There is сorporate network with Mikrotik CCR2004 as main router. Network clients are PC and mobile devices.
Standalone Pi-Hole DNS server is used for security purpose.
Pi-Hole blocks unwanted domains.
For successful Pi-Hole work there are some Mikrotik's setting:
1. Pi-Hole server is assigned as DNS server to all clients except Pi-Hole itself
2. All external (to WAN) forward traffic to port 53, 853 is blocking for all device except Pi-Hole server itself
3. Forward to udp 80,443 is blocked
4. Some popular "classical" VPNs are blocked too according to their specific parameters - port number, IP addresses, domain name.
This security scheme worked good enough until one of the employees installed the Adguard app on his phone to bypass the restrictions.
This Adguard app encapsulates so called"local VPN"
I installed same Adguard app at one of my testing Android device for learning how it works.
我把Mikr雷竞技网站otik - >防火墙>与行动”Snif损坏f TZSP" and I can capture my testing device in Wireshark.
I see all connection in Wireshark but I can't catch Adguard specific ones.
Is there the way to fight with such a local vpn?