Correct. Using this feature will break any client with a hard-defined DNS - as 
we found out in testing at the bar.


On May 11, 2014, at 13:48, Adam Thompson <athom...@athompso.net> wrote:

> On May 11, 2014 1:37:01 PM CDT, Mehma Sarja <mehmasa...@gmail.com> wrote:
> My Samsung Chromebook bypasses my router/OpenDNS because it has it's own DNS 
> entries. 
> 
> Yudhvir
> 
> 
> 
> Basically it takes a DNS call the first time and goes elsewhere. then it 
> corrects itself. If he’s got a different DNS set up then either CP does not 
> work or, potentially, it could be bypassed.
> 
> —
> 
> 
> List mailing list
> List@lists.pfsense.org
> https://lists.pfsense.org/mailman/listinfo/list
> 
> The simple solution is to block all outbound DNS at the firewall, but this 
> can also break things (like some Google and Apple devices).
> Even broken devices usually have a fallback mode, but be careful of what 
> breaks when you do this!
> -Adam
> -- 
> Sent from my Android device with K-9 Mail. Please excuse my brevity.
> _______________________________________________
> List mailing list
> List@lists.pfsense.org
> https://lists.pfsense.org/mailman/listinfo/list

_______________________________________________
List mailing list
List@lists.pfsense.org
https://lists.pfsense.org/mailman/listinfo/list

Reply via email to