Log into your Fortigate with SSH and enter the vdom context you are using then edit the WAN interface:
Assumtion
wan1
is for pppoe portinternal
internal switchvlan30
guest vlan
config system interface
Log into your Fortigate with SSH and enter the vdom context you are using then edit the WAN interface:
Assumtion
wan1
is for pppoe portinternal
internal switchvlan30
guest vlanconfig system interface
#!/bin/sh | |
echo 'use "curl -sSL git.io/corefile | bash" to update Corefile' | |
echo "remember to change 192.168.1.1 to your ISP's DNS server address or use public DNS server such as 114/DNSPod etc. directly" | |
china=`curl -sSL https://raw.githubusercontent.com/felixonmars/dnsmasq-china-list/master/accelerated-domains.china.conf | while read line; do awk -F '/' '{print $2}' | grep -v '#' ; done | paste -sd " " -` | |
apple=`curl -sSL https://raw.githubusercontent.com/felixonmars/dnsmasq-china-list/master/apple.china.conf | while read line; do awk -F '/' '{print $2}' | grep -v '#' ; done | paste -sd " " -` | |
google=`curl -sSL https://raw.githubusercontent.com/felixonmars/dnsmasq-china-list/master/google.china.conf | while read line; do awk -F '/' '{print $2}' | grep -v '#' ; done | paste -sd " " -` | |
bogus=`curl -sSL https://raw.githubusercontent.com/felixonmars/dnsmasq-china-list/master/bogus-nxdomain.china.conf | grep "=" | while read line; do awk -F '=' '{print $2}' | grep -v '#' ; done | paste -sd " " -` | |
cat>Corefile |