Many thanks, I followed the debug steps in the 'Troubleshooting Topic: File Shares' section and compared a debug when attempting to access \\unix-01\public to \\192.168.1.3\public. The first instance doesn't record anything whilst the 2nd initiates 'RpcServer::newConnection', which details the following in the Request section:
[CvpnProcServer 11021 4135978768]@fwcp1[12 Sep 21:52:08] Request: (
:method (RunProcReq)
:params (RpcProcRequest
:m_cookie (string
:value (***)
)
:m_processName (string
:value ("/opt/CPcvpn-R80/bin/Mount")
)
:m_args (vector
: (string
:value (192.168.1.3)
)
: (string
:value (public)
)
: (string
:value ("/opt/CPcvpn-R80/mnt/cvpn_mnt/ml0")
)
: (string
:value (davidh)
)
: (string
:value (50232a6b27653d4f)
)
: (string
:value (ad.lair.co.za)
)
)
)
)
We run split horizon DNS to resolve names differently outside of our network to within, the problem appears to be that Mobile Access name server definitions simply get added to /etc/resolv.conf, which results in Gaia recursively attempting to resolve the name in the UNC path using the default DNS search domain:
[Expert@fwcp1:0]# cat /etc/resolv.conf
# This file was AUTOMATICALLY GENERATED
# Generated by /bin/resolv_xlate on Mon Sep 10 20:45:34 2018
#
# DO NOT EDIT
#
search lair.co.za
nameserver 41.79.20.1
nameserver 41.79.21.1
#start SSLVPN name servers from Smart Dashboard
nameserver 192.168.1.3
nameserver 192.168.1.5
#end SSLVPN name servers from Smart Dashboard
What's confusing is that Gaia sends DNS queries for 'unix-01.lair.co.za' to both the public caching DNS servers as well as the private AD DNS servers (Samba Active Directory), but then doesn't attempt connecting to either.
Got it working by clearing the Mobile Access Name Resolution settings and configuring the DNS servers to reference the internal DNS servers in 'clish':
clish:
set dns primary 192.168.1.3
set dns secondary 192.168.1.5
Is this the intended behaviour? I would have assumed the gateway to be configured to use public caching DNS servers and the Mobile Access name resolution settings to be used for the SSL VPN portal...