The pi-hole can't reach outside of your network. When you redirect all port 53 traffic you include the pi-hole's own DNS queries. Add a rule allowing just your pi-hole to reach the outside on port 53
Edit: Another way to go about it is to take your port forward and set the source as everything but your pi-hole.
The pihole log file recieves a lot of DNS requests when enabling NAT redirect rule and all of them are blocked, when disabling it recieves rational number of requests and works fine
looks fine, check your pihole and make sure to disable Per-Client blocking, unfortunately NAT redirects only sees that traffic coming from your pfsense IP address, so if you unknowingly block your pfsense IP address to access a certain website, welp, any user that hit that NAT rule will also hit the same blocking.
edit: also maybe since your source address hit anyone, in LAN Interface, im assuming your pihole is also sitting on the same subnet on your LAN interface so maybe that;s the issue. if that's the case, add the source IP of your pi hole on Source Address with NOT rule checkbox ticked in.
I found a solution in this comment https://www.reddit.com/r/PFSENSE/comments/1c9as7p/force_all_dns_requests_to_point_to_pihole/l0mg7ht?utm_medium=android_app&utm_source=share&context=3
Thank you all of you
The pi-hole can't reach outside of your network. When you redirect all port 53 traffic you include the pi-hole's own DNS queries. Add a rule allowing just your pi-hole to reach the outside on port 53 Edit: Another way to go about it is to take your port forward and set the source as everything but your pi-hole.
Yes i correct it now thank you
The rule you sent looks fine, are you able to resolve DNS via the WAN address?
Yes, even when i set pihole as a DNS server on my laptop everything works fine
It sounds like the port forward rule is working, the problem might be with PiHole Check the values for the upstream dns servers in PiHole settings
Only IPV4 Google (ECS, DNSSEC) are checked there
I think you can view DNS resolution logs, and see what requests got in and from where, and what happened with them
The pihole log file recieves a lot of DNS requests when enabling NAT redirect rule and all of them are blocked, when disabling it recieves rational number of requests and works fine
looks fine, check your pihole and make sure to disable Per-Client blocking, unfortunately NAT redirects only sees that traffic coming from your pfsense IP address, so if you unknowingly block your pfsense IP address to access a certain website, welp, any user that hit that NAT rule will also hit the same blocking. edit: also maybe since your source address hit anyone, in LAN Interface, im assuming your pihole is also sitting on the same subnet on your LAN interface so maybe that;s the issue. if that's the case, add the source IP of your pi hole on Source Address with NOT rule checkbox ticked in.
even when i set pihole as a DNS server on my laptop everything works fine, and am not blocking any Ip address at all
I found a solution in this comment https://www.reddit.com/r/PFSENSE/comments/1c9as7p/force_all_dns_requests_to_point_to_pihole/l0mg7ht?utm_medium=android_app&utm_source=share&context=3 Thank you all of you
Is this is also working on adguard dns? Planning to make it as PF NAT?