B
Brad Rossiter
Simple problem, how do I properly setup a Member server
in a DMZ (Say for a Exchange 2000 OWA server)?
NOT SO SIMPLE ANSWER so far. 5 hours on the phone with
5 different MS engineers and they are not even close to
giving me an answer.
I've opened up all the ports as described in 280132
(Exchange 2000 connectivity though a firewall). All that
is fine.
REAL PROBLEM IS THIS. The DNS reply back from the
Internal network DNS server gives back Internal
addresses. Thus any time DNS is required communication
back to the Internal network does not work. Remember
Windows 2000 Active directory requires lots of DNS
records.
This problem has been solved by my company (an IT service
company) in the past by using DNS doctoring on the Pix
firewall itself (the firewall catches DNS replies and
changes the payload/response to the public address).
However not all firewall appear to support this
(Sonicwall Pro this time).
I have thought of using an IPSec tunnel from the dmz
member server (it's an OWA 2000 server). However that
seems much more complicated than necessary. How about a
way in Windows 2000 DNS to respond based on where the
request came from (such as a 'view').
If you have any suggestions, please contact my e-mail
above. MS is failing to give anything other than 'setup
a DNS server in the DMZ'. THIS IS SO STUPID I CAN'T EVEN
COMPREHEND IT. And no LMHOSTS AND HOSTS don't do a dam
thing for Windows 2000 Active Directory service records.
Thank You,
Brad Rossiter
Network Engineer
in a DMZ (Say for a Exchange 2000 OWA server)?
NOT SO SIMPLE ANSWER so far. 5 hours on the phone with
5 different MS engineers and they are not even close to
giving me an answer.
I've opened up all the ports as described in 280132
(Exchange 2000 connectivity though a firewall). All that
is fine.
REAL PROBLEM IS THIS. The DNS reply back from the
Internal network DNS server gives back Internal
addresses. Thus any time DNS is required communication
back to the Internal network does not work. Remember
Windows 2000 Active directory requires lots of DNS
records.
This problem has been solved by my company (an IT service
company) in the past by using DNS doctoring on the Pix
firewall itself (the firewall catches DNS replies and
changes the payload/response to the public address).
However not all firewall appear to support this
(Sonicwall Pro this time).
I have thought of using an IPSec tunnel from the dmz
member server (it's an OWA 2000 server). However that
seems much more complicated than necessary. How about a
way in Windows 2000 DNS to respond based on where the
request came from (such as a 'view').
If you have any suggestions, please contact my e-mail
above. MS is failing to give anything other than 'setup
a DNS server in the DMZ'. THIS IS SO STUPID I CAN'T EVEN
COMPREHEND IT. And no LMHOSTS AND HOSTS don't do a dam
thing for Windows 2000 Active Directory service records.
Thank You,
Brad Rossiter
Network Engineer