:18 by peter