I made a firewall rule to prevent hard coded devices to redirect as below:
config redirect
option dest 'lan'
option target 'DNAT'
option src 'lan'
option src_dport '53'
option name 'AdGuardHome DNS Interception'
option src_ip '!192.168.1.1'
option dest_ip '192.168.1.1'
option dest_port '53'
But the android tablets still access the 8.8.8.8 dns despite it not being the upstream server
as I am not familiar with writing firewall rules, can somebody share a prepared rules that can redirect both ip4, ip6 protocols and to be inserted directly.
if the leak test was done via browser, I assume you had disabled DoH in it before you ran the test, or implemented the additional DoH and DoT rules, to block encrypted DNS traffic from clients, as described in the link you posted earlier ?
yes, that correct . I did disable DOH in the browser. Configured browser to use the local DNS but it still goes to 8.8.8.8. Is there anything else I could try as above solution hasn't worked...
When I block 8.8.8.8 and other ip4 and IP6 addresses that it is blocked and doesn't have the access but that is not the solution, i would like to work on
redirection
the android tablest I have only have plane gogl dns both for ip4 and ip6. As above, if i block ip4 and ip6 addresses than they dont use gogl dns.
But with the redirect rule as in adguard wiki, it has not worked so far
This code hijacks dns traffic coming from the LAN and sends it to the local dns running on openwrt for resolution. Therefore, on the WAN only DNS traffic generated by OpenWRT is displayed.