149
Establishing your network
About the security gateway’s implementation of DNS
4
On the Aliases tab, do the following:
■
Type an alias name.
■
Click
Add
.
5
On the Domains Served tab, to configure the sub-domains for which the name server will provide
service, do the following:
■
In the Domain text box, type the domain name.
■
Click
Add
.
6
Optionally, on the Description tab, type a more detailed description than what you typed in the
Caption text box.
7
Click
OK
.
8
Optionally, do one of the following:
■
To save your configuration now and activate later, on the toolbar, click
Save
.
■
To activate your configuration now, on the toolbar, click
Activate
.
When prompted to save your changes, click
Yes
.
Related information
For further information related to this topic, see the following:
■
“DNS Name Server Record Properties—General tab”
Resolving host name requests for an outside system by creating a DNS
recursion record
By configuring a recursion record, you instruct the security gateway to resolve host name requests
from a specific outside system or network. For security reasons, by default, dnsd does not answer
requests coming from outside interfaces, for domains for which it is not authoritative.
Prerequisites
None.
To resolve host name requests for an outside system by creating a DNS recursion record
1
In the SGMI, in the left pane, under Assets, click
Network
.
2
In the right pane, on the DNS tab, click
New > DNS Recursion Record
.
3
In the DNS Recursion Record Properties dialog box, on the General tab, do the following:
4
Optionally, on the Description tab, type a more detailed description than what you typed in the
Caption text box.
5
Click
OK
.
Enable
To enable the DNS recursion record, click
Enable
.
Accessibility
The Public status is displayed.
This field is read-only.
IP address
Type the IP address of the external network or host.
Netmask
Type the subnet mask.
Caption
Type a brief description of the DNS record.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...