Before you forward your DNS traffic to BloxOne Threat Defense Cloud, it is important that your network and DNS server are set up correctly. You can execute a few dig and nslookup commands from your DNS server to ensure that you have properly configured the DNS server and clients for sending queries and receiving responses.
NOTE: Before configuring your network connection, make sure that your network is added to the Cloud Services Portal. If the network is not added, you will get a REFUSED response for your dig queries.
The following are some sample commands:
dig @22.214.171.124 www.infoblox.com
nslookup www.infoblox.com 126.96.36.199
If you experience resolution failures while executing the dig/nslookup commands, check your network configuration. The following are a few best practices that you may consider:
- Check your firewall rules and make sure that they are properly set up for DNS traffic
- Double check your routing configuration, especially if you use load-balancing connections
- Validate your network configuration to ensure that it is set up for sending DNS queries and receiving responses
- Ensure that you have enabled recursion on your DNS forwarders
After you have properly configured your DNS server and network, you can forward your DNS traffic to BloxOne Threat Defense Cloud, as described in Forwarding DNS Traffic to BloxOne Threat Defense Cloud.
This page has no comments.