472,364 Members | 2,137 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 472,364 software developers and data experts.

Configure IIS DNS/Domains/access when usign VPN

1 Bit
I have an Widows 2012 R2 server.
IT is always connected to a VPN
I run IIS for a couple of internal websites (These are not internet facing).
Most PCs on the network are permanently connected to a VPN.

Recently I found that we have DNS leaks. Where the PCs local adapter is configured with the VPN's DNS servers we hit a transparent DNS Proxy run by the ISP. To fix this we use the openVPN directive block-outside-dns

Unfortunately, this breaks access to the internal websites by name. Access by IP address works fine.

Without block-outside-dns using //server/home works
With block-outside-dns //server/home times out
With blokc-outside-dns //192.168.x.x/home works.

I'm hoping this is a IIS configuration issue.

Any suggestions?
Jan 4 '21 #1
0 1396

Sign in to post your reply or Sign up for a free account.

Similar topics

7
by: USUN_TO | last post by:
Hi, i got problem when i bind in this way: local_addr.sin_family = AF_INET; local_addr.sin_addr.s_addr = inet_addr("127.0.0.1"); local_addr.sin_port = htons(CLIENT_PORT); i can easly bind...
2
by: Gran | last post by:
Hi, Im using Access 97, and I have two subforms which have a total for the query'd data. I then go and total the two together on the main form. But, when one has no data it brings up an error. I...
1
by: Steven Thomas | last post by:
I have a windows service that uses office xp automation. Here is the code --------------------------------------- Public Sub CAccessSnapShot() Try Dim objAccess As New Access.Application() Dim...
2
by: Licheng Fang | last post by:
I use a HTTP proxy to connect to Internet. When I run ulropen command I get HTTP Error 407: Proxy authorization required. Could anybody tell me how to resolve this? Thanks!
2
emibt08
by: emibt08 | last post by:
Hi, I have an application that I recently revised. It transfers data between 2 programs, including files as well as small data chunks. I never had a problem (got garbage at the other side) or...
1
by: WackoZacho | last post by:
I've tried searching on Google and for other questions similar to mine, but all I get are results on how to use the LostFocus event or Deactivate, etc., but I'm under the impression each of these...
2
by: armantobe | last post by:
How To Configure Firewall Access For An Application By Java Program? Let A Application Name "xyz.exe" In Windows\system32\ It Should Connect To Net And Send Or Recieve Data Without Restriction...
2
by: Hansel Haycox | last post by:
In access 2007, I created a query. I used the query and an additional table to create the form using Wizard. Yet, when I open the form, I am unable to edit existing records or add new records. I...
16
by: normalice | last post by:
I found the vb that explains what to do to detect idle time and close out access automatically when idle and it works great, however this does not work if someone locks their computer but leaves...
8
by: Sedrick | last post by:
I have two different databases. Both have initial login forms set up that is executed from the startup form. The first database can open the second when a button is clicked on the menu. I would...
2
by: Kemmylinns12 | last post by:
Blockchain technology has emerged as a transformative force in the business world, offering unprecedented opportunities for innovation and efficiency. While initially associated with cryptocurrencies...
0
by: Naresh1 | last post by:
What is WebLogic Admin Training? WebLogic Admin Training is a specialized program designed to equip individuals with the skills and knowledge required to effectively administer and manage Oracle...
0
by: antdb | last post by:
Ⅰ. Advantage of AntDB: hyper-convergence + streaming processing engine In the overall architecture, a new "hyper-convergence" concept was proposed, which integrated multiple engines and...
0
hi
by: WisdomUfot | last post by:
It's an interesting question you've got about how Gmail hides the HTTP referrer when a link in an email is clicked. While I don't have the specific technical details, Gmail likely implements measures...
0
Oralloy
by: Oralloy | last post by:
Hello Folks, I am trying to hook up a CPU which I designed using SystemC to I/O pins on an FPGA. My problem (spelled failure) is with the synthesis of my design into a bitstream, not the C++...
0
by: Carina712 | last post by:
Setting background colors for Excel documents can help to improve the visual appeal of the document and make it easier to read and understand. Background colors can be used to highlight important...
0
by: Rahul1995seven | last post by:
Introduction: In the realm of programming languages, Python has emerged as a powerhouse. With its simplicity, versatility, and robustness, Python has gained popularity among beginners and experts...
2
by: Ricardo de Mila | last post by:
Dear people, good afternoon... I have a form in msAccess with lots of controls and a specific routine must be triggered if the mouse_down event happens in any control. Than I need to discover what...
1
by: ezappsrUS | last post by:
Hi, I wonder if someone knows where I am going wrong below. I have a continuous form and two labels where only one would be visible depending on the checkbox being checked or not. Below is the...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.