Replies: 1 comment
-
转到Issue去了,这边关闭讨论吧 |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
一直以来都是停用本地DNS劫持然后在防火墙里自行添加53端口的转发,将其转发到AdGuardHome的5353,再让AdGuard Home的上游指向OpenClash。但现在由于内网有机器用了CloudFlare Tunnel,走OpenClash的话每次切换代理都会让Tunnel中断,所以需要让机器绕过OpenClash,只能选择在OpenClash里劫持DNS。因为Fake-IP下只有用OpenClash的防火墙转发DNS才有局域网访问控制的功能。但这个选项的目标端口是写死成OpenClash自己的端口,没有办法在中间加其他的服务了。目前只能把OpenClash的上游指向AdGuard Home,再把AdGuard Home的上游指向公共DNS。但这样的问题是AdGuard Home的所有DNS来源都变成OpenClash,没有办法区分客户端了。
请问能否给使用防火墙转发增加自定义目标端口的功能,以便给DNS请求到OpenClash中间增加其他服务呢?多谢!
Beta Was this translation helpful? Give feedback.
All reactions