Configure Fortinet to Split DNS traffic based on local branch needs

Поделиться
HTML-код
  • Опубликовано: 19 авг 2024

Комментарии • 41

  • @andreaspetzel3986
    @andreaspetzel3986 4 года назад +1

    This is what a colleague needed going to check if he found it

  • @jgouskos
    @jgouskos 4 года назад

    Thanks for helping us get more familiar with Fortinet

  • @troywilliams5301
    @troywilliams5301 Год назад +1

    This was very helpful information. Thank you so very much!

  • @delvinraygamalo5355
    @delvinraygamalo5355 4 года назад +3

    Hi,
    On SSL-VPN there is an option SPLIT DNS where you can specify domain names. But on IPSec VPN there is none. How can you do that on IPSec Dial-up VPN connections via fortiClient?

  • @philippeladeiras3397
    @philippeladeiras3397 Год назад +1

    It looks like it's not possible anymore on 7.2. I configured the source ip on the dns config to be the wan IP, or else, the public DNS won't answer, and configured a local ip as the ip source for my dns-database config, but nothing goes to this IP.

  • @robkage
    @robkage 11 месяцев назад

    how do I resolve 504 DNS Lookup error for an IIS Website configured on a local server. The site is able to browsed on any workstations on the server site but all the other branches (different geographical sites) are unable to or even on the internet as the page is bound to an SSL and I would like it to be available on the internet. It's an employee self service website. Any help or advise to resolve this would be greatly appreciated.

  • @hennessy6996
    @hennessy6996 4 года назад +3

    Hi,
    Is there a way to apply a similar principal for SSL VPN clients. Especially for clients that require different DNS requests?

    • @hennessy6996
      @hennessy6996 4 года назад +1

      Actually I just remembered I found the solution to this. You can assign portal specific DNS entries, even a DNS suffix also. Just google Fortigate SSL VPN portal DNS and results should be there.

  • @LucPaulin
    @LucPaulin 4 года назад

    Awesome... Exactly what I wanted to achieve...

  • @tobinkulangara1298
    @tobinkulangara1298 4 года назад

    very helpful and clear! new subscriber

  • @zouyiro13
    @zouyiro13 2 года назад

    Hello friend excellent contribution I have a query, could this DNS zone work, to mask an IP of the internal network for URL applications? I thank you in advance.😄

  • @JosephJozwik
    @JosephJozwik 2 года назад

    Can you attach a DNS database to a specific DNS Service interface? Looking for method to override specific DNS record for a specific interface.

  • @profetaII
    @profetaII 4 года назад

    Nice, you're the best!

  • @ahmet-karaca
    @ahmet-karaca 3 года назад

    So? That's it? Where is the test, debug phases?

  • @lkfng
    @lkfng 3 года назад

    I am lost, how do I set the domain name in the DHCP server to hand it out to clients?

  • @renbinkoh2371
    @renbinkoh2371 2 года назад

    Hi guru,
    i got a question when i do split tunnel, my dns is pointing to the my AD server, but it is registering my client home lan ip and also the ssln vpn private IP. SSL vpn private IP is fine from server i could ping to the users, but i unable to ping their home lan ip as this is no routing in my network, when i nslookup the users host is resolving to their home lan ip address. How can i prevent their home lan ip to be registed into my DNS manager in my AD server.

  • @jasonseecharan7792
    @jasonseecharan7792 3 года назад

    I have a problem I am trying to solve, i am hoping you can help, i am running 6.2.7 code:
    Data Vlan has DHCP enabled from the Fortigate.
    Servers Vlan has AD, DHCP and DNS Server set up so the Vlan only has a static IP as the Gateway.
    Data has to be able to add computers to the Domain from Servers while still giving out IPs for the Data Vlan.
    is that possible using this method?

  • @sameerudeen710
    @sameerudeen710 4 года назад

    Woow. this is wat I'm looking for

  • @sstechworld1804
    @sstechworld1804 4 года назад

    how to config Azure MFA NPS extension with fortigate

  • @Brijeshkumar-fo5mt
    @Brijeshkumar-fo5mt 6 месяцев назад

    What will happen if IPSec goes down then how internet services will be accessible?

    • @Brijeshkumar-fo5mt
      @Brijeshkumar-fo5mt 6 месяцев назад

      I also have the same test case that DNS is hosted at remote location and reachable via overlay, users wants internet accessibility if IPSec goes down but don't any public DNS entry in end system

    • @FortinetGuru
      @FortinetGuru  6 месяцев назад

      You would do a fall back DNS server in my opinion

  • @MrSiaa
    @MrSiaa 2 года назад

    Thank you so much it was so clear, is it going to solve the problem of joining computers to the domain too?

