@dave14305 Is this by design for DNAT'ed traffic for it to reappear as having come from the router (192.168.1.1) as a client on pihole as opposed to the offending device that is trying to reach outside to a hardcoded dns server?
I assume there is no workaround for this?
Edit:
Just a thought, could you run DNSFilter set to custom and set a bogus local dns entry say (192.168.1.2) that is attached to no device to route the request no where and drop it?
Pointed DNSFilter to custom - set it to 192.168.2.2 (different subnet entirely) and seems to not be showing any redirections from router and I guess just sinks any request trying to go outside so far devices have been doing well.
I assume there is no workaround for this?
Edit:
Just a thought, could you run DNSFilter set to custom and set a bogus local dns entry say (192.168.1.2) that is attached to no device to route the request no where and drop it?
Pointed DNSFilter to custom - set it to 192.168.2.2 (different subnet entirely) and seems to not be showing any redirections from router and I guess just sinks any request trying to go outside so far devices have been doing well.
Last edited: