Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

How to publish Domain Name System servers with Internet Security and Acceleration Server


View products that this article applies to.

This article was previously published under Q291662

↑ Back to the top


Summary

This article describes how to publish a Domain Name System (DNS) server by using Microsoft Internet Security and Acceleration (ISA) Server.

↑ Back to the top


More information

There are two possible scenarios for DNS hosting:

Scenario 1: DNS hosting with a DNS Server on ISA Server

By default, ISA Server includes a predefined DNS query packet filter:
   Name: DNS Filter
   Filter Type: Predefined
   Protocol: UDP
   Direction: Send Receive
   Local Port: All ports
   Remote Port: Fixed port, 53
   Local Computer: Default IP address on the External interface(s)
   Remote Computer: All Remote Computers
				
Because the direction of the preceding packet filter is "Send Receive" with Remote port 53, the filter enables ISA Server to send DNS queries to an external DNS server that listens on User Datagram Protocol (UDP) port 53 and receives responses to these queries.

The filter does not enable incoming DNS queries to ISA Server. When you host a DNS server for external client computers, you must add a custom DNS packet filter that can enable incoming DNS queries to be received by the DNS server. An example of such a packet filter is:
   Name: DNS Query
   Protocol: UDP
   Direction: Receive Send
   Local Port: Fixed port, 53
   Remote Port: All ports
   Local Computer: Default IP address on the External interface(s)
   Remote Computer: All Remote Computers
				
Unlike DNS queries which use UDP protocol, DNS zone transfers between primary and secondary DNS servers use Transmission Control Protocol (TCP) protocol. If you require a DNS zone transfer to a secondary DNS server on the external network adapter of ISA Server, you must create another custom packet filter, such as:
   Name: DNS Zone transfer (In)
   Protocol: TCP
   Direction: Inbound
   Local Port: Fixed port, 53
   Remote Port: All ports
   Local Computer: Default IP address on the External interface(s)
   Remote Computer: All Remote Computers
				
   Name: DNS Zone transfer (Out)
   Protocol: TCP
   Direction: Outbound
   Local Port: Allports
   Remote Port: Fixed port, 53
   Local Computer: Default IP address on the External interface(s)
   Remote Computer: All Remote Computers
				
To prevent DNS zone transfers to unauthorized DNS servers, you must set the DNS server to enable zone transfers only to the specified DNS servers, or you can modify the preceding packet filter so that the specified remote computer is the Internet Protocol (IP) address of the secondary DNS server, instead of "All Remote Computers". For more details on DNS zone transfers, refer to Windows 2000 online Help.

Scenario 2: DNS Server on the private network of ISA Server

To enable a DNS server on the private network of ISA Server to resolve DNS queries for clients on the network adapter of ISA Server, you must create a DNS Publishing rule:
  1. Right-click Server Publishing Rule, click New, and then click Rule.
  2. Type in a name for the Server Publishing rule, and then click Next.
  3. Enter the IP addresses of the internal DNS server and the external interface of ISA Server, and then click Next.
  4. Click DNS Query Server as the protocol, and then click Next.
  5. Apply the rule to Any Request, click Next, and then click Finish.
If you require DNS zone transfer to a secondary DNS server on the network adapter of ISA Server, you must create another Server Publishing rule. Use the same general guidelines as the preceding DNS Query rule and select "DNS zone transfer" as the protocol.

↑ Back to the top


Keywords: KB291662, kbhowto, kbenv

↑ Back to the top

Article Info
Article ID : 291662
Revision : 3
Created on : 5/19/2004
Published on : 5/19/2004
Exists online : False
Views : 228