    • @MrSiaa
      @MrSiaa 2 года назад

      didnt solve it. users still cannot login . it just forwards names and don't do anything else like NLA

  • @mason60638
    @mason60638 3 года назад

    Nice job 👍🏽

  • @alaasemaka1307
    @alaasemaka1307 2 года назад

    Great tutorial, one question though. The split DNS works fine, I do see the Fortigate sending DNS requests to the internal DNS for a certain domain, but the source of the traffic is the WAN1 interface IP, not the local subnets that were used in the setup. Any way to force the Fortigate to send DNS requests to the internet DNS using the Local subnets? knowing that I have my routing setup correctly where the Fortigate should use an IPSEC tunnel to get to the internal DNS that is hosted in the Data Center.

    • @dutchdiver5323
      @dutchdiver5323 7 месяцев назад +1

      config system dns-database
      edit "domain-name"
      set source-ip x.x.x.x
      next
      end
      You have to set the source-iP on the domain in the DNS server via de CLI.

  • @bl7937
    @bl7937 3 года назад

    Hi Mike, I have 3 VLANs setup on my FortiGate 61E. I’m using a Netgear model GS728TPPv2 with identical VLAN ID/Names as configured on my FortiGate configured on the Netgear. I have all ports on the Netgear configured for the VLANs they need to be a part of. All intra zone traffic between VLANs is blocked. I have a single Domain Controller, DNS Server and DHCP Scope setup for each VLAN (all VLANs are to use DHCP on Domain Controller and not DHCP in FortiGate. Would you be willing and able to post a video on how to best setup each VLAN to use the DHCP and DNS Server on the Domain controller and only allow the necessary services needed for each VLAN to the DC for DHCP and DNS?

    • @alejandroparrello6493
      @alejandroparrello6493 2 года назад

      Hi from Argentina! I've similar configuration on my branch. To do that you need to config in every vlan interface and set the option about dhcp relay and put the IP of your Windows dhcp... and don't forget make the policies as well. Hope it help! Regards!!

  • @nikolaykot9312
    @nikolaykot9312 Год назад

    Hi Mike, sorry to bother you, is there any chance you could guide me what to do ? Basically I have FG-60E, I have domain and I have esxi server (Mac mini) what I want to do is allow one of VM to become my host server so I can host a website. At the moment I come in from outside using fortiguard dns I set that up and I can connect to my network from outside. But I need to configure now name servers for my FG so I can input at my domain registrar. And I do not know what to do. I have dynamic ip connection, and I want my domain be accessible. if you could guide me many thanks!

    • @FortinetGuru
      @FortinetGuru  Год назад

      Marius you are most likely going to be forced into utilizing some sort of dynamic DNS option to auto update DNS records based on the existing public IP

  • @carlb641
    @carlb641 2 года назад

    Is this possible to be used for a dial up ipsec tunnel with a split-tunnel configuration? Do I also need to update the tunnel interface with an IP and so? I tried this just now but does not seem to forward the queries to the DNS entries, still using the external DNS.

    • @FortinetGuru
      @FortinetGuru  2 года назад

      Give the tunnel an IP without the vpn range and set it as an interface for dns.

    • @carlb641
      @carlb641 2 года назад

      @@FortinetGuru When you say without the vpn range, do you mean on the tunnel settings itself? Can't set the interface as dns w/o turning on DHCP inside the tunnel int settings.

  • @Foars989
    @Foars989 4 года назад

    hi, nice vid. we're thinking of getting a fortinet fw & i was wondering is it possible to have 2 separate but local networks on the fw but allow certain traffic across, example LAN1 (192.168.1.0/24) & LAN2 (192.168.10.0/24) however i have some printers on LAN1 that i'd like computers on LAN2 to be able to print to?
    if this was already covered could you please point me to it. thanks.

    • @padraics
      @padraics 4 года назад

      Yep definitely, there's a few ways to go about this, either by using physical ports or vlans along with policies in the GUI. It's super simple. GL

  • @kishortp
    @kishortp 4 года назад

    Is it possible to configure multiple DNS server for ipsec VPN ie VPN for remote access in fortigate 80e.

    • @hennessy6996
      @hennessy6996 4 года назад

      Yes it is. I've tested in 6.2.3. When going through the wizard, you can set the DNS.

    • @hennessy6996
      @hennessy6996 4 года назад

      It allows two entries.