| hi,
hopefully, I understood your question correctly. Is it correct,
that the firewall is just an internal firewall ? I think so.
If it so, you can set up the firewall as root-server.
It's not that hard - and very easy with the O'reilly book :-)
I am not that experienced with DNS but it has taken about 2
hours to test and set up a root-server on a firewall.
The following example might give you an idea (it is a solution
for two root-servers (mbalpha and berris) for redudany purposes).
Hopefully it helps.
Torsten
In /etc/rc.config
HOSTNAME="hostname.domain.de"
BIND_CONF="YES"
export BIND_CONF
BIND_SERVERTYPE="PRIMARY"
export BIND_SERVERTYPE
BIND_SERVERARGS="-b /etc/namedb/named.boot"
export BIND_SERVERARGS
In /etc/hosts
ip-adresse hostname.domain.de hostname
In /etc/resolv.conf
domain vg.de
nameserver 127.0.0.1
In /etc/svc.conf
aliases=local
group=local
hosts=local,bind
netgroup=local
networks=local
passwd=local
protocols=local
rpc=local
services=local
SECLEVEL=BSD # for backwards compatibility ONLY
In /etc/namedb/named.boot
directory /etc/namedb
;
primary . named.root
primary vg.de hosts.db
primary 80.185.16.in-addr.arpa 80.185.16.zone
;
primary 0.0.127.in-addr.arpa named.local
;
In named.root
. IN SOA berris.vg.de. root.vg.de. (
1 ; serial
86400 ;
3600 ;
608400 ;
86400) ;
IN NS berris.vg.de
IN NS mbalpha.vg.de
berris.vg.de. 604800 IN A 16.185.80.134
mbalpha.vg.de. 604800 IN A 16.185.80.209
vg.de. 86400 IN NS berris.vg.de.
vg.de. 86400 IN NS mbalpha.vg.de.
80.185.16.in-addr.arpa. 86400 IN NS berris.vg.de.
80.185.16.in-addr.arpa. 86400 IN NS mbalpha.vg.de.
In named.local
;
; BIND data file for local loopback interface.
;
@ IN SOA berris.vg.de. postmaster.berris.vg.de. (
1 ; Serial
3600 ; Refresh
300 ; Retry
3600000 ; Expire
3600 ) ; Minimum
0.0.127.in-addr.arpa. IN NS berris.vg.de.
1.0.0.127.in-addr.arpa. IN PTR localhost.
In hosts.db
vg.de. IN SOA berris.vg.de. root.vg.de. (
1 ; serial
86400 ;
3600 ;
608400 ;
86400) ;
vg.de. IN NS berris.vg.de.
vg.de. IN NS mbalpha.vg.de.
berris.vg.de. IN A 16.185.80.134
tester.vg.de. IN A 16.185.80.100
beop05.vg.de. IN A 16.185.80.178
mbalpha.vg.de. IN A 16.185.80.209
In 80.185.16.zone
;
; AltaVista Firewall DNS address to names mapping file
;
@ IN SOA berris.vg.de. root.berris.vg.de. (
1996101601 ; Serial
21600 ; Refresh
3600 ; Retry
604800 ; Expire
86400 ) ; Minimum
IN NS berris.vg.de.
IN NS mbalpha.vg.de.
;
; Addresses point to canonical names
;
134 IN PTR berris.vg.de.
100 IN PTR tester.vg.de.
178 IN PTR beop05.vg.de.
209 IN PTR mbalpha.vg.de.
[Posted by WWW Notes gateway]
|
| Tim,
If you are talking simply invalid internal domain names, there is
really no issue at all. Make sure that the internal DNS servers
are set up to authoritative for their own domains. If they already
exist, their internal DNS server will have a "fake root" - it will
be authoritative for the DNS root. You will have to take this out.
That probably means replacing their existing cache file with a
real one.
Then you have to install normal hidden DNS on the firewall - I
take it you're doing hidden DNS.
And that's it! It really doesn't matter that it's an invalid
internal domain, because it's totally hidden from the outside.
Furthermore, the firewall (or internal machines) will ask the
internal server a question. If the internal DNS server can answer
the question it will do so. After that, the internal server will
ask the firewall server, and it will get an answer. This all works
the same, regardless of whether or not the internal domain name is
"real".
T
P.S. Tim, I can point you to such setups that I've previously
installed, if you want ...
|