Does setting router DNS to 208.67.220.220 interfere with Remote Desktop Connection?

Comments

14 comments

  • Avatar
    rotblitz

    You'll configure the OpenDNS resolver addresses only on the WAN side of your router, not on the LAN side.  Configuring on the LAN side indeed impacts or breaks local name resolution.  This is to be expected, of course.  If you introduce external resolver addresses on the LAN side, internal name resolution cannot work orderly anymore.

    If you cannot configure the OpenDNS resolver addresses on the WAN side (only), you'll have to add your internal names to the VPN exceptions list.
    https://support.opendns.com/entries/26022539-How-do-I-use-OpenDNS-and-Manage-Internal-Resources-and-Virtual-Private-Networks-

    Not sure what this has to do with the OpenDNS Updater.  It should work independently from where you configured the resolver addresses.  You may want to post the Updater's log here if there are problems, so we can take a look.

    0
    Comment actions Permalink
  • Avatar
    glnz

    Rotblitz - I'm REAL IMPRESSED.

    Your suggestions seems to be working, although it takes a few minutes for the added VPN setting to catch hold.

    I added three things to the VPN exceptions list:
    - the full router's domain name domain.actdsltmp
    - just actdsltmp
    - the target (host) PC name george

    I don't know which of these did the trick - do you?

    As you and team do not yet have instructions for my Actiontec GT784WNV DSL modem router, I strongly suggest you add these VPN exceptions list notes to those instructions whenever you post them. Also, I have attached screenshots of the WAN and LAN pages in this model Actiontec GT784WNV if they are helpful.




    Actiontec GT784WNV - Advanced Setup - IP Addressing - WAN IP Address.pdf
    Actiontec GT784WNV - Advanced Setup - LAN IP AND DHCP SETTINGS.pdf
    0
    Comment actions Permalink
  • Avatar
    rotblitz

    "Your suggestions seems to be working, although it takes a few minutes for the added VPN setting to catch hold."

    To take effect more immediately than 3 minutes, you need to flush your local caches, of course.
    https://support.opendns.com/entries/23281284-Clearing-the-DNS-Cache-on-Computers-and-Servers
    https://support.opendns.com/entries/23739610-Clearing-the-DNS-Cache-on-Browser

    "I don't know which of these did the trick - do you?"

    Your domain stats will tell you.  https://dashboard.opendns.com/stats/all/topdomains

    "As you and team do not yet have instructions..."

    Certainly not, I'm just a user like you. :)  And there is no team of mine.
    You better open a support ticket to get the instructions added.

    0
    Comment actions Permalink
  • Avatar
    glnz
    Not sure how to read the domain stats. A bunch of lines have [something].domain.actdsltmp -- the last two words being the domain name inside my modam router. All seem to be resolved normally. One line says: george.domain.actdsltmp 15 This domain resolved normally. You can block this domain or block similar domains . That's the target (host) computer. What does that line mean? Another line is very similar with the name of my principal PC - the one I'm on now. Also domain resolved normally. Is that OK?
    0
    Comment actions Permalink
  • Avatar
    glnz
    Not sure how to read the domain stats.   A bunch of lines have [something].domain.actdsltmp -- the last two words being the domain name inside my modam router. All seem to be resolved normally.   One line says: george.domain.actdsltmp 15 This domain resolved normally. You can block this domain or block similar domains .   That's the target (host) computer. What does that line mean?   Another line is very similar with the name of my principal PC - the one I'm on now. Also domain resolved normally. Is that OK?
    0
    Comment actions Permalink
  • Avatar
    rotblitz

    "A bunch of lines have [something].domain.actdsltmp"

    These are all local name resolution attempts exactly with the names as they appear at OpenDNS.  These "DNS suffixes" are appended by your OS when building the DNS queries.  It may be sufficient to add actdsltmp or domain.actdsltmp to your VPN exceptions list then.  "Subdomains" are usually covered by the parent.

    "This domain resolved normally."

    This message shows up always except if a domain is blocked by your settings.  Also NXDOMAIN and SERVFAIL DNS results appear like this.

    You can reveal what is really returned by executing commands like (trailing dots are significant to indicate an FQDN):

    nslookup george nslookup [something].domain.actdsltmp.
    nslookup domain.actdlstmp.
    nslookup actdlstmp.
    ...and so forth...

    They should return either the private IP address of the related device or an NXDOMAIN DNS result (domain does not exist), the latter being returned by OpenDNS.  If it returns a public IP address like 67.215.65.132 (hit-nxdomain.opendns.com), then your VPN exceptions list is not correct and does not cover certain names.

    0
    Comment actions Permalink
  • Avatar
    rotblitz

    Correcting the formatting of the above part:

    nslookup george
    nslookup [something].domain.actdsltmp.
    nslookup domain.actdlstmp.
    nslookup actdlstmp.
    ...and so forth...

    (Too bad that some fornatting is broken when submitting a message here.)

    0
    Comment actions Permalink
  • Avatar
    glnz

    Rotblitz - hey - none of them works. 

    nslookup for each of them returns

    Server:
    Address:  192.168.1.1
    +++  can't find [whatever it was]: Non-existent domain name

    But RDC is working with the target (host) PC name!

    0
    Comment actions Permalink
  • Avatar
    rotblitz

    "none of them works."

    No, all of them works.  I said: They should return either the private IP address of the related device or an NXDOMAIN DNS result (domain does not exist)
    And exactly this is what is happeing now, as should be.

    "But RDC is working with the target (host) PC name!"

    Yes, because OpenDNS now returns NXDOMAIN, and your OS continues to resolve by other means, e.g. NetBIOS, as should be.  NetBIOS can resolve your internal names, external DNS can't.

    0
    Comment actions Permalink
  • Avatar
    glnz
    Rotblitz - great - understood. Now, do you think I should go into the network settings for both PCs and DISABLE NetBIOS? On a few other threads about this type of problem, some posters advised how NetBIOS is old and sometimes problem-prone, and even internal workgroup networks should move to DNS-IP. What do you think?
    0
    Comment actions Permalink
  • Avatar
    rotblitz

    Oh no!  If you deactivated NetBIOS, you would no longer be able to resolve your internal names again unless you configured them in your local hosts files and applied a static IP address scheme internally.

    Simply leave it as it is now and enjoy it working.

    0
    Comment actions Permalink
  • Avatar
    glnz
    rotblitz - many thanks. This has all been quite helpful and instructive.
    0
    Comment actions Permalink
  • Avatar
    glnz

    rotblitz - how do we mark your comment (to add the info to the VPN exceptions list) as the answer?

    0
    Comment actions Permalink
  • Avatar
    rotblitz

    This can be done by staff only.

    0
    Comment actions Permalink

Please sign in to leave a comment.