
142
Establishing your network
About the security gateway’s implementation of DNS
Configuring an authoritative name server with delegation
You can also set up an authoritative name server to delegate subdomains to other name servers. In
, you need to set up two DNS servers. The first DNS server is set up as the authoritative
name server for symantecs.org. The second (external) DNS server is located at the branch office and is
configured as authoritative for eng.symantecs.org. This requires you to delegate the subdomain
engineering name space to their server.
Figure 5-12
Example network layout of an authoritative name server with delegation
To create an authoritative name server with delegation, configure the following records on the internal
DNS server, which in this case, is represented by symantec.org:
Authority record
“Defining an authoritative server with a DNS authority record”
Host record
“Identifying a host in a domain with a DNS host record”
(optional)
Mail server record
“Defining your email server with a DNS mail server record”
(optional)
Name server record
“Defining the server that performs lookups with a DNS name server record”
If you have selected outside systems for which DNS should be provided, you must also
configure a recursion record.
Recursion record
“Resolving host name requests for an outside system by creating a DNS recursion
(optional)
Subnet record
“Delegating naming authority with a DNS subnet record”
(optional)
Содержание Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Страница 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Страница 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Страница 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Страница 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Страница 319: ...318 Controlling traffic at the security gateway Blocking inappropriate content with content filtering...
Страница 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Страница 409: ...408 Providing remote access using VPN tunnels Multicast traffic through gateway to gateway IPsec tunnels...
Страница 509: ...508 Generating reports Upgrade reports...
Страница 553: ...552 Advanced system settings Configuring advanced options...
Страница 557: ...556 SSL server certificate management Installing a signed certificate...
Страница 861: ...860 Index...