I have a Synology NAS in my home network (IP
192.168.178.29) which serves as host for some network drives and local websites of mine. I access those via domains configured on a DNS server installed on the same NAS, using the top level domain lan, e.g.
nas1.lan. Works all fine. Now on my notebook (Windows 10) I've set up a connection to a VPN provider where I want to route my internet traffic through, including DNS requests if possible. I'm extending an OpenVPN configuration given by my provider to route IPs falling under my home subnet (
192.168.178.0) into my local gateway and register my local DNS server.
Code: Select all
client
dev tun
proto udp
remote [remote-vpn-server].net 1195
#redirect-gateway def1
allow-pull-fqdn
route 192.168.178.0 255.255.255.0 net_gateway
route 127.0.0.1 255.255.255.255 net_gateway
dhcp-option DNS 192.168.178.29
...
Now when connected to the VPN, while I can still access my local services via IP adresses, it's for some reason not possible for me to access those via the domains defined on my DNS server yet. In this scenario I'm also not quite understanding what
allow-pull-fqdn is supposed to do. I first thought this option ensures that DNS requests are done through VPN as well, which I usually want with exception for my local domains, but this seems also to be the case when I skip it. I've also been using the option
dhcp-option DOMAIN lan in the hope this would route my local domains to my DNS server instead, but to no avail.
Interestingly, while connected to the VPN,
nslookup times out even for reachable domains like
google.com, with the server being tried being my own one.
tracert though instantly goes for the DNS server from the VPN it seems.
Can someone clear my up on what I'm doing wrong? I figure that it might be impossible to split DNS requests, but I'd be glad if for now I could at least route all DNS traffic through my local DNS server.