Hi everyone,
I am trying to understand how to configure split DNS when using the Harmony Endpoint Security VPN client (basically same as Endpoint Security VPN client). Without split DNS at the moment, all the DNS queries (for internal + external/public domains) are all sent to my corporate internal DNS, and I would like for this to be the case only for the selected domains managed internally.
First, I find some parts of the documentation on the topic a bit confusing (https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_RemoteAccessVPN_AdminGuide/T...), I understand it is necessary to be done when using SecuRemote VPN client, but when using Mobile Access VPN or Endpoint Security VPN clients, is it already enabled or we still need to enable it + use SecuRemoteDNS objects as per mentioned in the documentation?
The following parts confuse me in the documentation:
- "Split DNS is automatically enabled"
- "Best practice is:
- For Endpoint Security VPN and Check Point Mobile for Windows, use Office mode."
I am already using office mode in my case and the VPN itself is working fine (using ADFS/SAML auth).
I still went ahead and followed the documentation to enable split DNS on my gateway and created the SecuRemoteDNS objects with the few domain suffixes I want to resolve internally. However, the results are not really what I expected and it does not seem to be working from what I can observe and tests. When split DNS is enabled, the DNS resolution on my the clients (Windows10 machine) take like 10s, basically the amount of time for the DNS requested to time-out 5 times on my internal DNS, and when I try to resolve external domains/public domains (out of the SecuRemoteDNS domain scopes I defined) using nslookup, it still tries to contact my internal DNS servers and times-out, not sure if this is supposed to be by design? I find it really strange. The whole experience becomes not usable for users as the DNS resolution for external domains takes forever (10s like I said) after enabling split DNS, it corresponds to what is describe here: https://woshub.com/dns-resolution-via-vpn-not-working-windows/
It can be workaround by disabling SMHNR in Windows to have the resolution work faster (seems to be a Windows bug), but I find it hard to believe I need to go to such extend to have split DNS working on all my users?
Am I missing something?
I thought that the VPN client would handle the split DNS part through routing of the DNS queries properly done depending on the domain requested:
- If domain is internal and managed (as defined in SecuRemoteDNS) --> send to internal DNS via VPN
- If domain is external, just resolve locally with the internet ISP DNS on the other adapter
But this is totally not what I am observing on my tests, which is very surprising... And I am not sure how to resolve this. I also did a packet capture on my test machine and I can see that DNS requests for external domains are still sent to my internal DNS via VPN, which makes no sense to me.
I guess my questions are:
1) Do you need to enable Split DNS as described in the documentation also for enterprise VPN clients (including Endpoint Security VPN)?
2) Has anybody else enabled split DNS using those VPN clients successfully and can share how? Am I approaching this incorrectly?
Thanks in advance for reading me and for your help.
My environment info and versions:
- Management R81.10 (latest recommended take)
- Gateway (VPN target) R81.10 Take 95
- Endpoint Security E87.30 client (latest version I think)
- Windows 10 22H2 devices (for the tests)