Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Split DNS via internal AD DNS over SSLVPN does not work with Connect based clients

Hi all,

we have the following setup:
- XGS 126, configured for SSLVPN
- The global SSLVPN settings contain the IPs for both internal AD DNS servers and the AD FQDN (i.e. contoso.local)
- The internal DNS is configured for Split-DNS to resolve external DNS names (i.e. webapp.contoso.com) with internal IP addresses (10.51.1.1, 10.51.1.2)

We have the requirement to access applications via a public DNS name (webapp.contoso.com), but through the VPN. That is why we configured Split DNS on the internal DNS servers.

When we connect to the corporate network with the newer Connect client (either Sophos Connect or OpenVPN Connect) Windows gets an NRPT rule saying that the FQDN provided by SSLVPN global settings (contoso.local) should be resolved by the DNS servers provided by global settings (10.51.1.1, 10.51.1.2).

In short: contoso.local --> 10.51.1.1, 10.51.1.2

So internal name resolution works (i.e. printer.contoso.local) but external name resolution (webapp.contoso.com) is directed to the Internet where no record exists because the application should only be available via VPN - so the request fails.
(it is no solution for us to add DNS records with internal IP addresses to the external zone so please do not suggest this ;-)

How can we achieve the goal to send all DNS requests to the internal DNS servers WITHOUT FORCE TUNNELING (Microsoft 365-related traffic must not be routed through the VPN)? Is there a way via DNS request routing?


Best

Ben



This thread was automatically locked due to age.