Hi Rick.

It would be more useful if you provided full output of DIG. There should
not be any private information. If there are private IPs, just replace them.

I would start with

dig @corpdc12.na.ads.idt.com -t NS eng.idt.com.

If it does not know your domain as I expect, you would get NXDOMAIN. You
have to delegate eng.idt.com. from idt.com. domain. IN Bind zone file,
it would look somehow like this:

eng.idt.com.   IN      NS      ns1-eng.idt.com.
eng.idt.com.   IN      NS      ns2-eng.idt.com.

Parent domain has to know IPs of delegated name servers. That is why I
used ns1-eng instead of ns1.eng. You would have to add also glue IP
addresses if ns1.eng.idt.com were used.

eng.idt.com.   IN      NS      ns1.eng.idt.com.
eng.idt.com.   IN      NS      ns2.eng.idt.com.
ns1.eng.idt.com.   IN      A      10.2.3.4
ns2.eng.idt.com.   IN      A      10.5.6.7

I do not know how delegation from parent domain is done in AD. You have
to contact administrator of idt.com to add your domain. Change that
would force all company clients would use your server, that already
knows your domain without delegation, is not the best one. Do you want
to keep that domain internal only?

Dne 29.1.2018 v 22:18 Reineman, Rick napsal(a):
> I recently migrated our internal DNS service to a newer OS and Bind.  Bind 
> 9.9.4 on CentOS7.  I am a third level zone off the corporate zone, 
> eng.idt.com (Engineering)
> 
> In general things are working pretty well but I have one really odd problem 
> that I am struggling with.
> 
> Our Windows desktops are all on a different Active Directory/DNS domain (from 
> the Engineering UNIX hosts) as you would expect.  Out of all of my 
> Engineering DNS records one of them will not resolve from the Windows 
> desktops, bugzilla.eng.idt.com.  Everything else appears to be working fine 
> from any Windows desktop.
> 
> The only Enterprise level change made was to the corporate zone (idt.com) to 
> change the IP for zone resolution to my two new servers.
> 
> I have some dig output to demonstrate the issue.  Both are from my Windows 
> desktop, one uses the new Engineering DNS server and the other one uses one 
> of the AD servers.  I have tested several AD servers, just posting the output 
> of one.
> 
> Dig using the Engineering DNS (good response):
> C:\Program Files\dig\bin>dig @ns1.eng.idt.com bugzilla.eng.idt.com
> 
> ;; ANSWER SECTION:
> bugzilla.eng.idt.com.   86400   IN      A       157.165.1.120
> ;; AUTHORITY SECTION:
> eng.idt.com.            86400   IN      NS      ns1.eng.idt.com.
> eng.idt.com.            86400   IN      NS      ns2.eng.idt.com.
> 
> Dig using one of the AD/DNS servers (bad response):
> C:\Program Files\dig\bin>dig @corpdc12.na.ads.idt.com bugzilla.eng.idt.com
> 
> ;; AUTHORITY SECTION:
> eng.idt.com.            312     IN      SOA     ns1.eng.idt.com. 
> root.eng.idt.com. 2018012901 10800 900 604800 86400
> 
> 
> I sure could use a suggestion.
> 
> Thanks,
> Rick
> 
> _______________________________________________
> Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
> from this list
> 
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users
> 

-- 
Petr Menšík
Software Engineer
Red Hat, http://www.redhat.com/
email: pemen...@redhat.com  PGP: 65C6C973
_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to