
How to Configure a VPN
Rev 4 May.17
43
7.3 Configuring DNS Zones for Private
DNS Server Use
In deployments that make use of VPNs with internal DNS servers (to resolve
specific internal domains) and public DNS servers, the oMG must be configured
to use DNS zones.
To configure one or more oMGs for DNS zones:
1.
In the LCI, set the Primary DNS and Secondary DNS Servers fields to the
addresses of the public DNS servers to be used. (Applies to the WAN > Links
configuration screens (Ethernet, Cellular) and WAN > Wi-Fi Networks config-
uration screen.)
2.
On a computer, create a DNS zones file named “private-zone.conf”. In this
file, indicate the domains to be resolved by the indicated internal DNS
servers.
For example (filename: private-zone.conf):
zone "customer.local" IN {
type forward;
forward only;
forwarders { 10.5.1.1; 10.6.1.1; };
};
zone "customer.internal" IN {
type forward;
forward only;
forwarders { 10.5.1.1; 10.6.1.1; };
};
In this example, the domains “customer.local” and “customer.internal” are
both to be resolved by the internal DNS servers “10.5.1.1” or “10.6.1.1”. Any
other domains will be resolved by the public DNS servers specified in the
WAN Link’s Primary DNS and Secondary DNS Servers fields.
3.
Use AMM to store the file on the oMG(s):
a.
In AMM, select Config > Deploy > Upload to copy the file to the AMM.
b.
Select Config > Deploy > Deploy to store the file on selected oMGs.
Note: Refer to the AMM Operation and Configuration Guide for details or contact
Sierra Wireless Support for assistance.