Author Topic: [SOLVED] DNS allow new subnet for query  (Read 1910 times)

ak007

  • Zen Apprentice
  • *
  • Posts: 2
  • Karma: +1/-0
    • View Profile
[SOLVED] DNS allow new subnet for query
« on: June 24, 2020, 10:57:05 am »
Hi All,

I am using Zentyal Commercial Edition V6.0.3 in production environment.
Just enable the following module:-
Network , Firewall (Just enable no any firewall rules), DNS, logs, NTP and Domain Controller.
It's work fine for one subnet. But I have added a new subnet for small office in difference floor on same building.
We use two Physical firewall to build a site to site VPN.
The small office can join this domain through VPN, but can't use the same DNS for web site resolve.
Anyway, I can fix this problem by manual add the subnet 192.168.2.0/24 in bind configure file.
the Bind config as follow:-

#vi /etc/bind/named.conf.local

//Generated by Zentyal

acl "trusted" {
     192.168.1.0/24;
     192.168.2.0/24;
     localhosts;
     localnets;
};

But after I reboot the Zentyal Server, the manual added line is deleted automatically.
How to add that subnet to avoid after reboot server deleted that line ?
Thanks in advance.

Rgds
AK
« Last Edit: June 26, 2020, 05:35:46 am by ak007 »

doncamilo

  • Zen Samurai
  • ****
  • Posts: 478
  • Karma: +165/-1
    • View Profile
Re: DNS allow new subnet for query
« Reply #1 on: June 24, 2020, 01:52:32 pm »
- Do my pigeons bother you passing over your land?
- They block the sun!

G. Guareschi., Don Camillo.,

ak007

  • Zen Apprentice
  • *
  • Posts: 2
  • Karma: +1/-0
    • View Profile
[SOLVED] Re: DNS allow new subnet for query
« Reply #2 on: June 26, 2020, 05:35:29 am »
Hi Doncamilo,

Thanks for your support.
I share my method to solve this problem.
According to your URL , I find this config file.

#cd /etc/zentyal
# cp dns.conf dns.conf.keep
# vi dns.conf

Add my new subnet in this line

intnets = 192.168.1.0/24,192.168.2.0/24

save the file.
Even reboot ,My new subnet will keep in  /etc/bind/named.conf.local like below:-

 //Generated by Zentyal

acl "trusted" {
     192.168.1.0/24;
     192.168.2.0/24;
     localhost;
     localnets;
};