Correct. Using this feature will break any client with a hard-defined DNS - as we found out in testing at the bar.
On May 11, 2014, at 13:48, Adam Thompson <athom...@athompso.net> wrote: > On May 11, 2014 1:37:01 PM CDT, Mehma Sarja <mehmasa...@gmail.com> wrote: > My Samsung Chromebook bypasses my router/OpenDNS because it has it's own DNS > entries. > > Yudhvir > > > > Basically it takes a DNS call the first time and goes elsewhere. then it > corrects itself. If he’s got a different DNS set up then either CP does not > work or, potentially, it could be bypassed. > > — > > > List mailing list > List@lists.pfsense.org > https://lists.pfsense.org/mailman/listinfo/list > > The simple solution is to block all outbound DNS at the firewall, but this > can also break things (like some Google and Apple devices). > Even broken devices usually have a fallback mode, but be careful of what > breaks when you do this! > -Adam > -- > Sent from my Android device with K-9 Mail. Please excuse my brevity. > _______________________________________________ > List mailing list > List@lists.pfsense.org > https://lists.pfsense.org/mailman/listinfo/list
_______________________________________________ List mailing list List@lists.pfsense.org https://lists.pfsense.org/mailman/listinfo/list