Resolving my domain name in a DMZ

Resolving my domain name in a DMZ

Author
Discussion

Z064life

Original Poster:

1,926 posts

248 months

Saturday 28th November 2015
quotequote all
Following on my thread about DMZ vs Port forwarding, I have a domain name purchased (my LAN Active Directory on my lab is based on this e.g. global.domainname.com).

I now want to ensure that I can create a site in IIS, set the binding to something like test.domainname.com in a DMZ web server and from outide, this can be reached (having made provisions in the firewall etc). How would I do this? Do my DNS servers on the web server and firewall need to point to the DNS servers of my domain registrar?


Thanks

rsbmw

3,464 posts

105 months

Saturday 28th November 2015
quotequote all
Doesn't matter what dns servers your web server points at, as long as it can resolve external records. You simply need to set an A record for test.domainname.com in your external dons zone once server/fw are configured. If you don't want this to actually be accessible by people outside, set the zone up on your AD domain controller so your clients can resolve it.

Nimby

4,589 posts

150 months

Saturday 28th November 2015
quotequote all
I may be well out of date on this, but I thought you were supposed to name your domain behind the firewall .local, not .com, for exactly this reason.

Z064life

Original Poster:

1,926 posts

248 months

Saturday 28th November 2015
quotequote all
Nimby said:
I may be well out of date on this, but I thought you were supposed to name your domain behind the firewall .local, not .com, for exactly this reason.
This has always been debated but need .com (a routable domain) for cloud services like Office 365.

bitchstewie

51,106 posts

210 months

Saturday 28th November 2015
quotequote all
Nimby said:
I may be well out of date on this, but I thought you were supposed to name your domain behind the firewall .local, not .com, for exactly this reason.
Microsoft's current best practise is to use a subdomain of your public internet presence.

So if you are corp.com on the internet, your AD would be ad.corp.com or something along those lines.

Either way .local is never recommended these days - though Microsoft have painted themselves into a bit of a corner by having their best practice say one thing, and their setup wizards suggest another by default.

bitchstewie

51,106 posts

210 months

Saturday 28th November 2015
quotequote all
Depends on specifics but split DNS is pretty common i.e. on your LAN f.q.d.n points to one IP address whilst on the public internet the same f.q.d.n points to a different IP address.

Z064life

Original Poster:

1,926 posts

248 months

Monday 30th November 2015
quotequote all
rsbmw said:
Doesn't matter what dns servers your web server points at, as long as it can resolve external records. You simply need to set an A record for test.domainname.com in your external dons zone once server/fw are configured. If you don't want this to actually be accessible by people outside, set the zone up on your AD domain controller so your clients can resolve it.
I will try this. I've set port forwarding on my dmz firewall and if I set the DNS servers to the DNS servers in my DMZ, this should work.

TonyRPH

12,968 posts

168 months

Monday 30th November 2015
quotequote all
@Z064life, it sounds as though you are fumbling in the dark a bit here.

You want to a DNS entry for your DMZ (external) IP address set in some external DNS server(s) (usually the servers that host your external DNS).

It is unwise (and not at all recommended) to expose your internal DNS to the outside world.

You need to understand things like DNS cache poisoning and (controlled) recursion amongst other things.


Z064life

Original Poster:

1,926 posts

248 months

Wednesday 2nd December 2015
quotequote all
TonyRPH said:
@Z064life, it sounds as though you are fumbling in the dark a bit here.

You want to a DNS entry for your DMZ (external) IP address set in some external DNS server(s) (usually the servers that host your external DNS).

It is unwise (and not at all recommended) to expose your internal DNS to the outside world.

You need to understand things like DNS cache poisoning and (controlled) recursion amongst other things.
You're right there is a bit of fumbling, but this is a learning curve and a lab scenario so not a big deal.

What you mentioned (second sentence) is exactly what I'm looking to achieve. My internal DNS servers are not being exposed to the DMZ (nor any other servers) and I'll be using VLANs and so forth to keep everything seperate (no route from DMZ to LAN).

ging84

8,884 posts

146 months

Wednesday 2nd December 2015
quotequote all
then is is very simple you need to setup an A record for test.domainname.com with the public ip address of your dmz
i expect your dns will be hosted by the company you registered the domain with, and they will probably have a web interface which will allow you to administer it

TonyRPH

12,968 posts

168 months

Wednesday 2nd December 2015
quotequote all
Z064life said:
You're right there is a bit of fumbling, but this is a learning curve and a lab scenario so not a big deal.

What you mentioned (second sentence) is exactly what I'm looking to achieve. My internal DNS servers are not being exposed to the DMZ (nor any other servers) and I'll be using VLANs and so forth to keep everything seperate (no route from DMZ to LAN).
As ging84 said - you need an 'A' record for the DMZ IP - IF - you have multiple external IP addresses, otherwise you can't do it like that - well you can but... Then you would use your single external IP and and nat specific ports back to the host on your DMZ.

Also, you would typically still allow LAN <-> DMZ connectivity, but seperated by a firewall (usually all part of your main firewall) which will govern which ports are allowed through.





Z064life

Original Poster:

1,926 posts

248 months

Wednesday 2nd December 2015
quotequote all
TonyRPH said:
Z064life said:
You're right there is a bit of fumbling, but this is a learning curve and a lab scenario so not a big deal.

What you mentioned (second sentence) is exactly what I'm looking to achieve. My internal DNS servers are not being exposed to the DMZ (nor any other servers) and I'll be using VLANs and so forth to keep everything seperate (no route from DMZ to LAN).
As ging84 said - you need an 'A' record for the DMZ IP - IF - you have multiple external IP addresses, otherwise you can't do it like that - well you can but... Then you would use your single external IP and and nat specific ports back to the host on your DMZ.

Also, you would typically still allow LAN <-> DMZ connectivity, but seperated by a firewall (usually all part of your main firewall) which will govern which ports are allowed through.
Yep I did as ging84 said so the hostname now points to the public IP of my dmz (which is the firewall). From there, I should be able to setup the reverse proxy to forward this onto the internal web server in the DMZ, behind the firewall.


Thanks all!