Created on
09-01-2015
04:17 AM
Edited on
11-28-2024
11:39 PM
By
Jean-Philippe_P
Description
Solution
It is assumed that IPsec is working correctly, and DNS zone transfer now needs to be implemented.
Topology:
PC1---(192.168.10.1)[FGT-100 Primary DNS]------IPsec VPN----[FGT-200](192.168.20.1)----PC2
DNS Master configuration: FGT-100.
FGT-1OO CLI configuration:
config system interface
edit "port2"
set vdom "root"
set ip 192.168.10.1 255.255.255.0
set alias "LAN"
next
end
config system dns-server
edit "port2"
next
edit "ToBranch"
next
end
config system dns-database
edit "zone1"
set domain "lab.local"
config dns-entry
edit 1
set hostname "dc"
set ip 192.168.1.196
next
edit 2
set hostname "webserver"
set ip 172.16.100.2
next
end
set allow-transfer "192.168.20.1" -> The source IP that will request the zone transfer.
next
end
DNS Slave configuration: FGT-200.
FGT-2OO CLI configuration:
config system interface
edit "port3"
set vdom "root"
set ip 192.168.20.1 255.255.255.0
set alias "LAN"
next
end
config system dns-server
edit "port3"
next
end
config system dns-database
edit "zone1"
set domain "lab.local"
set type secondary
set authoritative disable
set source-ip 192.168.20.1 -> The source IP that will request the zone transfer.
set ip-primary 192.168.10.1
next
end
Note: If the IPsec interfaces have an IP configured, these 2 IPs can be used as part of the configuration instead of the internal interface IPs. In this case, it is not required to include port2 as part of the config system dns-server in the Primary DNS FGT-100.
Testing the configuration.
FGT-200 can now resolve these domains as well as the PC2 using FGT200 (192.168.20.1) as the DNS server:
FGT-200 # exe ping webserver.lab.local
PING webserver.lab.local (172.16.100.2): 56 data bytes
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.